The privilege ____ can be granted to change the table structure.
A. WRITE
B. UPDATE
C. ALTER
D. MODIFY
Answer: C
Computer Science & Information Technology
You might also like to view...
In Excel, you need to be a programmer to create macros.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You rarely have a choice of tunneling protocol.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
How many channels on an E1 circuit are available for voice, video, or data?
a. 23 b. 24 c. 30 d. 32
Computer Science & Information Technology
What are the steps that can be taken by organizations to safeguard people from phishing, smishing, and vishing scams?
What will be an ideal response?
Computer Science & Information Technology