Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Draw the ER Diagram as usual and determine the number of tables. USE draw.io to draw your diagrams.
Give a PL/SQL function that will accept bike size as an argument and will return the category of the bike based on the criteria.
A Cursor that will display all the Employees reporting to a manager. Manager_ID will be passed. Show the execution of the Cursor with the parameter.
Function Get_All_Suppliers which will input the City and Country parameters. Show the execution of the function with the help of the SQL statement.
From the point of view of a penetration tester, what additional tests would you perform if you thought the client used any of these devices or services?
List the numbers and names of all customers. List the complete item table. List the number and name of all customers that are represented by rep 15.
Write SQL queries. Open the Company database in the SQLite Browser and create the following SQL queries: For each warehouse display a country and a city.
How would you extend use-case models that you created in the requirements phase, to usecase models that apply to the design phase?
Create a query that SELECT all of the EMPLOYEES from the EMPLOYEE TABLE that are Mangers. Include Employee ID first name, Lastname and Salary.
Let's imagine that the run me.sh file is a script. What command do you use to create it so that it may be run?
What is a poisoned null byte attack? Give an example to explain the coding errors that allow it to work? How can it be prevented?
write the SQL Statements for below cases: Get all the orders placed by a specific customer. CustomerID for this customer is MAGAA.
What are some other security models besides the CIA triad? What are the four components of security documentation?
What is the difference between SQL and MySQL, and the different subsets of SQL. Discuss how businesses can benefit from SQL.
You are to prepare a review of the tutorial, like the kind of review that you would find in a good computer/information systems journal or website.
Let me start with defining SQL. SQL or Structured Query Language is a programming language that is made to interface with databases (Kodian, 2020).
In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server.
Create some sample reports to make sure these also produce similar results. Enter all of your personal records. Write your SQL Script.
What are the main characteristics of NOSQL systems in the area related to data models and query languages?
Compare availability and ease of use for application scaling, geographical distribution, and network security measures.
Create a Relational Schema that will identify all the components of your table. Be sure you highlight your primary and foreign keys.
Write an SQL query to show the top n (say 8) records of a table. To complete the answer, execute the query and insert a full-screen snapshot with the query.
Explain why we use constraints in a database. Describe two constraints and how those constraints affect data that goes into a table.
Why is it important to learn SQL? In which jobs you need to know SQL? What is the definition of DML and DDL? Give examples in each case.
How would you perform a website vulnerability and security assessment? How can you use planned attacks to identify vulnerabilities?