Match each of the following subtotal functions to its best description:I.SUMII.AVERAGEIII.MAXIV.MINV.COUNTA.The greatest valueB.Adds the values in the field togetherC.The least valueD.The number of valuesE.Adds the values in the field together and then divides by the number of values

Fill in the blank(s) with the appropriate word(s).


B, E, A, C, D

Computer Science & Information Technology

You might also like to view...

Suppose the file is ordered by the non-key field DEPARTMENTCODE and we want to construct a clustering index on DEPARTMENTCODE that uses block anchors (every new value of DEPARTMENTCODE starts at the beginning of a new block). Assume there are 1000 distinct values of DEPARTMENTCODE, and that the EMPLOYEE records are evenly distributed among these values. Calculate (i) the index blocking factor bfr i (which is also the index fan-out fo); (ii) the number of first-level index entries and the number of first-level index blocks; (iii) the number of levels needed if we make it a multi-level index; (iv) the total number of blocks required by the multi-level index; and (v) the number of block accesses needed to search for and retrieve all records in the file having a specific DEPARTMENTCODE value u

Consider a disk with block size B=512 bytes. A block pointer is P=6 bytes long, and a record pointer is P R =7 bytes long. A file has r=30,000 EMPLOYEE records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), DEPARTMENTCODE (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte), JOBCODE (4 bytes), SALARY (4 bytes, real number). An additional byte is used as a deletion marker.

Computer Science & Information Technology

Which of the following is NOT an example of a communication channel?

A) Letter B) Fax C) Stereotype D) E-mail

Computer Science & Information Technology

Pam's boss, Alan, says that she needs to write her software so that it is protected against the security risks of today and tomorrow. How is this even possible, given that we don't even know what the security risks of tomorrow are?

What will be an ideal response?

Computer Science & Information Technology

To view which interfaces have IP access lists set, use the ____ command.

A. show ip in B. show ip out C. show ip interface D. show ip any

Computer Science & Information Technology