1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
8

Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab

le from the database Delete column Z from the table XYZ
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
8 0

Answer:

1.In the first query the column Z of table xyz wil change and set to its  default value so we use alter command .

Syntax :ALTER TABLE TABLENAME  ALTER COLUMN NAME  SET DEFAULT VALUE

So SQL query is :

ALTER TABLE  XYZ  ALTER Z SET DEFAULT  9999  ;

This query will Change the column Z of a table XYZ to acceptdefault value 9999 .

2.In the second query we delete a table from database so we use DROP    command .

Syntax :DROP TABLE TABLENAME;

So SQL query is :DROP TABLE XYZ;

This query will delete the table from database.

3.In the last query we have to change the column Z from table again we      use alter command .

Syntax:ALTER TABLE TABLENAME  DROP  COLUMN  COLUMNNAME  ;

So SQL query is :

ALTER TABLE XYZ DROP COLUMN Z;

This query will delete column Z from the table XYZ.

You might be interested in
Hannah wants to write a book about how scientists and society interact, and she has generated ideas for chapters. Which chapter
Luden [163]

Answer:

The answer is "how the water evaporates and makes snow from the rainwater".

Explanation:

In the question, the choices are missing and by searching, we find the choice that is "how the water evaporates and makes snow from the rainwater", that's why we can say that it is the correct choice.

6 0
3 years ago
Which letters appear in the home row on a keyboard?
ZanzabumX [31]
C) A, S, D, F, G, H, J, K, L

The home row of keys are the keys which are in the middle of the keyboard. F and J have little bumps on them, which signify that they are the home keys. The home row is also where your fingers are meant to return when not typing.

5 0
3 years ago
Read 2 more answers
Hi! I'm Kayla! I was wondering who does homework on the weekends... anybody?? I guess almost everyone, including me. Anyways, le
Dovator [93]

I do my homework on Friday if I can, I like to have my weekends free to do whatever I want :)

7 0
3 years ago
Read 2 more answers
________ are used to translate each source code instruction into the appropriate machine language instruction.
Liono4ka [1.6K]

Answer:

compillers

Explanation:

computer programs belong in three classes; these are

Machine language (0s and 1s)

Assembly language and Highlevel languages

The popular programming languages like Java, C, C++, Python etc are all examples of high level languages. When programs are written in these highlevel languages, the programs will require another special program called compillers to carryout a translation from the highlevel language to a machine level (0s and 1s) which is the level that is executable by computers.

8 0
4 years ago
Click this link to view O*NET’s Tasks section for Farmworkers and Laborers, Crop.
dangina [55]

Answer:

B. operating tractors and machinery

D. maintaining vehicles and equipment

E. operating irrigation (watering) equipment

F. harvesting fruits and vegetables by hand

Explanation:

6 0
3 years ago
Other questions:
  • What is the internet ?
    11·2 answers
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • EX 3.8 Write code to declare and instantiate an object of the Random class (call the object reference variable rand). Then write
    6·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • NEED HELP ASAP!!!!!!
    7·2 answers
  • What was the name of first computer?
    14·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!