A(n) ______ database is a huge database used to analyze transactions.

A. object-oriented
B. relational
C. data warehouse
D. distributed

Answer: C

Computer Science & Information Technology

You might also like to view...

The ________ process is a security precaution that verifies the identity of the person sharing a file

A) authentication B) verification C) identification D) validation

Computer Science & Information Technology

protected base class members cannot be accessed by:

a. Functions that are neither friends of the base class, derived-class member functions nor friends of a derived class. b. friends of the base class. c. Functions that are not derived-class member functions. d. friends of derived classes.

Computer Science & Information Technology