Identify some informal queries and update operations that you would expect to apply to the database shown in Figure 1.2.
What will be an ideal response?
(a) (Query) List the names of all students majoring in Computer Science.
(b) (Query) What are the prerequisites of the Database course?
(c) (Query) Retrieve the transcript of Smith. This is a list of
(d) (Update) Insert a new student in the database whose Name=Jackson,
StudentNumber=23, Class=1 (freshman), and Major=MATH.
(e) (Update) Change the grade that Smith received in Intro to Computer Science section
119 to B.
You might also like to view...
Joanne needs each page in her document to be numbered. She should do which of the following?
A) Manually enter the page number at the bottom of each page. B) Use the Insert Footnote button. C) Use the Cross-reference button. D) Use the Page Number button.
A security incident occurs that requires a systems administrator to take an image of a user's workstation hard drive. Which of the following should be taken at the time the system image is generated and retained through the file of the investigation to assure files have not been modified since?
A. A checksum hash of the drive image or files B. Copies of the system logs at specific intervals C. A snapshot of the file system D. The user's credentials and permissions