1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
4 years ago
8

Based on the Pizza database you imported, complete the SQL statement below to add the column VIP to the customers table. The cus

tomer will either be GOLD, SILVER, BRONZE level VIP. There is a blank in the query, and you should enter the required text in the box below. When completing the statement, ensure you use the same naming conventions as other columns in the database and choose the most appropriate datatype. Your answer will be marked incorrect if there is a spelling mistake, missing spaces, or unnecessary spaces. ALTER TABLE Customers ADD [a]
Computers and Technology
1 answer:
Ivenika [448]4 years ago
5 0

Answer:

The answer is: ALTER TABLE Customers ADD vip text;

Explanation:

The basic syntax for the ALTER TABLE command in SQL for adding a new column is:

ALTER TABLE <em>tableName </em>ADD <em>columnName dataType</em>;

In this case, the following replacements must be made:

<em>tableName </em>= Customers

<em>columnName </em>= vip

<em>dataType </em>= text

Notice that the Pizza database referenced, is not included in the question, so the following assumptions were made:

  • Column names are lowercase.
  • <em>vip </em>values are stored in the same Customer table, instead of using a foreign key to another table.
You might be interested in
Using encryption, a sender can encrypt a message by translating it to which of the following?
Mila [183]

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

  • Option 'a' refers to the public key which is used to encrypt the data.
  • Option b refers to the private key which is also used for encryption.
  • Option d refers to the sniffer which is not the correct answer.

5 0
3 years ago
Please help!!
Likurg_2 [28]

Answer:

D. Server

Explanation:

A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. In theory, whenever computers share resources with client machines they are considered servers.

If this helps, mark me Brainliest!!

8 0
2 years ago
Read 2 more answers
Does anyone know the code for codeHS 5.4.7 teenagers?
Over [174]

Answer:

function start(){

var age = readInt("Age: ");

if(age == 15){

println("Yes, you are a teenager.");

}else{

println("No, you are not a teenager.");

}

}

Explanation:

6 0
3 years ago
Choose two technologies that you think would help the company meet its goals. Then fill in the chart below to compare the techno
elena55 [62]

Answer:

Good luck

Explanation:

Laptop and iPad

laptop because you can open many pages and tabs to help you multitask your goals

and iPad because most free business would be on an iPad and apps are cheap and would help you focus/help you work harder

7 0
3 years ago
Read 2 more answers
True or false it is possible to insert an external drive that connects to your computer using a usb cable while the computer is
Serggg [28]
True. There's no need to turn the computer off for USB connections.
6 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • PLEASE HELP ME ASP!!!
    11·2 answers
  • IF YOU ARE COMPUTER MASTER TELL ME WHICH SOFTWARE IS USED IN CALLIGRAPHY
    6·2 answers
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • Sergio needs to tell his team about some negative feedback from a client. The team has been
    14·1 answer
  • Which line is most likely an error? A-“hello” B-hello C-“100” D-100
    6·2 answers
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • What triggers a LinkedIn account ban?
    6·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!