1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
2 years ago
11

What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an ads

o?
Computers and Technology
1 answer:
kenny6666 [7]2 years ago
6 0

The difference between a field and an infoobject as well as its advantages is given below.

<h3>What is the difference between InfoObject and adso?</h3>

The difference between Infoprovider and ADSO can be seen when we tell about the definition of both.

Note that Info Providers are known to be tools that are often used to save the data in SAP BW system. Info Providers are said to be the objects that can be seen in BW, which are saving data physically or virtually and it is one that give access to the data and can also be in the assessment for reporting issues.

In terms of ADSO , it is one that Corporate memory and it is one that helps a person to be able save the full history of the data that can be used for reconstruction purposes, and it is one where a person do not need to to extract it all from the source system.

<h3>What is the advantage of using infoobjects instead of fields in an adso?</h3>

Modeling InfoObjects brings is one that gives a lot of additional effort when compared to ADSO . ADSO is one that helps or enables you to be able to compress your data, thereby lowering the total data footprint.

Learn more about InfoObjects  from

brainly.com/question/1382377

#SPJ1

You might be interested in
I need subscribers plz ​
melamori03 [73]

Answer:

No :) here this is my channel name jshdhebejdb

8 0
3 years ago
Read 2 more answers
Use the code below to answer the following questions. Note that the catch statements in the code are not implemented, but you wi
anzhelika [568]

Answer:

d) either e1 or e5

Explanation:

Here, the instruction i1 goes ahead in trying to open the given file through an input stream buffer reader. If the given file name is wrong, it will indicate that an e1 file is not found or if any other IO errors due to invalid stream, no disc in drive e5 IO exception will be drawn.

4 0
4 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
Can anyone help???
Ugo [173]

Answer: Protocol identifier

Explanation:

Just took the test and resource name was incorrect. Hope this helps :)

6 0
3 years ago
Read 2 more answers
Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
liberstina [14]

Answer:

Sure. In Unit test 5, it's looking for 1 instead of 0. You are returning 0 instead of 1.

0 requires 1 digit to express it and should therefore return 1.

In line 6, change the 0 to a 1.

8 0
2 years ago
Other questions:
  • To keep your emails concise and to the point
    13·1 answer
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • What need most led to the creation of the Advanced Research Projects Agency Network? DARPA wanted scientists to be able to colla
    10·2 answers
  • How many fonts are there in a theme?<br> A. 1<br> B. 2<br> C. 4<br> D. 5
    10·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • 1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
    14·2 answers
  • To color the h2 heading, what tag would you use?
    6·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!