1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
4 years ago
5

Why do generated backup scripts usually include backticks around names such as database names and column names?

Computers and Technology
1 answer:
babymother [125]4 years ago
8 0
Using backticks<span> permits you to use alternative characters.</span><span>
Generated backup scripts usually include backticks around names such as database names and column names t</span>o allow for names that include spaces. 

You might be interested in
Need help with this question please help it’s on c++
yan [13]

Answer:

b

Explanation:

if you look at the end of the code it brings c back but for it to do that it has to make a newline.

8 0
3 years ago
How do you take a picture plz answer
Romashka [77]
Hold down Ctrl, Alt, and the button in pointing at for a screenshot to take a picture with the camera. There should be a app on the chrome book in the web store to use.

6 0
3 years ago
Read 2 more answers
Cuáles son las redes sociales que más utilizas tú y tu familia. Describe su utilidad.
Ymorist [56]

Answer:

Facebok

Explanation:

we are able to see everthing other people do and are able to limit what are kids do

6 0
3 years ago
Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?
ololo11 [35]

Answer: Dark background and light text.

Explanation:

Assuming when you mean by "light text", you mean by white text. This should be able to be readable by users visiting the site.

4 0
3 years ago
You have recently been hired as the staff attorney at a growing independent film studio in Van Nuys, California. Among your duti
expeople1 [14]

Answer: dude it’s all mussed in where the question

Explanation:

4 0
3 years ago
Other questions:
  • Scott is the CISO for a bank. In recent readings, he read about an attack where the attacker was able to enumerate all the netwo
    9·1 answer
  • A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
    13·1 answer
  • Which of the following is a proper use of the application NetStumbler?Which of the following is a proper use of the application
    10·2 answers
  • For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
    5·1 answer
  • Relation between training and occupation with examples in points . Plz tell fast<br> ​
    5·1 answer
  • TWO MINUTES LEFT<br> ________ __________ is the physical arrangement of devices on a network.
    9·1 answer
  • CAN SOMEONE PLEASE HELP ME WITH THIS PLEASE ?!!!!!!!!
    14·1 answer
  • A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
    5·1 answer
  • Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
    6·1 answer
  • Which sql keyword is used to retrieve a minimum value from an attribute in a table
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!