answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
2 years ago
15

Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let

ters of the last name and the first letter of the first name, they should be able to get the right author. Ask the user to input a percentage and calculate the new discounted price based on the current retail price minus this percentage. Round the result to cents (two decimals). For your example query, assume the user wants to discount the price of James Patterson books by 20%.
Computers and Technology
1 answer:
Harrizon [31]2 years ago
5 0

Answer:

We will SQL(Structured Query Language) designed for this specific problem to manage the data base  for the library management system.This querry SQL based system will ask the user  to tell the first name and this SQL based system will his full name.

You might be interested in
Modify the closest pair of points algorithm so that the separating line L now separates the first n/4 points (sorted according t
Nutka1998 [239]

Answer:

Check the explanation

Explanation:

Kindly check the attached images below to see the step by step explanation to the question above.

3 0
2 years ago
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user
bixtya [17]

Answer:

B

Explanation:

An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.

4 0
1 year ago
12) Suppose you wanted a subroutine to return to an address that was 3 bytes higher in memory than the return address currently
Snezhnost [94]

Answer:

.code

main proc

mov ecx,ebp

mov ecx, 787878

push ecx

call MySe7en

invoke ExitProcess,0

main endp

MySe7en PROC

pop ecx

sub ecx, 3

mov

push ecx

ret

end main

8 0
1 year ago
A summer camp offers a morning session and an afternoon session.
defon

Answer:

(A) IF (IsFound

(afternoonList, child))

{

APPEND (lunchList, child)

}

Hope this helps!

5 0
2 years ago
. Write a function wordscramble that will receive a word in a string as an input argument. It will then randomly scramble the le
inysia [295]

Answer: You can use the function randperm() to generate a random permutation of the indexes. so then you would use the random permutation to reorder the string array

Explanation:

4 0
1 year ago
Other questions:
  • Open this link after reading about Ana's situation. Complete each sentence using the drop-downs. Ana would need a minimum of ato
    5·2 answers
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
    11·1 answer
  • What is the value of x after each of the following statements is encountered in a computer program, if x=1 before the statement
    9·1 answer
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
    11·1 answer
  • Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was int
    9·1 answer
  • Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?
    9·1 answer
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!