1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
2 years ago
13

11. SQL Output III

Computers and Technology
1 answer:
borishaifa [10]2 years ago
4 0

Answer:

wertweabcd

Explanation:

The LPAD() function left-pads a string with another string, to a certain length.

LPAD(string, length, lpad_string)

Parameter Description

string: Required. The original string. If the length of the original string is larger than the length parameter, this function removes the overfloating characters from string

length: Required. The length of the string after it has been left-padded

lpad_string: Required. The string to left-pad to string.

In example;

SELECT LPAD("SQL Brainly", 20, "ABC");

Output : ABCABCABSQL Brainly

You might be interested in
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
seropon [69]

PKI trust model that should be used, is a distributed trust model.

  • A distributed trust is a trust model that gives power to different source while taking the power away from a single source and thereafter, shares that responsibility to the wide range of sources. It is important as it allows trust to flows through network, marketplaces and forums.

  • With the use of this distributed trust model, Sigma Technology can have multiple CAs in different locations to work on behalf of the company. And even if one is absence, other CAs can still issue certificate without any hindrances.

Conclusively, we can say that PKI trust model that should be used is a distributed trust model.

Learn more from:

brainly.com/question/14837773

8 0
3 years ago
The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and
bija089 [108]

Answer:

d. business area analysis

Explanation:

Business area analysis is the stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

Here the major focus is on planning the outlines required to achieve the central objective of business.

It outlines all the business process, the goals and helps to determine the most benefit from information technology.

3 0
3 years ago
25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
Alexxx [7]
15
12
19.8 cool cool cool
7 0
2 years ago
Account numbers sometimes contain a check digit that is the result of a mathematical calculation. The inclusion of the digit in
marishachu [46]

Answer:

using System;

class CheckDigit

{

public static void Main (string[] args)

{ //Accepting value from user

Console.WriteLine ("Enter a four-digit account number");

int acc = Convert.ToInt32(Console.ReadLine());

int d=acc%10; //extracting the last digit

acc=acc/10; //having the first three digit

if(acc % 7 == d) //checking and displaying

Console.WriteLine ("Valid Account Number");

else

Console.WriteLine ("Invalid Account Number");

}

}

Explanation:

3 0
3 years ago
Other questions:
  • In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
    6·1 answer
  • When formatting documents, ____ settings determine where text begins on a line in relation to the left margin?
    8·1 answer
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • What channel will the republian debate be broadcast on?
    6·2 answers
  • how do I comment on answers? there's one answer I'm confused about but I don't know how to comment on it
    7·2 answers
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • Which tool should be used to verify the compatibility of an application run on Windows 10?
    7·1 answer
  • Which new console should i buy Nintendo switch Xbox series x or a ps5
    14·2 answers
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!