1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
10

Which of the following is not a valid way to avoid search problems when you want to search for rows that have a specific date in

a column that’s defined with the DATE data type? a. use the TRUNC function to truncate the time values from the date value in the column that you’re searching b. search for date values that fall between the day and the day after the date you want c. use the TO_DATE function to remove the time values from the dates in each column
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
6 0

Answer:

use the TO_DATE function to remove the time values from the dates in each column

Explanation:

DATE types are involved in most obfuscations. One database that has been considered vulnerable in this regard is the Oracle database due to the fact that a time component is always included in its DATE type. Usually, the common practice would be to use the TRUNC function for the purpose of removing the time component, when in real sense, this function does not actually remove the time. Hence to avoid search problems when searchinc for rows with a specific date in a column defined with the DATE data type, it is most effective to use the TO_DATE function to remove the time values from the dates in each column.

You might be interested in
A hard drive that is running slowly may not have been
Anuta_ua [19.1K]
Plugged in i think is the answer
7 0
3 years ago
Read 2 more answers
Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
Stells [14]

Incomplete question. The Options read;

A. The year purchased

B. Brian's classmates

C. The amount of memory

D. The type of operating system

Answer:

<u>B. Brian's classmates</u>

Explanation:

<em>Remember,</em> the question is concerned about <em>"the individuals"</em> in the data set, <u>so the year they purchased their computer, neither is the amount of memory of the computer and the type of operating system can be classified as individuals in the data set.</u>

Hence, we can correctly say, only Brian's classmates are the individuals in this data set.

4 0
2 years ago
You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
Reptile [31]

Answer:

It could be because you where hack. Or there was something wrong with the site that stopped it from saying why it stopped.

8 0
2 years ago
The underwriters laboratories (ul) requirement for ? ground-fault circuit interrupters (gfcis) is that tripping shall occur when
Nadusha1986 [10]
The answer is Class A.  The GFCI (Ground Fault Circuit Interrupter) will “sense” the difference in the amount of electricity flowing into the circuit to that flowing out, even in amounts of current as small as 4 or 5 milliamps. The GFCI reacts quickly (less than one-tenth of a second) to trip or shut off the circuit. 
4 0
3 years ago
Write a program that prompts for a positive integer and prints the factors of all integers from 1 to that input integer. For exa
xeze [42]
74(Frequency) or 34(frequency)
7 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Rewrite this method so that it avoids the use of a return statement:
    15·1 answer
  • Why should you need to have skills and an understanding about programming?
    8·1 answer
  • Scott is an aspiring software developer. During an interview for a new job, his prospective employer asks what kind of program h
    12·1 answer
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
  • Describe some things that this person might say that might cause you to NOT hire them. Explain.
    6·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!