Count the distinct building names in LOCATION.

Write queries for the following. (Use tables created in Chapter 4 Lab Activity.)


```
SQL> SELECT COUNT(DISTINCT Building)
2 FROM location;

COUNT(DISTINCTBUILDING)
-----------------------
3
```

Computer Science & Information Technology

You might also like to view...

Flash drives plug into a(n) ________ port on a computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

MIME is a protocol that's used when you're

a. sending a video file to YouTube. b. encrypting an e-mail message. c. executing a CGI script. d. sending an e-mail that has a photo attached.

Computer Science & Information Technology

The need for network speed in the late 1990s resulted in the IEEE developing a group of standards known as __________________, now the most common type of Ethernet found on new NICs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

A) Cybercrime B) Computer fraud C) Cyber-stalking D) Cyber-terrorism

Computer Science & Information Technology