Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Example-Search the salary of employees who are not 'ANALYST' but get a salary below than or equal to any people employed as 'ANALYST'.
SELECT EMPNO, ENAME, JOB, SAL
FROMEMP
WHERE SAL <= ANY (SELECT SAL
FROM EMP WHERE JOB = 'ANALYST')
AND JOB<>'ANALYST' ;
EMPNO
ENAME
JOB
SAL
DEPTNO
7566
Nirmal
MANAGER
2975
10
7788
Kailash
ANALYST
3000
7839
Karuna
PRESIDENT
5000
20
7902
Ashwin
7905
Ashwini
4000
OUTPUT:
Search the average salary in every department
SELECT DEPTNO, AVG(SAL) FROM EMP GROUP BY DEPTNO;
Result:
2987.5
what are the main characteristics of database
Define deadlock avoidance. An alternative method for avoiding deadlocks is to needs additional information about how resources are to be requested. Each request requires the s
Decompose the table with the following description and functional dependencies into a set of equivalent tables normalized to 3NF or BCNF. This database stores records from a (ve
Primary Index In primary index, there is a one-to-one relationship among the entries in the index table and the records in the major table. Primary index can be of two types:
Explain I command in QBE ? I : It is the command in QBE that is used to insert tuple (s) into the database
The ABC Bank authority now wants to create a database for their customers. So you are requested to modify your program of Assignment A3 as follows. The main program first displa
An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be
Northwind Pty Ltd sells a variety of food products throughout the world. They want to use the reporting features of SAP's Business Information Warehouse to better understand their
Discuss the methods for a hash file to expand and shrink dynamically. What are the advantages and disadvantages of each? The hashing methods that permit dyanamic file expansi
What are the different approaches for database design? There are two basic approaches for database design which are as follows: Attribute driven: It compiles a list of att
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd