1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
2 years ago
8

How can structure of a table change in sql. What general types of changes are possible

Computers and Technology
1 answer:
Amiraneli [1.4K]2 years ago
7 0

One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

<h3>How can we modify the structure of a table in SQL?</h3>

The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.

Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.

Hence, One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

Learn more about table structure from

brainly.com/question/26125587

#SPJ1

You might be interested in
Several students are making presentations for a science class. The chart describes the concept that each student will present to
JulsSmile [24]

Question

Student presentation concepts from another source

Letitia - a step-by-step process of breaking down glucose into energy

Mana - repeating process of the steps of the cell division, going from interphase to division, and back to interphase.

Paul - a series of organisms that show similar characteristics and compare them to those that do not

Which best describes the SmartArt graphic layout each student should use?

Answer:

Letitia would use a process, Maria would use a cycle, and Paul would use a relationship.

Explanation:

Letita's assignment requires her to show how glucose can be broken down into energy, this requires a series of steps in s linear fashion, meaning it would be best suited to a process-style diagram.

Marta's project involves showing the steps of the cell cycle: the clue is in the name. This process is not linear, and instead repeats itself, meaning it fits to a cycle diagram (i.e. a circular diagram)

Paul is comparing and contrasting different organisms. Therefore, he should use a relationship diagram to show shared characteristics as well as features that differ.

8 0
4 years ago
The Dark Web is _____. Select 2 options.
fiasKO [112]

Answer:

a. an international marketplace where criminals buy and sell products.

c. a capitalistic marketplace for criminals and non-criminals.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the world wide web (www) is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The dark web also referred to as darknet, can be defined as a subset of the world wide web that is intentionally encrypted from conventional web browser and search engines. Thus, it is a peer-to-peer network that requires the use of specialized configuration and web browser such as "Tor browser" in order to access its contents.

Generally, all the internet activities carried out on the dark web are anonymous and private, thereby making it suitable for either legal or illegal operations. Also, it's devoid of government influence or control and as such it's typically a capitalistic marketplace, where goods and services are privately owned and controlled by the people.

Hence, we can deduce that the dark web is simply;

I. An international marketplace where criminals buy and sell their products.

II. A capitalistic marketplace for criminals and non-criminals.

4 0
3 years ago
How many doors in the arsenic and old lace
Romashka [77]

Answer:

13

Explanation:

6 0
3 years ago
Please explain in simple words. What does a root do to your tablet? And how do you do it? Is it worth doing it if you only play
nadya68 [22]
Root is a term for android devices similar to "jailbreak" for Apple devices. Rooting gives you basically full control of your device but is considered to be a third party software because you are modifying the operating system. I would watch a YouTube video on how to root your device. I tried to root my device so I could get this screen recording app to work. I think it is really up to you because I think it avoids warranty.
6 0
3 years ago
Marianne needs to create a version of her slide presentation that does not include all the slides and will be used for
Morgarella [4.7K]

Answer:

B is the correct answer because that's what I do

8 0
3 years ago
Read 2 more answers
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • Write a method called all Less that accepts two arrays of integers and returns true if each element in the first array is less t
    12·1 answer
  • How do I write a letter on my computer and print it?
    9·2 answers
  • One factor in algorithm performance that we've not had a chance to speak much about this quarter, but one that is certainly rele
    6·1 answer
  • Memory cards from your cameras (SD cards) and flash drives are examples of __________.
    13·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • To summarize means to
    11·2 answers
  • What should be taken into consideration when determining which critical information should be protected?
    11·1 answer
  • 1. While researching online, you come across an article that prominently displays the author's name. This source is likely to ha
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!