Closed database architecture is

A. a control technique intended to prevent unauthorized access from trading partners.
B. a limitation inherent in traditional information systems that prevents data sharing.
C. a data warehouse control that prevents unclean data from entering the warehouse.
D. a technique used to restrict access to data marts.
E. a database structure that many of the leading ERPs use to support OLTP applications.

Answer: B

Computer Science & Information Technology

You might also like to view...

What is the difference between a calling function and a called function?

What will be an ideal response?

Computer Science & Information Technology

The method __________ from the File class forces a physical write to the file of any data that is buffered.

(a) close() (b) flush() (c) writeUTF() (d) writeObject()

Computer Science & Information Technology