Closed database architecture is
A. a control technique intended to prevent unauthorized access from trading partners.
B. a limitation inherent in traditional information systems that prevents data sharing.
C. a data warehouse control that prevents unclean data from entering the warehouse.
D. a technique used to restrict access to data marts.
E. a database structure that many of the leading ERPs use to support OLTP applications.
Answer: B
You might also like to view...
Users can pin pictures, music, and videos to their Pinterest pinboards
Indicate whether the statement is true or false
One of the advantages of competition between Web browsers is that it results in Internet _____.
A. standards B. differences C. inter-operability D. validation
____ refers to enhancing the appearance of the information.
A. Laying out B. Coloring C. Formatting D. Reshaping
A _ attack occurs when a hacker discovers a security hole in software that is unknown to the developer of the software or when a hacker takes advantage of a recently reported gap in a software's security before users apply patches released by the developer.
Fill in the blank(s) with the appropriate word(s).