1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
2 years ago
6

What does the asterisk (*) after select tell the database to do in this query?

Computers and Technology
1 answer:
OlgaM077 [116]2 years ago
4 0

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

<h3>What does asterisk (*) mean in SQL?</h3>

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

You might be interested in
Python Question: write a program that generates a random number in the range of 1 through 100, and asks the user to guess what t
natima [27]

Answer:

import random

arr=[]

for i in range(100):

   arr.append(i)

while True:

   answer=random.choice(arr)

   guess=int(input("enter your guess number between 0-100: "))

   if answer is guess:

       print("right guess\ncongratulations.....")

       print("the answer was: "+str(answer))

       break

   elif guess < answer-20:

       print("you guessed too low....\ntry again")

       print("the answer was: "+str(answer))

   elif guess > answer+20:

       print("you guessed too high....\ntry again")

       print("the answer was: "+str(answer))

   else:

       print("incorrect guess\ntry again")

       print("the answer was: "+str(answer))

Explanation:

6 0
3 years ago
Validating the users claimed identity is called which of the following?A. AuthenticationB. IdentificationC. VerificationD. Valid
soldier1979 [14.2K]

Answer:Authentication

Explanation:

3 0
4 years ago
You need to install an RODC in a new branch office and want to use an existing workgroup server running Windows Server 2012 R2.
klio [65]

Answer:

You should do the following:

  • Create an account of computer for RODC in the domain controller OU (Organizational unit) as well as allow the Micheal's account to join the computer to the domain.

Explanation:

RODC:

It is called as Read only domain controller that is used to ensure the protection of the servers at remote offices of an organizations.

  • In this case, you are installing an RODC in a new branch office that is remote. For installation of RODC on windows server 2012 R2, we need to create an account for the computer in the domain controller organizational unit for the installation of RODC.
  • We also need to create an account for Micheal's with the privilege to join that computer to the domain.

5 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
o-na [289]

Answer:

I think the answer is 2.

hope it will help you

4 0
3 years ago
Read 2 more answers
Other questions:
  • Create short names for the terms below based on the naming conventions rules.
    14·1 answer
  • Name the main technology used to connect computers to devices
    6·1 answer
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • Consider an array of size nine with the numbers in the following order: 40, 60, 20, 80, 70, 90, 30, 10, 50. (a) Create the heap
    7·1 answer
  • What to do when you strip a screw
    10·2 answers
  • Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
    5·1 answer
  • Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output sho
    5·1 answer
  • 4. Sameer appointed as journalist in big news channel. News channel has its own podcast. Explain to Sameer how podcast is useful
    11·1 answer
  • Open a Python interpreter. Python can show you the set of currently known names if you type dir(). While these values may vary f
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!