1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
8

Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab

le from the database Delete column Z from the table XYZ
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
8 0

Answer:

1.In the first query the column Z of table xyz wil change and set to its  default value so we use alter command .

Syntax :ALTER TABLE TABLENAME  ALTER COLUMN NAME  SET DEFAULT VALUE

So SQL query is :

ALTER TABLE  XYZ  ALTER Z SET DEFAULT  9999  ;

This query will Change the column Z of a table XYZ to acceptdefault value 9999 .

2.In the second query we delete a table from database so we use DROP    command .

Syntax :DROP TABLE TABLENAME;

So SQL query is :DROP TABLE XYZ;

This query will delete the table from database.

3.In the last query we have to change the column Z from table again we      use alter command .

Syntax:ALTER TABLE TABLENAME  DROP  COLUMN  COLUMNNAME  ;

So SQL query is :

ALTER TABLE XYZ DROP COLUMN Z;

This query will delete column Z from the table XYZ.

You might be interested in
Each high-level language has its own __________, or rules of the language. group of answer choices
il63 [147K]

Each high-level language has its own syntax which is also called rules of the programming language. Therefore, the correct choice is syntax.

High-level languages have a greater level of abstraction from details of the computer. They focus more on the programming logic which is closely associated with human understanding instead of the underlying hardware modules. Each high-level programming language has its own specific set of rules which is known as the syntax of that language.

Syntax of the high-level languages define structure and formation of the statements in the language. In order to write a program in any high-level programming language, proper syntax of that programming language requires to be followed.

If the syntax of the programming language is not followed properly, the compiler will produce errors. In result, required output of the program will not be generated because of the failure of the program execution.

You can learn more about syntax at

brainly.com/question/831003

#SPJ4

5 0
1 year ago
What is a common method for testing a spot weld?
Gennadij [26K]
Hey there,
The common method is destructive testing.

Hope this helps :))

<em>~Top♥</em>
4 0
2 years ago
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
Vadim26 [7]

Answer:

TPM(Trusted Platform Module) is the correct answer to the following question.

Explanation:

Because TPM is the computer chip which protects your system data and store all keys and access of data that is encrypted by these keys. So that's why TPM is that hardware component which is used to contain the encryption keys and that data is not accessible to any other person's whether your hard drive will be lost or stolen by anyone.

6 0
3 years ago
How are network computers different from traditional personal computers? describe some usage scenarios in which it is advantageo
Elanso [62]
A network computer depend on on a centralized computer for most of its services. It can consequently have a minimal operating system while a personal computer on the other hand has to be proficient of on condition that all of the required functionality in a detached manner without depending on a centralized manner. Scenarios where administrative costs are high and where sharing leads to more efficient use of resources are exactly those settings where network computers are preferred.
8 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Other questions:
  • Ming is building an inexpensive computer to use for her online classes, and needs to purchase Windows. What is the most cost-eff
    8·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provi
    8·1 answer
  • Each of the walls of a room with square dimensions has been built with two pieces of sheetrock, a smaller one and a larger one.
    11·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request
    15·1 answer
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!