1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
4 years ago
12

You use a Microsoft SQL Server 2012 database. You want to create a table to store Microsoft Word documents. You need to ensure t

hat the documents must only be accessible via Transact-SQL queries. Which Transact-SQL statement should you use?
Computers and Technology
1 answer:
castortr0y [4]4 years ago
6 0

Answer:

The answer to this question can be given as:

Statement:

INSERT INTO First_table(Column name)  

SELECT * FROM  

Second_table(BULK 'C:\data\data.docx', SINGLE_BLOB) as file;

Explanation:

In the above statement firstly we use the insert command and select command. The insert command is used to insert data into table and Select command is used for return group of the data from one or more table in this command we use two parameter in the first parameter we use the bulk it is used for store data into a file and we pass the path of the file where data stored. In the second parameter, we use the single_blog. It is used to store the data into a single block and at the last, we define the file that stores data like a file. In this statement, we insert data into another file that stores the data into word file.

You might be interested in
Explain the following terms:<br><br> a) Atomicity<br><br> b) DML
GenaCL600 [577]

Answer:

a) Atomicity:- It is among the one of the ACID properties of transactions.It states that an atomic transaction is irreducible and indivisible series of data operations such that either nothing occurs or all occurs.

b) DML(Data Manipulation Language):- It is a computer programming language that is used for inserting,deleting,manipulating data in the database.For example -SQL.

6 0
4 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
What does a file extension tell you?
kiruha [24]

A. because everyone basically has seen it..

3 0
3 years ago
A developer of a relational database refers to a file as a
goldenfox [79]
This is the correct Answer    <span>Attribute</span>
5 0
3 years ago
Define the HTML tags needed to write CSS rule, inside of those HTML tags define a CSS rule using internal CSS requirements for c
Len [333]

You can use internal style definitions with the <style> tag:

<style>

body {

  color: red;

  font-style: italic;

  font-size: 12pt;

  font-family: Arial;

  font-weight: bold;

}

</style>

This gives you red italic text of 12pt using the Arial font.

7 0
3 years ago
Other questions:
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • A Use-Case diagram is a staticdiagram?
    7·1 answer
  • The operating system, and in particular the scheduler, is not an important component of a real-time system.
    14·1 answer
  • Adding functionality to a Button is easy when you use the IDE. After you have dragged a Button onto a Form, you can ____ it to c
    7·1 answer
  • You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. Wh
    10·1 answer
  • Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
    7·1 answer
  • Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
    11·2 answers
  • Most sources consider the ARPA-NET project the birth of computer blank<br> .
    11·2 answers
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
  • In a(n) ____________________ device, the movement of electrons performs essentially the same functions as gears and wheels in me
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!