Source and destination are named the same, Computer Engineering

What happens if the both source and destination are named the same?

Ans) The import operation present in MS Access does not overwrite or change any of the existing tables or objects. If both the source and destination are the similar it makes sure that numbers are appended to the name of the source file. For example a table having a name as info will be renamed as info1.               

 

 

Posted Date: 4/3/2013 6:16:55 AM | Location : United States







Related Discussions:- Source and destination are named the same, Assignment Help, Ask Question on Source and destination are named the same, Get Answer, Expert's Help, Source and destination are named the same Discussions

Write discussion on Source and destination are named the same
Your posts are moderated
Related Questions
Determine the Uses of memory blocks. Not as common a technique though something to consider. As Verilog has a very convenient syntax for declaring and loading memories, you ca

This is the set of tools and facilities that you work with as the MATLAB user or programmer. It contains facilities for managing the variables in your workspace and importing and e

Explain about the term- Reports Reports are produced as a result of questions like "how many times has a type of car broken down" or "which cities have the highest house price

What are the different ways in which a thread can be cancelled?  Cancellation of a target thread may occur in two different scenarios: Asynchronous cancellation: One thre

Classify Scheduler. Scheduler is a kernel function decide which method  be  thought to be implemented by the processor: the scheduler scans the list of processes in the ready s

Q. What is Unique port number? A port is an extra 16-bit number which uniquely identifies particular service on any given machine on Internet. Port numbers are 16 bit wide, con

Q. Address - operand data types? Addresses : Operands residing in memory are specified by their memory address while operands residing in registers are specified by a re

Illustrate the Encryption and Decryption methods One of the best method of ensuring security is to change the form of communication. Let the messages be encoded in such a patte

How the Kernel handles both the page stealer and the fault handler? The page stealer and the fault handler thrash because of the shortage of the memory. If the sum of the worki

Explain briefly about demultiplexers?