Closed database architecture is
a. a control technique intended to prevent unauthorized access from trading partners.
b. a limitation inherent in traditional information systems that prevents data sharing.
c. a data warehouse control that prevents unclean data from entering the warehouse.
d. a technique used to restrict access to data marts.
e. a database structure that many of the leading ERPs use to support OLTP applications.
B
You might also like to view...
Which of the following refers to a policy or a program that tries to respond to instances of past discrimination by implementing proactive measures to ensure equal opportunity today?
A. Affirmative action B. Gentrification C. Bully Broads D. Just cause
Sprock is a holder in due course on an instrument issued by Klingon. Which of the following defenses could be successfully raised by Klingon?
A)Forgery B)Prior payment C)Breach of contract D)Fraud in the inducement
Online booksellers that seem to be following the same business activities are said to be using a B2B business model.
Answer the following statement true (T) or false (F)
Big Data information systems are similar in data and software in comparison to routine-sized databases
Indicate whether the statement is true or false