subject

The kings and queens of england are listed in a relation kings (name, nickname, house, beginreign, endreign). their name is unique, either using a roman numeral to distinguish them, e. g., 'edward i' or 'edward ii', or in a few cases using their nickname, e. g., 'edward the confessor'. the attribute nickname is an additional appelation, if they have one and it is not used in their name to distinguish them, e. g., 'the unready'. the value of nickname is null if there is no nickname. the attribute house is the dynasty, e. g., 'tudor'. attribute beginreign and endreign are integers, the first and last years, respectively, that the king or queen was on the throne. there is also a relation parents(child, parent). both attributes are the names of kings or queens, with the obvious connection that the first is a child of the second.
write the following queries:
who was king in the year 1000?
give the name and nickname.
find all the pairs of kings or queens (a, b) such that a was the great grandchild of b.
find the name and nickname of all kings or queens that have a nickname that does not begin with "the". find the names of those kings or queens that were the parent of two or more kings or queens. list each such person only once.
find for each house the number of kings or queens of that house. several times in british history, kings or queens have deposed one another, so that their reigns overlapped.
find all such pairs, listing the pairs in both orders; i. e., list both (a, b) and (b, a). however, be careful not to list pairs a and b where the only overlap is that a's reign ended in the same year that b's began, or vice-versa.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
Jake really works well with numbers and is skilled with computers but doesn't work well with others. which of the jobs discussed in this unit might be best for jake? why?
Answers: 3
question
Computers and Technology, 23.06.2019 17:00
In which of the following ways can using test-taking tips you? a. you can focus on the information that you need to study. b. you will see the answers to the test. c. you will study more. d. you will be less organized.
Answers: 1
question
Computers and Technology, 23.06.2019 21:10
Asample of 200 rom computer chips was selected on each of 30 consecutive days, and the number of nonconforming chips on each day was as follows: 8, 19, 27, 17, 38, 18, 4, 27, 9, 22, 30, 17, 14, 23, 15, 14, 12, 20, 13, 18, 14, 20, 9, 27, 30, 13, 10, 19, 12, 26. construct a p chart and examine it for any out-of-control points. (round your answers to four decimal places.)
Answers: 2
You know the right answer?
The kings and queens of england are listed in a relation kings (name, nickname, house, beginreign, e...
Questions
question
SAT, 16.10.2020 07:01
question
Mathematics, 16.10.2020 07:01
question
Mathematics, 16.10.2020 07:01
question
Biology, 16.10.2020 07:01
question
Spanish, 16.10.2020 07:01
question
Mathematics, 16.10.2020 07:01
question
English, 16.10.2020 07:01
question
Mathematics, 16.10.2020 07:01
question
Mathematics, 16.10.2020 07:01
Questions on the website: 13722359