Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL

Answers

Answer 1

Answer:

hi

Explanation:


Related Questions

Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exception in Firewall and enable WinRM. PowerShell has a cmdlet that can perform all of these tasks at once.
A. Start-PSRemoting.B. Enable-PSRemoting.C. Enable-PSSession.D. Get-PSRemoting.

Answers

Answer:

B. Enable-PSRemoting.

Explanation:

Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.

The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".

A __ consists of wires connecting the CPU and other parts of the computer. The __ transfers the data between the CPU and the memory unit.

Answers

Answer: A BUS consists of wires connecting the CPU and other parts of the computer. The DATA BUS transfers the data between the CPU and memory unit.
Explanation: PLATO

Please help with this

Answers

Answer:

Horizontal lines chart/graph

Please help this computer science question(Pseudocode and Trace table)

Answers

Answer:

can u explain more specific plz

Explanation:

how to earn money fast in adopt me?

Answers

Become a baby and take care of yourself and pets

Answer:                                                                                                                        If you want money in adopt me quickly, you could become a baby and buy a pet and take care of it and yourself. Also, you could purchase adopt me bucks with robux.

Explanation:

describe an activity to prove that sounds can travel in a liquid medium
in long



Answers

An activity to prove that sounds can travel in a liquid medium in long​ time is:

Use a tub  that is filled with water, also take a bell in one of your hand and then one can dip it into the water.  Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.

How do sounds travel in liquids?

Sound waves is known to be one that tends to travel a lot faster in denser forms or kinds of substances due to the fact that neighboring particles will be able to bump into each other.

Therefore, An activity to prove that sounds can travel in a liquid medium in long​ time is:

Use a tub  that is filled with water, also take a bell in one of your hand and then one can dip it into the water.  Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.

Learn more about sounds from

https://brainly.com/question/1199084

#SPJ1

What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems

Answers

Answer:

firewall

Explanation:

It is said that Wifi repeater is not good as a rumor

Answers

True your welcome bue

You manage a Windows server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.Damien needs to pause and resume documents for all users, but does not need to change printer properties.You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do

Answers

Answer:

Damien would be assign the Manage Documents permission while Sally on the other hand will be assign the permission to print.

Explanation:

Based on the information given in order for me to assign a restrictive permission that will meet the requirements of the sale manager's what I will do is for me to assign the Manage Documents permission to Damien reason been that Damien only needs to stop and resume the documents for all users in which he does not need to change the printer properties and to assign the permission to print to Sally reason been that Sally only needs to connect to a printer and to print documents in which she will then stop and resume her own print jobs.

What is cybercrime?
Describe some of the various cybercrimes?
What are the laws that govern cybercrimes?
What can we do to prevent being a victim?

Remember to provide examples.

Answers

Answer:

criminal activities carried out by means of computers or the internet is known as cyber crime.

how ssd is better than normal sata and pata HDD​

Answers


The HDD offers high storage capacities at a low price, while the SSD provides blazing fast access speeds at a higher cost.

What is the thickness of a character’s outline called

Answers

Answer:

actually is answer is font weight

hope it helped!

Why do people want phones so bad??

Answers

To help explain this, take a look at these reasons why kids should have cell phones:

#1 To keep in touch. What happens if you're running late picking your child up from school? ...

#2 To talk to friends. ...

#3 To stay safe. ...

#4 To develop essential skills. ...

#8 To improve their organization. ...

#11 To encourage responsibility.

Because we live in a world full of technology and we use it for almost everything. They made life easier in some ways

A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link bandwidths (packet travels across each of these links, in order): 1000 Mbps, 1 Mbps, 40 Mbps, 400 Mbps, 100 Mbps, 1000 Mbps. Assuming your computer and the server can transfer data at > = 1000 Mbps (so neither device is limiting the data transfer relative to the links), how long, in seconds, will it take to transfer a 125 MB file?

Answers

Answer:

0.125 seconds

Explanation:

The formula for the time taken to transfer the file is = file size / bandwidth

Assuming the computer and server could only transfer data at the speed of 1000 Mbps or more, The time of transmission is;

= 125 MB / 1000 Mbps = 0.125 seconds.

what is bullk email software​

Answers

Bull email software is a software that is used to send emails in large quantities

Hope this helps

For this exercise, you are going to write a recursive function that counts down to a Blastoff!
Your recursive function will not actually print. It will return a String that can be printed from the main function. Each recursive call will add on to that string.
In your main function, prompt the user for a starting value, then print the results.
Sample Output
Please enter a number to start:
5
5 4 3 2 1 Blastoff!
import java.util.Scanner;
public class Countdown
{
public static void main(String[] args)
{
// Start here
}
public static String countdown(int number)
{
// Base case - return Blastoff!
// Recursive call
}
}

Answers

Answer:

import java.util.Scanner;

public class Countdown {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

int n;

System.out.print("Please enter a number to start: ");

n = input.nextInt();

System.out.print(countdown(n));

}

public static String countdown(int number) {

if(number>0) {     return " "+number+countdown(number-1);    }

   else    {        return " Blastoff!";    }

}

}

Explanation:

The main method begins here

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

This declares an integer variable n

int n;

This prompts user for a number

System.out.print("Please enter a number to start: ");

This gets user input n

n = input.nextInt();

This calls the countdown function

System.out.print(countdown(n));

}

The countdown function begins here

public static String countdown(int number) {

This is the base case where input number is greater than 0

if(number>0) {     return " "+number+countdown(number-1);    }

This ends the recursion

   else    {        return " Blastoff!";    }

}

Write a recursive function named double_digits that accepts an integer as a parameter and returns the integer obtained by replacing every digit with two of that digit. For example, double_digits(348) should return 334488. The call double_digits(0) should return 0. Calling your function on a negative number should return the negation of calling it on the corresponding positive number; for example, double_digits(-789) should return -778899.

Answers

Answer:

A recursive function known as double-digit is a function that accepts as a parameter and returns the integer that is obtained by changing each digit with double digits. For example 425 should be return as 442255.

In the given scenario

the function will be as follow

If

def double_digits:

n < 0:

return -1 * double_digits ( -1 * n )

elif n = 0

return o

else:

result

double_digits ( n // 10 )

return int ( str ( result ) + str ( n % 10 ) + str ( n % 10 )

Test the function as follow

print ( double_digits ( 348 ) )

Result

334488

Test the function as follow

print ( double_digits ( 0 ) )

Result

0

Test the function as follow

print ( double_digits ( -789 ) )

Result

-778899

CPU is an abbbreviation for
1.Central processing unit
2.Computer processing unit
3.Control processing unit

Answers

Answer:

1.Central processing unit

Explanation:

CPU is an abbreviation for Central processing unit.

If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest

Answers

Answer: The answer is C     Hope this helps :)    Please mark Brainliest

Explanation:

Answer:

c) 18mm f5.6

Explanation:

For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.

Hence choice c) has the maximum aperture and does not zoom.

Hope this helps :)

For this program you are given a String that represents stock prices for a particular company over a period of time. For example, you may be given a String that looks like the following:
String stockPrices = "1,22,30,38,44,68,49,73,52,66";
Each number in this String represents the stock price for a particular day. The first number is day 0, the second number is day 1, and so on. You can always assume tha the supplied string will formatted using commas to separate daily stock prices. The individual stock prices will always be valid integers, but they many not always be the same number of digits (i.e. 1 is a valid stock price, as is 1000. Your program should work with strings of any length. The "split" method might come in handy for this problem. Your task is to analyze the supplied string and determine the following:
• The highest price for the stock
• The day when the highest price occurred
• The lowest price for the stock
• The day when the lowest price occurred
Here are two sample runnings of the program:
// First run
Please enter stock prices: 1,22,30,38,44,68,49,73, 52,66
Highest price: 73 ocurred on day # 7
Lowest price: 1 occurred on day # 0
// pecond run
Please enter stock prices: stock_prices - 41,37,40,54,51,63,54,47,23,33
Highest price: 63 occurred on day # 5
Lowest price: 23 accurred on day # 8
Write your program on the following page. You can use this page for rough work.

Answers

Answer:

price = input("Please enter stock prices: ")

x = price.split(",")

min = int(x[0])

max = int(x[0])

for i in x:

    if int(i) < min:

         min=int(i)

    if int(i) > max:

         max=int(i)

index = x.index(str(max))

print("Highest price: "+str(max)+" ocurred on day # "+str(index))

index = x.index(str(min))

print("Lowest price: "+str(min)+" ocurred on day # "+str(index))

Explanation:

This solution is implemented in Python

This prompts user for stock prices

price = input("Please enter stock prices: ")

This places the price in a list

x = price.split(",")

The next two lines initialize the lowest and highest to stock at index 0

min = int(x[0])

max = int(x[0])

This iterates through the list

for i in x:

The following if statement checks for the lowest

    if int(i) < min:

         min=int(i)

The following if statement checks for the highest

    if int(i) > max:

         max=int(i)

This gets the day for the highest stock

index = x.index(str(max))

This prints the highest price and the day it occurred

print("Highest price: "+str(max)+" ocurred on day # "+str(index))

This gets the day for the lowest stock

index = x.index(str(min))

This prints the lowest price and the day it occurred

print("Lowest price: "+str(min)+" ocurred on day # "+str(index))

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased

Answers

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

what is the purpose of writing a topic sentence​

Answers

Answer:

A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.

Explanation:

Answer:

To summarize the main point of paragraph

Explanation:

The system where the unit of measurement is centimeter

Answers

Answer:

International System of Units

Explanation:

The advancement of technology in our daily lives has changed how we interact with the world.

Answers

i agree. i think there’s less communication, more anger, mental issues.

Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.

Which mail field will Jorge use to achieve this goal?

To:
From:
CC:
BCC:

Answers

Answer:  BCC (fourth choice)

=================================================

Explanation:

CC stands for "carbon copy".

BCC stands for "blind carbon copy".

Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.

In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.

C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?

Answers

Answer:

"resume.docx" is located in "Documents"

Explanation:

[<drive-letter:: represents drive name>]:/Main_Directory/Sub_Directory/ETC..

The  "resume" is located in the "Documents" according to the file structure.

Given the information C:/Users/Documents/resume.docx, this can be interpreted as Documents is in the Users folder and the resume can be found in the Document folder.

We can also say that the document folder was created by the user and the "resume" file is placed directly into the documents.

Based on the explanation, we can say that the  "resume" is located in the "Documents" according to the file structure.

Learn more here: https://brainly.com/question/13715153

One of the following is NOT a basic linked list operation:_________.
a) search
b) insert
c) create
d) delete
e) traverse
f) destroy
g) build list from file

Answers

Answer:

One of the following is NOT a basic linked list operation:_________.

g) build list from file

Explanation:

Linked list operation is the creation of trees and graphs or a chain of data elements, which are called nodes.  Each note points to the next using a pointer.  In linked lists, each node consists of its own data and the address of the next node.  A linked list, which may be single, double, or circular, forms a chain-like structure that builds from one node to the other.

I'm in Paris and want to take a picture of my mom in front of the Eifel Tower. I want both her and the tower to be in sharp focus. Which aperture is likely to do the best job of giving me that deep depth of field?
a) 2
b) 5.6
c) 11
d) 22
50 Points and brainliest mark

Answers

Answer:

Explanation:

It depends on the day. 5.6 might be best if it is a cloudy day. 2 would not work under any conditions.

11 might work well on a hazy day, but the sun is sort of visible.

A nice clear sunny day would allow you to use 22.

Answer:

Generally, a small aperture like f/8 will give you enough depth of field to be able to make most of your image sharp. However, if the subject is too close to your camera, you might need to either move back or stop down the lens even further to get everything looking sharp

And mostly :

It depends on the day. 5.6 might be best if it is a cloudy day. 2 would not work under any conditions. 11 might work well on a hazy day, but the sun is sort of visible. A nice clear sunny day would allow you to use 22.

Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this
purpose?
Mary needs to choose the _________
menu in order to place the text in a desired fashion around the image

Plato btw

Answers

Answer:

she needs to choose the insert menu

Denise is using Outlook 2016 in a business environment. Her company operates a Microsoft Exchange email server.

When Denise uses the address book, which tool is she using by default?

Offline Address Book
Personal Address Book
Global Address List
Custom Address List

Answers

Answer:

Custom Address link

Explanation:

Answer:

D custom address list

Explanation:

Edge 202

Other Questions
HELP PLEASE!!Celeste found this article in a neighborhood newsletter.Hey, Kiddos! Come and join the gang at our Spring Fling next Saturday, March 20. Meet at the North Pavilion at 11:30 a.m. for games, prizes, and a tug-of-war. Therell be hot dogs and root beer floats! Don't forget sunscreen and a lawn chair.The intended audience for this article isA. young children in the neighborhood. The writer's style is informal, and the purpose is to persuade kids to come to a party.B. parents in the neighborhood. The writer's style is informal, and the purpose is to educate adults about a community party.C. young children in the neighborhood. The writer's style is formal, and the purpose is to educate children about community traditions.D. parents in the neighborhood. The writer's style is formal, and the purpose is to entertain readers with funny stories of a neighborhood event. I need help with algebra 2 I GIVE BRANLILSETMaddie prepared 24 kilograms of dough after working 6 hours. How many hours did Maddie work if she prepared 40 kilograms of dough? Assume the relationship is directly proportional. the surface "s" area of a sphere of radius " r" is given by the formula of s= 4r^2find;1, the surface area of a sphere whose radius is 5 cm 2,the radius of a sphere whose surface area is 23716/81 15. Name the element that has 3 energy levels and 3 valence electrons. * To create an image, the lens of an eye ________ focuses light on the cornea reflects light away from the retina bends the cornea to correct vision focuses light on the retina What is the value of 3x^2+4x+12 when x=-2 please help me answer this question!! will give brainliest and 5 star rating!! The President can serve no more thanyears in office. What figurative language device is being used in this sentence from thenovel? But soon the steeples called good people all to church and chapel,and away they came, flocking through the streets in their best clothes,and with their gayest faces." * Adams Company is a manufacturing company that has worked on several production jobs during the first quarter of the year. Below is a list of all the jobs for the quarter: Job. No. Balance 356 $ 450 357 1,235 358 378 359 689 360 456 Jobs 356, 357, 358, and 359 were completed. Jobs 356 and 357 were sold at a profit of $500 on each job. What is the balance of Sales for Adams Company at the end of the first quarter The partial factorization of x2 3x 10 is modeled with algebra tiles. An algebra tile configuration. 1 tile is in the Factor 1 spot: and is labeled + x. 6 tiles are in the Factor 2 spot: 1 is labeled + x and 5 are labeled negative. 18 tiles are in the Product spot: 1 is labeled + x squared, 2 are labeled + x, the 5 tiles below + x squared are labeled negative x, and the 10 tiles below the + x tiles are labeled negative. Which unit tiles are needed to complete the factorization? What does it mean to have a public defender? That a defendant is representing him-or herself. That a defendant was found guilty of the crime. That a defendant gives up the right to a jury trial. That a defendant cannot afford to pay an attorney. Perry Freight Co. leased a trailer to Harper Inc. for use in delivering inventory. The finance lease has a 3-year term, 5% implicit rate, and begins on January 1, 2018. The lease requires a down payment of $10,000 and two equal annual lease payments on December 31 of 2018 and 2019. The list price of the trailer on the inception date is $50,000. What is the dollar amount of each annual payment that Perry Freight Co. will receive Assume that you have a choice between a manufacturing job and a sales job. The annual earnings from the manufacturing job will have a normal distribution with a mean of $40 000 and a standard deviation of $9 000. The annual earnings from the sales job will have a normal distribution with a mean of $35 000 and a standard deviation of $9 000. What is the probability that you would earn more than $45 000 per year if you select one or the other When we look at a visual stimulus, our impressions may seem fluid enough; however, they consist of a series of eye fixations referred to as _________. What is 1.2 + 6.07 =? A number p is less than 6 and greater than 2. Whats the inequality? How do the terms loose interpretation and strict interpretation help you to better understand the beliefs of Hamilton and Jefferson? HELP ASAP I WILL GIVE 25 POINTS AND MARK BRAINLIST!!!!!!