De?ne the above query as an SQL view and then use this view to answer the following query: For each student who has taken a course from every professor in the MUS Department, show the number of courses taken, provided that this number is more than 10.
What will be an ideal response?
```
CREATE VIEW Musician(StudId) AS
SELECT R.StudId
FROM Transcript R
WHERE NOT EXISTS (
(SELECT P.ProfId
FROM Professor P
WHERE P.Dept = ’MUS’)
EXCEPT
(SELECT T.ProfId
FROM Teaching T
WHERE T.CrsCode = R.CrsCode
AND T.Semester = R.Semester))
```
A query that uses Musician:
```
SELECT M.StudId, COUNT (*)
FROM Musician M, Transcript T
WHERE M.StudId = T.StudId
GROUP BY M.StudId
HAVING COUNT(*)>10
```
You might also like to view...
What does PDF stand for?
A. Public Document Format B. Portable Document Format C. Public Document File D. Portable Document File
When you insert a clip on a slide without a clip content placeholder, the clip is inserted ________________________of the slide, as shown in the accompanying figure.
Fill in the blank(s) with the appropriate word(s).
You can tone down a loud background by using a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.