1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
4 years ago
6

You use ddl to create, modify, and delete the ___________________________ of a database.

Computers and Technology
1 answer:
melomori [17]4 years ago
7 0
You use the ddl to create, modify, and delete the objects of a database..
You might be interested in
Develop a script to demonstrate an understanding of the overload (overwrite) methods of using Python operators. This lesson will
MrRa [10]

hsjshekejeoehejeoejebenwkwuwbnwlwjdvrbrnfnfjkddjddmdmdndnfndmdkdjdjdjdjjdjdjdjdkdkdkdkdfkkdjdjdjdyremssjyehsmmamaajbshsjsbdbsksidhdbdbddddddddododododkdkdkdjdjdhddhhdvxbxbbxbxbxjdiegebeodhe

8 0
3 years ago
Which HTML tags describe the meaning of the content?<br> describe the meaning of the content.
Nata [24]
Defines an HTML document
Contains metadata/information for the document
Defines a title for the document
5 0
2 years ago
Which of the following is NOT an advantage of central management of information systems in the University System of Georgia? (A)
zzz [600]

Answer:

Independence

Explanation:

Management information system (MIS) is the system that acts as the backbone of an organization's activities, holding everything together. According to my research on MIS, I can say that based on the information provided within the question the one term that is not considered an advantage would be Independence. Since MIS doesn't really provide independence since the organization depends on the system.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
Ostrovityanka [42]
Some of the disadvantages of using layered protocols are the redundancy and overall lower performance.
Reimplementing everything from remote and wired to connectionless and association situated application correspondence, with each ringer and shriek of BGP, MPLS, multicast steering and so on would be a gigantic endeavor and potentially unmanageable in this solid across the board convention. I could envision specialty utilize situations where most extreme execution is imperative most importantly where an exceptionally basic framework might be wanted.
8 0
3 years ago
A retail store stocks two types of shirts A and B. These are packed in attractive cardboard boxes. During a week the store can s
antiseptic1488 [7]
300 of A and 300 of b
7 0
2 years ago
Other questions:
  • What is the main role of LDAP?
    6·1 answer
  • A four-year old laptop will not boot and presents error messages on screen. You have verified with the laptop technical support
    11·1 answer
  • You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every day
    7·1 answer
  • What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
    13·1 answer
  • Bert started off his working life as a typesetter for a print house. With the advent of new technologies, Bert's job became redu
    6·1 answer
  • What type of things can be marketed
    11·1 answer
  • A mobile device user has tried to install a new app numerous times without success. She hasclosed all unused apps, disabled live
    12·1 answer
  • What is MS-Word? Write some versions of MS-Word.
    8·2 answers
  • Which marketing strategy is represented by advertisers paying for online display ads?
    8·1 answer
  • What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!