Closed database architecture is
A. a control technique intended to prevent unauthorized access from trading partners.
B. a limitation inherent in traditional information systems that prevents data sharing.
C. a data warehouse control that prevents unclean data from entering the warehouse.
D. a technique used to restrict access to data marts.
E. a database structure that many of the leading ERPs use to support OLTP applications.
Answer: B
Computer Science & Information Technology
You might also like to view...
What is the difference between a calling function and a called function?
What will be an ideal response?
Computer Science & Information Technology
The method __________ from the File class forces a physical write to the file of any data that is buffered.
(a) close() (b) flush() (c) writeUTF() (d) writeObject()
Computer Science & Information Technology