1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
8

In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu

mns are identity columns, and that none of them have default values or accept null values. What’s wrong with the statement?
Computers and Technology
1 answer:
Firlakuza [10]3 years ago
5 0

Answer:

The number of items in the column list doesn't match the number in the VALUES list.

Explanation:

The statement is:

INSERT INTO InvoiceCopy

(VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,

TermsID, InvoiceDate, InvoiceDueDate)

VALUES

(97, '456789', 8344.50, 0, 0, 1, '2016-08-01');

As clearly seen, there are 8 number of items (VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,  TermsID, InvoiceDate, InvoiceDueDate) but there are only 7 items in the values list.

Assuming the conditions given are true, it is seen the number of items in the column list does not match that of the values list, which identifies as a fault.

You might be interested in
what are the two capabilities of the internet that promote and sustain customer relationships? multiple choice question. anywher
nika2105 [10]

The two capabilities of the internet that promote and sustain customer relationships is option C: interactivity and individuality.

<h3>What can the internet do and how does it function?</h3>

A global computer network called the internet transmits many types of data and media between linked devices. It functions by utilizing a packet-routing network that complies with Transport Control Protocol (TCP) and Internet Protocol (IP).

Therefore, Note that Web interactivity describes interactive elements that are integrated into websites and allow for the exchange of information between users of technology or between users of communication technology.

Learn more about internet  from

brainly.com/question/2780939
#SPJ1

5 0
2 years ago
Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employ
liraira [26]

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

8 0
3 years ago
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
Which body of water is most likely to be a marine ecosystem?
Sophie [7]

Answer:

The body of water that is most likely to be a marine ecosystem would be an estuary.

Explanation:

An estuary is a widened, often funnel-shaped mouth of a river, where fresh river water and salt sea water are mixed and thus brackish water is created, and where tidal differences can be observed. When a river flows as a system of branches, it is called a delta.

Estuaries often have a great natural value. They typically consist of swallows and salt marshes that are very rich in invertebrates and thus have a great attraction for birds, among other things.

4 0
3 years ago
Which are the best examples of how technology can be used in contemporary entrepreneurship?
VARVARA [1.3K]

Answer:A

Explanation:

7 0
3 years ago
Other questions:
  • What type of devices are the key board and the mouse?
    10·1 answer
  • What are tags?
    13·1 answer
  • What does limited access to a document mean?
    12·2 answers
  • Chole enjoys her math classes, and she would like to find a career that will allow her to continue use her math skillls which ca
    10·1 answer
  • When you right-click a word with a red squiggly line under it, which of the following displays?
    12·2 answers
  • In which of the following situations will a macro make your work more efficient?
    12·1 answer
  • Which type of storage disk and disk drive can be used in the given situation? Amy wants to borrow an interesting movie from Bruc
    10·2 answers
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Lyla is writing a program that uses a recursive method. Why might she want to use a recursive helper method?
    8·1 answer
  • What does every shot have with regards to depth?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!