Please  answer for this

pl. answer this
Which clause excludes the group function?
a. WHERE
b. FROM
c. HAVING
d. GROUP BY
e. ORDER BY

pl. answer this
Which clause excludes the group function?
a. WHERE
b. FROM
c. HAVING
d. GROUP BY
e. ORDER BYYour question doesn't make sense.
Excludes = To do away with, ignore, make solitary.
None of the above answers prevents you from having a GROUP BY in your query as well. It's possible to have a statement that contains ALL of those elements.
You need to clarify the question and say if the question is in the context of a previous question or example piece of SQL etc.

Similar Messages

  • Please answer for this question

    public class Qcb90 {
    int a;
    int b;
    public void f() {
    a = 0;
    b = 0;
    int[] c = { 0 };
    g(b, c);
    System.out.println(a + " " + b + " " + c[0] + " ");
    public void g(int b, int[] c) {
    a = 1;
    b = 1;
    c[0] = 1;
    public static void main(String[] args) {
    Qcb90 obj = new Qcb90();
    obj.f();
    I answered 001 as o/p
    But the o/p is 101
    How can this be possible.

    First I have to say: whoever wrote this code need some extensive lessons in HUMAN FRIENDY CODE. Use useful variables name other than one letter.
    You have two methods:
    Method f
    And method g.
    You have to global or public variables a and b.
    Now, in the main method you call the first method f () which assigns zeros to the public variables a and b. it also creates a new array c[] with one slot containing the number 0;
    After that, you call the method g. and pass both b and c[]. Notice that you have over ridden the values of b and c[] because you redefined them again in the header of the method
    public void g(int b, int[] c)So now both b and c[] are not initialized and contain basically nothing.
    Inside the g() method, you assign the public variable a with 1, and the ENTERNAL variable b with 1 (note that b now is not the same after it has been redefined again in the header of the g() method).
    After this, you have printed the out put. a = 1, b = 0, c = 1.

  • Hello please hepl me in my problem in apple id, i cannot connect to my ipad mini in itune store and app store because they find me a credit card but i dont have credit card. what can i do now? i need an answer for this problem. thank you

    hello please help me in my problem in apple id, i cannot connect to my ipad mini in itune store and app store because they find me a credit card but i dont have credit card. what can i do now? i need an answer for this problem. thank you

    I would suggest that you buy a visa or mastercard gift card and put a few dollars on it and use it to access the store.  Just add money to it before you want to buy something from the store and it will act like a normal credit card for you.

  • Hi, sometimes big images could not open with photoshop.ı can open with windows but cant open photoshop.if ı try to open i am seeing a white image.is there any answer for this problem please.

    hi, sometimes big images could not open with photoshop.ı can open with windows but cant open photoshop.if ı try to open i am seeing a white image.is there any answer for this problem please.

    Just to assist those who might help you with this, please give the exact version of Photoshop CS6 you are running, for instance CS6 13.0.1.3.
    I had already asked for that in my previous post, but I guess you didn't quite know what I was referencing when I typed "exact version".
    Sorry, I cannot help you myself because I don't deal with that kind of 3D images, don't use Windows, and in all frankness I'm not quite following your last post.
    Also please give the exact model of your graphics card, so they can check whether it is on the list of cards tested by Adobe.
    Thank you.

  • I am using photoshop cc 2014.2 And when I use save for Web it gives me a dialog box that says it is using Latin characters I've never seen this before. Does anyone have an answer for this problem or do I need to go back to the older version of Photoshop.

    I'm using Photoshop cc 2014.21 I you save for Web and dialog box comes up that says that Photoshop is using Latin characters and that servers cannot recognize Latin characters in webpages and you may have trouble viewing these pages does anyone have an answer for this problem?

    What Firefox version is currently installed on the computer?
    You can find the full version of the current current Firefox release (37.0.2) in all languages and all operating systems here:
    *https://www.mozilla.org/en-US/firefox/all/
    If you have a very old Firefox version then you could consider to uninstall that version to clean up existing registry keys (especial the uninstall key).
    Make sure NOT to remove "personal data" when you uninstall Firefox, because that will remove all profile folders and you lose personal data like bookmarks and passwords including data in profiles created by other Firefox versions.
    Check the Firefox program folder and remove the Firefox program folder if there are still files left in it.
    *(32 bit Windows) "C:\Program Files\Mozilla Firefox\"
    *(64 bit Windows) "C:\Program Files (x86)\Mozilla Firefox\"
    It is important to delete the Firefox program folder to remove all the files and make sure that there are no problems with files that were leftover after uninstalling.
    *http://kb.mozillazine.org/Uninstalling_Firefox
    Your bookmarks and other personal data are stored in the Firefox profile folder and won't be affected by an uninstall and (re)install, but make sure NOT to remove personal data when you uninstall Firefox as that will remove all Firefox profile folders and you lose your personal data.
    *http://kb.mozillazine.org/Profile_folder_-_Firefox
    *http://kb.mozillazine.org/Profile_backup
    *http://kb.mozillazine.org/Standard_diagnostic_-_Firefox#Clean_reinstall

  • Could you please answer to this?

    [object array|http://i218.photobucket.com/albums/cc298/curseofgoldendragon/code-1.png] Could you please answer to this?

    Inserting text is better than linking to external images.
    Anyway, look up autoboxing.

  • What the answer for this  error on a Macintosh system, the application can not open because "NameRegistryLib" could not be found

    what the answer for this error, the application could not open because the "NameRegistryLib" could not be found

    http://www.everymac.com/mac-answers/mac-os-9-classic-support-faq/run-macos-9-on- intel-macs.html
    http://www.macwindows.com/Emulator-for-Mac-OS-9-in-OS-X-updated-for-Mountain-Lio n.html
    http://hints.macworld.com/article.php?story=20060509180914879
    How to run Classic (pre OS X) apps on Intel Macs  

  • Please give answers for this. This is urgent

    1)can u create internal table dynamically ?how?
    2)what is the model dialogbox?
    3)can u create more than one selectionscreen
    4)in which event we will be writing authorization object.

    Hi
    1)can u create internal table dynamically ?how?
    Dynamic internal table is internal table that we create on the fly with flexible column numbers.
    For sample code, please look at this code tutorial. Hopefully it can help you
    Check this link:
    http://www.****************/Tutorials/ABAP/DynamicInternaltable/DynamicInternalTable.htm
    2)what is model dialog box?
    Go to SE51 and create the model dialog box and see.
    It is like creating the screen.
    3)can u create more than one selectionscreen
    Why do you need more than one selection screen for a program,One is enough .
    4)in which event we will be writing authorization object.
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    In general different users will be given different authorizations based on their role in the orgn.
    We create ROLES and assign the Authorization and TCODES for that role, so only that user can have access to those T Codes.
    USe SUIM and SU21 T codes for this.
    Much of the data in an R/3 system has to be protected so that unauthorized users cannot access it. Therefore the appropriate authorization is required before a user can carry out certain actions in the system. When you log on to the R/3 system, the system checks in the user master record to see which transactions you are authorized to use. An authorization check is implemented for every sensitive transaction.
    If you wish to protect a transaction that you have programmed yourself, then you must implement an authorization check.
    This means you have to allocate an authorization object in the definition of the transaction.
    For example:
    program an AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT <authorization object>
    ID <authority field 1> FIELD <field value 1>.
    ID <authority field 2> FIELD <field value 2>.
    ID <authority-field n> FIELD <field value n>.
    The OBJECT parameter specifies the authorization object.
    The ID parameter specifies an authorization field (in the authorization object).
    The FIELD parameter specifies a value for the authorization field.
    The authorization object and its fields have to be suitable for the transaction. In most cases you will be able to use the existing authorization objects to protect your data. But new developments may require that you define new authorization objects and fields.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/67167f439b11d1896f0000e8322d00/content.htm
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    Authorization : An authorization enables you to perform a particular activity in the SAP System, based on a set of authorization object field values.
    You program the authorization check using the ABAP statement AUTHORITY-CHECK.
    AUTHORITY-CHECK OBJECT 'S_TRVL_BKS'
    ID 'ACTVT' FIELD '02'
    ID 'CUSTTYPE' FIELD 'B'.
    IF SY-SUBRC <> 0.
    MESSAGE E...
    ENDIF.
    'S_TRVL_BKS' is a auth. object
    ID 'ACTVT' FIELD '02' in place 2 you can put 1,2, 3 for change create or display.
    The AUTHORITY-CHECK checks whether a user has the appropriate authorization to execute a particular activity.
    This Authorization concept is somewhat linked with BASIS people.
    As a developer you may not have access to access to SU21 Transaction where you have to define, authorizations, Objects and for nthat object you assign fields and values. Another Tcode is PFCG where you can assign these authrization objects and TCodes for a  profile and that profile in turn attached to a particular user.
    Take the help of the basis Guy and create and use.
    Reward points if useful
    Regards
    Anji
    Message was edited by:
            Anji Reddy Vangala

  • I can't find the answer for this anywhere on the internet...please help

    I am trying to learn some things that arent taught to me in class and I would say that I am a beginner, but I have a solid knowledge base of the syntax of java. I am trying to make a program that will log into my gmail account for me. I have to do a presentation at the end of the semester and I would like to take the input from the user and log into gmail by outputting the input taken into the gmail login textboxes. Is this done through source or is it something different. I know this seems pointless, but I think it is fun to learn new things in this language. I can always make it more usefull for myself if I go back and make my usename and password static or final within my class. If anyone can help me or at least tell me what classes in the API would be helpfull for this that would be great. Thanks.

    Thanks for the reply kitty...I guess I am not as good as I thought because I don't really know how to impliment this and truely understand it. How long have you been programming java?

  • Please check for this account skype he is scammer

     now he use skype call to me my mobile phone i'm  IT Recruiter  it's have more impact my occupation please delete and block this account i must delete my account . i must use skype for business but now i can not .  now second time  he send mail and use skype call to me i can not change my number mobile telephone i must use for business please help for me i must use skype only business .
    Hello Jiraporn, how are you doing, hope you have been enjoying your self, you were playing smart on me right, i have to give you time to play on the game first and see if you win, but you never win, you give my skype id to people over there in Thailand to insult me and call me all kind of name, i just want to leave Malaysia to UK first before contact you, and i still have does copy of your sex video, i am going to give you 2 days for you to me the sum of 3000 Great British pounds, i know you will love to see some of you video honey, and your **bleep** so good, i hope the people of Thailand and the Movie porn industry will love to have you **bleep** some else on life, here are one of you video
    Uploaded screen shot removed as personally identifiable information was not redacted.

    Hi, J3120,
    Please refer to this instruction on how to remove your Skype account:
    'Can I delete my Skype account?'
    Then, please contact Skype customer service to file your request, as the article states.
    Here is a link to the instruction on how to contact Skype Customer Service via their secure portal: Contact Customer Service
    As you know you intend to contact Customer Service, skip past Step 2 of the instruction where several articles from the FAQ library will appear for you to review, and proceed to Step 3, Continue Support Request (the "button" appears at the lower right corner of the website page). You may also skip past in Step 4 where you will be referred back here to the Community; no need to do this as the Community is where you started.
    You may transfer your contacts that you wish to keep from the old account to the new, however please note that you would have to request a refund of any credit and cancel subscriptions as neither of these can be transferred from one account to another.
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • Can anyone please answer to this?

    Failed to Save Data when creating layout
    http://forums.oracle.com/forums/thread.jspa?messageID=3919509
    anybody have answers to above threads?

    while doing the same thing in Temolate it is throwing the error like
    'Java execution failed. Please check the Java Option in the option dialog'
    for this i go to options and change the setting to -XMS1024m in the preview .then also i am getting the same error in the template
    can anyone please help me to resolve this ...

  • Plz some body answer for this..its urgent

    Hai can anyone help me?
    I have lengthy report containing 1000s of Records in it..
    When i disply this report in viewer,i have to use horizontal scroll bar of IE to view the lengthy report,which will in turn display long page ofit.
    But,My requirement is,i want to display the length report in singe screenshot itself..it means i should not use IE Horizontal scroll bar to view the next set of records in report..
    does discoverer supports providing any scroll bar to view horizontal shots like what we do in Excel.
    Hope u understand what i am coming to say..if not understandable plz query me i will tell in details..
    But plz somebody reply me for this query..its urgent.
    regards
    ck

    Brother this is not the correct way to ask.
    In your words you are commanding...
    But we have to request the EXPERTS.
    WE are in learning stage dont order or command.
    Just request them in another way...... then only u get the required reply....
    With regards,
    Prasad.

  • TS3694 why is there an error 9006 and how can i fix it?? please answer for ipad mini

    why is there an error 9006 and how can i fix it?? please answer and btw its an ipad mini

    if you are trying to download and install ios7, it is probably because of the enormous amount of traffic apple's download servers must be experiencing. things should return to normal before too long, just hang tight

  • Not getting any straight answers for this question!!!!!

    Hi All,
    This question i've posted before, but i didn't get correct answer. I'm posting it again!!!!!
    I'm very confused about the flow of process.
    right now i'm working on webmethods. I did worked on lots of message types like 850, 810,856,832,940,997 in X12 and also EDIFACT.......for that past 2 1/2 years.
    This question is completely related to SEEBURGER ADAPTER NOT ANY CONVERSION AGENT:
    1.
    when an EDI message comes into XI it will be converted into EDI-XML format bye seeburger adapter. where we get the prototype of EDI message? Do we have a package or namespace in repository from seeburger which gives all EDI prototypes? or we import as an XSD doc from our local system generated by 3rd party tools?
    2.
    Do we write a mapping program(EDI-XML 2 IDOC-XML)  with graphical tool or do we have a tool provided by seeburger to write mapping program? I heard that seeburger provides mapping programs(not those modules which converts standard EDI to XML EDI)  which will convert EDI XML 2 IDOC-XML. is this is true?
    3.
    how do we process EDI file sent by customer? is it ISA level or ST level? because there may be many situations where one ISA has multiple ST's.
    Please explain me if possible with one scenario......i read all the links provided about this question so i need a practical example.........
    Thanks in advance.

    Hi,
    Go thru this might help you
    http://www.seeburger.com/fileadmin/com/pdf/AS2_General_Overview.pdf
    http://www.seeburger.it/fileadmin/it/pdf/2005_04_sapphire_Ferrero_transcript.pdf
    http://www.seeburger.com/fileadmin/com/pdf/SEEBURGER_SAP_Adapter_engl.pdf
    http://www.seeburger.com/fileadmin/com/pdf/Butler_Group_SEEBURGER_Technology_Audit.pdf
    http://www.sap.com/france/company/events/2006/02-01-Automotive-Seeburger.pdf
    http://h41123.www4.hp.com/presentations/ISUG/XISeeBurger.ppt
    http://www.sap.com/asia/company/events/nwtechdays/presentation/australia-slides/Pre-Built_Integration.pdf
    Regards
    Agasthuri Doss

  • SDN Login problem - Modrators please look for this issue

    Dear Moderators,
    Earlier Registered email - <<edited>> at gmail dot com
    User ID - p762884
    I had created this SDN ID in year 2008, I am used it til yesterday, but when I try to log in today it showing wrong user ID or email id
    Why this happens suddenly, I contacted SCN suport team with evidence when exactly it created but they replied no such user ID and email id is registered with us, if check on SD forum for which post I answered, there nothing is appearing just appearing as GUEST as below link
    Not Allowing Goods Movements for the confirmed quantity in the delivery
    Now my user ID & points from last three year gone,
    Dear Laxmipathi Now you are my last hope, please do need full to invstigate this
    Kapil
    Edited by: Matt on Sep 18, 2011 4:49 PM - removed email address

    hmmm...sometimes, you would like to refer to other threads for more info and more clarification instead of just copy-paste..because a similar problem has been discussed and the continuation can be found in that discussion/link.
    and it doesn't mean it is not adding any value to the forum..
    and  if I apply this argument then referring to an OSS note isn't adding value too?
    OSS note is already there and you just need to search for it..
    For ex. check this thread: [Invoice pricing in sto;
    as per the argument it doesn't add any value because the oss note already exists and it is just a copy paste of the info from the note? Simply not! it does add value..I didn't know about this note.. and I had my learning from it..and probably many others..
    As a contributor, am scared what to post and what not to? I understand the copyright and repeated questions part...leaving them apart, I don't think there should be so many restrictions and so much policing.
    The above are Just my thoughts.. am sure there have been many discussions and brain storming about this before the rules were formed, and I hope they were formed with all the considerations and in a perspective beneficial to all.
    Edited by: Rags on Sep 16, 2011 1:57 PM

Maybe you are looking for

  • Publishing: Sharepoint WorkSpace Vs OneDrive for business

    I've SharePoint 2013 on premise with OneDrive for business. I've published SharePoint Site Collection App with Web Application Proxy (WAP). When a user is at home, he can creates files on his OneDrive folder, these files are automatically synchronize

  • How Do I Combine iTunes Libraries?  - I just need the content (not playlists, etc.)

    I have two very large iTunes libraries that I'd like to combine into one. To complicate the issue, the "old" library is larger because I had more space on an external drive at the time.  The "new" library (the one I want to add to) is essentially a s

  • Button actions and Paste into

    Hi, working with the new InDesign CC, I'm somewhat disappointed that the paste into bug, where the button actions are going to be lost if you paste a group of objects/frames into another frame (ex.: go to state action), still exists. The same if you

  • RunInstall looks into wrong path

    Hi guys I don't know what else to delete... how come running runInstall see another home(fedora 12 x64) [oracle@laptop database]$ ./runInstaller You do not have sufficient permissions to access the inventory '/home/florin/oraInventory'. Installation

  • My keyboard shortcuts started not working when I updated to iOS 6?

    For example, I made is so when i type in "wru" it puts in "where are you" This isn't working for me since I have updated to iOS 6. Please help, thank you!