Computers and Technology, 22.02.2021 20:00 lukeakalucas
Based on the relational schema below:
Emp(eid: integer, ename: string, age: integer, salary: real)
Works(eid: integer, did: integer, pcttime: integer)
Dept(did: integer, dname: string, budget: real, managerid: integer)
Express the following queries in Relational Algebra. Please make use of the aggregate relational algebra operators that was explained in class. If you believe you cannot express a given query in relational algebra, explain why not. Or if you end up making some additional assumptions in order to express the queries using relational algebra, please state your assumption clearly.
a. Find the names and ages of each employee who works in both the Hardware department and the Software department (assume that Hardware Dept ID =0 and Software Dept ID = 1).
b. Find the mamagerids of managers who manage only departments with budgets greater than $1,000,000. Please note that if a manager manages dept 1 and dept 2 and dept 1 has a budget of 2,000,000 and dept 2 has a budget of 10,000, then the manager would not be included in the result list.
c. For each department with more than 20 full-time-equivalent employees (i. e., where the part-time and full-time employees add up to at least that many full-time employees), find the did together with the number of employees which work in that department.
d. Find the name and age of the oldest employee in each department.
e. Find the department with the highest average age of employees.
Answers: 2
Computers and Technology, 23.06.2019 00:00, brooklyn4932
What engine component is shown in the above figure?
Answers: 1
Computers and Technology, 23.06.2019 11:00, jolleyrancher78
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
Computers and Technology, 23.06.2019 23:00, GreenHerbz206
Computer programming is one type of what career
Answers: 1
Computers and Technology, 24.06.2019 14:30, tleppek6245
Alison is having a hard time at work because hee inbox is flooded with emails every day. some of these emails are unsolicited. some of other she don’t need. which action should she take to better manager her emails?
Answers: 1
Based on the relational schema below:
Emp(eid: integer, ename: string, age: integer, salary: real)<...
English, 19.09.2019 08:30
Chemistry, 19.09.2019 08:30
Computers and Technology, 19.09.2019 08:30
Geography, 19.09.2019 08:30