subject

Consider the relations, containing information on names of authors, and who is authoring which papers, respectively: Authors(auID, name)and Authoring(articleID, authorID), the answer can be expressed in either SQL or algebra.
1. List the articles authored by John Smith
2. List the co-authors of John Smith (authors who co-authored an article with John Smith)
3. List the authors that have written no paper with John Smith
4. List the authors who have all their papers co-authored with John Smith
5. List the papers authored by only one author
6. which author co-authored at least 1 paper with every author (without aggregate functions)
7. List pairs (authorID and Name) of authors who have written at least one common paper

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 16:30
What type of file does a cookie place on web site visitors' computers so that web site managers can customize their sites to their visitors' preferences?
Answers: 1
question
Computers and Technology, 22.06.2019 22:00
Consider the following declarations (1, 2, 3, 5, 7)class bagtype{public: void set(string, double, double, double, double); void print() const; string getstyle() const; double getprice() const; void get(double, double, double, double); bagtype(); bagtype(string, double, double, double, double); private: string style: double l; double w; double h; double price; }; a.) write the definition of the number function set so that private members are set according to the parametersb.) write the definition of the member function print that prints the values of the data membersc.) write the definition of the default constructor of the class bagtype so that the private member variables are initialized to "", 0.0, 0.0, 0.0, 0.0, respectively d.) write a c++ statement that prints the value of the object newbag.e.) write a c++ statement that declares the object tempbag of type bagtype, and initialize the member variables of tempbag to "backpack", 15, 8, 20 and 49.99, respectively
Answers: 3
question
Computers and Technology, 23.06.2019 06:00
What machine listens for http requests to come in to a website’s domain? a. a router b. a browser c. a server d. a uniform resource locator
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
You know the right answer?
Consider the relations, containing information on names of authors, and who is authoring which paper...
Questions
question
Health, 20.07.2019 02:30
question
Mathematics, 20.07.2019 02:30
question
Mathematics, 20.07.2019 02:30
question
Mathematics, 20.07.2019 02:30
Questions on the website: 13722360