I phone because it stores things hil sends out things to other people
Answer:
The answer to this question is "Password".
Explanation:
In computer science, any User's computer and networks and server is secured with the password to access all we use the password. for example, if we want to access any WiFi system or any User's computer. Then we will insert the password. If the password is wrong so we can't access the WiFi system or User's computer. similarly, If we want to access any server so we must know about the password. Then we use the server and change it's setting.
So the password is the primary means of authentication for all User's.
<span>A shortcut is a used to quickly open a folder, data file, program, or other object. They are very convenient to have and make navigating through a computer extremely easy.</span>
The SQL is used to change a table's structure by:
The use of the SQL ALTER TABLE command.
<h3>How is it done?</h3>
The SQL ALTER TABLE command is known to be that which is often used to alter the structure of an existing table.
It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.
Note that It can also be used to alter the comment for any kind of table and type of the table therein.
Learn more about SQL from
brainly.com/question/25694408
#SPJ1
Answer:
length is your answer
Explanation:
Have a great day! ^-^
can you me as brainliest if its right? i need 10000 points and 35 brainliest's to rank up to genius