1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
2 years ago
11

If you used D*n as the criterion in a Short Text field called FirstName, what would appear in that field in the query results

Computers and Technology
1 answer:
Soloha48 [4]2 years ago
5 0

When querying a list or table, the use of wildcard symbols maybe used to optimize the search result. The words D*n will return First names which <em>starts with D and ends with n.</em>

  • The (*) denotes that the search returns any values or alphabets inbetween D and n.

  • Names such as <em>Dean, Don, Drezn</em> and other rated names would be included in the returned query.

Therefore, the returned query would include names starting with the letter D and ends with the letter n.

Learn more : brainly.com/question/25586700

You might be interested in
DDL statement for adding a column to an existing table is
vaieri [72.5K]

Answer:to add a column to existing table.

to rename any existing column.

to change datatype of any column or to modify its size.

to drop a column from the table.

Explanation:

hope this help

4 0
2 years ago
Construct a SQL query that displays a list of colleges, their sity/state, the accrediting agency, and whether or not the school
Alex787 [66]

Answer:

SELECT college, city_state, accre_agency, distance LIMIT 10

Explanation:

Given

Table name: College

See attachment for table

Required

Retrieve top 10 college, state, agency and school distance from the table

To retrieve from a table, we make use of the SELECT query

The select statement is then followed by the columns to be selected (separated by comma (,))

So, we have:

SELECT college, city_state, accre_agency, distance

From the question, we are to select only first 10 records.

This is achieved using the LIMIT clause

i.e. LIMIT 10 for first 10

So, the complete query is:

SELECT college, city_state, accre_agency, distance LIMIT 10

6 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
What is a system of computers that are joined together and connect to peripheral devices and can’t be accessed from home
harina [27]
<span>What is a system of computers that are joined together and connect to peripheral devices and can’t be accessed from home = LAN for Local Area Network, unless it's connected to the internet and you allow VPN/RAS system access you will not be able to connect to a LAN remotely.</span>
7 0
3 years ago
Select a correct statement regarding a hashing process.
kogti [31]

Answer:

a) It is used for authentication.

Explanation:

Hashing is a process of transforming a single key into another value. It generates the values using a mathematical algorithm. the outcome of this process is a hash value or a hash.

The hashing process is used for authentication.

The hashing process is not reversible.

The hashing process is used to create the digital signature.

The outcome of the hashing process is the hash value, not a message.

4 0
3 years ago
Other questions:
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • What is the CPI of the central processing unit cpu of a computer
    13·1 answer
  • Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computi
    5·1 answer
  • There are three types of value for money. Which of the following is not a method of value?
    14·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
    10·1 answer
  • You would like to put the data in order by product number. What should you do?
    15·1 answer
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • What is the output of the following JavaScript code?
    9·1 answer
  • The ________ is the easy way to insert a new slide between existing slides.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!