Answer:
View Base tables: Virtual table based on a SELECT query
CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary
DROP VIEW statement: Data definition command that removes the query specification in the data dictionary
Explanation:
Views are virtual tables, which can be created by select queries using the real database tables.
Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.
<u>CREATE VIEW syntax:</u>
CREATE VIEW view_name AS
SELECT column1, column2, ...
FROM table_name
WHERE condition;
<u>DROP VIEW syntax:</u>
DROP VIEW view_name;
Answer:
(a) Weak passwords
Explanation:
Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.
Examples of weak passwords are;
i. those generated from the name of a user.
ii. those generated for a user by default.
iii. those generated from words from dictionary or other similar materials.
iv. those that don't include a combination of letters and numbers and even symbols.
v. those that are short in length e.g less than 8 characters.
The code that is executed when the user clicks a button is known as
the widget (w)
Answer:
number formatting,
scientific analysis computer programming
Answer:
To store decimal values
Explanation:
Analyzing the given options.
(a)
Decimal values are digits and are to be treated as such. So, storing them as strings mean that they are no longer decimal values.
(b), (c) & (d)
List of colors, words and values that can't be used for calculations are all string values.
Take a for instance.
List of colors: "Red", "Yellow", "Blue",...
Words, "I", "am", "a", "boy"
Values that can't be used for calculations are non numerical data and as such, some of them could be strings.
Hence:
Option (a) answers the question