1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
15

The ____ command is used to disconnect a datatable object from the database. (

Computers and Technology
2 answers:
salantis [7]3 years ago
8 0
Delete I think....................
lisabon 2012 [21]3 years ago
7 0
The delete from command I think
You might be interested in
Compare the two types of formatting that IDE devices must go through. What is the primary difference between the two?
Andrei [34K]
A quick format<span> changes the file system while the </span>full format<span> also checks the </span>drive for bad sectors.  <span>The scan for bad sectors is the reason why the Full </span>format<span> takes twice as long as the </span>Quick format<span>. If you choose the </span>Quick format<span> option, the </span>format<span> removes address files from the partition, but does not scan the disk for bad sectors.</span>
7 0
3 years ago
Read 2 more answers
Which of the following is lost when the computer is turned off?
Sergeeva-Olga [200]

Answer:

Memory (RAM) is lost when computer is turned off.

6 0
3 years ago
Write a python program to calculate the average of two numbers​
Elan Coil [88]

Answer:

n1 = int(input("Please enter a number<:"))

n2= int(input("Please enter a number<:"))

sum = n1 + n2

print("The average of the two numbers is", sum / 2)

8 0
2 years ago
A major ozone depletion happened in the 1900s. What was it caused by
melomori [17]
It was caused by air pollution and the extreme heat built up underneath it. <span />
3 0
3 years ago
Read 2 more answers
Como realizar un cuadro comprativo?​
Kruka [31]
How to make a comparison chart?
3 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • Using Karnaugh maps, simplify the following Boolean function:
    14·1 answer
  • Which is a copyright
    5·1 answer
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • A Function checkMe takes three parameters, a character and two integers. If the sum of the two integers is negative, and the cha
    11·1 answer
  • We can sort a given set of n numbers by first building a binary search tree containing these numbers (using Tree-Insert repeated
    12·1 answer
  • As a general rule, what is the size of a brochure?
    11·1 answer
  • What command is most effective at identifying different types of files?
    6·1 answer
  • Why is it uncommon for users to perform searches directly in database tables?
    15·1 answer
  • HELP PLEASE 100 POINTS
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!