Closed database architecture is

a. a control technique intended to prevent unauthorized access from trading partners.
b. a limitation inherent in traditional information systems that prevents data sharing.
c. a data warehouse control that prevents unclean data from entering the warehouse.
d. a technique used to restrict access to data marts.
e. a database structure that many of the leading ERPs use to support OLTP applications.


B

Business

You might also like to view...

Which of the following refers to a policy or a program that tries to respond to instances of past discrimination by implementing proactive measures to ensure equal opportunity today?

A. Affirmative action B. Gentrification C. Bully Broads D. Just cause

Business

Sprock is a holder in due course on an instrument issued by Klingon. Which of the following defenses could be successfully raised by Klingon?

A)Forgery B)Prior payment C)Breach of contract D)Fraud in the inducement

Business

Online booksellers that seem to be following the same business activities are said to be using a B2B business model.

Answer the following statement true (T) or false (F)

Business

Big Data information systems are similar in data and software in comparison to routine-sized databases

Indicate whether the statement is true or false

Business