1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
4 years ago
9

It is a function that ends the connection to the database.

Computers and Technology
2 answers:
Mkey [24]4 years ago
4 0

Answer:

mysql_close/ mysqli_close.

Explanation:

mysql_close / mysqli_close  functions are used to close the connection to the database.mysql_close is removed from the php version 7.0.0 and mysqli_close is used .

If the link in the mysql_close is not specified it so the last link opened by mysql_connect() is assumed.

It returns the value True or False.True on success false on failure.

yanalaym [24]4 years ago
4 0

Answer:

a. mysql_close / mysqli_close

Explanation:

mysql_close/mysqli_close closes existing MySql connection.

Example usage:

<?php

$link = mysql_connect('localhost', 'userid', 'password');

// Close the connection reference $link

mysql_close($link);

?>

Mysqli represents an improved version of mysql driver.

<?php

$link = mysqli_connect('localhost', 'userid', 'password');

if ($link) {

   // Close the connection reference $link

   mysqli_close($link);

}

?>

You might be interested in
Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
Ahat [919]

CAVA’s Academic Integrity Policy refers to Calfornia Virtual Academic’s policy book for students of their schools, which are public charter schools in the state of California.

In the handbook, it is mentioned that students who commit plagiarism will be required to re-submit the assignment during the first offence; will receive a fail grade for the assignment during the second offence; and will be withdrawn from a course or even the school during the third offence.

Thus the answer to the question is (D) all of the above.

8 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
What are the 5 characteristics of flowchart<br>​
olchik [2.2K]

Answer:

Here's ur answer

Explanation:

(i) Should consist of standardized and acceptable symbols. (ii) The symbols should be correctly used according to flowcharts rules. (iii) Should have short, clear and readable statements written inside the symbols. (iv) It must have clear one starting point and one ending point.

3 0
3 years ago
Lime is using social media to ask consumers about the qualities they desire in an electric scooter. The firm hopes to develop a
tresset_1 [31]

Answer:

The correct answer to the following question will be "Product".

Explanation:

  • Product marketing is often a mechanism by which a brand is marketed and delivered to a client. It's also known as the intermediate feature between product innovation and brand recognition or awareness.
  • It's something to which comparison is made when selling a product on the market to the consumer.

Therefore, the Product is the right answer for the above question.

8 0
3 years ago
Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
FromTheMoon [43]

Answer:

<h2>I would recommend Python Programming language</h2>

Explanation:

The major reason i recommend python is that It has a ton of resources, and community support, such that it is practically impossible to get stuck while carrying out a project

Python is easy,and lets you build more functions with fewer lines of code.

More so, provides a stepping stone to learning other code and it is a very  flexible language

3 0
3 years ago
Other questions:
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • What is a VIN and what role does it play during a criminal investigation? Explain how a VIN could help in a bomb and/or arson ca
    12·1 answer
  • Is it better to meet online or offline<br> (Please answer QUICK)<br><br> Thanks :')
    5·2 answers
  • How to change screen brightness windows 10?
    7·1 answer
  • Which two technologies support the building of single-page applications? and are two technologies helpful in building single pag
    12·1 answer
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • when working with smart which tab would provide the ability to change the shape or size of the smart art shapes
    15·2 answers
  • Need answer ASAP plz
    8·1 answer
  • Which of these is NOT an example of a GUI?
    7·1 answer
  • The action of entering data into your computer. This can be text typed in a word processing document, keywords entered in a sear
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!