1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
11

Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code

it used to do it. Need it ASAP before this monday. Tables.sql file need to do this is in the document file. Extra points and brainliest for one who have most correct and useful code. Thank you for help. Good Luck
Computers and Technology
1 answer:
PIT_PIT [208]3 years ago
5 0

Answer:

from the document and show the code it used to do it. Need it ASAP before this monday. Tables.sql file need to do this is in the document file. Extra points and brainliest for one who have most correct

You might be interested in
Explain how communication managerial efficiency​
kakasveta [241]

Answer:

The efficiency of manager depends upon his ability to communicate effectively with the members of his organisation. It is only through communication that management conveys its goals and desires, issues instructions and orders, allocates jobs and responsibility and evaluates performance of subordinates.

pls tag me brainliest

8 0
3 years ago
What does limited access to a document mean?
Vlad [161]

Answer:

D. It does not reflect any changes made in the document

Explanation:

A limited access is usually done by middle level and top level managers in an organisation to prevent other staff member to edit or make changes to confidential documents when they are out of the office, though the staff can read it, they can not make changes to it.

6 0
3 years ago
Read 2 more answers
Help! What is this graph and what does it represent?
Lunna [17]

Answer:

Explanation:

how much something had in each month in this graph

7 0
3 years ago
Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way fo
Paul [167]

Answer: a

Explanation:

6 0
3 years ago
________ is a function that removes specific identifying information from query results, such as last name and telephone number,
Musya8 [376]

Answer: Anonymization

Explanation: Anonymization is the mechanism followed on the data for it's security. It is the process in which the data is eliminated on the basis that it is particularly identifiable by the features like last name and other specific features. It is also done by the encryption technique to protect the information. The data that has been specifically identified are specified as anonymous.

4 0
3 years ago
Other questions:
  • Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful att
    14·1 answer
  • If you want to open an application that does not have a tile pinned to the start menu
    9·1 answer
  • Please help?!
    11·2 answers
  • Chdtp aoxophg gr72 ae9>3 zqqz
    12·1 answer
  • What is one course of action available in every problem solving process?
    9·2 answers
  • How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
    10·1 answer
  • This isn't a homework question but rather a technological problem. I connected my device to the motherboard but it will not dete
    5·2 answers
  • Pig Latin is ______ and fits very naturally in the pipeline paradigm while SQL is instead declarative.
    7·1 answer
  • What is the function of a breadcrumb trail in a website?
    13·1 answer
  • What two Python data structures are already thread-safe, because they provide automatic support for synchronizing multiple reade
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!