1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
2 years ago
8

How can structure of a table change in sql. What general types of changes are possible

Computers and Technology
1 answer:
Amiraneli [1.4K]2 years ago
7 0

One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

<h3>How can we modify the structure of a table in SQL?</h3>

The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.

Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.

Hence, One can structure of a table change in sql and the general types of changes that are possible is that:

  • One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.
  • One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

Learn more about table structure from

brainly.com/question/26125587

#SPJ1

You might be interested in
In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the l
Shtirlitz [24]

Answer:

best-fit

Explanation:

Best-fit: Closest in size to the request: In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that is large enough to satisfy the request

3 0
3 years ago
Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
ad-work [718]

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

3 0
2 years ago
In cell B20, enter a
zzz [600]

Answer:

かあなたは棚田やヌタほたややあはあやあやあさあ与田弥太は沙汰やあはあわあね、田やホワアラハやくださいヤアカやさ矢田かほあや体は白湯のやさた

Explanation:

なたさたらなやさゆなやさら

5 0
2 years ago
Vpns create a _____________ to transport information through public communications media.
Oxana [17]

They create a secure tunnel.

3 0
3 years ago
I need app ideas for basic everyday problems​
-BARSIC- [3]

Answer:

App that reminds you to drink water

Explanation:

A lot of people are dehydrated because they don't remeber to drink water

8 0
2 years ago
Other questions:
  • What are factors that limit a technological design
    13·1 answer
  • A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) _______
    10·1 answer
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
    12·1 answer
  • What is it called when you make a reference in the text of a document alerting the reader that you are using information from an
    10·1 answer
  • A modern version of the BIOS firmware is called?
    12·1 answer
  • What connectors are available for components to be connected externally to the motherboard
    12·2 answers
  • Short notes on Supply chain Management System (SCMS)
    12·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • What sort of negative outcomes are possible for this type of risk?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!