Closed database architecture is

A. a control technique intended to prevent unauthorized access from trading partners.
B. a limitation inherent in traditional information systems that prevents data sharing.
C. a data warehouse control that prevents unclean data from entering the warehouse.
D. a technique used to restrict access to data marts.
E. a database structure that many of the leading ERPs use to support OLTP applications.


Answer: B

Computer Science & Information Technology

You might also like to view...

Users can pin pictures, music, and videos to their Pinterest pinboards

Indicate whether the statement is true or false

Computer Science & Information Technology

One of the advantages of competition between Web browsers is that it results in Internet _____.

A. standards B. differences C. inter-operability D. validation

Computer Science & Information Technology

____ refers to enhancing the appearance of the information.

A. Laying out B. Coloring C. Formatting D. Reshaping

Computer Science & Information Technology

A _ attack occurs when a hacker discovers a security hole in software that is unknown to the developer of the software or when a hacker takes advantage of a recently reported gap in a software's security before users apply patches released by the developer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology