Create a new table, EMP30, and populate it with employees in department 30, using an existing table and a subquery. Use EmployeeId, Lname, Fname, HireDate and Salary columns.

Use the N2 Corporation database tables to design the following subqueries. (Use the spooling method to capture all queries and results in the CHAP8SP1.LST file.)


```
SQL> CREATE TABLE emp30
2 AS
3 SELECT EmployeeId, Lname, Fname, HireDate, Salary
4 FROM employee
5 WHERE DeptId = 30;

Table created.

SQL> SELECT * FROM emp30;

EMPLOYEEID LNAME FNAME HIREDATE SALARY
---------- --------------- --------------- --------- ----------
200 Shaw Jinku 03-JAN-00 24500
135 Garner Stanley 29-FEB-96 45000
```

Computer Science & Information Technology

You might also like to view...

Explain why the log buffer need not be flushed when an abort record is appended to it.

What will be an ideal response?

Computer Science & Information Technology

Programs on Mac that launch at startup are called login items.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with a statement below.

A. Must be entered to complete the process of starting up a computer. B. Tell the firewall what types of traffic to let in and out of your network. C. Password you need to enter to make your screen saver vanish so you can return to your desktop and resume working. D. Of central importance to the operation of the firewall software that it hosts. E. F. Set of rules that blocks all access by default, and then permits only specific types of traffic to pass through. G. Enables a packet to get from one network's OSI stack of interfaces to another. H. Primary intent is to let all traffic through and then block specific types of traffic. I. Used to gain access to the BIOS set-up program or to change the BIOS password. J. The practice of storing data in a part of disk storage space so it can be retrieved as needed.

Computer Science & Information Technology

Describe how nested method calls work. For example, if you have three nested method calls, which method executes first and how are return values propagated? Is there a limit to how many method calls can be nested?

What will be an ideal response?

Computer Science & Information Technology