You use a ____ statement to create user accounts and assign privileges.

A. GIVE
B. GRANT
C. ASSIGN
D. PROVIDE


Answer: B

Computer Science & Information Technology

You might also like to view...

Computer memory is usually grouped in bytes, which consist of 8 bits each. How many different values can be represented using a byte? How many different values can be represented using two bytes?

What will be an ideal response?

Computer Science & Information Technology

The ____ defines the point from which a transformation occurs.

A. point of origin B. crosshairs C. open sequence D. starting point

Computer Science & Information Technology

The ____________ symbol marks the program’s ending point in a flowchart.

a. output b. processing c. End terminal d. Input

Computer Science & Information Technology

Which of the following is the second step of the machine cycle of a computer?

A. ?The next instruction is fetched from cache or RAM. B. ?The instructions are decoded. C. ?The data or results are stored in registers or RAM. D. ?The instructions are carried out.

Computer Science & Information Technology