1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.​

Answers

Answer 1

Answer:

The SQL queries are as follows:

1. select * from customer

select * from sale

select * from product

2. select name, sex from customer

3. select * from customer where sex = 'male'

4. select name, age from customer where sex = 'male'

5. select name, price, color from product

Explanation:

Given

Tables: customer, sale, product

Required

Answer question 1 to 5

(1) All data in the given tables

To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.

So, we have:

select * from customer --> This lists all data from customer table

select * from sale --> This lists all data from sale table

select * from product --> This lists all data from product table

(2) Selected details from customer table

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, sex from customer

(3) Male customers

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve male customers, we introduce the where clause

So, we have:

select * from customer where sex = 'male'

(4) Name and age of male customers

In (3), we have:

select * from customer where sex = 'male'

To retrieve the name and age, we replace * with name and age. So, we have:

select name, age from customer where sex = 'male'

(5) Name, price and color of products

In (1), we have:

select * from product --> This lists all data from product table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, price, color from product


Related Questions

What will the following code display?


A) 6

B) 0

C) 3

D) 0

1

2

Answers

Answer:

Answer is C) 3

Explanation:

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Answers

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply

Answers

Answer: Input Voltage

Explanation:

Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.

The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue

Answers

Answer: Increase your staging folder quota by 20%

Explanation:

The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.

Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.

who invented pascaline and when?​

Answers

Pascaline, also known as Pascal's calculator or arithmetic machine, was invented by [tex]\sf\purple{Blaise\: Pascal}[/tex] between [tex]\sf\red{1642\: and\: 1644}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search

Answers

Answer:

n/2

Explanation:

A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.

Answers

Answer:

"Virtual reality" is the appropriate answer.

Explanation:

The utilization of technological advances gives the impression of a 3D interactive environment wherein the things that have such a perception of space embodiment or involvement, are considered as Virtual reality.

Virtual reality implementations often include:

Entertainment,Medical and Educational activities.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

La historia de los productos tecnologicos
porfa

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.

La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.

You have just assembled your first PC. You hit the power button and the computer turns on. As the computer runs through POST, it starts beeping multiple times and you don't see anything displayed on the LCD. You notice there are no activity lights flashing for the HDD. However, when you check the inside of the computer, you can hear the drive spinning up. What is the NEXT thing you are going to check in order to get the PC functioning

Answers

Answer:

Explanation:

If the HDD is spinning, this means that the power cable is correctly connected and that the drive is receiving power and powering on. However, this does not mean that the HDD is functioning correctly and reading the information. Therefore, the next logical step would be to check the SATA cable that connects the drive to the motherboard. The cable may be broken or maybe the SATA slot on the motherboard. Switch out the cables and plug it into another slot. If this does not work, then it may be that the HDD is broken. Multiple Beeps can also mean that the RAM or CPU is not plugged in correctly or broken.

You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?

Answers

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.

A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

Answers

Answer:

Closed

Explanation:

When a connection has been terminated and no communication is possible between the communicating network devices, the Transmission Control Protocol (TCP) socket would be closed.

the user cannot use a computer system without.................... software

Answers

Answer:

the user cannot use a computer system without hardware and software

Answer:

the user cannot use a computer system without.........hardware.....and...... software

A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions, you find out that his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right. What could be the problem

Answers

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Write a letter of application to your school as a chemistry teacher​

Answers

Answer:

Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

a computer takes a lot of time to do complex calculation​

Answers

Question:

A computer takes a lot of time to do complex calculation.

Answer:

False!

Hope it helps you

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

Other Questions
Complete the table for the given rule.Rule: y=\dfrac{x}{2}y= 2x y, equals, start fraction, x, divided by, 2, end fractionxxx yyy1112.52.52, point, 53.53.53, point, 5 Designing shoes is hard work. It will pay off in the end.Identify the sentence that combines the above passage into a complex sentence.Designing shoes is hard work, but it will pay off in the end. Designing shoes is hard work; however, it will pay off in the end. Designing shoes is hard work; it will pay off in the end. Although designing shoes is hard work, it will pay off in the end. Maya and Kenzie are discussing oil spills and how they impact the environment. How can humans help reduce the impact of oil spills? So fabricados nos E.U.A.?. Fabricados aqui? Espantada, ela me explicou que seus tnis so produzidos no Brasil e na sia.Bill Krenn, Gerente de relaes pblicas dos sapatos K-Swiss, retornou minha ligao, mas me interrompeu antes que eu pudesse concluir minhas perguntas. No fornecemos informaes sobre a produo, disse. S posso dizer que realizada no exterior.A maioria dos operrios que produzem sapatos no sudeste asitico de adolescentes e mulheres jovens. Eles trabalham de 15 a 16 horas dirias. Muitas mulheres vivem em alojamentos, separadas de suas famlias; em alguns casos so virtuais prisioneiras, proibidas de deixar as instalaes da fbrica sem um passe especial. O salrio mnimo na Indonsia de 1,80 dlar por dia.Telefonei para a Nike mais uma vez, na condio de jornalista. Falei com Keith Peters, diretor de relaes pblicas. Entre longos silncios, ele disse que no economicamente vivel, para a Nike fabricar seus sapatos nos Estados Unidos. (...)Aps a leitura do texto, responda:1- Quais so os lugares citados no texto?2- Qual o assunto retratado pelo texto?3- Quando e onde aconteceram tais fatos?4- Onde so fabricados os produtos consumidos nos EUA?5- Porque os EUA produzem e compram tnis na sia e no fabricam em seu prprio pas? Explique. What is the chemical formula of potassium manganate vii how do i convert 134five to base ten A derivative work is also granted copyright protection with a half paid write up. Give four examples of such work. Pls help .ZZZZZZZZA what do you mean by compound sentence? Explain. 5. A child rides a pony on a circular track with a radius of 5 m Find the distance traveled and the placementafter the child has gone halfway around the track (8) Does the distance traveled increase, decrease, or stay thesame when the child completes one circuit of the track? Does the displacement increase, decrease, or stay thesame? Explain. (C) Find the distance and displacement ter a complete circuit of the track The chi-square test statistic is 2 = 18.68 and the P-value is between 0.0025 and 0.005. What conclusion should the researcher make? Use = 0.05. During normal beating, the heart creates a maximum 4.10-mV potential across 0.350 m of a person's chest, creating a 1.00-Hz electromagnetic wave. (a) What is the maximum electric field strength created? V/m (b) What is the corresponding maximum magnetic field strength in the electromagnetic wave? T (c) What is the wavelength of the electromagnetic wave? If an atom of chlorine (CI) were to ionize, it wouldelectron(s). 2. . Complete the following past simple and continuous events. Choose the correct alternative (10 points)1. Sylvia _____________ when she ___________ the DVDs.a) was running / droppedb) ran / droppedc) was running / was droppingd) ran / was dropping 2. While Steve ___________ a documentary, he __________ asleep.a) was watched / fellb) was watching / fellc) watched / was fallingd) was watching / felt3. They _________ when you _________ for remote control.a) aren't listening / were askingb) weren't listening / were askingc) weren't listening / askedd) listened / asked Will give brainliest answer How many meters are in 10 miles? use the formula v=u+at to find the velocity when the initial velocity is 3m/s2 the time is 7 seconds I need help ASAP thank you Progress is impossible without change, and those who cannot change their minds cannot change what is a example of this quote Graph the exponential function.f(x)=3/2(2)^xPlot five points on the graph of the function. Then click on the graph-a-function button.