The ______________ statement is used to change an existing database object.

Fill in the blank(s) with the appropriate word(s).


ALTER

Computer Science & Information Technology

You might also like to view...

If the file has not been saved before, the ____ window appears.

A. Save B. Name File C. Save As D. Save File

Computer Science & Information Technology

A(n) ________ allows you to compose, send, and receive e-mail messages

A) e-mail server B) mail client C) host server D) message server

Computer Science & Information Technology

Phishing is a malicious attack using social skills directed at a person who has access to sensitive data

Indicate whether the statement is true or false

Computer Science & Information Technology

A directory is to a subdirectory as a(n) _______ is to a(n) _______

A) Filename; extension B) Remote control; television C) Filing cabinet; folder D) Internal command; external command

Computer Science & Information Technology