1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
13

In one to three sentences describe one reason you would import data into a datebase

Computers and Technology
1 answer:
Bond [772]3 years ago
8 0

The primary reason that you would import data into a database is because the data already exists somewhere else.

As an example, you may have a spreadsheet that contains names and telephone numbers of a group of people. It is much faster to import this data into a database instead of manually entering the information.

You might be interested in
Write a program that prints to the screen all the ASCII characters from 33 to 126. 33! 34''
leonid [27]

Answer:

#include <iostream>

using namespace std;

int main() {

   for(int i=33;i<=126;i++)//Using loop to print ASCII characters.

   {

         cout<<i<<char(i<<" ";//statement to print integer and it's ASCII characters with values.

   }

return 0;

}

Explanation:

Put a closing parenthesis i char(i after doing that code will run .Since the answer was not getting posted hence i have to come to this resort.

I have used for loop for values 33 to 126 and for printing the ascii characters I have used typecasting converting the integer to corresponding char forcefully.

6 0
3 years ago
brielle is researching substitution ciphers. she came across a cipher in which the entire alphabet was rotated 13 steps. what ty
kogti [31]

Caesar cipher is a very common type of substitution cipher where each letter in the plaintext is moved or shifted to a known number of places down the alphabet.

The type of cipher is this is ROT13

  • ROT13ROT13 is a simple letter substitution cipher. It functions by the replacement of a letter with the 13th letter after it in the alphabet. It is commonly known as Caesar cipher used in ancient Rome

Conclusively we can say that ROT13 is a commonly known Caesar cipher that replaces a letter with the 13th letter after it in the alphabet.

Learn more from

brainly.com/question/15300028

3 0
3 years ago
Which device is connected to a port on a switch in order to receive network traffic?
inysia [295]

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

  • A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.
  • This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.
6 0
3 years ago
Which of these is not a sub-claim "Our Clean Power Plan" uses to support its main claim? The CPP protects public health. The CPP
Leno4ka [110]
The CPP cleans the air statement is not a sub-claim of Our Clean Power Plan.

It is the efforts of President Barrack Obama and the U.S. Environmental Protection Agency that has the main goal of lessening to cutting carbon pollution from the present power plants
4 0
3 years ago
Read 2 more answers
What is the process of starting or restarting a computer or mobile device?
kenny6666 [7]
Hello there.

<span>What is the process of starting or restarting a computer or mobile device?

Answer: </span><span>booting</span>
3 0
3 years ago
Other questions:
  • Whoevr answers this will be marked brainliest
    12·1 answer
  • Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?
    8·1 answer
  • 19. Which network topology is a combination of two or more types of physical or two or more types of logical topologies? A. Poin
    8·1 answer
  • What is an effective way to assess user requests for additional features and functions
    10·1 answer
  • You try to enter your name into a cell that accepts a numeric value. What error would you receive? A. #NAME B. #VALUE C. #REF D.
    14·2 answers
  • The default paper size is _____. <br> a. letter <br> b. legal <br> c. executive <br> d. statement
    7·1 answer
  • If you have limited means, you...?
    9·1 answer
  • 1. Who is affected by electronic theft of a song?
    5·2 answers
  • Try my game? https://scratch.mit.edu/projects/589314237
    13·2 answers
  • What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!