A ________ takes data from multiple data sources, cleans and processes the data, and stores the data.

Answers

Answer 1

Answer:

A Data Warehouse is the answer


Related Questions

Which of the following statements will cause a compile-time error? Parent person = new Child(); person.grade(); Child person = new Child(); person.gra

Answers

The  statement that will cause a compile-time error is  Parent person = new Child(); person.grade();

What is compile-time error with example?

A compile-time error is known to be a kind of errors that matches to that of semantics or syntax.

It is often known as Syntax errors and it occurs if the programmer does not use the steps of the syntax in the  programming language, due to the above, the compiler will bring out the syntax error.

Learn more about error from

https://brainly.com/question/18497347

Harry’s Shoe Store has noticed a significant increase of revenue of $123,000. The manager has also determined that the total expenses equal to $128,000. Will this business net a profit or loss? _______ How much of a profit or loss? ________

Answers

Answer: Loss by $5,000

Explanation:

As you see, the loss is greater than profit. Simply subtract loss-profit

1.What are the importance of installation procedures of Windows 7?

Answers

Answer:

Check System Requirements

Check Hardware and Software Compatibility

Determine Disk Partitioning Options

Complete a Pre-Installation Checklist

Explanation:

PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!

Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.

He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.

You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.

What do you do?

Answers

Consider his point of view and apologize politely. Reason out the causes in a calm and orderly manner. Take deep breaths and listen to what he has to say.

1. What can you say about the picture?

Answers

Answer:

What picture?

Explanation:

Where is the picture? We need the picture in order to answer your questions

Why is it important to enforce access controls and to keep logs regarding who has access to data closets

Answers

Answer:

To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.

Explanation:

Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)

Answer:

it is important to enforce access controls and to keep logs regarding who has access to data closests is

Explanation:

To encure that in the event of a failure or breach, there is a record of what the equipment was accessed.

What type of software might be somewhat "light" in functionality even though they
usually allow you to apply filters and special effects in a relatively straightforward
manner?
A. functionality software
B. watermark software
C. third-party software
D. proprietary software

Answers

The answer is d because it s the only one that makes sense here

The type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner is third-party software. Thus, the correct option for this question is C.

What do you mean by Software?

Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.

According to the context of this question, third-party software is a computer program that is constructed or developed by different companies, organizations, etc. For example, any software program working on a Microsoft computer that was not developed by Microsoft. This reveals an example of third-party software.

Therefore, third-party software is a type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner.

To learn more about Softwares, refer to the link:

https://brainly.com/question/28224061

#SPJ2

The method getValueFromFile is public and returns an int. It accepts no arguments. The method is capable of throwing an IOException and a FileNotFoundException. Write the header for this method.

Answers

The method header is an illustration of java programs

The definitions of the method header are:

public int getValueFromFile()public static int getValueFromFile()

How to determine the header of the method?

From the question, we have the following parameters:

Method name: getValueFromFile Modifier: publicReturn type: intNumber of arguments = 0

The syntax to define the header of a method is:

modifier return-type method-name (argument-list)

Using the above syntax, the definition of the method header is:

public int getValueFromFile()

It can also be written as:

public static int getValueFromFile()

Read more about java programs at:

https://brainly.com/question/18554491

how are technology and technician interrelated to each other

Answers

Answer:

the technician is the technology so connected because without the technician how can we keep the technology running

Explanation:

without the technician, nothing technological would work for a long time

Effectiveness of thicker,biodegradable plastic shopping bags

Answers

The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

What is the use of biodegradable plastic bags?

Plastic bags are known to be part of modern technology. They are usually very  thin and strong. They are able to carry a heavy load as a result of shopping.

Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

Learn more about bags from

https://brainly.com/question/728465

20 points!!!!! Help, I am being timed!!!!!!!

Don't just answer for the points!


Which snippet of code is in XML?

Answers

Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.

Explanation:

Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b. cross-examined d. cross-checked please select the best answer from the choices provided a b c d

Answers

Information should be cross-checked to ensure more than one source provides the same factual information.

What is the source of information?

The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.

The options given in the problem regarding the information as,

a. repeated b. cross-examinedc. cross-lined d. cross-checked

There are many feck news and nonfactual data is present over the internet and other source of information.

To get the factual information, one should always cross-checked the information from other sources.

Thus, the information should be cross-checked to ensure more than one source provides the same factual information.

Learn more about the source of information here;

https://brainly.com/question/26169752

Answer:

D

Explanation:

D

Dropdown
Complete the sentence
A good digital citizen is

Answers

Answer:

A good digital citizen is one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.

Explanation:

Answer:ethical

Explanation:

i got a 100 %

Monique wants to protect her images from outside public use. What should she
nake sure to obtain?
A. a copyright

B. a watermark

C.intellectual property

D.a patent

Answers

Answer:

A and B

Explanation:

but still cuz u have only one choice B is the best option.

Good Luck :)

Monique wants to protect her images from outside public use. She should make sure to obtain a watermark. The correct option is B.

What is a watermark?

When it comes to the copyright protection and marketing of digital works, watermarking the process of superimposing a logo or piece of text on a document or image file is crucial.

A logo, line of text, or signature used as a watermark is placed over a picture. The majority of watermarks are transparent, allowing viewers to still enjoy the image. Usually, the watermark will also reveal the photographer.

They are proud of the effort they put in and do not want it copied or stolen and posted on other websites without permission.

They believe that a watermark will make it simple for viewers to locate and immediately recognize their photos and brand as their images are distributed online.

Thus, the correct option is B.

For more details regarding watermark, visit:

https://brainly.com/question/26321908

#SPJ2

If the start index is __________ the end index, the slicing expression will return an empty string.

Answers

Answer:

"Greater than."

Explanation:

The designated end of a string cannot be reached from the start. For example, if you had a list labeled 'colors' (colors = [1,2,3,4]) and then you tried to bring back that list using colors[1:0], you will recieve an empty string. However, if the starting is lower than the final index, then your program will run. For example, if you use colors[0:1], you will be given the output: [1].

Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every _______ in order to maintain an updated database of people on the Do-Not-Call List.

Answers

Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every 31 days in order to maintain an updated database of people.

What telemarketing firms do?

The act of telemarketing is known to be the act talking to potential or existing customers through the use of a telephone.

Conclusively, Note that Telemarketing can help a business firm to promote or boast their products or services, make their customer database stronger, bring about a lot of leads and appointments and others.

Learn more about telemarketing from

https://brainly.com/question/25974538

What is the action of extracting data fragments and then reassembling them in order to recover a file?.

Answers

The method of recreating files by scanning the raw bytes of a disk and reassembling them is known as file carving.

The action of extracting data fragments and then reassembling them in order to recover a file is known as "file carving".

What is file carving?

File carving is a process that is used to recover files that have been damaged or corrupted, or that have been split into multiple fragments. It involves identifying the fragments of the file, extracting them, and then reassembling them in the correct order to reconstruct the original file.

There are a number of tools and techniques that can be used for file carving, depending on the nature of the damage or fragmentation. Some common methods include using specialized recovery software, using a hex editor to manually extract and reassemble the data, or using forensic tools to analyze and reconstruct the file.

File carving can be a complex and time-consuming process, and the success of the recovery often depends on the severity of the damage and the availability of intact fragments of the file. However, with the right tools and techniques, it is often possible to recover at least some of the data from a damaged or fragmented file.

To learn more about file carving click here:

https://brainly.com/question/29570501

#SPJ12

Which of these are parts of the iterative process? check all of the boxes that apply.


debugging code


writing the initial code


testing code


documenting code


check all of the boxes that apply.

Answers

There are different kinds of practice . The option that is parts of the iterative process are:

Debugging code.Testing code.What is iterative processes?

The iterative process is known to be a kind of practice that pertains to  building up, polishing, and making a project, product, or initiative to be more better.

Note that the option that are parts of the iterative process are debugging code and testing  of code as they help one in product building.

Learn more about iterative process from

https://brainly.com/question/25754804

Answer:

A and C

Explanation:

Person above is correct

Jennifer is moving to nashville in a few weeks and needs to find an apartment to rent. She has looked online, talked to her new coworkers about safe areas close to work, and read through nashvilleguru. Com to gather information for her decision. She has narrowed down the area she wants to live to the gulch, which is a walkable neighborhood and friendly for young urban professionals. Now she is assessing which available apartment buildings and condos in the gulch suit her wants and needs most. Jennifer is working through which part of the consumer decision-making process?.

Answers

The part of the decision-making process that Jennifer is working through is: evaluating alternatives.

What is the decision-making process?

Decision-making process can be defined as a cognitive process that involves gathering information, analyzing the information, and assessing or evaluating alternatives, so as to enable the proper selection of an optimum solution (choice).

In this scenario, evaluating alternatives is the part of the decision-making process that Jennifer is working through because she is assessing all available apartment buildings.

Read more on decision-making process here: https://brainly.com/question/1249089

I need help on this, need answer asap.

Answers

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

What invention was created to try to enforce copyright protection on digital products

Answers

What invention was created to try to enforce copyright protection on digital products?

Digital Rights Management (DRM) systems

Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works. "Pay-per-use" policies were meant to prevent intellectual property from being copied freely, just as physical locks are needed to prevent personal property from being stolen.

What is a program that includes a function parameter capable of doing?
O
A. Passing data to a function whenever it is called
B. Storing data after a function is called
C. Returning data after a function completes a task
D. Ensuring that all function calls in the program are identical

Answers

A software program that includes a function parameter is capable of: A. passing data to a function whenever it is called.

What is a function parameter?

A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as input into the function.

This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is capable of passing data to a function as an input, whenever it is called.

Read more on function parameter here: brainly.com/question/20264183

The ________ states that given two plausible explanations for the same event, one should accept the less complex version.

Answers

Answer:

Rule of Parsimony

Explanation:

What is output? public class vehicle { public void drive(){ system.out.println("driving vehicle"); } }

Answers

The system will print “driving vehicle ”

What is the shortcut key for opening a new tab in a web browser.

Answers

Crtl + T is the answer

The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence process include _____________, _______________, and _______________.

Answers

The people, procedures, etc. needed to create computer systems that can simulate human intelligence process include learning, reasoning, and self-correction .

What is artificial intelligence system?

This is known to be a type of system that is made use of people, procedures, hardware, software, etc. to create a type of computer systems and machines.

Conclusively, Know that they  often influence human intelligence processes, by  in the area of learning (the getting of information and methods for using the information), reasoning (thorough the use of laws or rules to come to a conclusion), and self-correction (through the use of different occurrences or outcome from one event to boast its performance on future times).

Learn more about  human intelligence from

https://brainly.com/question/9786721

Your connection to this site is not secure how to fix.

Answers

Answer:

The only way to solve the issue is for the website operator to obtain a TLS certificate and enable HTTPS on their site. This will allow your browser to connect securely with the HTTPS protocol, which it will do automatically once the website is properly configured.

Explanation:

Which of the following security policies can be implemented to prevent removable media from automatically launching potentially harmful programs?
A. Disable AutoPlay.
B. Disable AutoRun.
C. Disable the Guest account
D. Enable screen lock.

Answers

The security policy that can be implemented to prevent removable media from automatically launching potentially harmful programs is Disable AutoRun.

Why should one disable AutoRun?

The Autorun is known to be a system function that often launches every time, and as such, it renders your system to be open to viruses, malwares, trojans etc.

Conclusively, The act of Disabling the autorun feature is one that can hinder malware from spreading in your system.

Learn more about computer from

https://brainly.com/question/24540334

When working on electronic devices, what should you use to dissipate any static charge that might damage electronic chips

Answers

Anti-static bracelet/wristband
You put the bracelet on
The clip attached to something that’s very large and metal so that you are “grounded”
This is commonly used by PC builders

How to share excel file for multiple users office 365?.

Answers

Answer:

You would need that person email to share it with them.

Click the Review tab.
Click Share Workbook in the Changes group.
On the Editing tab, click to select the Allow changes by more than one user at the same time. ...
In the Save As dialog box, save the shared workbook on a network location where other users can gain access to it.

Or try emailing
Other Questions
How do you know where the centre of curvature(c) and the focal point(f) is on the principle axis 382.85 rounded to three significant figures PLS HELP FAST!!What is the mean of this data set? 3, 5, 10, 11, 15 MARKING BEST ANSWER BRAINLIEST: What do geothermal, nuclear, biomass, and fossil fuels all have in common as a way to generate electricity? What is the theme of Harlem?optionsA:Dreams should be about being rich and having wealth.B:If you don't have dreams you will explode C:If you don't want to turn into a raisin make sure you accomplish your dream.D:If a person or group defers their dreams, it may result in destruction and harm to the dreamer what would happen if H2O was removed from the plants environment I need help on this specific question please? What type of cartilage provides support and shock absorption?. Mrs. Johnson bought 12 pound of ham and used it to make 3 sandwiches. She uses the same amount of ham on each sandwich. What fraction of a pound of ham is on each sandwich 2. How does the genetic code in the DNA get passed on to themRNA? A type of grass is planted in someone's backyard to look visually appealing but has a toxin that prevents local animals from successfully eating it. This new grass becomes popular among homeowners and is planted all over the local area, becoming the most common type of grass found. What statement explains the most likely impact of this new grass on the biodiversity of the areaThe grass has improved the habitat and increased biodiversityThe grass has caused adaptations within the ecosystem and caused and increase in biodiversity. The grass has become dominant and increased biodiversity. The grass has become dominant and decreased biodiversity What is the purpose of daca? to provide legal measures to remove individuals who came to the us illegally to establish a method of recording the number of children who enter the us without documentation to create a pathway to citizenship for individuals who were brought to the us as children to institute a method for differentiating between legal and undocumented immigrants to the us How do china and mongolia use fossil fuels as energy sources?. URGENTLY NEEDING HELP!!!! Now take a look at this first part of clintons speech. in this passage, clinton highlights his failures. challenges. successes. 2Starting from rest, a child zooms down a frictionless slide from an initial height of 3.00 m. What is her speed atthe bottom of the slide? Assume she has a mass of 25.0 kg One of these scholars relied heavily on evidence about the political process. Which scholar was that? What sort of evidence did he use? The rock has a low amount of silica, is that intrusive? What is TVEL (nuclear fuel cycle) special features that use Nuclear Technology? 5-6y^2=113 solve by square roots