A(n) ______ database is a huge database used to analyze transactions.
A. object-oriented
B. relational
C. data warehouse
D. distributed
Answer: C
Computer Science & Information Technology
You might also like to view...
The ________ process is a security precaution that verifies the identity of the person sharing a file
A) authentication B) verification C) identification D) validation
Computer Science & Information Technology
protected base class members cannot be accessed by:
a. Functions that are neither friends of the base class, derived-class member functions nor friends of a derived class. b. friends of the base class. c. Functions that are not derived-class member functions. d. friends of derived classes.
Computer Science & Information Technology