Student:Kavita
Q: Write a program to reverse the elements present in the queue. Make a reverseQueue() function. Use a…
A:
Q: What are the levels of TCP/IP called? In what sequence do you want to describe each layer of the…
A: TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is one of the most commonly…
Q: Size of the memory =Number of Wordsx Number of bits per word
A: The answer is
Q: 3 In mobile cellular networks 4G, if a user is constantly moving (i.e., changes the visited network…
A: The statement given is:- What if a user is moving constantly (i.e., changes the visited network…
Q: If you were writing code for a real-time operating system, how would you go about designing it? If…
A: Real-time operating system (RTOS) Operating System in Real TimeReal-time operating systems vary from…
Q: portable computers, what type of operating system is the most common one used?
A: Any portable computer is a computer that includes a display and keyboard in one/single unit,…
Q: Which Commands can be Used to See Trunk Interfaces? (Choose two
A: Please refer below for your reference: Commands can be Used to See Trunk Interfaces are: 1) show…
Q: How can a two-tier client–server architecture suffer from a fundamental flaw? Describe how a…
A: Given: The customer is on the first layer of a two-tier architecture. The database server and web…
Q: #include using namespace std; int main () { clrscr(); int feet; float meters; cout>feet ; meters =…
A: In the given program the variable feet has data type int and the variable meters has float datatype.…
Q: Software modeling and software development are two distinct processes. What is the difference?…
A: let us see the answer:- Introduction:- Individual modules/components are designed in software…
Q: Among other things, dimensional modeling is a technique for organizing and presenting data in order…
A: Purpose of dimensional modeling is to optimize: Dimensional modelling is a way to organize and show…
Q: Write a function foldl (also called reduce) with type: foldl: ('a * 'b -> 'b) -> 'b -> 'a list -> 'b…
A: It is defined as a block of organized, reusable code that is used to perform a single, related…
Q: Describe five devices that may be used to shift windows while using a laptop in detail.
A: let us see the answer:- Introduction:- When using a laptop, there are a variety of gadgets that can…
Q: Write a concise report for your team outlining the five most important factors to examine in order…
A: As with congestion on highways, which causes vehicles to take significantly longer to reach their…
Q: Provide your thoughts on "time-variant" and "time-invariant" Data Base systems, as well as some…
A: Time Invariant Database Structures: If the properties of the inputs and outputs of a system do not…
Q: Question 1 A) Divide and Conquer (Mergesort) sorting Start 45 31 78 69 98 20 55 30 B) SHELL sorting…
A: The code is given below.
Q: Explain how Internet technologies are used in the development of a process in one of the company's…
A: INTRODUCTION: Here we need to tell Internet technologies are used in the development of a process in…
Q: to have the fewest possible pipeline risks. Do all assemblers and compilers optimize the same manner…
A: The answer is
Q: Considering artificial intelligence's historical progress, what do you think the future holds for…
A: Artificial Intelligence: Artificial Intelligence (AI) is transforming the future of almost every…
Q: Explain the following sprint terminology: Planning for a sprint Backlog for the sprint Goal for the…
A: PLANNING IN SPRINTS - Sprint planning is a kind of action in Scrum that serves to kick off the…
Q: Software modeling and software development have distinct differences. Provide an explanation of how…
A: Software Development: Software development is a collection of computer science activities concerned…
Q: Methodically examine and explain the many phases of a multimedia project's development?
A: The display of information utilizing words, sounds, graphics, animations, and videos is known as a…
Q: What is the idea of process synchronization, and how is it defined?
A: Process Synchronization is the errand of planning the execution of cycles such that no two cycles…
Q: Demonstrate the corresponding output for the given program. Give your analysis for results of the…
A: Explanation for logic:- A variable sum is assigned with 0 at the start. Then a loop is used for…
Q: Which of the following conversion procedures is appropriate? Update ABM/ATM software Upgrading a…
A: A management system: A management system is an organized collection of rules, processes, practises,…
Q: What are some of the drawbacks of moving to an enterprise-level analytics solution for end users who…
A: An enterprise-level analytics system is a secure, adaptable platform that collects, analyses, and…
Q: How does using a second hard drive for the paging file benefit the user?
A: Secondary hard drives are commonly used to expand a computer's data storage capacity, but they can…
Q: now the four stages of netwo
A: Bellow the four stages of network growth??
Q: What are the positive and negative aspects of the current network environment?
A: Answer the above question are as follows:
Q: (Count occurrence of numbers) Write a program that reads at most 100 integers between 1 and 100 and…
A: First, we will input the elements. Then we will find the frequency of each element and store them in…
Q: Analysis of relational schemas and normalization Consider the following conceptual schema of a…
A: Solution :: functional dependency is a restriction that specifies the relationship between two…
Q: Why RISC processors have simple instructions taking about one clock cycle. The average clock cycle…
A: RISC( Reduced Instruction Set Computer ) processor have simple & limited sets of instruction…
Q: compare and contrast a cuniform tablet to a smart phone
A: It is the first ever known writing and was developed around 3200 B.C.E.The texts were carved on…
Q: List the many sorts of personality qualities; how would you advise employees on which personality…
A: Different types of personality traits that a staff is advice to have for the organization are :…
Q: 8.00 programming Howchart to given namber Draue print 900 a Multip lice tion tablk for Wing 00 - wer…
A:
Q: Suppose that the head of a disk drive is currently at track 9, that the disk has 32 tracks per…
A: head of the drive is at track 9
Q: What is the responsibility of the IT risk manager in dealing with the dangers of the physical…
A: Given: To begin, we must understand what risk management is. Risk management is the act of…
Q: Write a program to recognize the input "script" as a command and then split the following command "…
A: According to the information given:- We have to follow the instruction in order to create input…
Q: XCHG AX, DS
A: It is false : XCHG AX, DS
Q: Typed answers are easier for students to read than handwritten notes
A: Introduction: With our smartphones and laptops, we are typing on keyboards more frequently than…
Q: What exactly is OWASP Zed Attack Proxy (ZAP) (previously WebScarab)? What kind of security tests can…
A: Eavesdrop: An eavesdropping assault, also known as a sniffing or spying attack, is when a computer,…
Q: Not just the variable's type, but also its "additional attributes" must be mentioned. Other than a…
A: Please refer below for your reference: Variables Properties are below: Name: name of a variable is…
Q: Using both TCP and UDP, which of the following protocols is it?
A: Start: However, it is usual practise to utilise the same service on the same port number every time.…
Q: Is it feasible to use optical discs that can be written to again? Disc rewrites are possible, but…
A: Rewritable discs represent the next phase in media development. CDs and DVDs are analogue storage…
Q: Question 5 When writing a recursive method, O you do not need to know ahead of time exactly how many…
A:
Q: What is the reason why computer security has evolved into what it is today?
A: Information technology security, also known as cybersecurity or IT security, is the process of…
Q: Moore: Why does he believe he can talk about ICs? What does debugging mean? What does the phrase…
A: Introduction: The purpose of this response is to define a few terminology. These words have anything…
Q: e) A Web page has a unique address called a A is a program that finds Web sites, Web pages, images,…
A: e. A Web page has a unique address called a Uniform Resource Locator. Uniform Resource Locator is an…
Q: Many key challenges must be addressed when information systems are not integrated?
A: Definition: Integrated information systems are information systems that combine data from several…
Q: he use of internet search engines raises many legal and ethical difficulties.
A: A search engine is an information recovery system designed to assist with finding information stored…
3. Create a table for student mark list and insert the values for name, id, m1,m2,m3,m4,m5, total and grade of each student. Calculate the grades using “if else / nested if” statement and display the total no. of student, total marks and grade of each student.
Output:
Total 5 Students
Student:Kavita, Marks:98
Student:Pritam, Marks:97
Student:Ayan, Marks:78
Student:Rishav, Marks:87
Student:Aziz, Marks:92
Do it in oracle sql
Step by step
Solved in 2 steps
- 9. Write a SELECT statement that uses aggregate window functions to calculate the total due for all vendors and the total due for each vendor. Return 3 Columns: The vendor id from the Invoices table. The balance due (invoice_total-payment_total-credit_total) for each invoice in the invoices table with a balance greater than 0. The total balance due for all vendors in the Invoices table. Modify the column that contains the balance due for each vendor so it contains a cumulative total by balance due.Please write a view to list staff’s names, salary, ages, and their supervisors’names, salary, and ages for all staff whose supervisor’s age is younger than the staff’s age and theirsupervisor’s salary is higher than the staff’s salary. You should use Staff2 table. The output headerneeds to distinguish between staff and manger: (E_name, E_salary, E_age, M_name, M_salary, M_age)5.17 LAB - Select horses with logical operators The Horse table has the following columns: ID - integer, primary key RegisteredName - variable-length string Breed - variable-length string Height - decimal number BirthDate - date Write a SELECT statement to select the registered name, height, and birth date for only horses that have a height between 15.0 and 16.0 (inclusive) or have a birth date on or after January 1, 2020.
- 2.7 LAB - Alter Movie table The Movie table has the following columns: ID - integer, primary key Title - variable-length string Genre - variable-length string RatingCode - variable-length string Year - integer Write ALTER statements to make the following modifications to the Movie table: Add a Producer column with VARCHAR data type (max 50 chars). Remove the Genre column. Change the Year column's name to ReleaseYear, and change the data type to SMALLINT.Write a SELECT statement that returns the following columns from the PRODUCT_INFORMATION table. Sort the results by PRODUCT_ID in ascending order. 1. PRODUCT_ID 2. PRODUCT_NAME 3. LIST_PRICE ○ Use the TO_CHAR function to convert LIST_PRICE to a character string with the currency formatting Give this field an alias of PRICEQ. Write a trigger that checks the length of a contract when a new contract is inserted into longtermcontract table. If this is the first contract between the pharmacy and pharmaceutical company, the length of the contract should not be more than 12 months. If the contract is more than 12 months, the trigger should alter the end date and reduce it to 12 months after the start date. * You have to use BEFORE INSERT ON* THE INSERT STATEMENT IN THE END OF THE GIVEN CODE MUST WORK. GIVEN CODE:-- Do not change the name of the triggerdelimiter //create trigger first_contracts_length_limitation -- do not modify or delete the following lines. Do not write anything after this line.insert into longtermcontract values('parapharmaceutical', '24 South St., Fabreville, QC H7P-E2H', '2020-02-01', '2021-04-01', '***'); SCRIPT:
- Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.The monthly payment M of a loan amount P for y years and with interest rate r can be calculated by the formula: P(r/12) M = 1-(1+r/12)-12y Calculate the monthly payment and the total payment for a $100,000 loan for 10, 11, 12, ..., 29, 30 years with an interest rate of 4.85%. Display the results in a three-column table where the first column is the number of years, the sec- ond is the monthly payment, and the third is the total payment.Write a SELECT statement that returns all rows with salary, last name, street address and ZIP code (SALARY, LAST_NAME, STREET, ZIP_CODE) from the EMPLOYEE and ADDRESS tables, sorted by SALARY from largest to smallest. STREET and ZIP_CODE are in the ADDRESS table, while the other fields are in the EMPLOYEE table. The common key is EMPLOYEE_ID.
- Task 6: Create the GET_INVOICE_DATE procedure to obtain the customer ID, first and last names of the customer, and the invoice date for the invoice whose number currently is stored in I_INVOICE_NUM. Place these values in the variables I_CUST_ID, I_CUST_NAME, and I_INVOICE_DATE respectively. When the procedure is called it should output the contents of I_CUST_ID, I_CUST_NAME, and I_INVOICE_DATE.5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is stored in I_CUST_ID. Place these values in the variables I_CUSTOMER_NAME and I_CREDIT_LIMIT, respectively. When the procedure is called it should output the contents of I_CUSTOMER_NAME and I_CREDIT_LIMIT. HERE'S MY QUERY -- create a procedure named GET_CREDIT_LIMIT -- use I_CUST_ID as a input parameter -- use I_CUSTOMER_NAME, I_CREDIT_LIMIT as output parameters -- select columns CONCAT(FIRST_NAME, ' ', LAST_NAME), CREDIT_LIMIT and store the values in I_CUSTOMER_NAME, I_CREDIT_LIMIT -- using where clause to match the CUST_ID to currently stored in I_CUST_ID(provided as a parameter) DELIMITER // CREATE PROCEDURE GET_CREDIT_LIMIT ( IN I_CUST_ID int, OUT I_CUSTOMER_NAME varchar(75), OUT I_CREDIT_LIMIT decimal(10,2) ) BEGIN SELECT CONCAT(FIRST_NAME, ' ', LAST_NAME), CREDIT_LIMIT INTO I_CUSTOMER_NAME, I_CREDIT_LIMIT FROM CUSTOMER WHERE CUST_ID = I_CUST_ID; END // DELIMITER…Question 1 Use Index and math functions to fill in a table that extracts the amounts shipped between each pair of cities in Excel file General Appliance Corporation your table should display as follows and the formula for the amount should reference the names in the From and To columns From To Amount Marrietta Cleveland 0 Marrietta Baltimore 350 Marrietta Chicago 0 Marrietta Phoneix 850 Minneapolis Cleveland 150 Minn. Baltimore 0 Minn. Chicago 500 Minn. Phoneix 150 Full explainthe this question very fast solution sent me step by step Don't ignore any part all part work u A to CText typing work only not allow paper work