The three major areas in the data warehouse are:
The enterprise data warehouse (EDW).The operational data store (ODS).The data mart.Yea, this is logical division because it helps to give room for viewing data without any form of transformation or movement.
What is a Data Warehouse?A data warehouse is known to be a term that connote a form of a central keep hold of information that can be examined to be able to make a lot of informed decisions.
Note that this is one where Data tend to flows into a data warehouse through the kind of transactional systems, relational databases, as well as other sources.
Since Data Warehousing make use of data and information obtained from a lot of sources into a single comprehensive database. Therefore, The three major areas in the data warehouse are:
The enterprise data warehouse (EDW).The operational data store (ODS).The data mart.Learn more about data warehouse from
https://brainly.com/question/28166807
#SPJ1
what is paragraph indentation
Answer:
a blank space between a margin and the beginning of a line of text
Explanation:
How is the Agile way of working different?
Answer:
It is working within guidelines (of the task) but without boundaries (of how you achieve it).
Taking on a programming internship does not provide training and is of little value to an intern. True or False.
Answer:
the correct answer is False
Advantages and Disadvantages of Modern Devices
Answer:
Advantages of Technology:
Easy access to information
Improved Communication
The convenience of travelling
Convenience in Education
Improved entertainment
Disadvantages of technology
Excessive dependency
Inevitable Cheating
Laziness and forgetting the basic way of studying
your University wants to create a new department for university alumni. Every
employee has their own system credentials and they can use these credentials on any system inside the
building. how can you ensure the system authorization, availability and monitoring.
The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.
What is system credentials?The system credentials is seen as a kind of Credentials that is known to be used for the verification of peoples identity as well as been used as a tools for authentication.
Note that they can be part of a certificate or other authentication act that helps to know the identity of a user's and as such, The way to ensure the system authorization, availability and monitoring is that an efficient and effective online examination system be made or a system where all can clock in daily can be used.
Learn more about system credentials from
https://brainly.com/question/4670419
#SPJ1
A computer science degree does not typically give students the necessary skills to easily learn a new computer language. True or False.
Answer:
False
Explanation:
Rank the following storage systems from slowest to fastest:
a. Hard-disk drives
b. Registers
c. Optical disk
d. Main memory
e. Nonvolatile memory
f. Magnetic tapes
g. Cache
Answer:
Slower = Larger capacity (and vice versa)
Ranked from Slowest to Fastest:
1. magnetic tapes
2. optical disk
3. hard-disk drives
4. nonvolatile memory
5. main memory
6. cache
7. registers
What device that will have the most network ports.
Answer:
switch device
Explanation:
because its purpose is to connect many devices.
Answer: SWITCH DEVICE
Explanation:
The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?.
The miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.
What is Microprocessor?A Microprocessor may be defined as a kind of miniature electronic device that significantly stores the arithmetic, logic, and control circuitry mandatory to carry out the functions of a digital computer's central processing unit.
Microchips are silicon devices that remarkably function as the central processing unit in the computer. These chips possess numerous electronic components which are utilized to carry out specific mathematical operations.
Along with this, these chips also migrate data from one memory location to another with the support of microprocessors.
Therefore, the miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.
To learn more about Microprocessors, refer to the link:
https://brainly.com/question/13164100
#SPJ1
Your question seems incomplete. The most probable complete question is as follows:
The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?
microchipelectronic circuitvacuum tubetransistorA computer is experiencing network connectivity issues; what step would you NOT attempt to solve the problem?
Answer:
A step I wouldn't take is throwing the computer in the trash and lighting my house on fire.
Explanation:
HELP PLEASE
Which type of error occurred in the following lines of code?
>>> print(9 / 0)
Traceback (most recent call last):
File " ", line 1, in
9/0
ZeroDivisionError: division by zero
logical error
logical error
exception
exception
syntax error
syntax error
reserved word error
reserved word error
Answer:
Logical Error
Explanation:
The division by 0 is a logical error.
I want to know if C# can be used to solve questions here as well.
write a complete main that will input a decimal number, double it and display the results
Answer:
No sure what language you want but since I am best with Java.
class Main {
public static void main(String[] args) {
Scanner input = new Scanner(System.in); // Create a Scanner object
System.out.println("Enter Number");
double number01 = input.nextLine(); // Read user input
double multi = number01 * 2;
System.out.println("Number is " + multi); // Output user input
}
}
Explanation:
Bad Directions You are driving to your friend’s house and are using your smartphone for directions. While approaching your destination, you realize that your smartphone app instructed you to turn the wrong way on your friend’s street. How could this have happened?
This could have happened when:
Lack of Internet service or failureWrong application.What do you mean by Internet?The Internet is seen as a form of a network that helps people to connects their computers all over the nation.
In this age, Through the help of the Internet, people are able to share information and navigate through places.
Note that the problem of bad direction could have happened when:
Lack of Internet service or failureWrong application.Learn more about Internet from
https://brainly.com/question/2780939
#SPJ1
Raw images can be processed again at a later date when new and improved software become available.
Group of answer choices
True
False
Answer:
True
Explanation:
How many input configurations does the Boolean expression (x AND Y) OR (NOT x
AND NOT y) have?
4
6
8
10
CAN SOMEONE PLSEASEEE HELP ME
Answer:
4
Explanation:
There are only 2 inputs, X and Y, and the number of different input configurations will be 2-to-the-power-of the number of inputs.
2² = 4
In other words, XY can be 00,01,10 or 11 and that's it. Four combinations.
BTW, (x AND Y) OR (NOT x AND NOT y) is allso called XNOR. See picture.
Your team has been assigned responsibility to identify an appropriate MSSP provider for a small, rural hospital. What criteria will you use to select an appropriate provider? Do research online to identify three MSSP providers. Use the criteria you established to rate each of the three, and choose the one that would be best for the hospital.
The Criteria for Choosing the Right MSSP for for a small, rural hospital are:
Customized solution. UX – User experience. Responsiveness. Cost-effective. What are the three MSSP providers?They are:
1) Cipher.
2) SecurityHQ.
3) SecureWorks.
The option that is chosen among the three is Cipher. It is known to be chosen because they provide the services listed above which is needed by the hospital as well as:
Cybersecurity MonitoringIncident Management and Cyber Defense Security Asset Management, etc.Therefore, based on the above. The Criteria for Choosing the Right MSSP for for a small, rural hospital are:
Customized solution. UX – User experience. Responsiveness. Cost-effective.Learn more about Cipher from
https://brainly.com/question/14754515
#SPJ1
list any three specification technology
Answer:
descriptive, performance and detailed.
to group worksheets together press and hold the _____ key
Which of the following commands will visualise the running processes?
Select one:
a. Get-Process
b. Get-RunningProcesses
c. Show-Process
Answer:
A
Explanation:
The PS command displays your currently running processes in real-time. This will display the process for the current shell with four columns: PID returns the unique process ID.
Write code to print values of integers x, y, and z in a single line such that each value is left-justified in 6 columns
The code to print given value can be x = int(input ("enter first number: ")) y = int(input ("enter second number: ")) z = int(input ("enter third number: ")) print('%6d %6d %6d' %(x,y,z)).
What is a code?Print is a function in many programming languages that sends text, variables, or another object to the screen. If you're more familiar with the Scratch programming language, print is equivalent to say.
The print command is used to print a file without using a printing-capable Windows application.
We receive three integer variables (x,y,z) using the Python programming language, and the values are printed out using string formatting (%6), which specifies that the output should be right justified with a width of 6.
x = int(input ("enter first number: "))
y = int(input ("enter second number: "))
z = int(input ("enter third number: "))
print('%6d%6d%6d'%(x,y,z)).
Thus, this is the code to print given value.
For more details regarding a code, visit:
https://brainly.com/question/1603398
#SPJ1
You join Mountain Water Co – an expanding bottled water company as an information security officer. The company wants to do a lot of advertising of its bottled water products through its website. The CEO asks you to review the company website and report if it is secure. After talking to the webmaster you find out the following:
The Web server accepts all connections
No authentication is required
Self-registration is allowed
The web server is connected to the Internet
Is the situation secure? Select all that apply.
a.
Yes. There is no threat to a bottled water company so it is secure.
b.
There is insufficient information available to answer this question.
c.
No. Anything that is connected to the Internet is insecure.
d.
No. The system is allowing everyone to register. Only individuals who are associated with the company should be able to register.
e.
No. If there is no authentication, then anyone with access to the website online can access it. For good security only individuals with certain authorized roles should access a website.
In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.
What is meant by computer security?Computer security is known to be a term that can be called cybersecurity. This is seen as a form of protection of computer systems as well as information from any kind of harm, theft, as well as any form of unauthorized use.
Note that Computer hardware is seen to be protected by the same ways or methods that one uses to protect other valuable things.
In the above, there is no method of authentication and as such, In regards to the above case, My response is c. No. Anything that is connected to the Internet is insecure.
Learn more about Computer security from
https://brainly.com/question/25720881
#SPJ1
You do not need to cite anything used from creative commons.
True or False?
True. It is not necessary to cite information that is common knowledge. One of the ways to judge if something is common knowledge is to ask yourself if anyone in the field would know this information or if no one would argue against it.
Answer: False
Explanation: Creative commons is when a person uploads their own copyrighted content and gets license for it, so it other people online may add to it or alter it and re-share it. They get to decide how you get to use and what you are allowed to do with but no matter the situation you always have to give credit to the original content creator. Thus, false, you NEED to cite anything used from Creative Commons.
The Internet is the largest example of a _____?
Answer:
the answer is wide area network
What does the office background allow you to do?
Answer: Any changes that you make to the Office Background in PowerPoint 365 will be reflected in all other Microsoft Office 365 products on your computer, such as Word, Excel, Outlook, and others. These patterned strips are not activated by default.
Carlos is having trouble with his device. It keeps freezing on him and he does not know what to do. What is the first step he should take when troubleshooting this problem?
A.
sell the computer
B.
check for power issues
C.
restart his device
D.
verify network connectivity
c restart his device
Explanation:
it is freezing and the most logical reason is c restart his device
Which of the following information
is required by application programs
to access the content ofa file.
a. File name
b. File location
c. File extension
d. File size
An information which is required by application programs to access the content of a file is: c. File extension.
What is a file?A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.
In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest include the following:
Text (.txt)Compressed files (.zip)Picture (.jpeg)Audio (.mp3)Video (.mp4)In conclusion, we can reasonably infer and logically deduce that an information which is required by application programs to access the content of a file is file extension because an error would occur if there's an incompatibility issue between the two resource.
Read more on file extensions here: brainly.com/question/1982059
#SPJ1
Name this program lower.c - This program will read two strings and output which string has more lowercase letters. If both strings contain the same amount of lowercase letters, indicate the number of lowercase letters. Match the output according to the examples below. Assume each string will contain less than 50 characters.
Examples
Enter two strings:
Hello wORLD
'Hello' contains 3 more lowercase letter(s) than 'wORLD'.
Enter two strings:
HELLO WORLD
'HELLO' and 'WORLD' both contain 0 lowercase letter(s).
Enter two strings:
CRIMson! tide1
'tide1' contains 1 more lowercase letter(s) than 'CRIMson!'.
The program will be:
#include <stdio.h>
int lower_count(char s[]) {
int count = 0, i;
for (i = 0; s[i]; i++) {
if (s[i] >= 'a' && s[i] <= 'z')
++count;
}
return count;
}
int main() {
char str1[51], str2[51];
int count1, count2;
printf("Enter two strings:\n");
scanf("%s", str1);
scanf("%s", str2);
count1 = lower_count(str1);
count2 = lower_count(str2);
if (count1 > count2) {
printf("'%s' contains %d more lowercase letter(s) than '%s'.\n", str1, count1 - count2, str2);
} else if (count1 < count2) {
printf("'%s' contains %d more lowercase letter(s) than '%s'.\n", str2, count2 - count1, str1);
} else {
printf("'%s' and '%s' both contain %d lowercase letter(s).\n", str1, str2, count1);
}
return 0;
}
What is a program?It should be noted that a series of instructions written in a programming language for a computer to follow is referred to as a computer program.
The software, which also contains documentation and other intangible components, comprises computer programs as one of its components. Source code is a computer program's human-readable form.
In this case, the program is shown above.
Learn more about program on:
https://brainly.com/question/26642771
#SPJ1
why information systems were centralized and used solely with governance and management
during the First Era
The data will be given according to the supply and the processor was strong with governance and management
What is information systems?
Storage of data sets, interaction logs, documents, and modification histories can be done with the help of computer systems. The organization will spend a considerable amount of time hunting for certain data if the conventional remote backup is used.
Strategic planning is a governance strategy used by governments. The act of submitting, succumbing, or providing details is known as data compliance was used in the First Era.
Learn more about information systems, here:
https://brainly.com/question/13299592
#SPJ1
Which of the following makes the varied types of digital communication possible?
an agreed-upon set of rules and standards governing the way technology shares and manages data
properly linking all of the workstations on a closed loop-like configuration
refraining from relying too heavily on one central hub that connects all nodes on a system
only using a high-quality server computer with lots of memory
Answer:
An agreed-upon set of rules and standards governing the way technology shares and manages data