1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
11

MySQL Questions?

Computers and Technology
2 answers:
Margarita [4]3 years ago
6 0

Answer:

The Statement for selecting values from the table in SQL is given below,

SELECT vendor_name, vendor_contact_last_name, vendor_contact_first_name FROM Vendors;

Explanation:

SQL stands for Structured query language which is used to insert, update, delete and modify the value in a table.

There are five types of SQL-

1. Data definition language  

2. Data manipulation language

3. Data control language

4. Transaction Control Language

5. Data Query Language

The SELECT statement comes under DDL which is used to select and display values from a table.

We can use select statement in two ways-

1. SELECT column_name1, column_name2 ........column_nameN FROM Table_name;

2. SELECT * FROM tablename; ( This is used to select all values from the table name)

We can also give conditions using WHERE clause while selecting values.

Viktor [21]3 years ago
5 0

Answer:

To answer this question first step is to

1. Query the table in this case vendor, so we use the SELECT statement to bring out data from a table.

SELECT vendor_name, vendor_contact_last_name, vendor_contact_first_name FROM Vendors

Explanation:

The FROM statement allows you to choose which table you want to access the selected columns. Also the columns will be comma separated so it knows that we are selecting different columns.

You might be interested in
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
sdas [7]
Least privilege is the data access principle that ensures to unnecessary access to data exists by regulation members so that can perform only minimum data manipulation necessary. The principle of least privilege or as called as POLP is the run-through of controlling access to the minimal level that will permit normal functioning. The norm of least privilege interprets to giving people the lowermost level of user right that they can have and still do their jobs. The principle is also functional to things other than people as well as programs and processes. It is created in the US department of defense in the 1970’s and aimed to limit the potential damage of any security breach either accidental or malicious. 
5 0
3 years ago
This is a bit confusing to me. Could someone please help me! I have to use CSS to Design a Web Page. I will mark Brainliest!
GrogVix [38]

Answer:

CSS is easy

Explanation:

CSS is like the color or your sylte for a webpage.

6 0
3 years ago
The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
Papessa [141]
The above statement is FALSE.

The layout gallery displays 9 slide layouts NOT 10. 

These 9 layouts have various<span> placeholders to define text and content positioning and formatting.

</span>1 - Title slide
2 - Title and content
3 - Section Header
4 - Two content
5 - Comparison
6 - Title only
7 - Blank 
8 - Content with Caption
9 - Picture with Caption
8 0
3 years ago
Mention<br>any<br>5<br>indicators of<br>happiness​
Maru [420]

Answer:

5 indicators of happiness that might surprise you · Happiness is deep · Happy is busy · Can't buy me happiness · The happiness gene · No regrets.

Explanation:

5 0
3 years ago
Read 2 more answers
Which LIKE operator would match a single character?<br><br> *<br> ?<br> []<br> #
algol [13]

Answer:

underscore hope that helps

Explanation:

4 0
3 years ago
Other questions:
  • manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
    10·1 answer
  • Name that red flag asigment
    15·2 answers
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • Ned and Mary Ann are saving their files to a CD. When prompted, Ned will click on Burn file to disk, indicate the recording spee
    15·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • It is possible to make the document larger for viewing small text.<br><br> True<br> False
    15·2 answers
  • Image-editing software is used to_____
    7·1 answer
  • I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
    10·2 answers
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!