1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
15

The ____ command is used to disconnect a datatable object from the database. (

Computers and Technology
2 answers:
salantis [7]3 years ago
8 0
Delete I think....................
lisabon 2012 [21]3 years ago
7 0
The delete from command I think
You might be interested in
When summarizing graphs of categorical​ data, report the​ _______ and describe the​ _______?
Alex_Xolod [135]
Hello <span>Rouahidy7821 
</span><span>

Answer: When summarizing graphs of categorical​ data, report the​ models and describe the​ </span><span>variability. 
</span>
Hope this helps
-Chris
7 0
3 years ago
Personal computer hard disk platters typically have storage capacities ranging from 40 gb to ____.
Doss [256]
2tb I think I'm not that sure
7 0
3 years ago
A(n) guiiconfatmenu is a list of commands that tell your computer what to do.
natima [27]
Yes that is right a guiiconfatmenu is a list of commands that your computer will tell you to do
3 0
3 years ago
Read 2 more answers
Am i in elementary yes no
IgorLugansk [536]

Answer:

no

Explanation:

7 0
2 years ago
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • Ted wants to follow the StartSafe philosophy when working around electricity. Which of the following steps would be consistent w
    15·2 answers
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Compressing a file is also called
    9·2 answers
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • dr. olson likes to conduct research on the nature of prejudice and its effect on behavior. dr olson is probably a (n) - psycholo
    8·2 answers
  • Which of the items listed is not considered to be personal protective equipment (PPE)?
    14·1 answer
  • Where do i put the lines?
    11·1 answer
  • How do I go to files in Brainly I need help
    13·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!