Find the names of pilots certified for some boeing aircraft

Assignment Help Basic Computer Science
Reference no: EM133266145

Consider the following relations containing airline flight information:

Flights(flno: integer, from: string, to: string, distance: integer, departs: time, arrives: time)

Aircraft(aid: integer, aname: string, cruisingrange: integer)

Certified(eid: integer, aid: integer)

Employees(eid: integer, ename: string, salary: integer)

Note that the Employees relation describes pilots and other kinds of employees as well; every pilot is certified for some aircraft (otherwise, he or she would not qualify as a pilot), and only pilots are certified to fly.

The primary keys are underlined. The attribute names of foreign keys are not changed for easy identification. From the relational schemas illustrated above, use the different relational algebra operators and operations (ρ, σ, π, ?, ?, -, ?) discussed in class to build the following queries:

Find the eids of pilots certified for some Boeing aircraft.

Find the names of pilots certified for some Boeing aircraft.

Find the aids of all aircraft that can be used on non-stop flights from Bonn to Chicago.

Identify the flights that can be piloted by every pilot whose salary is more than $100,000.

Find the eids of employees who make the highest salary.

Reference no: EM133266145

Questions Cloud

Ways on-line documentation : What impacts of tablets have you seen on the ways on-line documentation is accessed?
What is wake-on-lan : Which features are supported by a WinPE disk? What is Wake-on-Lan? What happens when a WinPE OS reboots? Select the best answer.
Receiver side of protocol rdt3.0. and protocol rdt2.2 : Are there are any differences between the receiver side of protocol rdt3.0. and the receiver side of protocol rdt2.2?
Why does full-duplex switch behave : Why does a full-duplex switch behave like a shared hub immediately after start-up?
Find the names of pilots certified for some boeing aircraft : Find the eids of pilots certified for some Boeing aircraft. Find the names of pilots certified for some Boeing aircraft.
Discuss the purpose of java language : Discuss the purpose of the Java language and why it is used. Remember to consider aspects such as hardware and strengths and weaknesses of the language.
Unique binary representation : Determine the minimum number of bits needed to uniquely represent a member of the set described.
Identify vulnerability or potential vulnerability : Think about the Internet of Things (IoT), AioT and wearable devices or Embedded Technology and try to identify a vulnerability or a potential vulnerability
Sophistication of stuxnet led to speculation : The focus on Iran's nuclear program and the sophistication of Stuxnet led to speculation that the Israeli and/or U.S. government created it.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculates the cost per square inch of a circular pizza

Redo Programming Exercise 2 from Chapter 3. Use two functions-one to compute the area of a pizza, and one to compute cost per square inch.

  About IoT and other emerging technologies

You have read about IoT and other emerging technologies. From the perspective of a user, explain which pillar of the CIA triad "informed consent" falls under.

  What new or current threats or viruses do you know of

What new or current threats or viruses do you know of? What is their method of infection?

  Showtime-history bundle available

Suppose Time Warner could sell Showtime for $9, and the History channel for $8, while making Showtime-History bundle available for $13.

  Weaker wep protocol

The WEP protocol, introduced in 1997, was discredited by 2001, and WPA, its replacement was approved in 2004. Yet, in 2008 many sites still used the weaker WEP protocol. Cite reasons why sites might not have changed.

  Create a japplet that contains a jlabel and jbutton.

Create a JApplet that contains a JLabel and JButton. You'll create a JButton that will automatically change font typeface, style, and size when clicked by the user. Change the font typeface, style, and size on the JLabel.

  Did any of the jobs require nontechnical skills

Use Indeed.com, Monster.com, or LinkedIn.com to research IT job careers that require Microsoft 365 configuration and management-related skills in your area. You

  Software development methodology discussion

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department

  What are the basic reasons that people resist change

What are the basic reasons that people resist change? How can this resistance be overcome?

  Information governance and legal functions

Information Governance and Legal Functions.discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

  The project may be to protect the communications network

The project may be to protect the communications network between the White House and the President's home in Trump Tower in New York City.

  How long would this address assignment last

How long would this address assignment last? At the time when the company runs out of address space, how would the addresses be assigned to the three groups? (c) If CIDR addressing were not available for the seven-year plan, what options would the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd