You can delete a table that is no longer needed by using the ____________________ TABLE command.
Fill in the blank(s) with the appropriate word(s).
DROP
You might also like to view...
Which of the following allows for storage and management of a company's documents?
A. DNS B. DSS C. DMS D. DFP
Which tool lists all open network sockets, including those hidden by rootkits?
a. EnCase b. Memoryze c. R-Tools d. Knoppix
A(n) ______is a program or app that provides a scheduling, communication, and document sharing platform for students and teachers.
A. cloud educational platform B. open courseware C. learning management system D. web school system
Match each item with an statement below:
A. a valuable tool used in threat modeling. B. the lifeblood of an organization. C. probability that a risk will occur in a particular year. D. final step in identifying risks. E. encourage members of professional groups to adhere to strict ethical behavior within their profession. F. document that outlines the specific rules that must be met in order to keep the WLAN secure. G. defines what actions the users of a system may perform while using the wireless network. H. proportion of an asset's value that is likely to be destroyed by a particular risk. I. never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.