Find all loan numbers with a loan value

Assignment Help Basic Computer Science
Reference no: EM131255076

Consider the bank database.

branch(branch name, branch city, assets)

customer (customer name, customer street, customer city)

loan (loan number, branch name, amount)

borrower (customer name, loan number)

account (account number, branch name, balance)

depositor (customer name, account number)

Give an expression in the relational algebra for each of the following queries:

a. Find all loan numbers with a loan value greater than $50,000.

b. Find the names of all depositors who have an account with a value greater than $9,000.

c. Find the names of all depositors who have an account with a value greater than $8,000 at the "Uptown" branch.

Reference no: EM131255076

Questions Cloud

Benefits of recursion over simple loops : What are the benefits of recursion over simple loops? Can recursions be used to find specific words, find and replace these words? Would you use a loop or recursion for this?
Command line argument on a separate line : Program 1: Write a C program that will print out each command line argument on a separate line. Use for-loop. The loop should have an index variable i that ranges from 0 to (argc-1).
Parts of a programm can access the members of a class : What is the process by which we can control what parts of a programm can access the members of a class?
Describing the different types of firewalls : Compose a letter to your CEO describing the different types of firewalls and where each should be used/deployed within the Hypothetical Fortune 500 network.
Find all loan numbers with a loan value : a. Find all loan numbers with a loan value greater than $50,000. b. Find the names of all depositors who have an account with a value greater than $9,000. c. Find the names of all depositors who have an account with a value greater than $8,000 at the..
For what range of output would bonham be superior : At what volume of output would the two locations have the same profit? - For what range of output would Bonham be superior (have higher profits)?
Relationship between orders and products : If you were given an ERD that contained a M:N relationship between orders and products, what would you need to do in order to create the tables and relationship in Access?
What is the gulf of execution : 1. How does Norman define "execution" and "evaluation"? 2. What is the Gulf of Execution? Give an example. 3. What is the Gulf of Evaluation? Give an example?
Evaluate the reasons cited by obrian for relocation : Evaluate the inducements offered Southern Recreational Vehicle Company by community leaders in Ridgecrest, Mississippi.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine a fourier series expansion of the rectified wave

Passing a sinusoidal voltage A sin ωt through a half-wave rectifier produces the clipped sine wave shown in Figure 7.13. Determine a Fourier series expansion of the rectified wave.

  Estimate the height of a building

An observer wants to estimate the height of a building. At herfirst measurement, the angle of elevation to the top of thebuilding is 45 degrees. She walks 300 feet closer to the building and determines the angle of elevation to be 60 degrees

  Select and describe in detail the evaluation method

Computer class written assignment. select and describe in detail the evaluation method that you plan to use to compare and contrast the 3 options. Write 250 to 300 words.

  Write an iterative function power1 ,power2,power3

This problem considers several ways to compute xn for some n >= 0. (a) Write an iterative function power1 to compute xn for n >= 0.

  What are the advantages and disadvantages of each

What are the advantages and disadvantages of each?

  How much your appearance should affect

What are your thoughts regarding potential employers not hiring you or someone else due to tattoos that cannot be covered up?

  Glba and hipaa compliance laws

Identify three similarities between GLBA and HIPAA compliance laws. Explain how GLBA and HIPAA requirements align with information security.

  Explain what type of attack

A person in possession of a sample of the ciphertext and the corresponding plaintext is capable of what type of attack

  How would you display the man page for shadow

How would you display the man page for shadow in section 5 of the system manual?

  The solution is some real number

Let P be a problem. For any instance x ∈ P, the solution is some real number f(x). Let A be a randomized algorithm for P, such that it gives a solution A(x) that lies in [1/2f(x), 2f(x)] with probability 2/3.

  Operating system supported

To learn more about e-mail client programs, perform the following actives: Open a browser and search the Web for free E-mail client programs. Visit several of the home pages associated with these programs and make note of the following informatio..

  Example of a combination of security

In your own words describe what is meant by "defense-in-depth" in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd