1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
2 years ago
15

Write one DDL statement to add a new table Project into exam1. It contains the followingthree columns:-ProjNum of char(3) type,

which is the primary key of Project.-Pname of varchar(30) type, which could be null. If it has a value, its first three characters must be 'UH2' or 'UB5'.-Budget of smallmoney type, which cannot be null and must have a minimum of $1,500.

Computers and Technology
1 answer:
Goryan [66]2 years ago
8 0

Answer:

Check the explanation

Explanation:

When it comes to database management systems, a query is whichever command that is used in the retrieval of data from a table. In a Structured Query Language (SQL), generally queries are more or less always made by using the SELECT statement.

I have been trying to type it here but it's not working

so kindly check the code in the attached image below

You might be interested in
Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled arch
Inessa [10]

Answer:

The statement about Multiprocessors that is FALSE is:

a. Asymmetric multiprocessors are a popular form of tightly coupled architecture

Explanation:

Symmetric multiprocessors house two or more identical processors sharing a single main memory.  The multiprocessors are tightly coupled, and all of them can access all the connected devices without any preferential treatment of one over the others.  This is unlike asymmetric multiprocessors that do not share a single main memory.   Instead, they have distributed memories.

4 0
2 years ago
You have installed a device that has eight interfaces and does not forward broadcast packets. What kind of device did you instal
Novay_Z [31]
A router, possibly. Thought I'm not for sure because I'm not in computers and technology

7 0
2 years ago
Read 2 more answers
You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
galina1969 [7]
The answer is True bc it saves you time and is efficient
6 0
2 years ago
How do you change the font in html?<br>&lt;______&gt;google sans"google sans font"&lt;/______&gt;
Allisa [31]
What do you want inside font colour,text,or face
7 0
2 years ago
One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:_____
ikadub [295]

Explanation:

The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.

6 0
1 year ago
Other questions:
  • To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
    5·2 answers
  • What are the three fundamental elements of an effective security program for information systems?
    11·2 answers
  • What is the capture of transaction and event information using technology to (1) process the information according to defined bu
    13·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer. Assume t
    14·1 answer
  • High level languages are closer to machine language than humans yes or no​
    12·2 answers
  • What is one of the advantages of using an algorithm to solve a puzzle like Kriss-Kross or Sudoku?
    13·1 answer
  • 90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
    14·2 answers
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
  • The term used to describe whereby old and new media are available via the integration of personal computers and high speed satel
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!