De?ne the above query as an SQL view and then use this view to answer the following query: For each student who has taken a course from every professor in the MUS Department, show the number of courses taken, provided that this number is more than 10.

What will be an ideal response?


```
CREATE VIEW Musician(StudId) AS
SELECT R.StudId
FROM Transcript R
WHERE NOT EXISTS (
(SELECT P.ProfId
FROM Professor P
WHERE P.Dept = ’MUS’)
EXCEPT
(SELECT T.ProfId
FROM Teaching T
WHERE T.CrsCode = R.CrsCode
AND T.Semester = R.Semester))
```

A query that uses Musician:

```
SELECT M.StudId, COUNT (*)
FROM Musician M, Transcript T
WHERE M.StudId = T.StudId
GROUP BY M.StudId
HAVING COUNT(*)>10
```

Computer Science & Information Technology

You might also like to view...

What does PDF stand for?

A. Public Document Format B. Portable Document Format C. Public Document File D. Portable Document File

Computer Science & Information Technology

When you insert a clip on a slide without a clip content placeholder, the clip is inserted ________________________of the slide, as shown in the accompanying figure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can tone down a loud background by using a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.

Computer Science & Information Technology