1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
15

The ____ command is used to disconnect a datatable object from the database. (

Computers and Technology
2 answers:
salantis [7]3 years ago
8 0
Delete I think....................
lisabon 2012 [21]3 years ago
7 0
The delete from command I think
You might be interested in
. The first step in devising security services and mechanisms is to develop a security policy True False
Evgen [1.6K]

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

5 0
3 years ago
How to move files and folders from desktop in w10?
Oksana_A [137]
Press CTRL + X to cut the file(s) and folder(s) you wish to move from your desktop.

Go to your destination (where you would like to move them to), and press CTRL + V to paste them there.
4 0
3 years ago
Which measure should you take for the periodic maintenance of your computer? You need to invest in a for_______________ the peri
Sergio039 [100]
I believe the answer is <span>annual maintenance
</span><span>annual maintenance refers to the system maintenance that being done at a regular time period (most commonly done at least every 6 month)
This is really necessary in order to detect potential virus/malware that would compromise the information within your computer.</span>
3 0
3 years ago
Read 2 more answers
How is modern technology developed? Explain.
vivado [14]

Answer:

Modern technology has developed

Explanation:

The development of technology may draw upon many fields of knowledge, including scientific, engineering, mathematical, linguistic, and historical knowledge, to achieve some practical result. ... For example, science might study the flow of electrons in electrical conductors by using already-existing tools and knowledge.

4 0
3 years ago
Read 2 more answers
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
Other questions:
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • Encyclopedia.com is considered to be
    15·1 answer
  • 60 POINTS!
    13·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • Which of the following is true regarding data acquisition? Because data acquisition is often technical, the research team does n
    15·2 answers
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is wo
    6·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
  • Help help help help help help help help
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!