1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
15

In 1–3 sentences, describe one reason you would import data into a database.

Computers and Technology
2 answers:
Norma-Jean [14]3 years ago
8 0

Answer and Explanation

A database is an organised collection of a data which is stored and can be easily, managed, updated and can be accessed electronically when required. The reason for importing your data into the data base is because this data is secure from unauthorized people. This is because to access this data you need to login. You can also update it and access it electronically when the need be.

prisoha [69]3 years ago
5 0
. Importing your data in you database is very important especially if you have a data that need not to be deleted. Database is a permanent storage that stores and secures your data. So your data is already placed in a certain storage as the same time makes you less worry about its security. If you did not place your data in your database there’s a possibility that it can be corrupted or deleted by accidents, so better to always have a back-up to be safe.
You might be interested in
A transcript must bear a(n)___ to be considered official
harkovskaia [24]
A transcript must have a signature or school stamp. 
7 0
4 years ago
Read 2 more answers
Dynamically allocatе mеmory for a DNA objеct and storе its addrеss in a variablе namеd dnaPtr
borishaifa [10]

Answer:

 DNA obj =new DNA;//obj object created dynamically.

   DNA *dnaPtr=&obj.//dnaPtr to store the address of the object.

Explanation:

The above written statements are in C++.The DNA object is created dynamically and it is done in C++ by using new keyword which allocates the heap memory for the object.

Then a dnaPtr is created of type DNA so that it can store the address of the DNA objects.

4 0
3 years ago
I am trying to write a c++ program like the game typeracer. When the player starts the program he will be asked to write a sente
murzikaleks [220]
Http://www.cprogramming.com/tutorial/string.html

--------------------------------------------------------------------
6 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
How can i get a java complier for linux and ubuntu?
egoroff_w [7]
You can install Eclipse. If you want you can look into the Ubuntu store and see if they have any.
5 0
3 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • (In C prog.) What is the difference between scanf, getche and getchar?
    12·1 answer
  • A _____ is a climate-controlled building or set of buildings that houses database servers and the systems that deliver mission-c
    6·1 answer
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • What do newly PivotTables look like?
    9·1 answer
  • 5. Question<br> The control flag that isn't really in use by modern networks is the<br> flag.
    15·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • Davingould1115...................answer 3​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!