Which of the following commands lists all the privileges granted to a user?
A. SHOW GRANTS
B. SHOW PRIVILEGES
C. SHOW USERS
D. SHOW SECURITY
Answer: A
You might also like to view...
A deep copy of an object __________.
a. is an assignment of that object to another object b. is an operation that copies an aggregate object and all the objects that it references c. is a bogus term and means nothing d. is always a private method
Case-Based Critical Thinking QuestionsCase 7-1Max wants to save a worksheet as a Web page. What should he do?To make sure that his worksheet will work as a Web page, Max should preview his worksheet in _____ prior to posting the file online.
A. a Web browser B. Print Preview C. Microsoft Word D. Microsoft Excel
Follow the ________ rule to limit the number of bullet points on each slide and the number of words per bullet point
A) three-by-three B) six-by-three C) eight-by-eight D) six-by-six
Why are prime numbers significant in algorithms?
a. Because of cryptographic algorithmic schemes b. Because computers can now compute prime numbers c. Because prime numbers are used in hash functions d. Prime numbers are used in more advanced math functions