1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
1 year ago
9

________ are not used for querying and analyzing data stored in data warehouses. Group of answer choices Word processing program

s OLAP tools MOLAP tools Dashboard tools
Computers and Technology
1 answer:
Mashcka [7]1 year ago
3 0

Answer:

Word processing programs

Explanation:

Q:

________ are not used for querying and analyzing data stored in data warehouses.

A:

Word processing programs

You might be interested in
What is the difference between a Network Diagram and a Wiring Semantic?
stiks02 [169]

Answer:

Network diagram is the type of graphical networking chart that is basically used in the various type of computer telecommunication. The network diagram is useful for the networking designer and also for the network engineer for compiling the network documentation in detail.

Wiring semantic is the type of open source prototype platform which basically composed of the programming language and the IDE ( Integrated development environment). The wiring semantic consumer can affect the triggering the new data or information from the existing concepts.

7 0
3 years ago
What determines gravitational pull?<br><br> volume<br><br> mass<br><br> the sun<br><br> acceleration
Arte-miy333 [17]
C. The sun is correct!
8 0
2 years ago
Read 2 more answers
you might propose a(n) program for your country if you wanted to hire a large number of manual laborers from neighboring countri
miskamm [114]

You might propose  guest worker program for your country if you wanted to hire a large number of manual laborers from neighboring countries to build a large dam or canal, with the understanding that they would not be granted any other privileges or legal status in your country, after the project is finished.

<h3>What is guest worker program?</h3>
  • In the absence of a ready supply of replacement workers, guest worker programs enable foreign workers to live and work temporarily in a host nation.
  • For temporary employment lasting less than a year, the United States now offers two guest worker programs: the H-2A program for temporary agricultural work and the H-2B program for temporary non-agricultural work.
  • Guest workers will be eligible for all federal programs, including Social Security and Medicare, if they are granted green cards. Additionally, low-skilled, low-income guest workers bring along their spouses and kids, who are enrolled in local schools and qualify for a variety of state benefits.

To learn more about  program refer to:

brainly.com/question/20534047

#SPJ4

4 0
10 months ago
A social media site violates its terms of service by selling information about its users
balu736 [363]
A company violating its terms of service by selling their user’s info is a violation of Digital Privacy
4 0
2 years ago
What are 3 things that can make cyberbullying especially harmful​
motikmotik

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

3 0
3 years ago
Other questions:
  • If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
    5·2 answers
  • why do networking components need more examination from an information security perspective than from a systems development pers
    5·1 answer
  • Question 1 of 40
    12·1 answer
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    9·1 answer
  • What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other
    6·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • The ____ is a tool in versions of microsoft office starting with office 2007 that consists of tabs, which contain groups of rela
    7·1 answer
  • Classroom content transaction <br> examples use of IT
    8·1 answer
  • I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
    9·1 answer
  • Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!