1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
2 years ago
9

SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attrib

ute value matches a value contained within a subset of listed values is ____. Question 20 options: BETWEEN IS NULL LIKE IN
Computers and Technology
1 answer:
ycow [4]2 years ago
4 0

Answer:

LIKE.

Explanation:

A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.

In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.

Hence, these reserved words can only be used as the name of an object but not as an identifier e.g the name of a function, label or variable.

Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, CREATE, DELETE etc.

Hence, SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is LIKE.

You might be interested in
1. From where you can access save command?
Alja [10]

Answer:

1 no. ans

none of above

this ans is not 100% correct but also it help may help you

4 0
3 years ago
Write a SELECT statement that returns these columns from the Products table: The list_price column The discount_percent column A
Anarel [89]

Answer:

Check the explanation

Explanation:

The SELECT statement that returns these columns are:

SELECT

   list_price,

   discount_percent,

   ROUND (list_price * discount_percent / 100,2)  AS discount_amount

FROM

   products;

----------------------------------------------------------------------

6 0
3 years ago
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
ivanzaharov [21]
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

3 0
3 years ago
LMK ASAP PLEASE
never [62]

Answer: I belive the answer to be (C)

Explanation:

7 0
2 years ago
Use the drop-down menus to identify the differences between entrepreneurs and employees.
MatroZZZ [7]

of the hundreds of thousands of business ventures that entrepreneurs launch every year, many never get off the ground. Others fizzle after spectacular rocket starts.

A six-year-old condiment company has attracted loyal customers but has achieved less than $500,000 in sales. The company’s gross margins can’t cover its overhead or provide adequate incomes for the founder and the family members who participate in the business. Additional growth will require a huge capital infusion, but investors and potential buyers aren’t keen on small, marginally profitable ventures, and the family has exhausted its resources.

Another young company, profitable and growing rapidly, imports novelty products from the Far East and sells them to large U.S. chain stores. The founder, who has a paper net worth of several million dollars, has been nominated for entrepreneur-of-the-year awards. But the company’s spectacular growth has forced him to reinvest most of his profits to finance the business’s growing inventories and receivables. Furthermore, the company’s profitability has attracted competitors and tempted customers to deal directly with the Asian suppliers. If the founder doesn’t do something soon, the business will evaporate.


4 0
3 years ago
Read 2 more answers
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • What are some local storage devices?​
    6·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • Read the scenario below, and then answer the question.
    13·1 answer
  • Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain
    9·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
  • Some of y'all make me lose braincells with your questions
    10·2 answers
  • a radio frequency identification (rfid) tag provides a generic identification for a credit or debit card carrying the tag.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!