The privilege ____ can be granted to change the table structure.

A. WRITE
B. UPDATE
C. ALTER
D. MODIFY


Answer: C

Computer Science & Information Technology

You might also like to view...

In Excel, you need to be a programmer to create macros.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You rarely have a choice of tunneling protocol.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many channels on an E1 circuit are available for voice, video, or data?

a. 23 b. 24 c. 30 d. 32

Computer Science & Information Technology

What are the steps that can be taken by organizations to safeguard people from phishing, smishing, and vishing scams?

What will be an ideal response?

Computer Science & Information Technology