Use SQL to write the following queries: 1. a) Find the last names of students born after January 1, 2000 b) Find the student last names, dates and grades of exams they passed, where a grade was greater than or equal to 8 c) Find the first and last names of students who took to at least one exam from "Computer Science" programme d) List professor IDs of top 5 professors who teach the most courses e) Calculate the average credits for courses in each programme f) Find the surnames of students who have never taken an exam from "Mathematics" programme
Q: write c++ program. Two words are said to be anagrams if they contained the same characters but in…
A: I have provided C++ CODE along with CODE SCREENSHOT and OUTPUT SCREENSHOT...
Q: Events Search Start Explore Interactive map Map view Event Place categories Top categories Live…
A: An activity diagram is a UML (Unified Modeling Language) diagram that visually represents the flow…
Q: Research the design and implementation of high-speed data cables, such as coaxial cables, fiber…
A: The design and implementation of high-speed data cables, including coaxial cables, fiber optics, and…
Q: How can software dependencies be managed in a continuous integration and continuous delivery (CI/CD)…
A: Continuous Integration and Continuous Delivery (CI/CD) form a dynamic and collaborative approach to…
Q: Sorting - Lab #7 Create a class called Sort that has three static methods for sorting integer…
A: SOLUTION -Bubble Sort:Iteratively compares adjacent elements and swaps them if they are in the wrong…
Q: Changing directories You will need to implement change_directory so that it changes the current…
A: In this question we have to write a C code for the changing the directories so, it chages the…
Q: Part 1 unbalanced binary search trees Add the following numbers, in the order given, to a binary…
A: Binary Search Tree has the following properties:The left subtree contains keys less than the node’s…
Q: Propose a new approach to optimizing the performance of computer systems for specific applications.
A: In this question we have to understand about the approach to optimizing the performance of computer…
Q: Teemo has just received a message from Draven that was encrypted using the RSA algorithm. The public…
A: Formula for decryption:F(c, d) = cd mod nWhere c is ciphertextd, n public key
Q: Develop a process for evaluating the risk of software dependencies.
A: In the world of software development, it is vital to understand and effectively manage the risks…
Q: Suppose you are to design a payroll program where the user inputs the employee's name, number of…
A: The objective of the question is to design a payroll program that calculates and prints a summary of…
Q: / lab8ExB.cpp #include using namespace std; void insertion_sort(int *int_array, int n); /*…
A: In this question we have to understand and write the C++ code for the insertion methods as per the…
Q: What are some of the latest trends in software development
A: In the rapidly evolving realm of software development, staying abreast of the latest trends is…
Q: What are the different types of computer memory?
A: A fundamental component of a computer is memory, which stores and retrieves data for processing.…
Q: Why is legal protection for e-commerce important and why does it matter?
A: The objective of the question is to understand the importance of legal protection in the context of…
Q: Write down all the possibilities in the following scenarios, and give the count in each case: 1) A,…
A: 1)The following are possibilities in this scenario:{A, B}, {A, C}, {B, C} (3…
Q: Array P = [40, 30, 25, 10, 35, 5, 20] Suppose the dimension of 6 matrices (A1, A2 … A6) are given by…
A: The Matrix Chain Multiplication algorithm optimally parenthesizes a sequence of matrices to minimize…
Q: Explore the advantages and limitations of utilizing media-sharing websites, where you can share your…
A: Media- sharing websites are online platforms that allow users to upload, share, and…
Q: Write a program that generates N random numbers between 1 and 1000. The program should print out a…
A: 1. is_prime(n) Function:Input: A positive integer n.Output: Returns True if n is prime, and False…
Q: Construct a 16-bit serial-parallel counter, using four 4-bit parallel counters. Suppose that all…
A: The 16-bit serial-parallel counter is constructed by organizing four 4-bit parallel counters in…
Q: How can computer systems be protected from security threats?
A: Computer systems face a range of security threats, including malware, viruses, unauthorized access,…
Q: JAVA PROGRAM ASAP ************* THE PROGRAM MUST WORK IN HYPERGRADE AND PASS ALL THE TEST…
A: Inside main function :Run a while loop which works till a break condition does not appearTake input…
Q: How the powerpoint slide for conclusion should be arranged?
A: To encapsulate your main ideas and make a lasting impact on your audience, you must create a…
Q: Create a function called get_age() to input the user's age. If the user enters a value that is…
A: Here's an algorithm for the provided program:1. Define get_age Function:a. Start an infinite loop.b.…
Q: 5.04-3. Bellman Ford Algorithm - a change in DV (1, part 3). Consider the network below, and suppose…
A: The Bellman-Ford Algorithm is a graph traversal algorithm used to find the shortest paths from a…
Q: Classes are a way of grouping data and functions together in C++. True or False
A: In C++ programming, a class is a blueprint for creating objects—a user-defined data type that…
Q: 4.3-2b. Network Address Translation (b). Consider the following scenario in which host 10.0.0.1 is…
A: The NAT translation table entry you provided indicates that there is a translation between a WAN…
Q: Each box of Healthy Crunch breakfast cereal contains a coupon entitling you to a free package of…
A: Healthy Crunch breakfast cereal sweetens the deal with a free package of garden seeds in each box.…
Q: Elaborate on the role of network cables in connecting computers to form a network.
A: A gathering of linked computers with the capacity to trade information and assets is known as a…
Q: Propose at least two legal or technological solutions that might enhance the transaction of business…
A: The objective of the question is to identify and propose at least two legal or technological…
Q: Explain the NOR technology of Flash memory.
A: NOR flash mеmory is a type of non-volatilе mеmory that usеs floating-gatе transistors to storе data.…
Q: Investigate the impact of multiprocessing on heat dissipation and cooling solutions in mobile…
A: In this question we have to understand about the impact of multiprocessing on heat dissipation and…
Q: What are the different tools and resources available for evaluating software dependency?
A: Software dependency refers to the relationship between different software components, where one…
Q: Using Java create a program for each Inheritance and Polymorphism
A: The objective of the question is to create two separate Java programs demonstrating the concepts of…
Q: a. Normalize the Bank Accounts Table to 1NF by increasing the records in the existing table.
A: AccountHolderID AccountHolderName C111 Joe Smith C222 Sue…
Q: Give a regular expression for each of the following sets. Set of all strings of 0s and 1s…
A: Set of all strings with at least one 0:Look for any string with the number 0 in it. The expression…
Q: Discuss the role of artificial intelligence (AI) in software development.
A: 1) Artificial Intelligence (AI) in software development refers to the incorporation of advanced…
Q: 6.4-4. Self Learning Switches (a). Consider the network below with six nodes, star-connected into an…
A: A sеlf-lеarning switch is a type of nеtwork switch that can automatically lеarn thе MAC addresses of…
Q: How do compilers and interpreters work?
A: Compilers and interpreters are components, in the field of computer science.They have a role in…
Q: There are two tribes on the island of Tufa: the Tu's, who always tell the truth, and the Fa's, who…
A: The island of Tufa is home to two distinct tribes: the Tu's, known for their unwavering commitment…
Q: Selection Sort The selection sort improves on the bubble sort by making only one exchange for every…
A: In this question we have to understand about the selection sort process for the given list and…
Q: What are some common risks associated with software dependencies?
A: Software dependencies are components, libraries, modules that a software system relies on to…
Q: How can development teams stay up-to-date with the latest trends and technologies?
A: Here are some tactics:Encourage team members to set aside time for learning as part of continuous…
Q: Discuss the importance of risk management in software development.
A: Risk management is essential concept in software development as it detects the potential problems…
Q: Explore the role of virtualization and containers in managing multiple operating systems on a single…
A: Virtualization and containers are concepts when it comes to managing operating systems (OS) on a…
Q: How do I make these computations using IEEE-754 single precision representation? a. 4.75 + 7.75 =…
A: In this question we have to perform the IEEE-754 single precision computation.Let's understand and…
Q: Write an application for Nina’s Cookie Emporium named CookieDemo that declares and demonstrates…
A: The objective of the question is to create a program that models a cookie order system for Nina's…
Q: Vertically Centered Triangle And now, modify the above program to center the triangle vertically as…
A: The code was successfully altered to accomplish both vertical and horizontal centering in response…
Q: void hanoi(int n, char source, char auxiliary, char target) { if (n > 0) { hanoi(n-1, source,…
A: void hanoi(int n, char source, char auxiliary, char target) {if (n > 0) {hanoi(n-1, source,…
Q: 3. Consider the relation schema R = (A,B,C,D). For each of the following set of FDs, do the…
A: A property known as lossless join decomposition guarantees that a relation (table) remains similar…
Step by step
Solved in 3 steps
- Material : Relational Algebra Course : Database Systems Create a Relational Algebra From Entity Relational Diagram (ERD) Below for:a) Displays books published in the last 5 years from 2020.b) Displays details of customers who have done shopping (using the Join operator)c) Displays email customers who have done shopping (using the Set operator)d) Displays the ISBN book that has never been purchased (using the Set operator)Database Schema The schema for the Ch07_FACT database is shown below and should be used to answer the next several problems. Click this image to view it in its own tab. FIGURE P7.56 THE CH07_FACT ERD CHECKOUT PATRON PK Check Num PK Pat ID FK1 Book_Num FK2 Pat_ID Check_Out_Date Check_Due_Date Check_In_Date >0-----H- Pat_FName Pat LName Pat_Type BOOK AUTHOR PK Book_Num PK Au ID Book_Title Book_Year Book_Cost Book_Subject FK1 Pat_ID Au_FName Au_LName Au_BirthYear WRITES PK,FK1 Book Num PK,FK2 Au ID The CIS Department at Tiny College maintains the Free Access to Current Technology (FACT) library of e-books. FACT is a collection of current technology e-books for use by faculty and students. Agreements with the publishers allow patrons to electronically check out a book,write the schema that descibes the following relations: 1- The course relation course id title dept.name credits Intro. to Biology Biology Biology Biology Comp. Sci. Comp. Sci. Comp. Sci. Comp. Sci. Comp. Sci. Elec. Eng. BIO-101 4 BIO-301 BIO-399 CS-101 CS-190 CS-315 CS-319 Genetics 4 Computational Biology Intro. to Computer Science Game Design Robotics 3. 4. 4 Image Processing Database System Concepts Intro. to Digital Systems Investment Banking World History Music Video Production CS-347 ЕЕ-181 FIN-201 3 3 Finance HIS-351 MU-199 PHY-101 History Music Physical Principles Physics 4
- SQL DDL corresponding to this schema (i.e. the CREATE TABLE statements Database Schema:branch ( branch_name, branch_city, assets )customer ( ID, customer_name, customer_street, customer_city )loan ( loan_number, branch_name, amount )borrower ( ID, loan_number )account ( account_number, branch_name, balance )depositor ( ID, account_number )You are given the following schema of a University, where primary keys of each table areunderlined and symbol (#) symbolises foreign keys:Student (student_id, first_name, last_name, date_of_birth)Course (course_id, #professor_id, course_name, credits, programme)Exam (#student_id, #course_id, exam_date, grade)Professor (professor_id, first_name, last_name, research_field) -Use DOMAIN or TUPLE RELATIONAL CALCULUS to write thefollowing queries:a) Find the last names of professors who have taught a course with 6 creditsb) Find all student IDs of students who are born before January 1, 1999 or have passed at leastone exam with a 10c) Find the last names of professors who have never taught a coursed) Find the last name(s) of the professor(s) who teach the most coursesThe following four tables form part of a library database: • Book (isbn, title, author, genre, price) • Copy (copyId, isbn) • Loan (userId, copyId, loanDate, dueDate) • User (userId, name, address, email) Where: • Book contains details of books and isbn is the primary key• Copy contains details of individual copies of books and copyId is the primary key• Loan contains details of loans and (userId, copyId, loanDate) forms the primary key • User contains details of library users and userId is the primary key 3.1 Identify the primary in the above schema. 3.2 Identify the foreign keys in the above schema. 3.3 Draw an Entity relationship model (ER-model) for the above schema, including: • all attributes• correct notation for primary and foreign keys • relationships• multiplicities 3.4 Draw sample tables for the above relations, ensuring relational integrity rules are met. 3.5 Explain the Entity Integrity constraint with reference to the Book relation.
- You are given the following schema of a University, where primary keys of each table areunderlined and symbol (#) symbolises foreign keys:Student (student_id, first_name, last_name, date_of_birth)Course (course_id, #professor_id, course_name, credits, programme)Exam (#student_id, #course_id, exam_date, grade)Professor (professor_id, first_name, last_name, research_field) -Use RELATIONAL ALGEBRA to write the following queries:a) Find names and surnames of professors, who teach a course in "Biology" programmeb) Find the student IDs and names of students who have not taken any exam (from any course)c) Find student IDs of students who have passed every exam from "Data Science" programmed) Find the course IDs and names of courses that have been passed by at least two differentstudents (If a course was taken, it means that a student wrote an exam on that course)Computer Science Create a SQL Code for the following ER diagram/Schema. choose any data type you think is appropriate for each of the attributes (int, numeric, varchar, etc.). Make sure that your SQL code includes all the constrains depicted in the schema! User Follows Follows u id follower id u id username u id birthyear User username birthyear Event Participates Participates u id e id e id topic day e id month day Event month topic (a) (b)CUSTOMER (Cust#, Cname, City)ORDER (Order#, Odate, Cust#, Ord_Amt)ORDER_ITEM (Order#, Item#, Qty)ITEM (Item#, Unit_price)SHIPMENT (Order#, Warehouse#, Ship_date)WAREHOUSE (Warehouse#, City) Given the database model above, propose a solution for the below business requirement:Business requirement: Assume this database belongs to an e-commerce application and the company has several warehouses in different cities. The company wants to optimize its item shipment time. You can propose a series of SQL queries. Explain your answer in details.
- An E-learning website needs your help to design its database. They need to store information about teachers and online tutorials. Each teacher has a unique ID, name, and at least one field of specialty. Teachers form groups to prepare online tutorials. Each group has unique name and at least one teacher as a member. Each online tutorial has a title, date and organized by exactly one group. The title of the tutorial is unique for the group. Each tutorial consists of several sessions, described by their titles and durations. Naturally, each session is presented by one teacher and belongs to exactly one tutorial. In addition, sessions on the same tutorial have different titles. Design an ERD for this application. Note any unspecified requirements, and make appropriate assumptions to make the specification complete.BOOK Book_id Title Publisher_name BOOK AUTHORS Book_id Author_name PUBLISHER Name Address Phone BOOK_COPIES Book id Branch_id No_of_copies BOOK LOANS Book_id Branch_id Card_no Date out Due_date LIBRARY_BRANCH Branch_id Branch_name Address BORROWER Card_no Name Address Phone Consider the LIBRARY relational database schema shown in Figure 8.14, which is used to keep track of books, borrowers, and book loans. Referential integrity constraints are shown as directed arcs in Figure 8.14. Write down relational algebra expressions for the following: A) Find the total number of books published by Macmillan Publishers B) Find the address of the borrower whose card number is '101' C) List the names of the publishers of all the books authored by Dan Brown D) List the names of all the authors and the total number of books each of them authoredConvert the following Relation into INF, 2NF, and 3NF and show the functional dependencies. StudentID StudentName Major CourselD CourseTitle InstructorName InstructorLocation Grade D-Building A-Building C-Building C-Building A-Building D-Building A-Building 111 Kevin CS CS201 Bob Computer Marketing Accounting Accounting Jeff 111 Kevin CS МАЗ3 Jeff 111 Kevin CS АCC234 Sarah 222 Alex BA АСC234 Sarah B. 333 МАЗ33 Marketing Computer Marketing Noor MA 444 CS201 Bob Luay Adam BA A 555 AC МАЗ33 Jeff