1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
2 years ago
14

Database queries is an example of

Computers and Technology
1 answer:
storchak [24]2 years ago
8 0

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

You might be interested in
Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
Zigmanuir [339]

Answer:

She is experiencing the features of feeling in between.

Explanation:

Because she graduated from college currently and she thinks about moving seriously with her boyfriend or best friend and she also thinks about the convenience and safety which she gets in her parents' house. She confused because she is not completely in the adult stage and currently, she passed through from the stage of adolescence, so that's why she experiencing feeling in between.

3 0
4 years ago
BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
xeze [42]

<u> Allows you to see two parts of the same worksheet side by side</u>

<u>Option: B</u>

<u>Explanation:</u>

The View Side by Side command helps to see the two documents side by side in Word. When using this feature, both the documents open at the same time in different windows side by side.

To view this, click the View tab in Word and then click the View side by side button. Now the document opens in two windows with side by side views. This is used to compare the documents. In case, if we want to disable this view, click the 'View Side by Side' button again so that it comes to the normal view.

6 0
3 years ago
Read 2 more answers
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
What service is used when your email program exchanges messages with the mail server on a distant network?
Verizon [17]

The answer is SMTP (Simple Mail Transfer Protocol)

SMTP is a TCP/IP protocol used in sending and receiving emails. This service is usually used with two other protocols, IMAP or POP3. Most email systems nowadays used SMTP to send messages from one server to another. Generally, an SMTP is used to send messages from a mail client to a mail server.

4 0
3 years ago
In each iteration, selection sort (small) places which element in the correct location?
Jet001 [13]
The answer is <span>smallest not yet placed.  </span><span>In each iteration, selection sort  places smallest not yet placed element in the correct location.  </span>
7 0
3 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • How can styles be used in Word? Check all that apply. to standardize the font size of a title in a Word document to standardize
    9·2 answers
  • If images around the edges of a monitor do not look right, the computer might have a(n) access problem. hardware problem. Intern
    13·2 answers
  • [15 points] 3.2 Lesson Practice (holy marry mother of joseph)
    7·1 answer
  • Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a
    11·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • Which statement is true for rapid prototyping? (A. It creates a two-dimensional model of a part or a product, from the original
    8·2 answers
  • In what ways can information be slanted in a news report? List at least five ways.
    5·2 answers
  • The Ingenuity and the MOXIE are two new pieces of technology on the Perseverance. What role will these instruments play? How wil
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!