1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
10

Which of the following is not a valid way to avoid search problems when you want to search for rows that have a specific date in

a column that’s defined with the DATE data type? a. use the TRUNC function to truncate the time values from the date value in the column that you’re searching b. search for date values that fall between the day and the day after the date you want c. use the TO_DATE function to remove the time values from the dates in each column
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
6 0

Answer:

use the TO_DATE function to remove the time values from the dates in each column

Explanation:

DATE types are involved in most obfuscations. One database that has been considered vulnerable in this regard is the Oracle database due to the fact that a time component is always included in its DATE type. Usually, the common practice would be to use the TRUNC function for the purpose of removing the time component, when in real sense, this function does not actually remove the time. Hence to avoid search problems when searchinc for rows with a specific date in a column defined with the DATE data type, it is most effective to use the TO_DATE function to remove the time values from the dates in each column.

You might be interested in
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Instructions: Use the tables below to answer the questions that follow:
Svet_ta [14]

Answer:

same as above....................

3 0
2 years ago
What data type or you use to represent true or false values?
vfiekz [6]
The Boolean type is used to represent true or false values
3 0
2 years ago
What types of files we do backup in UNIX and Linux?
katrin [286]

Answer:

Nas ja kaki yawe diy. Kitu mu chuk k a jana a.

Explanation:

Karu explain pudi diya chal puter chuti kar.

8 0
2 years ago
Read 2 more answers
Web navigation gives the user a sense of control.
Leviafan [203]
1. a.
2. d
3. b
I hope this helps
6 0
3 years ago
Read 2 more answers
Other questions:
  • I need help answering these questions!
    11·1 answer
  • Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
    5·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the ou
    10·1 answer
  • What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
    11·1 answer
  • Which of the following are incident priorities?
    9·1 answer
  • Write a program to change background colour of your visual basic form with any 3 different events.​
    15·2 answers
  • If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:
    14·1 answer
  • Icon view, list view, and details view are all common views provided by which kind of program?
    12·2 answers
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!