1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
7

Describe the concept of a cursor and how it is used in embedded SQL.

Computers and Technology
1 answer:
Korvikt [17]3 years ago
7 0

Answer:

Cursor is the temporary area created when the SQL statement is executed.

Explanation:

Data base management system allows

 Entering Data

 Housekeeping

 Querying data

 Printing reports

Cursor contains the information about the selected statement and the rows data accessed by it. This space is used to store the data retrieve from data base    

A cursor is used to get rows from the query that has many rows in its result sets a cursor is work as a handle and identifier in SQL query. it is very necessary in SQL because it is an object which is used to store the output of query.

A cursor is used to retrieve rows from a query that has multiple rows in its result set. A cursor is a handle or an identifier for the SQL query and a position within the result set.  

You might be interested in
In the MOV instruction both operands i.e. source andthe destination cannot be
nekit [7.7K]

Answer:

an immediate.

Explanation:

It is because of the instruction encoding and decoding.Intel which make these instructions decided not include instructions which provide no real advantage. MOV segment register is one of them because segment register need not to be changed very often.This saves the space in instruction encoding.

3 0
3 years ago
Read 2 more answers
An ironworker standing 30 feet in the air is safe wearing a full body harness that is not tied off
Nataly_w [17]

Answer

It is FALSE .

Explanation

A full body harness is a  type of safety 'attire' specifically put on for the purposes of protection. Safety harness are necessarily for fall protection. It also provides the user or the worker comfortability and confidence while working on those high risky places. It is advisable that when a worker is exposed to a fall hazard which about six feet and above high to wear a harness that is tied off.

8 0
3 years ago
Read 2 more answers
you are the manager of a virtual team that is working on a project. You uploaded a Word document to an OneDrive account that you
Valentin [98]

He can simply right click on the file and select restore previous versions. Instead of the manager choosing to recreate the Word document from scratch, he can recover the initial and previous version of the file. Once he has clicked the “Restore previous versions” option, a list of available items will pop. He will click the version he would like restored and click “Restore”

6 0
3 years ago
What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
Blizzard [7]
People, procedures and instructions, data, software, information technology infrastructure, internal controls.
7 0
3 years ago
Information goes into a computer through _______ and comes our through _______
vaieri [72.5K]
Imformation goes into a computer through wires and comes out through data/gigabites. Or when you print it.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A circuit has a resistance of 300 ohm and a current of 0.024 A. What is the voltage in the circuit?
    12·1 answer
  • The standard qwerty keyboard has 47 keys that can place characters on the screen. each of these keys can also display a second c
    13·2 answers
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • How can a wiki contribute to an academic paper?
    9·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • Any recommendations for anime series on netflix?
    14·1 answer
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • Which local folder temporarily stores all outgoing emails until the email program successfully sends them to a recipient?
    8·2 answers
  • What is cyber security ???​
    8·1 answer
  • Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!