1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
2 years ago
10

When users access a data warehouse, their queries usually involve aggregate data. what type of software is used to perform these

queries?
Computers and Technology
1 answer:
iragen [17]2 years ago
4 0

When users access a data warehouse, their queries usually involve aggregate data. These type of software is used to perform these queries OLAP

<h3>what is OLAP?</h3>
  • OLAP (online analytical processing) is a computing strategy that allows users to easily and selectively extract and query data to explore it from various issues of view.
  • OLAP industry brain queries often aid in trends analysis, financial reporting, sales forecasting, budgeting, and other planning purposes.
  • For example a user can ask that data be analyzed to portray a spreadsheet displaying all of a business's beach ball effects sold in Florida in July, compare income figures with those for the same effects in September, and then see a comparison of other product sales in Florida in the same period.

To learn more about OLAP, refer to:

brainly.com/question/26691784

#SPJ4

You might be interested in
What is the file extension for an impress file??
gogolik [260]
<span>In this resource, files created in OOo Impress will be referred to as ODP files and Impress Files.</span>
6 0
3 years ago
________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
iren [92.7K]

Answer:

Correct answer is (4)

Explanation:

Terminal Access Controller Access Control System

4 0
3 years ago
How to clear cache in Internet Explorer Version 11
Paladinen [302]
Clear the browser history and accept everything
7 0
4 years ago
Read 2 more answers
BitLocker Encryption can be deployed three ways. Identify which of the descriptions best describes the Computer Authentication m
ch4aika [34]

To  know  the descriptions best term about the Computer Authentication method is that On the motherboard of many laptops is a chip known as the TPM (Trusted Platform Module) chip. The BitLocker encryption key can be found on the TPM chip (also called the startup key).

<h3>How can a computer be verified?</h3>

The user or machine must demonstrate their identity to the server or client during authentication. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are further options.

Therefore, Data theft or exposure from lost, stolen, or improperly retired computers is a hazard that is addressed by the OS system-integrated data protection feature BitLocker Drive Encryption.

Learn more about Computer Authentication method from

brainly.com/question/3522088
#SPJ1

3 0
1 year ago
List 7 internal components in a computer system
MrRa [10]
Motherboard
processor
graphic card
memory
storage
power supply
sound card
6 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ appearing in the main text of a document indicates a footnote or endnote.
    15·1 answer
  • Which mistakes are NOT highlighted by the spell checker in a word-processing document?
    15·1 answer
  • A customer seeks to buy a new computer and for a private use at home.The customer primarily needs the computer to use the Micros
    15·1 answer
  • Which best explains a password attached to a document
    9·1 answer
  • Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
    5·2 answers
  • How does sugar dissolve in water ? &amp; Read Carefully ?
    9·1 answer
  • What does this mean in python?
    5·1 answer
  • Which of the following is a windows feature that allows you to temporanily store text
    8·2 answers
  • We can save our data peremently on a
    7·2 answers
  • A web site that contains large numbers of misspelled words and grammatical errors fails which of these general criteria?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!