subject

ABC Supply Company needs to keep track of their office and computer inventory in order to reduce costs, manage reorder points, and better track item locations within their facilities. They need to track which buildings contain what products and be able to contact the manager of each building to verify inventory and reorder products, when necessary. The New Technology Center (NTC) is a building managed by Ingrid B. Johnson, while the Candice Simms Foundation (CSF) Building is managed by Mary B. Carter. Both managers have access to the central building phone number. Currently, one of the administrative assistants keeps track of office furniture, computers, servers, printers, scanners, printer toner, etc. using a simple spreadsheet. It looks something like this, with just a sample of five of the items tracked:

Item Number Item Name Building Room Number(s) Vendor ID Vendor Name Item Quantity on Hand Item Quantity on Order
231134-678 HP DeskJet 895Cse New Technology Center 325,100 555 Sam’s Supply Store 6 0
342245-225 HP Toner New Technology Center 325 555 Sam’s Supply Store 12 2
254668-449 DT Scanner Candice Simms Foundation Building 123 456 John’s Warehouse 18 1
254678-449 DT Hard Drive Candice Simms Foundation Building 100 987 Electronic Depot, Inc. 4 2
254278-450 DT 400 Cable New Technology Building 100 987 Electronic Depot, Inc. 2 1

follow SQL programs to extract the data to answer these questions:

a. Which items are currently on order and from what vendor?
b. What is the list of inventory (items), along with the location (building and room) and the quantity on hand of each. 3) What is the aggregated count of items in each building? Each room of each building?
c. What is the manager name and phone number of each building and the products stored in that building?
d. What is the aggregated count of all items in all buildings by vendor name?

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 12:10
1. package newton’s method for approximating square roots (case study 3.6) in a function named newton. this function expects the input number as an argument and returns the estimate of its square root. the script should also include a main function that allows the user to compute square roots of inputs until she presses the enter/return key. 2. convert newton’s method for approximating square roots in project 1 to a recursive function named newton. (hint: the estimate of the square root should be passed as a second argument to the function.) 3. elena complains that the recursive newton function in project 2 includes an extra argument for the estimate. the function’s users should not have to provide this value, which is always the same, when they call this function. modify the definition of the function so that it uses a keyword parameter with the appropriate default value for this argument, and call the function without a second argument to demonstrate that it solves this problem. 4. restructure newton’s method (case study 3.6) by decomposing it into three cooperating functions. the newton function can use either the recursive strategy of project 1 or the iterative strategy of case study 3.6. the task of testing for the limit is assigned to a function named limitreached, whereas the task of computing a new approximation is assigned to a function named improveestimate. each function expects the relevant arguments and returns an appropriate value. 5. a list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor. define a predicate issorted that expects a list as an argument and returns true if the list is sorted, or returns false otherwise. (hint: for a list of length 2 or greater, loop through the list and compare pairs of items, from left to right, and return false if the first item in a pair is greater.)
Answers: 1
question
Computers and Technology, 22.06.2019 12:20
Usually, when we sniff packets, we are only interested certain types of packets. we can do that by setting filters in sniffing. scapy’s filter use the bpf (berkeley packet filter) syntax; you can find the bpf manual from the internet. set the following filters and demonstrate your sniffer program again (each filter should be set separately): (a) capture only the icmp packet. (b) capture any tcp packet that comes from a particular ip and with a destination port number 23. (c) capture packets comes from or to go to a particular subnet. you can pick any subnet, such as 128.230.0.0/16; you should not pick the subnet that your vm is attached to.
Answers: 3
question
Computers and Technology, 23.06.2019 01:30
1. which of the following is a search engine? a) mozilla firefox b)internet explorer c)google d)safari 2. which of the following statements is true? a) all search engines will provide the same results when you enter the same query. b) all search engines use the same amount of advertisements. c) some search engines are also browsers. d) search engines often provide different results, even when you enter the same query.
Answers: 2
question
Computers and Technology, 23.06.2019 12:30
How is the brightness of oled of the diaplay is controled
Answers: 1
You know the right answer?
ABC Supply Company needs to keep track of their office and computer inventory in order to reduce cos...
Questions
question
Mathematics, 09.10.2019 15:00
Questions on the website: 13722363