what does the asterisk (*) after select tell the database to do in this query?

Answers

Answer 1

The asterisk informs the database to select all data that meets the criteria as stated in the query.

What is an Asterisk server?

Asterisk is one that changes an ordinary computer into a kind of communications server. Note that the asterisk or star symbol ( * ) is one that connote all columns.

Therefore, The asterisk informs the database to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

https://brainly.com/question/1620017

#SPJ11


Related Questions

What is the basic body structure of html.

Answers

Answer:

A line holding HTML version information, a declarative header section (separated by the HEAD element), and a body containing the document's actual content make up an HTML 4 page.

Answer:

introduction to the structure of HTML document and HTML for document is composed of 3 parts a line containing HTML version information a declarative had your section the limited by the head element a body which contains the documents actual continent

Explanation:

helpful for you

Which is a major drawback of muliuser procesing of a database

Answers

The main drawback of multiuser processing of a database is:

Lost-update problem.

What is  lost-update problem?

In the area of lost update problem, an update that has been carried on to a data item by a transaction is said to be lost as it is known to be overwritten by the update that has been carried on by another transaction.

Therefore, The main drawback of multiuser processing of a database is:

Lost-update problem.

Learn more about database from

https://brainly.com/question/26096799

#SPJ12

if we intend to include a servo motor as an actuator, what feature should we include when selecting a microcontroller?

Answers

If we intend to include a servo motor as an actuator, the feature that we should include when selecting a microcontroller is pulse width modulation pin.

What is a microcontroller?

It should be noted that a microcontroller simply means an integrated circuit that designed to govern particular operation in a system.

In this case, if we intend to include a servo motor as an actuator, the feature that we should include when selecting a microcontroller is pulse width modulation pin.

Learn more about microcontroller on:

brainly.com/question/15745800

#SPJ12

why open source software is very important for the country like Nepal​

Answers

Collaboration promotes innovation through open source licensing. Many of the modern technology we take for granted would not exist today without it or would be hidden behind the restrictions of the patent system. Technology has advanced so quickly over the last few decades because of the open source movement.

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged

Answers

Gaining an understanding of the current application system and messages provides a baseline against which future design requirements can be gauged

Having an understanding of the current application system and messages provides a baseline against the future design requirements that can be gauged.

What is a baseline?

A baseline is known to be a kind of imaginary starting point or the option that is often used as a basis of comparison for a thing.

Note that in the above case, when a person has an understanding of the current application system and messages, it gives a baseline against the future design requirements that can be gauged.

Learn more about baseline from

https://brainly.com/question/1346895

#SPJ12

the internet is controlled by ______

Answers

In the case above, No one control the Internet.

What is the internet control about?

Note that no one and everyone has no control over the use of the Internet as it is said to be a network of networks.

Note that there are separate networks that is said to belongs to different firms and organizations as they have their own laws and regulations.

Therefore, In the case above, No one control the Internet.

Learn more about Internet from

https://brainly.com/question/2780939

#SPJ11

An organization with a(n) _____ structure, sometimes called a "franchiser," uses highly centralized information systems

Answers

An organization with a global structure, sometimes called a "franchiser," uses highly centralized information systems to perform its tasks.

What is an information system?

An information system refers to a set of computer systems that is primarily used by an organization to obtain, store, and process data, including the dissemination of information, knowledge, and the distribution of digital products from one geographical location to another.

Basically, an organization with a global structure, which is sometimes referred to as a "franchiser," make use of highly centralized information systems to perform its tasks.

Read more on information here: brainly.com/question/25885448

#SPJ12

When you switch-on your computer system, just wait a ____________ and
allow the system to _______________. After________________, the
system will route itself to a background known as the
________________environment.
On this environment, move the ________________ to where we have the
START / Windows Icon at the bottom left. Click on this icon whether it’s
the START or the Windows icon. Now type the word “Microsoft Word” in
the ______________ bar and left-click on the _____________that has
“W” icon. There you found yourself in the Microsoft environment. The
environment comes up with an “A4 paper- size in a _______________
orientation background”, there you start typing your letter.

Answers

The answers for the blanks are as follows:

Minute Windows_startGUI environmentCursorSearchFilePortrait

When you switch-on your computer system, just wait a minute  and allow the system to boot_. After_windows_start___,

The system will route itself to a background known as the_GUI__ environment.

On this environment, move the cursor___ to where we have the START / Windows Icon at the bottom left.

Click on this icon whether it’s the START or the Windows icon.

Now type the word “Microsoft Word” in the __search_ bar and left-click on the _file__that has “W” icon.

There you found yourself in the Microsoft environment. The environment comes up with an “A4 paper- size in a portrait_orientation background”,

There you start typing your letter.

learn more about fillups here: https://brainly.com/question/14538716

#SPJ10

what does the asterisk (*) after select tell the database to do in this query?

Answers

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

What does asterisk (*) mean in SQL?

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

https://brainly.com/question/1620017

#SPJ11

To freeze rows 1 and 2, and columns 1, 2, and 3, which cell should you highlight before selecting freeze panes?.

Answers

In the case above, the cell that you can highlight before selecting freeze panes is row 3 column 4.

How do one freeze several column?

This can be done when a person select the column that's is said to be next to the right of the last column a person want to freeze.

Therefore, In the case above, the cell that you can highlight before selecting freeze panes is row 3 column 4.

Learn more about panes from

https://brainly.com/question/17194167

#SPJ1

what does the acronym siem stand for in a cybersecurity context?

Answers

Siem is an acronym which stands for Security Information Event Management.

From a cybersecurity context, Siem is a term used for generalized tools that help an organization monitor their IT systems in other to detect potential cyberattacks.

In other words, Siem helps companies monitor and detail security events that occur within an organization's IT infrastructure.

You can learn more about Siem here https://brainly.com/question/25720881

#SPJ9

an estimated _____ percent of all college students suffer from ptsd.

Answers

An estimated amount of nine (9) percent of all college students suffers from PTSD.

What is the meaning of Post Traumatic Stress Disorder (PTSD)?

Post-traumatic stress disorder (PTSD) is a mental health disorder caused by experiencing a traumatic incident.

It can emerge after experiencing or witnessing a traumatic incident from symptoms includes from such as:

Flashbacks from accidents or war,Nightmares,Acute anxiety, as well as Uncontrolled thoughts from abuse.

According to statistics, it is estimated that nine (9) percent of all college students suffer from PTSD.

Learn more about Post Traumatic Stress Disorder here:

https://brainly.com/question/13097232

#SPJ12

An end-user received an email stating his bank account was compromised, and that he needs to click a link to reset his password. When the user visited the site, he recognized it as legitimate and entered his credentials which were captured by a hacker. What type of social engineering attack does this describe

Answers

Answer:

A phishing attack

Explanation:

Phishing attack is the process of delivering fake communications that appear to come from a trusted source. It is often done by email. The purpose is to steal personal information such as credit card and login information, or to installing malicious on the victim's PC. Phishing is a widespread sort of cyber assault that everyone should be aware of in order to stay safe.

Phishing in the banking industry seeks to get personal information such as banking logins, PINs, bank account information, and credit card details. Fraudsters utilize this data to gain access to accounts, transfer funds, perpetrate credit card fraud, or sell it on the black market. Occasionally hackers are content just to obtain user's personal information and credit card details for financial benefit. In other circumstances, phishing emails are sent in order to get employee login credentials or other details for use in more hostile assaults against a small group of people or a single firm. Phishing is a sort of cyber assault that everyone should be aware of in order to protect oneself and guarantee organizational email security.

Please post detailed answers to the following questions. Please use complete sentences.

Select two artists from the following list:

Phil Borges
Lee Jeffries
Stephanie Sinclair
Jimmy Nelson
Use the internet to find at least three images for each of the artists that you selected. In a word document, include the names of the two artists and the images you selected. Then answer the following questions about each photographer using complete sentences:

What life events impacted this photographer?
What is their personal style? How do you know?
What is the photographer’s purpose for taking the images you selected?
How are the two artists that you selected differently? How are they similar?

Answers

Please post detailed answers to the following questions. Please use complete sentences t two artists from the following list: Phil Borges,Lee Jeffries.

What are photography opportunities?

The taking of constant or nevertheless snap shots furnished a brand new medium with which to seize reality, and modified the manner humans in general, and artists in particular, noticed the arena and created new inventive opportunities. Learning from the technological know-how of photography, artists evolved a selection of the latest portrayal techniques.

Photography modified our imaginative and prescient of the arena with the aid of using presenting greater get entry to to greater snap shots drawn from greater locations and instances withinside the global than ever before. Photography enabled snap shots to be copied and mass-distributed. The media-sphere became burgeoning.

Read more about the internet :

https://brainly.com/question/2780939

#SPJ1

You are trying to establish a Wi-Fi Direct connection between a Windows desktop system and a Windows tablet device. You have installed an 802.11n wireless adapter in the desktop system. However, you are unable to see the tablet device. Which action must you take to see the tablet device from the desktop

Answers

Answer:

Update the desktop system's wireless network adapter driver with one that supports Wi-Fi Directly. To initiate Wi-Fi Direct connections with other devices, the drivers for your wireless network adapter must be Wi-Fi Direct supported. The wireless adapter in the desktop system is the most probably offender in this circumstance because it is a third-party device that was not installed by the manufacturer.

a diminished triad can be indicated by

Answers

A  diminished triad can be indicated by A lower-case Roman numeral and °.

How do you Know a diminished triad?

In any diminished triad, the middle and top two notes of the chord are known to be the flattened and shown by the symbol "o" or "dim."

Therefore, A  diminished triad can be indicated by A lower-case Roman numeral and °.

See options from below

A diminished triad can be indicated by:

A) A lower-case Roman numeral and °.

B) A lower-case Roman numeral and +.

C) An upper-case Roman number and °.

Learn more about triad from

https://brainly.com/question/4951751

#SPJ11

Which open-sourced packet capture tool uses linux and mac os x operating systems?

Answers

Tcpdump is an open-sourced packet capture tool which uses Linux and Mac OS X operating systems.

What is tcpdump?

Tcpdump can be defined as an open-sourced packet capture tool that is typically used to monitor and record TCP/IP traffic that are passing through a network and most Unix-like operating systems such as Linux.

This ultimately implies that, tcpdump is an open-sourced packet capture tool which makes use of Linux and Mac OS X operating systems.

Read more on tcpdump here: https://brainly.com/question/14485515

#SPJ12

Sftp uses which mechanism to provide security for authentication and data transfer?

Answers

Sftp uses SSH mechanism to provide security for authentication and data transfer.

What are SSH known for?

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also  share their data.

Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.

Learn more about  SSH mechanism from

https://brainly.com/question/13086077

#SPJ12

Phases of systems development life cycle do developers identify the particular features nd functions of a new system

Answers

Answer:

requirement analysis

Explanation:

The goal of the requirement analysis phase is to specify the system inputs, processes, outputs, and interactions in greater depth. The system's operations would be specified at the functional level by the end of this phase, which means that the functions and features to be done will be defined but not necessarily how they will be executed. Requirements Analysis should not evaluate computer software, documents, or data streams unless expressly restricted by the Project Charter. The risks associated with how the system will be integrated into the standard operating procedures will be identified and considered during the requirements analysis. The functional and system requirements of the business process, as well as the user and operational needs, will be collected throughout the requirements analysis.

The phase where developers identify the particular features and functions of a new system is the requirement and analysis stage.

What is system development?

System development is the process of defining, designing, testing, and implementing a new software application or program.

System development has a life cycle. The primary stages are as follows;

Planning stageRequirement and AnalysisDesignDevelopmentTestingImplementation.Operation and maintenance.

Therefore, the phase where developers identify the particular features and functions of a new system is the requirement and analysis stage.

learn more on system development here: brainly.com/question/13042526

#SPJ12

Technicians who perform sealed-system service on small appliances must have; Question 13 options: Type I, II, or III certification. Type I or Universal certification. Type II certification. A Universal 609 certification

Answers

The technician who performs sealed-system service on small appliances must have Type I or Universal certification. Thus, the correct option is B.

What is a Sealed-system service?

A sealed-system service may be defined as those services which are performed by the technician that can be sealed by the product of the company with the mark of OK tested.

Type I certification delivers to those technicians who service, maintain and repair small appliances that incorporate CFCs, HCFCs, or HFCs.

Technicians can hold either Type I or Universal certification which includes Type I to service appliances sheathed under Section 608.

Therefore, it is well described above.

To learn more about technicians, refer to the link:

https://brainly.com/question/5122191

#SPJ1

Which hardware component interprets and carries out the instructions contained in the software.

Answers

Answer:

Processor

A processor interprets and carries out basic instructions that operate a computer.

You manage a Windows system. You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. How can you generate a report that includes suggestions for how to improve system performance

Answers

Answer:

In Performance Monitor, run the System Diagnostics data collector set.

Use wireshark to capture packets on the enp2s0 interface for five seconds. analyze the wireshark packets to determine whether arp poisoning is taking place. use the 192.168.0.2 ip address to help make your determination. answer the questions.

Answers

In the case above, the Questions that need to be answered is:

"What is the MAC address of the 1st responding device and the answer will be: 00:00:1B:11:22:33"The second question will be "What was the MAC address of the duplicate responding device and the answer will be 00:00:1B:33:22:11".

How do you use wireshark to capture packets?

The steps are:

Do Open Wireshark and then one can go to under Capture folder and then click on enp2so.Click on Blue fin to start capture.In about 5 seconds after that operation, , click red box to stopLook at the Apply a display filter type arp and click on Enter to depict those packetsLooking at the Info column, you will see lines having the 192.168.0.2 IP. Then  Answer questions above.

Learn more about wireshark  from

https://brainly.com/question/13139168

#SPJ1

if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix hosts?

Answers

The NMap procedure that can be used to help you to gain information about remote *nix hosts is Script Scanning

What is script scanning?

The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Therefore, The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Learn more about Script Scanning from

https://brainly.com/question/18152781

#SPJ11

Acceptance testing: tests each program separately in the system. tests the functioning of the system as a whole. provides the final certification that the system is ready to be used in a production setting. tests the conversion of legacy data to the new system. includes all the preparations for the series of tests to be performed on the system.

Answers

Acceptance testing provides the final certification that the system is ready to be used in a production setting.

What is an acceptance testing?

It should be noted that acceptance testing is the last phase of software testing.

In this case, acceptance testing provides the final certification that the system is ready to be used in a production setting.

Learn more about acceptance on:

brainly.com/question/14378792

#SPJ12

You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the best way to go about doing this?

Answers

The best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

What is a password policy?

A password policy refers to a set of rules and standard that are designed and developed by the data security of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

Password lengthPassword maximum age.Password combination

In this scenario, the best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

Read more on password here: https://brainly.com/question/3404286

#SPJ12

explain different types of secondary memory of computer system

Answers

Answer:

There are three main types of secondary storage in a computer system: solid state storage devices, such as USB memory sticks. optical storage devices, such as CD, DVD and Blu-ray discs. magnetic storage devices, such as hard disk drives.

Explanation:

Write an if-else statement to describe an integer. Print positive even number if iseven and ispositive are both true. Print positive number if iseven is false and ispositive is true. Print not a positive number otherwise. End with newline.

Answers

The positive number if is even is false and the positive is true. Print, not a positive number otherwise. End with a newline. C code is the answer.

How, support your answer?

#include <stdio.h>

#include <stdbool.h>

int main(void) {

int userNum;

bool is Positive;

bool is Even;

scanf("%d", &userNum);

isPositive = (userNum > 0);

isEven = ((userNum % 2) == 0);

if(isPositive && isEven){  printf("Positive even number");}

else if(isPositive && !isEven){

 printf("Positive number");}

else{ printf("Not a positive number");

}printf("\n");

return 0;

Thus, this could be the answer.

To learn more about integer. click here:

https://brainly.com/question/2114800

#SPJ1

An organization needs to setup a(n) _____ infrastructure to issue and sign client certificates

Answers

Answer:

Certificate Authority (CA)

Explanation:

The requestor's identification is verified by the Certification Authority. The requestor might be a user, a program, or anything else. The identity mechanism is governed by the kind of CA, protection laws, and request processing needs. A certificate template is selected during setup, and the certificate is issued depending on the information provided upon request. CAs also publish revoked lists known as CRLs, which guarantee that invalid or illegal certificates are no longer utilized.

An organization needs to setup a CA infrastructure in order to issue and sign client certificates.

What is CA?

CA is an acronym for Certificate Authority and it can be defined as a trusted and verified entity that is saddled with the responsibility of issuing digital certificates in order to authenticate any content that is sent from web servers of an organization.

This ultimately implies that, an organization needs to setup a Certificate Authority (CA) infrastructure in order to issue and sign client certificates.

Read more on Certificate Authority here: https://brainly.com/question/24975082

#SPJ12

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved

Answers

When a designer follow accepted standards and protocols, the basic characteristics of network architecture that's achieved is called scalability.

What is scalability?

Scalability can be defined as a measure of the ability of a system to change (increase or decrease) in performance and cost as a result of changes in demands of application and system processing, especially in a network architecture.

This ultimately implies that, scalability is the basic characteristics of network architecture that's achieved when a designer follow accepted standards and protocols.

Read more on scalability here: https://brainly.com/question/14301721

SPJ12

Other Questions
capitalism allows people to earn what? What is the surface area of a square prism with sides that measure 8 units?O254 unitsO 300 units0314 units0384 units A surfer on top of a wave takes 10 seconds to travel a distance of 40 meters. What is the speed of the wave the surfer is riding on?Select one:a. 0.25 m/sb. 4 m/sc. 40 m/sd. 400 m/s What role does the governor play in the legislative process?A. The governor runs the meetings where bills are written and votes occur.B. The governor can add amendments to laws passed by the legislature.C. The governor gets one vote in each house on every bill considered.D. The governor can approve or reject a bill passed by the legislature. The Gross Domestic of a country in the first quarter of 2014 was $1.3299108.GPD=$ Technicians who perform sealed-system service on small appliances must have; Question 13 options: Type I, II, or III certification. Type I or Universal certification. Type II certification. A Universal 609 certification Ethan is using 30 cupcakes . he spreads mint icing on 1/5 of the cupcakes and chocolate on 1/2 of the reimagining cupcakes . the rest will get vanilla frosting. how many will have vanilla frosting EASY PLS HELP Quentin's family worries that he has a substance abuse issue. what would most likely lead them to believe he is experiencing this critical health issue?A. They have noticed he is no longer exercising and is gaining weight.B. They have found empty beer bottles hidden in his closet.C. They have seen him have multiple romantic relationships.D. They have heard him complain that he has no friends and feels alone. Solve the problem.The length of a rectangular room is 9 feet longer than twice the width. If the room's perimeter is198 feet, what are the room's dimensions? The radius iscm.The circumference in terms of is cm.7Using 3.14 for , the approximate circumference of thecircle iscm. find lim x->2 for f(x)= {2x+1, x greater than or equal to 2{x^2, x>2a. 5b. 4c. 5 or 4d. dne When 7/11 is written as a decimal, what is the sum of the first 20 digits after the decimal point? Pls Help When a company develops a product and then attempts to sell it through normal distribution channels in a number of test-market cities, it is engaged in Blank______. What rhetorical device is used in this excerpt from Mark Twain's "The Danger of Lying in Bed"?The man in the ticket-office said:"Have an accident insurance ticket, also?""No," I said, after studying the matter over a little. "No, I believe not; I am going to be traveling by rail all day today. However, tomorrow I don't travel. Give me one for tomorrow."The man looked puzzled. He said:"But it is for accident insurance, and if you are going to travel by rail""If I am going to travel by rail I sha'n't need it. Lying at home in bed is the thing I am afraid of."I had been looking into this matter. Last year I traveled twenty thousand miles, almost entirely by rail; the year before, I traveled over twenty-five thousand miles, half by sea and half by rail; and the year before that I traveled in the neighborhood of ten thousand miles, exclusively by rail. I suppose if I put in all the little odd journeys here and there, I may say I have traveled sixty thousand miles during the three years I have mentioned. AND NEVER AN ACCIDENT.A. allusionB. rhetorical questionC. anecdoteD. logic What happened to Helen after her illness? The volume of a cylinder with a height of 4 feet is 144n cubic feet what is the radius of the base of the cylinder V=nr2h In Hellenistic culture,which was NOT a culture that there was a new acceptance of? Select the correct answer.Which excerpt from the passage best shapes the author's perspective on the misfortunes of the working class?OA. "I watched people's feet from my cellar window, miners' feet in old shoes; soldiers' feet, well shod in government leather,the shoes of women with the heels run down; the dilapidated shoes of children; barefooted boys." (paragraph 16)O B."He was a man with a heart, who perhaps imagined his own mother imprisoned in a cellar with the sewer rats' union."(paragraph 17)OC."If I were out of this dungeon," thought I, "I would be fighting the human sewer rats anyway!" (paragraph 12)"Boys," I said, "go back on your engine. Some day it will be all right." (paragraph 10)OD.ResetNext Otto used 5.5 cups of whole wheat flour and x cups of white flour in the recipe. What is the equation that can be used to find the value of y, the total amount of flour that Otto used in the recipe, and what are the constraints on the values of x and y? y=5.5x; x is any integer greater than or equal to 0, and y is an integer greater than or equal to 5. y=5.5x; x is any real number greater than or equal to 0, and y is any real number greater than or equal to 5.5. y=x+5.5; x is any integer greater than or equal to 0, and y is an integer greater than or equal to 5. y=x+5.5; x is any real number greater than or equal to 0, and y is any real number greater than or equal to 5.5. In 1950, zenith introduced the first tv remote control. What was it called?.