1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
7

Describe the concept of a cursor and how it is used in embedded SQL.

Computers and Technology
1 answer:
Korvikt [17]3 years ago
7 0

Answer:

Cursor is the temporary area created when the SQL statement is executed.

Explanation:

Data base management system allows

 Entering Data

 Housekeeping

 Querying data

 Printing reports

Cursor contains the information about the selected statement and the rows data accessed by it. This space is used to store the data retrieve from data base    

A cursor is used to get rows from the query that has many rows in its result sets a cursor is work as a handle and identifier in SQL query. it is very necessary in SQL because it is an object which is used to store the output of query.

A cursor is used to retrieve rows from a query that has multiple rows in its result set. A cursor is a handle or an identifier for the SQL query and a position within the result set.  

You might be interested in
Select the correct answer.
kogti [31]

the answer is E. ............

5 0
3 years ago
Read 2 more answers
Suppose that a local area network requires seven letters for user names.​ lower- and uppercase letters are considered the same.
Naddik [55]
<span>If a user name can have seven letters (with no distinction between upper and lower case), and if a letter can be repeated, then the maximum number of names is 26x26x26x26x26x26x26, or 8,031,810,176. That is, slightly more than eight billion names are possible.</span>
6 0
3 years ago
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
Which item was key to how Microsoft got its start in the 1970s? a. artificial intelligence b. vacuum tubes c. Altair 8800 d. UNI
tigry1 [53]

Answer:

A??

Explanation:

6 0
3 years ago
How is an operating system like a translator?
emmasim [6.3K]

Answer:

Operating systems work like translators because they are able to take software and hardware, and put it all together to work in a way that is readable and usable for the consumer.

5 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Please help i really need to turn this in already
    6·1 answer
  • What is the function of the modem?
    12·2 answers
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • A picture of kitchen sink draining system​
    15·2 answers
  • Which of the following keywords is used to remove a row in a table? (Points : 2) DROP
    11·1 answer
  • Que se puede observar en el escritorio de windows
    8·1 answer
  • Consider the following code segment.
    11·1 answer
  • If you delete a shortcut from your desktop, have you also deleted the original file?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!