Free Essay

Itt Tech

In:

Submitted By TerraceM
Words 359
Pages 2
Niesha Wright
Unit 5 Homework
SQLCourse: I got through Deleting Record Answers
W3school.com: I got through Combining and & OR
Which one do you prefer? Why
Over all I like them both, because they educate you on writing codes in different ways, but keeps the same format. SQLCourse allows you to try and answer the questions at the end of the course, while W3school lets you try and write code and gives you corrective answers.
Over all I like W3school because it allows more hands on teaching. W3school allows you to create your own code and run it, while providing results. When SQLCourse just gives you the answers to code questions. To me, SQLCourse is more like a study guide.
I learn a lot better when I complete my work hands on. And W3school.com makes me feel like I’m really learning.

Look up the data types for Oracle. How do they differ from SOL Server’s? Number datatype convert from Oracle to SQL Server | Oracle(source) | SQL Server(target) | number | Float | number([1-38]) | numeric([1-38]) | number([0-38],[1-38]) | numeric([0-38],[1-38]) | float | float | float([1-53]) | float([1-53]) | float([54-126]) | float | binary_float | float | binary_double | float(53) | int | numeric(38) | real | float |

Number datatype convert from SQL Server to Oracle | SQL Server(source) | Oracle(target) | bigint | NUMBER(19) | int | NUMBER(10) | smallint | NUMBER(5) | tinyint | NUMBER(3) | bit | NUMBER(3) | numeric | NUMBER(p[,s]) | money | number(19,4) | smallmoney | NUMBER(10,4) | float | FLOAT(49) | real | FLOAT(23) | Look up the ANSI data types. How do they differ from that of SQL Server and Oracle?
ANSI uses different names for data types than both Oracle and SQL Server. ANSI SQL Datatype | Oracle Datatype | CHARACTER(n)CHAR(n) | CHAR(n) | CHARACTER VARYING(n)CHAR VARYING(n) | VARCHAR2(n) | NATIONAL CHARACTER(n)NATIONAL CHAR(n)NCHAR(n) | NCHAR(n) | NATIONAL CHARACTER VARYING(n)NATIONAL CHAR VARYING(n)NCHAR VARYING(n) | NVARCHAR2(n) | NUMERIC[(p,s)]DECIMAL[(p,s)] (Note a) | NUMBER(p,s) | INTEGERINTSMALLINT | NUMBER(38) | FLOAT (Note b)DOUBLE PRECISION (Note c)REAL (Note d) | FLOAT(126)FLOAT(126)FLOAT(63) |

Similar Documents

Premium Essay

Itt Tech

...objective for this job is to obtain some people skills from interacting with the customers that come in and learn more about the phone industry, I’m currently a student at ITT Tech majoring in Network Systems Administration and thought this job would be a good start in the tech industry. | Skills & Abilities | | I have been working with Computers since the age of 13 so my computer tech skills are well refined, I can and will adjust to any environment when need be, I am a quick learner regardless of what it may be I can and will learn it as fast as I possibly can, I am extremely patient and have been known to work well with people. | Experience | | Dish washer, Minnesota misonic Homes North ridge March 2013 To May 2013 My duties as the dish washer goes beyond the title I not only made sure all the dishes were clean I also helped with serving the food, my job was a bit stressful at times because we was working with the elderly who’s immune system is much weaker because of aging. Pizza Maker, Pizza Ranch August 2014, Current employer My task are to make and prep the dough in the morning and also make quick but quality pizza’s as fast as possible keeping up with the orders and the Buffet line. | Education | | ITT TECHNICAL INSTATUTE – Brooklyn Center - BA I am currently a student at ITT Tech working on my BA in Network System Administration, I just finish with my first quarter in the summer and now moving on to the second quarter in the fall, I currently have...

Words: 415 - Pages: 2

Free Essay

Itt Tech

...Name: Colleen Losota Date: 11/1/2009 Week 8: Baseline Project 13 Baseline Project 13 - Sports and Statistics Math Support: Tool Book CD, Sections 1.8 Skill Level I I .Understand the Problem (a) In your opinion, what are the difficulties involved in making such a comparison? Answer: Ages were different, different materials are also used now to make up the bats. Mark McGwire also used steroids. (b) What data do you need to compare the performances of these athletes in an objective manner? Answer: How long each player played in the MLB. How many hits did they average per year, home runs, games played, etc. II. Devise a Plan (c) Identify some resources for acquiring the data that you need. Answer: Look online, espn.com, sports magazines, virtual library d) What type of graph do you think would be most effective at showing patterns in your data? Answer: A bar graph would be the most effective graph to show the data. III. Carry out the Plan (e) Construct a graph to summarize your data. Answer: see attached file f) Now that you have graphed your data, do you think that you need to do any additional research to make an objective comparison of Mark McGwire’s, Hank Aaron’s, and Babe Ruth’s batting careers? If so, what is it? Answer: No. I was able to gather the batting averages of all...

Words: 719 - Pages: 3

Free Essay

Itt Tech

...Uyiosa Ehioghae R-N-M NT1110 Unit 3 Student Study Guide 1. What port type has replaced mini-DIN, COM, LPT, and other port types? USB 2. State the speeds of USB 1.1, 2.0. and 3.0. 12 Mbps; 480 Mbps; 4,800 Mbps. 3. What is the standard IRQ range? Which IRQ is for the keyboard? 0-15. 60-6F. 4. List the maximum cable length for USB 1.1, 2.0, and 3.0. Five meters for 1.1 and 2.0. Three meters for 3.0. 5. How many devices does a USB hub appear as in the Windows device manager? Two devices. A USB root hub, and a PCI-to-USB universal host controller. 6. How can USB ports be added to a computer? Motherboard connectors for USB header cables, hubs, and Add-on cards. 7. Name the two generic hub types. Bus powered and self powered. 8. Which port is as versatile as a parallel port? 1284-B port. 9. What are the two serial port forms? IEEE 1394 (Firewire400), IEEE 1394b (Firewire800). 10. List two of the most common serial cables. Null-modem (data transfer) cable. Modem cable. 11. What hardware resources are required by serial ports? IRQ and I/O port addres. 12. What is one of the most versatile ports and also used for printers? The parallel port, or LPT ( Line Printer) port. 13. What was the most common use for SCSI? Servers and mass storage (hard disk, tape backup). 14. Define daisy-chaining Multiple device support...

Words: 706 - Pages: 3

Premium Essay

Itt Tech

...t113 Chapter 11 Chapter 11 Master It 1. What is the active component that a patch cord is plugged into when it is attached to a network connected device, such as a desktop computer? 2. What type of switch, and over what type of cabling, are workstation connections funneled into in a hierarchical star network? 3. What type of switch, and over what type of cabling, are workgroup switches connected? Solution 1. Patch cords are plugged into workstation ports. These are either part of the motherboard or part of a network interface card. 2. All workstation connections are connected to workgroup switches using horizontal cabling. 3. Workgroup switches are connected to core switches using backbone cabling. Master It 1. You are asked to specify a pluggable module for 850nm transmission over multimode fiber at 1Gbps with an LC connector interface. What module do you need to order? 2. You are asked to specify a pluggable module for 1310nm transmission over single-mode fiber at 10Gbps from one building to another. The IT manager wants you to order the smallest possible form factor. What module do you need to order? Solution 1. 1000Base-SX SFP mini-GBIC supports operation at 1Gbps over multimode fiber with an LC connection. 2. 10GBase-LR SFP+ module would provide you the smallest form factor transceiver for 1310nm operation over single-mode fiber. Master It You have nine users who have 100Base-T NIC cards on their computers. The 12-port workgroup...

Words: 329 - Pages: 2

Premium Essay

Itt Tech

...Richard D. Murrell II EN1420 04/07/15 Argument and Violence in Video Games The Violence in Video Games The reason why there are ratings on video games is for the simple fact that the violence can be pushed to the extreme for certain ages. Some kids today can’t tell the difference in violent games so therefore there are age restrictions put on games. An eight year old might play a shooter and kill someone in the game but not fully understand what he or she is actually doing in the game. If they are dead then some children might think in real life that what they just did is okay and alright to do. But that’s not the case is it? My opinion for violence in Video Games is alright. Why am I for it is for the simple fact that it is amusing and can be funny at times If I were to play with a group of buddies of mine we most likely would be having a drink and clowning around having fun with whatever we might be playing just to pass the time. So to me it’s relaxing and I enjoy it for the most part. But to our little brothers and sisters we don’t let them stay in the room just because they are too young to understand what they are looking at and have no knowledge of what they are looking at. That’s exactly why there was a age rating invented so that children under the ages of ten can play games related to them and adults can play with no limits to whatever it may be. The point is that most adults want to be able to play something they can enjoy in their free time and...

Words: 523 - Pages: 3

Premium Essay

Itt Tech

...Michael Knall Date: 6/26/14 Class: Programming Unit 2 Assignment 1: Homework Short Answer 1-4: 1.) What dose a professional programmer usually do first to gain an understanding of a problem? Break the larger problem into independent sub-problems. Seek solution of each sub-problem. Test the solutions of each sub-problem. Combine all the tried and tested solutions together. Apply the solution to the complex problem under consideration 2.) What is Pseudo Code? A notation resembling a simplified programming language, used in program design. 3.) Computer programs typically perform what three steps? Input is received. Some process performed on the input. Output is produced. 4.) What dose the term “user-friendly” mean? The term user-friendly is commonly used in the softwear business to describe programs that are easy to use. Algorithm workbench 1-2: 1.) Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height. Any height, you just have to be good, i advise you to work on your shot having better than a 60% shot is alot better than any other aspect? In Basketball Rules and Regulations =The official height of an NBA basketball hoop is 10 feet from the floor to the rim. 2.) Design an algorithm that prompts the user to enter his or her favorite color and stores the user’s input in a variable named color. Declare Interger color Display “ what is the color” Input color ...

Words: 260 - Pages: 2

Premium Essay

Itt Tech

...When running a Windows program with a batch file, the program will need to finish before starting the next task. To command the computer to wait until the program finishes, the start command used with the /wait switch or /w for short is used. For example to install a DNS Server role the command line input would be start /w ocsetup DNS-Server-Core-Role. 2. To remove a Server role the switch /uninstall is used. The switch is typed at the end of a command line input of the start, /w, ocsetup and then name of the role which is to be removed. For an example, if say the Server role of DHCP was needed to be uninstalled the command line input would be start /w ocsetup DHCPServerCore /uninstall. 3. To start and configure the DHCP Server role once it has been installed two commands will be needed. To configure the service the command to input would be sc config dhcpserver start= auto. This command will bring up the ChangeServiceConfig function for the DHCP Server role. To start the DHCP Server role the command line input would be net start dhcpserver. 4. To configure a DNS zone once a DNS Server role has been installed the command line input to use is dnscmd. The dnscmd command is used in conjunction with the / command followed by the DNS configuration that is to be changed. For example if the DNS server cache need to be cleared the command line input would be dnscmd...

Words: 254 - Pages: 2

Premium Essay

Itt Tech Paper

...Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Soft Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development Paper Software Development...

Words: 363 - Pages: 2

Premium Essay

Itt Tech Exercise

...AD Design Scenario: FSMO Role & GC Placement 1. Is there a one to one relationship between the server roles and the number of servers that house them? 2. How many DC’s are in your domain? 3. What servers/server are global catalog servers? 4. How many computers will be hosting the FSMO roles? 5. Will the roles be on one DC or multiple? The Schema Master and Domain Naming Master should reside on the same server, and that machine should be a Global Catalog server. Since all three are, by default, on the first domain controller installed in a forest, then you can leave them as they are. The Infrastructure Master should not be on the same server that acts as a Global Catalog server. The reason for this is the Global Catalog contains information about every object in the forest. When the Infrastructure Master, which is responsible for updating Active Directory information about cross domain object changes, needs information about objects not in its domain, it contacts the Global Catalog server for this information. If they both reside on the same server, then the Infrastructure Master will never think there are changes to objects that reside in other domains because the Global Catalog will keep it constantly updated. This would result in the Infrastructure Master never replicating changes to other domain controllers in its domain. I also recommend that the PDC Emulator and RID Master be on the same server. This is not mandatory like the Infrastructure...

Words: 315 - Pages: 2

Free Essay

Itt Tech Institude

...Nguyen Huynh 3/25/2016 NT1310 Unit 2 Lab Portion Amazon EC2 is a virtual server hosting. It is mostly for web designer that provides a really big compute capacity for your server. EC2 lets you create website with an easy options that it has. It is design for developers to maintain the server with ease, very lenient for them with all the tools that it has. You can try EC2 for free, but after the free time period, you pay what you use. There is no minimum fee, for instance if you use 750 hours of EC2 running Microsoft windows server t2.micro it would cost about $0.013 per hour. This EC2 does not have a long term commitments or upfront payment, like I said you pay what you use. You can increase of decrease the amount of space and time that you used. Google is another solution for cloud businesses. It offers great prices just like amazon also with great performance. I like google a lot, I’m sure a lot of people does too. It’s almost similar to Amazon pricing, you pay for what you have used. There is no lock in contracts required. They have a special which is called automatic discounts where you can save money by matching whatever machine you want for workload. Their storage space is very durable and highly recommended. The standard speed is 99.9% ms at $0.0026, DRA 99% ms at $0.02 and Nearline is 99% sec at $0.01. Its low cost with minimum fee, google cloud storage capacity pricing is the most effective in the market, with the cheapest rates for developers and companies...

Words: 446 - Pages: 2

Premium Essay

Itt-Tech Answers

...Don Delara/IT320 IT320 Wan Technology/ Unit 4 Assignment: 4.1 1. At what layer of the OSI model does CDP operate? Data Link layer 2. What is the primary use for CDP? To discover information about directly connected Cisco devices 3. What network layer protocols can CDP provide information for? IP, Internetwork Packet Exchange (IPX), and AppleTalk 4. When CDP is enabled on an interface, a router (or switch) sends CDP advertisements on a regular basis, which list information about the sending router. Included in the packets are a series of Type/Length/Value, or TLV, data structures. 5. The show cdp neighbors command can be used to display one line of information about each directly connected CDP-enabled device. List the six pieces of information displayed. Device ID, local interface, holdtime, capability, platform, and port ID 6. In the topology of all Cisco devices shown in Figure 4-1, you are on Host A and consoled in to RTA. What devices can you see in the output from CDP commands? SWA, RTB, and RTC—only the directly connected devices that are attached to RTA 7. How would you gather information about other CDP-enabled devices in the network? By Telneting to those devices and using the show cdp neighbors command 8. From RTB in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 9. From RTC in Figure 4-1, what devices can you see in the output from CDP commands? RTA and RTD 10. From RTD in Figure 4-1, what devices...

Words: 1186 - Pages: 5

Free Essay

Itt Tech Lesson 2

...Lesson 2 Installing Microsoft Windows Server 2008 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The ability to use the installation process to fix problems with an existing Windows Server system is called ___ _______. 2. Installation of just the necessary components for a particular server role, without the GUI and other software features, is called _________ 3. The ____ ______ screen appears by default when the Windows Server 2008 operating system is first installed. 4. A(n) ___ _____ offers the best performance of any multi-disk configuration option within the Disk Management MMC, but does so at the expense of fault tolerance. 5. The feature that allows users on different computers to access the Internet through a single connection is called___ _______. 6. The ___ _______ provides a single point of administration to configure networking and firewall configuration tasks on a Windows Server 2008 computer. 7. The setting describing the network environment, such as home or public network, is called the ____ ______. 8. Unsolicited inbound traffic can be blocked through the use of the ____ ___. 9. The network location setting controls the behavior of __________. 10. Once a disk is converted from a basic disk to a(n) __ _____, it can only be accessed only by operating...

Words: 803 - Pages: 4

Premium Essay

Itt Tech Linux Assignment 3.1

...1. JetDirect, LPD/LPR, IPP, and SMB. 2. It is The Internet Printing Protocol (IPP). 3. lpadmin, a CUPS web interface, and system – config – printer. 4. It is a Uniform Resource Identifier. It is a string/ name, or a symbol to identify a resource (ex: http://hangtime.blogs.nba.com/2012/07/18/blazers-smith-released-from-hospital/#) 5. Model Wizbang 9000 – lpadmin -p Wizbang 9000 -E -v socket://172.20.20.76 -m Wizbang 9000 ps.ppd.gz PPD file Wizbang_9000_ps.ppd.gz (already in the foomatic database) - lpadmin -p "Wizbang 9000" -E -v socket://(add IP address here) -m Wizbang_9000_ps.ppd.gz (basically, the same answer as the previous answer before this one). Connected to a JetDirect print server with an IP of 172.20.20.76 – press CTRL + V and it enters it to the copied IP, after you’ve copied the IP address….and then press the “enter” key. Accessible to all users – lpoptions -p printer -o option1=value –o, for a second option, enter the value of the file name. 6. A timing attack; a side channel attack, which the attacker tries to concede a cryptosystem, in which, you estimate the time taken to execute cryptographic secrets/conclusions or formulas. 7. rsh and rexec. (they send passwords in visible text). 8. (/home/axl/.ssh/id_rsa): 9. /etc/ssh/sshd_config, or /usr/local/etc/ssh/sshd_config, and /etc/sshd_config. 10. Modify the etc/host.deny, then enter sshd: “all.” You can then modify /etc/host.allow, then add the commands: sshd: Archie, sshd: Jughead, and sshd: Veronica...

Words: 283 - Pages: 2

Premium Essay

Project Part C1 Itt Tech

...Peter Quarelli English 2 Project Part C1 Claim 1 Physician-assisted suicide is currently illegal in all but four states in America; however, it should be legal in all fifty. Suicide of any kind is generally a last resort for very desperate people who are suffering. Any patient with a painful terminal illness should be able to have the option to end their suffering prematurely instead of living out their days in agony and despair. Pancreatic cancer is one such disease; patients experience intense pain in their upper abdomen and their back and there is currently no cure for this disease. The pain that is encountered is excruciating and can be eased with medication, but generally only for a little while and severe pain is still felt. Trigeminal neuralgia is an example of another such condition, it is a neuropathic disorder characterized by episodes of intense pain in the face stemming from the trigeminal nerve. There is no cure and triggers as slight as the wind or a high pitched sound can stimulate an episode, it is also described as among the most painful diseases known to mankind. There are many other illnesses similar to these that no one should have to tolerate, especially if there are safer and relatively easier ways for someone to end their agony. Forcing someone to spend their life miserably and in constant pain is not something that can be justified. Every doctor must take an oath to do no harm, but assisted suicide, in the appropriate circumstances, is not...

Words: 871 - Pages: 4

Free Essay

Itt Tech Ap Case Study

...Unit 4 Case Study 2: Skin Cancer Skin cancer is a rather harsh reality for many people that love soaking up the sun, however genetics and gene mutation may be playing a larger role in the development of carcinomas. Almost everyone has experienced a sunburn from staying out at the beach for too long, or not reapplying the appropriate amount of sunscreen. The damage that UVA and UVB rays can do to the integumentary system in a short period of time can cause life changing effects. Genetic mutations are sometimes caused by outside sources such as UVB rays, and other times linked to hereditary factors. In recent studies, direct links have been found between melanoma and specific hereditary genes that they believe are responsible. A gene is mutated when one or more cells change and create an abnormal protein in response to the change. With what I have learned in previous units about DNA replication, once a gene is replicated, it will continue to replicate its adapted form, this is important because this is how the mutated gene is being replicated at a cellular level. The bad cells are now being copied and replicated. The genetic mutations that pose the greatest risk of developing skin cancer are CDK4 and CDKN2A gene mutations. These two mutations effect the tumor suppressor, and stop the cell from performing its normal job. Gene mutations can be germ-line meaning passed from parent to offspring if they are hereditary. Genes can also be mutated by outside sources such a light...

Words: 414 - Pages: 2