answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergejj [24]
2 years ago
15

The effectiveness of a(n) _____ process is essential to ensure the success of a data warehouse. Select one: a. visual basic b. e

xtract-transform-load c. chamfering d. actuating
Computers and Technology
2 answers:
Greeley [361]2 years ago
4 0

Answer:

B. Extract-transform-load

Explanation:

Extract, transform, load (ETL) and Extract, load, transform (E-LT) are the two main approaches used to ensure the success of a data warehouse system.

An extract-transform-load (ETL) process is used to pull data from disparate data sources to populate and maintain the data warehouse. An effective extract-transform-load (ETL) process is essential to ensure data warehouse success.

Option A (Visual Basic) is an example of programming language.

Levart [38]2 years ago
4 0

Answer:

b. extract-transform-load

Explanation:

A data warehouse is a repository of data gathered from other data sources, to provide a medium of central data streaming for data analysis and reporting purposes. It hold data from multiple source, where the data are extracted, transformed and loaded to the data warehouse.

ETL or extract-transform-load is very important for the successful implementation of data warehousing

You might be interested in
A customer wants to increase his storage capacity by 25gb
Tom [10]

The answer is "SSD-25GB", and its further calculation can be defined as follows:

  • The <u><em>current generation of computer storage devices</em></u> is a hard drive (SSD).
  • It uses a flash memory that is substantially faster than a conventional mechanical disc.
  • The user does not require Storage or GPU, Video Card cannot be used.
  • RAM is a memory volatile that cannot be utilized as storage media.
  • SSD is better than magnetic HDD in terms of speed and performance.
  • SSD has become substantially quicker than USB 3.0.

That's why the answer is "SSD-25GB".

Learn more:

brainly.com/question/14411313

7 0
1 year ago
Which variable name is the best to hold the area of a rectangle?<br> 1A<br> area<br> AREA<br> a
Fantom [35]

Answer:

Area

Explanation:

The variable name is the best to hold the area of a rectangle is area

plz give brainliest

3 0
2 years ago
Acceleration is the rate at which an object changes its velocity. It is typically represented by symbol a and measured in m/s2 (
Natalija [7]

Answer:

<u>Pseudocode:</u>

INPUT velocity

INPUT time

SET velocity = 0.44704 * velocity

SET acceleration = velocity / time

SET acceleration = round(acceleration, 1)

PRINT acceleration

<u>Code:</u>

velocity = float(input("Enter a velocity in miles per hour: "))

time = float(input("Enter a time in seconds: "))

velocity = 0.44704 * velocity

acceleration = velocity / time

acceleration = round(acceleration, 1)

print("The acceleration is {:.2f}".format(acceleration))

Explanation:

*The code is in Python.

Ask the user to enter the velocity and time

Convert the miles per hour to meters per second

Calculate the acceleration using the formula

Round the acceleration to one decimal using round() method

Print the acceleration with two decimal digits

7 0
2 years ago
Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?
mamaluj [8]
<span>Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?
Ryze
Friendster
SixDegrees
Tribe.net
MySpace


The Correct answer is </span>Friendster.
5 0
2 years ago
Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is
Alenkinab [10]
Scatter infrared. Hope this helps! <span />
7 0
2 years ago
Other questions:
  • Which process is used to protect transmitted data in a vpn?
    12·1 answer
  • Judd puts password protection on all of his files, makes sure not to have any patient information open on his computer when he t
    12·2 answers
  • The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart
    14·1 answer
  • #Create a class called Name. Name should have two attributes
    11·1 answer
  • Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the printAll() member method and a separate println()
    5·1 answer
  • covers a wide variety of applications such as web and computer-based training (CBT), and social networks. a. E-learning b. Model
    10·1 answer
  • In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to of
    12·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
  • PYTHON PROGRAMMING: At one college, the tuition for a full-time student is $8,000 per semester.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!