Write appropriate column name, data type, and size for the following columns.

1. Student’s date of birth
2. Social Security Number (without dashes)
3. Telephone number (with area code)
4. Employee’s gender
5. Employee’s picture in a file
6. Link to a word document
7. Customer’s last name


1. Student’s date of birth Student_DOB DATE
2. Social Security Number (without dashes) S_S_Number CHAR(9)
3. Telephone number (with area code) Phone_Number CHAR(10)
4. Employee’s gender Gender CHAR
5. Employee’s picture in a file Emp_Picture BLOB
6. Link to a word document Word_Doc BFILE
7. Customer’s last name Cust_LastName VARCHAR2(15)

Computer Science & Information Technology

You might also like to view...

Explain why a cohort in the two-phase commit protocol cannot release locks acquired by the subtransaction until its uncertain period terminates.

What will be an ideal response?

Computer Science & Information Technology

Identify the login name and the password, shown in plain text in the payload of the packets that you captured.

What will be an ideal response?

Computer Science & Information Technology

When testing, it is never possible to establish the ________ of a program.

a. output b. run time c. correctness d. author

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. your location can be captured from your mobile device even if app location tracking is turned off 2. podcasts can only be created by professional organizations 3. the s in HTTPS stands for secure and indicated that the secure sockets layer protocol has been applied to the website 4. cat fishing is posting inflammatory remarks online to generate negative responses 5. google docs is an example of a wiki

Computer Science & Information Technology