1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
10

Which query will give the following result when it it applied on table 1????!!!!!

Computers and Technology
1 answer:
Mandarinka [93]3 years ago
6 0

Answer:

B

Explanation:

You need Name , Age and Gender

the second requirement should only match the last row where age is 20 and gender is male.

thrid requirement of the query is that its syntax should be correct.

Option B staisfies all of required so it is the correct option.

You might be interested in
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
A contracting company recently completed its period of performance on a government contract and would like to destroy all inform
avanturin [10]

Answer:

A. Consult data disposition policies in the contract.

Explanation:

The disposition of data should be carefully handled. The data associated with government project should be handled with care as it may include sensitive information. To destroy the data the company should refer the agreement and see if there is any notes included regarding the data disposition policy. The course of action to destroy the data should be according to the agreement.

5 0
3 years ago
Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio
GuDViN [60]

Answer: B

Explanation:

WHATS GOOD DAVE STRIDER? WHATS UP MAN I -  i man put the bunny back in the box what pumpkin apple juice?

ok so application software performs specific tasks for an end user and utility software just runs routine maintenance on your computer to ensure it runs smoothly. in this sense, the answer is B because if your computer crashed then you have no backup. things do not run smoothly obviously.

think of utility software as things such as antivirus, compression tools, defragmenter, and the other boring stuff that is meant for your computer to run smoothly

4 0
3 years ago
How to restart your computer without turning the power off?
Nataly_w [17]
Trl + Alt + Delete. I think
6 0
3 years ago
Write qbasic code for given pattern<br><br>NEPAL<br>. EPA<br>. P​
V125BC [204]

Answer:

The program to question as follows:

Program:

PRINT "NEPAL", 'print message

PRINT ".EPA", 'print message

PRINT ".P​", 'print message

Output:

NEPAL  

.EPA  

.P​

Explanation:

In the above Qbasic program code, the three print function will be used to print the given pattern, that can be described as follows:

  • The first time the print function is used, which uses a value, that is "NEPAL" to print its value.
  • In the second time, again this function is used, that prints a value, that is ".EPA".
  • In the last time, the print method accepts a value, which is ".P" to print its value. when the code is executed, it will print the given design.
3 0
3 years ago
Other questions:
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • Cookies are to improve the access of internet information. Therefore for the sake of you own privacy and security you should not
    8·2 answers
  • Question 16 (1 point)
    15·1 answer
  • Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
    8·1 answer
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • Someone plz answer
    8·1 answer
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • Write a Python program that uses three variables. The variables in your program
    12·1 answer
  • What are the common operations performed on character strings?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!