To delete data from the database, use the ____ command.

A. ROLLBACK
B. COMMIT
C. DELETE
D. UPDATE


Answer: C

Computer Science & Information Technology

You might also like to view...

Describe four common mistakes that may occur when attempting to protect data that is at rest.

What will be an ideal response?

Computer Science & Information Technology

Elkhorn College needs to keep better track of students and others who use the many computers available in the Buck Memorial Library.

a. Design and draw a representation of a display screen for students to use in signing into the computers in the library. Label the three sections of a display that you included. b. Many students access the Elk Horn Library collection online. Design a login screen so that students can log in remotely. In a paragraph, comment about how logging into the library system while in the library (Part a) is different from logging on remotely. (Hint: Consider different aspects of security as well as users who would like to use a browser other than the one used in the library.) c. Design a paper form to be left alongside each computer daily that users who are part of the community (but are not students) are required to fill out. The form should ask for name, date and time of visit, general purpose for computer use (i.e., word processing, Web surfing, examining real estate documents on line), and the time they have logged off. Label the seven sections of a form that you included.

Computer Science & Information Technology

Pinterest is becoming an important gathering place for both professional and amateur photographers who want to share the photos they take

Indicate whether the statement is true or false

Computer Science & Information Technology

Loop modifiers are perfect for situations where you need to repeat the execution of multiple statements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology