The ______________ statement is used to change an existing database object.
Fill in the blank(s) with the appropriate word(s).
ALTER
Computer Science & Information Technology
You might also like to view...
If the file has not been saved before, the ____ window appears.
A. Save B. Name File C. Save As D. Save File
Computer Science & Information Technology
A(n) ________ allows you to compose, send, and receive e-mail messages
A) e-mail server B) mail client C) host server D) message server
Computer Science & Information Technology
Phishing is a malicious attack using social skills directed at a person who has access to sensitive data
Indicate whether the statement is true or false
Computer Science & Information Technology
A directory is to a subdirectory as a(n) _______ is to a(n) _______
A) Filename; extension B) Remote control; television C) Filing cabinet; folder D) Internal command; external command
Computer Science & Information Technology