SQL is NOT a ____.
A. programming language
B. language that allows the actions of the end user to be converted into instructions that a computer can understand
C. language that allows us to add, delete, or change data in a database
D. procedural language
Answer: D
You might also like to view...
Typically, memos are internal to an organization
Indicate whether the statement is true or false.
________ refers to the use of secondary user IDs or bidders who have no actual intention to buy to artificially raise the price of an item.
A. Bid manipulation B. Shill feedback C. Shill bidding D. Bid rigging
An architectural view of the solution is not important to designing a system
Indicate whether the statement is true or false
Which of the following represents a payroll system privacy breach by Susan, a payroll accountant?
A) Susan shares information about labor costs with company executives. B) Susan alerts department managers about potential FLSA violations in their departments. C) Susan discusses specific information about the company's federal contracts with friends during lunch. D) Susan places employee payroll files in a cabinet to which only she and her supervisor have access.