Please use the tables in the flights database. Your deliverable should include a single SQL query that I can run against a "fresh copy" of the tables in the flights database.
1. Write a script to select all data from the planes table.
2. Update the planes table so that rows that have no year will be assigned the year 2013. (missing values will display as NULL).
3. Insert a new record to the planes table with the following values:
Tailnum: N15501
Year: 2013
type: Fixed wing single engine
Manufacturer: BOEING
Model: A222-101
Engines: 3
Seats: 100
Speed: NULL (notice this is not a text value but truly the absence of any value: "empty". As such, don't use single or double quotes around NULL when inserting this value).
Engine: Turbo-fan
4. Delete the newly inserted record on step 3.

Answers

Answer 1

Answer:

The scripts are:

1. SELECT * FROM planes

2. UPDATE planes SET YEAR = 2013 WHERE year IS NULL

3. INSERT INTO planes (Tailnum, Year, type, Manufacturer, Model, Engines, Seats) VALUES ('N15501',2013,'Fixed wing single engine', 'BOEING', 'A222-101',3,100,NULL)

4. DELETE FROM planes WHERE Tailnum = 'N15501'

Explanation:

1. SELECT * FROM planes

To select all from a table, use select * from [table-name]. In this case, the table name is planes

2. UPDATE [tex]planes\ SET[/tex] YEAR = 2013 WHERE year IS NULL

To do this, we use the update query which is as follows:

UPDATE [table-name] SET [column-name]= [value] WHERE [column] IS NULL

So: the above query will update all YEAR column whose value is NULL to 2014

3. INSERT INTO planes (Tailnum, Year, type, Manufacturer, Model, Engines, Seats) VALUES ('N15501',2013,'Fixed wing single engine', 'BOEING', 'A222-101',3,100,NULL)

To insert is very straight foward.

The syntax is:

INSERT INTO [table-name] (column names) VALUES (values)

4. DELETE FROM planes WHERE Tailnum = 'N15501'

To do this, we use the update query which is as follows:

DELETE FROM [table-name] WHERE [column] = [value]

So: The above query will delete the entry in (3) above


Related Questions

What is
Computer Security

Answers

Answer:

Computer Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

Answer:

the protection of computer systems and information from theft

Explanation:

What is full form of (IP)​

Answers

answer:

internet protocol?

explanation:

the set of rules governing the format of data sent via the internet or local network

On a roulette wheel, the pockets are numbered from 0 to 36. The colors of the pockets are as follows: Pocket 0 is green. For pockets 1 through 10, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 11 through 18, the odd-numbered pockets are black and the even-numbered pockets are red. For pockets 19 through 28, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 29 through 36, the odd-numbered pockets are black and the even-numbered pockets are red. Write a program that asks the user to enter a pocket number and displays whether the pocket is green, red, or black. The program should display an error message if the user enters a number that is outside the range of 0 through 36.

Answers

Answer:

pkt = int(input("Pocket Number: "))

if pkt == 0:

   print("Green")

elif pkt >= 1 and pkt <=10:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 11 and pkt <=18:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

elif pkt >= 19 and pkt <=28:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 29 and pkt <=36:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

else:

   print("Error")

Explanation:

The program was written in Python and the line by line explanation is as follows;

This prompts user for pocket number

pkt = int(input("Pocket Number: "))

This prints green if the pocket number is 0

if pkt == 0:

   print("Green")

If pocket number is between 1 and 10 (inclusive)

elif pkt >= 1 and pkt <=10:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 11 and 18 (inclusive)

elif pkt >= 11 and pkt <=18:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

If pocket number is between 19 and 28 (inclusive)

elif pkt >= 19 and pkt <=28:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 29 and 36 (inclusive)

elif pkt >= 29 and pkt <=36:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

Prints error if input is out of range

else:

   print("Error")

Which term is defined by the total operating current of a circuit?

Answers

Answer:

OK PERO NOSE LM SOTTY BROTHER

Explanation:

What are the short comings of the Napier bones?

Answers

Answer:

Disadvantages of Napier's bone: It became tedious when the multiplication has to be done with big numbers. It was a much elaborate setup. It was made up of 200 rods placed in a special box.

Complete the sentence.

When you enter “weather.com" into the URL, the _____ acquires the IP address.

a. Revolver
b. HTTP
c. Telnet

Answers

the http acquires the ip address

Explanation:

this is because it is the default protocol

Answer:

A. Revolver

Explanation:

On Edge, it states that a revolver, "makes a request to a name server, giving a domain name and receiving an IP address."

I hope this helped!

Good luck <3

Which of the following terms is associated with instant messaging?
A. buddy list
B.subject heading
C.Save As
D.texting

Answers

D.

Texting is associated with instant messaging

Answer: A buddy list is a term that is associated with instant messaging (IM)

Have a wonderful day :D

Explanation:

Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all the slides at once?
Harry needs to change the ___________ to change the background of all his presentation slides.

Answers

Answer:

settings

Explanation:

edmentum

A Products table and an Orders table have several linked records that are joined by a cross-referencing table named ProductsOrders. What kind of table relationship do these tables demonstrate?
A.one-to-one
B.one-to-many
C.many-to-many
D.many-to-none

Answers

Answer:

I believe it could be D. many to many.

Answer:

C. Many-to-Many

Explanation:

:)

What is true about super computers?

Answers

Explanation:

Super Computer are expensive computer that are used to provide very quick results. Super computer are used in calculating complex mathematical calculations. Calculations such as weather forecast and Atomic energy research. Therefore Super Computer perform complex calculations rapidly.

What is the second step in opening the case of working computer

Answers

Answer: 1. The steps of opening the case of a working computer as follows:

2. power off the device.

3. unplug its power cable.

4. detach all the external attachments and cables from the case.

5. Remove the retaining screws of the side panel.

6. Remove the case's side panel.

Explanation:

how does abstraction help us write programs

Answers

Answer:

Abstraction refines concepts to their core values, stripping away ideas to the fundamentals of the abstract idea. It leaves the common details of an idea. Abstractions make it easier to understand code because it concentrates on core features/actions and not on the small details.

This is only to be used for studying purposes.

Hope it helps!

What happens when text is added to grouped objects that is larger than an object ?

Answers

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

What are folders within folders called​

Answers

it is called a subfolder????

Answer:

The folder within folder are also know as subfolder .

what is digital museum​

Answers

Access hundreds of professional development resources for museum professionals. Museum professionals can benefit at any career stage from student to retiree. Student Membership. Industry Membership. Established Since 1906. Museum Memebership. 501(c)3 Nonprofit Org.

Explanation:

1.Digital museum is a museum exhibition platform that utilizes computer and information technology, on which cultural relics and historical collections can be preserved and displayed in digital format. It is one of the main outcomes of digital curation. Learn more in: The Challenges of Digital Museum

how does dual concepts work?​

Answers

The transaction that affects a business

giving Brianlist (to the correct answers)help plesee question is what is keyboard (long paragraph)​plzz don't spam with unnecessary answers !!!!thankyouuuuuuu:)

Answers

Answer:

Explanation:

A computer keyboard is an input device that allows a person to enter letters, numbers, and other symbols (these are called characters in a keyboard) into a computer. Using a keyboard to enter lots of data is called typing. A keyboard contains many mechanical switches or push-buttons called "keys".

what precautions should be taken to make a computer more secure ​

Answers

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

15 points....How do you get money at home by just playing a vidio game.

Answers

You could become a creator or make an account on twitch

Streaming or you tube!

I personally am starting to stream within the new few years but creating content and streaming can make you money by getting subs, bits, and more :)

What are some positive and nevative aspects of technology?

Answers

Answer:

Explanation:

Positive:

Enhances Learning.  

Fosters Problem-Solving Skills.  

Develops Future Technological Leaders

Negative:

Diminishes Relationships and Social Skills

Stimulates Health Issues

Reduces Sleep Quality

Sentence Deobfuscate Name this file deobfuscate.cpp Hints: Don’t overthink this problem. Prompt the user to enter a collection of sentence words (i.e., words in the sentence), with the spaces removed (i.e., the obfuscated sentence) and with words that are less than ten (10) letters each. Then prompt the user to enter a sequence of numbers that represent the length of each corresponding sentence word (i.e. the deobfuscated details). Output the deobfuscated sentence. Convert char c to int by subtracting 48 (‘0’) from c.
Sample Execution:
Please enter obfuscated sentence: Thisisasentence
Please enter deobfuscation details: 4218
Deobfuscated sentence: This is a sentence

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   string text,lengt;

   cout<<"Please enter obfuscated sentence: ";    cin>>text;

   cout<<"Please enter deobfuscation details: ";    cin>>lengt;

   string t1, t2;

   int kount = 0;

   for(int i = 0;i<lengt.length();i++){

   kount+=(int)(lengt[i]-'0');

   t1 = text.substr(0, kount);

   t2 = text.substr(kount, text.length()-1);

   text = t1 +" "+ t2;

   kount++;   }

   cout<<"Deobfuscated sentence: "<<text;

   return 0; }

Explanation:

This declares the text and the deobfuscation details as string

   string text,lengt;

This prompts for the sentence

   cout<<"Please enter obfuscated sentence: ";     cin>>text;

This prompts for the details

   cout<<"Please enter deobfuscation details: ";     cin>>lengt;

t1 and t2 are declared as string. They are used to split the texts into 2 parts

   string t1, t2;

This declares and initializes a count variable to 0  

   int kount = 0;

This iterates through the deobfuscation details

for(int i = 0;i<lengt.length();i++){

This gets each deobfuscation character

   kount+=(int)(lengt[i]-'0');

The next two instructions splits the text into 2

This gets from 0 to kount.

   t1 = text.substr(0, kount);

This gets from kount to the last index

   t2 = text.substr(kount, text.length()-1);

The new string or sentence is calculated here

   text = t1 +" "+ t2;

The kount variable is incremented by 1

   kount++;   } The loop ends here

This prints the new sentence

   cout<<"Deobfuscated sentence: "<<text;

See attachment for program file

true or false with reason :- carriage inword is carriage on purchases​

Answers

Answer:

True

Explanation:

Carriage on purchases is carriage inward. Explanation: Carriage inwards refers to the transportation costs required to be paid by the purchaser when it receives merchandise it ordered with terms FOB shipping point. Carriage inwards is also known as freight-in or transportation-in.

:)

what is the command used to retrieve the java files along with the string existence "Hello world" in it​

Answers

Answer:

java” xargs grep -i "Hello World”

A set of object that share a common structure and common behavior in database is called ​

Answers

An Object Class. Hopefully this answer is right.

what was his beliefs?

Answers

A belief is an attitude that something is the case, or that some proposition about the world is true.[1] In epistemology, philosophers use the term "belief" to refer to attitudes about the world which can be either true or false.[2] To believe something is to take it to be true; for instance, to believe that snow is white is comparable to accepting the truth of the proposition "snow is white". However, holding a belief does not require active introspection. For example, few carefully consider whether or not the sun will rise tomorrow, simply assuming that it will. Moreover, beliefs need not be occurrent (e.g. a person actively thinking "snow is white"), but can instead be dispositional (e.g. a person who if asked about the color of snow would assert "snow is white").[2]

There are various different ways that contemporary philosophers have tried to describe beliefs, including as representations of ways that the world could be (Jerry Fodor), as dispositions to act as if certain things are true (Roderick Chisholm), as interpretive schemes for making sense of someone's actions (Daniel Dennett and Donald Davidson), or as mental states that fill a particular function (Hilary Putnam).[2] Some have also attempted to offer significant revisions to our notion of belief, including eliminativists about belief who argue that there is no phenomenon in the natural world which corresponds to our folk psychological concept of belief (Paul Churchland) and formal epistemologists who aim to replace our bivalent notion of belief ("either we have a belief or we don't have a belief") with the more permissive, probabilistic notion of credence ("there is an entire spectrum of degrees of belief, not a simple dichotomy between belief and non-belief").[2][3]

Beliefs are the subject of various important philosophical debates. Notable examples include: "What is the rational way to revise one's beliefs when presented with various sorts of evidence?"; "Is the content of our beliefs entirely determined by our mental states, or do the relevant facts have any bearing on our beliefs (e.g. if I believe that I'm holding a glass of water, is the non-mental fact that water is H2O part of the content of that belief)?"; "How fine-grained or coarse-grained are our beliefs?"; and "Must it be possible for a belief to be expressible in language, or are there non-linguistic beliefs?".[2]

My goal is to help Edmentum kids
Select the correct answer.
What type of communication flow occurs in a formal network when employees submit status reports to their superiors?
A.
downward communication
B.
horizontal communication
C.
lateral communication
D.
upward communication
Hopefully people will answer these

Answers

Answer:

D upward communication

Answer:

D.

upward communication

Explanation:

Which statement in main() generates an error?
public class Players {
public void setName(String newName) { … }
public void setAge(int newAge) { … }
};
public class SoccerPlayers extends Players {
public void setDetails(String newName) { … }
public String getLeague() { … }
};
public static void main(String args[]) {
String leagueName;
Players newPlayers = new Players();
SoccerPlayers playerObject = new SoccerPlayers();
playerObject.setName("Jessica Smith");
playerObject.setAge(21);
leagueName = newPlayers.getLeague(); }
A. SoccerPlayers playerObject=new SoccerPlayers(); An object of a derived class cannot be created.
B. playerObject.setName("Jessica Smith"); setName() is not declared in SoccerPlayers.
C. leagueName=newPlayers.getLeague(); getLeague() is not a member of Players.
D. Players newPlayers=new Players(); An object of a base class cannot be created.

Answers

Answer:

C. leagueName=newPlayers.getLeague(); getLeague() is not a member of Players.

Explanation:

The main method in this code will case an error when trying to run the following line of code...

leagueName=newPlayers.getLeague();

This is because the method getLeague() is being called on a Player object which takes all of its methods from the Player class. Since getLeague() is not a method located in the player class then it cannot be called by an object from that class. Especially since the Player class does not extend to the SoccerPlayers class where the getLeague() method is actually located. Instead, it is the SoccerPlayers class which extends the Players class as its parent class.

What are the 3 biggest advancements in computers?

Answers

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of this word in a text file. There should be no repetition of letters in permutation (i.e. in our example, bacde is a valid permutation but bbcde is invalid. Use of library functions for generation of permutations is NOT allowed.
The text file containing the output should be named as q3out.txt. Each word of the output must be on a separate line in the text file. The 5-letter input word should be read by your program from the console. Provide comments in your code. Submit your C code, and the q3out.txt file for the following inputs:
(a) parba
(b) arbca

Answers

Answer:

See attachment 1 for code

See attachment 2 for the output of permuting letters of parba

See attachment 3 for the output of permuting letters of arbca

Explanation:

The program was implemented in C

The program uses a recursive function letterpermutation and a swap function to successfully implement the requirement of this question.

The letterpermutation function is defined here

void letterpermutation(char *mystring, int index1, int index2) {  

This lets the program writes to a file

  FILE *fptr;

This opens the file in an appending mode

  fptr = fopen("q3out.txt","a");

int i;

This checks for unique strings.

if (index1 == index2) {

If found, this appends the string to the text file

   fprintf(fptr,"%s\n",mystring); }

If otherwise

else{  

This iterates through the string

for (i = index1; i <= index2; i++)   {

The swap function is called to swap the characters of the string

 swap((mystring+index1), (mystring+i));  

This calls the function, recursively

letterpermutation(mystring, index1+1, index2);  

This further swaps the characters of the string

swap((mystring+index1), (mystring+i));  

} } }  

The swap function begins here and what it literally does is that it swaps characters of the input string to create a new string

void swap(char *ch1, char *ch2) {  

char temp;  

temp = *ch1;  *ch1 = *ch2;  *ch2 = temp; }

The main function begins here

int main() {  

This declares and initializes the string

char mystring[] = "ABCd"; // The string here can be changed

This calls the function to permute the string

letterpermutation(mystring, 0, strlen(mystring)-1);  

return 0; }

Select all examples of active listening.
Interrupt if you do not agree
Give the speaker your full attention
Be aware of how your opinions could influence what you hear
Notice the speaker's emotions
Ask questions to clarify

Answers

Answer:

Give the speaker your full attention

Be aware of how your opinions could influence what you hear

Notice the speaker's emotions

Ask questions to clarify

Other Questions
6/7x = 7/8 what is w Does the magnetic field lines of repelling magnets always combine. True or False? Which statement describes two organ systems working together to get rid of waste made by cells? plzz help me!!! Matt started his own company where he rents used textbooks to struggling college students at multiple Universities for a low rate. Over the last few years Matt has been able to collect a total of 250 textbooks for his business at Temple University. Unfortunately, students can be irresponsible and lose their textbook rental causing a loss for Matt. Based on past information Matt has collected the data below for Temple University based on losses per semester. # of losses per semester Probability 0 0.08 5 0.16 10 0.28 15 0.32 20 0.14 25 0.02 a. Calculate the expected frequency of losses per semester. (2 points) b. Calculated the variance. (2 points) Now assume that when losses do occur, they are non-random and losses equal $60. c. Calculate the expected losses per semester? (2 points) d. Calculate the expected losses for ALL textbooks per semester. (1 point) e. Calculate the expected losses for ALL textbooks for the next 2 school years (4 semesters). (1 point) Food webs in ecosystems become very complicated very fast. Explain why. what are the parts of heart? What is the measure of each angle of an equilateral traingle what is that answer is it 30 or 45or 60 or 90 hmmmm given the following in a right triangle the hypotenuse is 200 cm and one of the legs is 45cm what is the lenght of the other legA: 194.9 cmB: 12.4 cmC: 155 cmD: 245 cm Which of the following terms is associated with instant messaging?A. buddy listB.subject headingC.Save AsD.texting Which of the following do you use to tell whether a relationship isproportional or not? Someone help who actually knows Spanish 80 POINTS PLEASE ANSWER!!!! A team of scientists in Canada recently worked on a case where a drug company was selling medicines to another country illegally. Even though all branding was removed from the drug, the scientists were able to use the chemicals in the drug to figure out what company made and sold it out of the country. This is an example of what?government regulationdrug enforcementforensicsnone of the above Explain what test marketing is and its purpose? Help memmememmememenememmeemememmemememememmemememememmeme Write the poem on the topicof women education Chemistry question please help Image 01Image 03Image 02Image 04MENTColumn A1Image 1Column Ba {Prefieres correr a hacer la tarea?D. Juan prefiere hacer gimnasia en las maanasA mi primo atrevido le encanta patinar2image 023image 034Image 04d. Les gusta pintar gatos Match the words in the text with the definitions below: crops, farmyard, plough, seeds, land, wheat, 1) the area next to the farm buildings2) an area of ground3) the parts of a plant that you put into the ground to grownew plants4) a plant that is used to make bread5) plants that farmers grow6) a machine that farmers use to prepare fields for planting The process by which a cell divides into two daughter cells is called What did Special Treatment mean to the NAZI's and the Jews?