1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
13

On other questions, how do I write my own question, without commenting on others questions? It is only allowed two, I think, the

n you have to comment on others. Please help.
Computers and Technology
1 answer:
faust18 [17]3 years ago
8 0
You go to whats your question and write your question
You might be interested in
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
1 year ago
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
Which of the following techniques is used with a state of nature of uncertainty? A. Decision tree B. Laplace C. Break-even analy
miss Akunina [59]

Answer:

A)

Explanation:

7 0
2 years ago
The advantages of the DecimalFormat class compared with the NumberFormat class include Group of answer choices
Anon25 [30]

Answer:5. only A and B(precise control over the number of digits to be displayed and control over the presence of a leading zero)

Explanation: DECIMAL FORMAT CLASS is a subclass of Number format class specifically made to format parsing decimal Numbers. It is capable of formating both ARABIC, WESTERN AND INDIC DIGITS. It has a unique Attribute of control over the number of digits to be displayed and control over the presence of a leading zero.

NUMBER FORMAT CLASS is the class for formatting parsing numbers it helps to format According to Specific locale.

3 0
3 years ago
QUESTION 4 Developing practical thinking skills often involves O using common sense o learning from experience and building emot
Juliette [100K]

Answer:

The answer is "mixing collaboration with private time".

Explanation:

In this question, the development of practical thinking abilities, training often involves resolved everyday struggles. It also helps students, are already used to develop communication skills, in particular, to resolve mostly based on critical thinking, everyday life issues at different layers of difficulty.

8 0
2 years ago
Other questions:
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • Taking away iPad privileges when a student hits another child would be considered a(an) ________ principle for decreasing or ext
    10·1 answer
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • When you use the 3 bits 100 what color will it produce?<br><br> Computer Science
    11·1 answer
  • Who invented the Bluetooth device​
    12·1 answer
  • How many passes will it take to find the four in this list?
    15·2 answers
  • Alexis received paychecks from both her jobs and she would like to deposit them. One check is for $62.88 and the other is $523.2
    9·1 answer
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
  • Line formatting can be accomplished by using
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!