Count the distinct building names in LOCATION.
Write queries for the following. (Use tables created in Chapter 4 Lab Activity.)
```
SQL> SELECT COUNT(DISTINCT Building)
2 FROM location;
COUNT(DISTINCTBUILDING)
-----------------------
3
```
You might also like to view...
Flash drives plug into a(n) ________ port on a computer
Fill in the blank(s) with correct word
MIME is a protocol that's used when you're
a. sending a video file to YouTube. b. encrypting an e-mail message. c. executing a CGI script. d. sending an e-mail that has a photo attached.
The need for network speed in the late 1990s resulted in the IEEE developing a group of standards known as __________________, now the most common type of Ethernet found on new NICs.
Fill in the blank(s) with the appropriate word(s).
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
A) Cybercrime B) Computer fraud C) Cyber-stalking D) Cyber-terrorism