1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
4 years ago
11

Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni

que (not duplicated), so that downstream uses in reports and databases are more trusted and accurate B. the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives; C. established frameworks and best practices to gain the most leverage and benefit out of IT investments and support the accomplishment of business objectives D. None of the above
Computers and Technology
1 answer:
alina1380 [7]4 years ago
4 0

Answer:

A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate

Explanation:

Data governance consists of the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate. Master data management (MDM) tools can assist in this effort.

Once the definitions of these three information-related governance disciplines are clear, their differences become more distinct.

You might be interested in
Ark titanoboa taming
ivann1987 [24]
Huh???????................
3 0
3 years ago
What is the fundamental purpose of sentiment analysis on social media?​
Rzqust [24]

Answer:

A social media sentiment analysis tells you how people feel about your brand online. Rather than a simple count of mentions or comments, sentiment analysis considers emotions and opinions. It involves collecting and analyzing information in the posts people share about your brand on social media.

Explanation:

8 0
3 years ago
What would you enter at the command prompt to start a new bourne again shell session?
butalik [34]

The answer is bash . The bash command opens a Bourne-again sheel (bash) session. It is the standard shell used in most Linux computers and it uses commands similar to a UNIX shell. Bash includes features such as:

1) Command completion when pressing the tab key.

2) Command history.

3) Improved arithmetic functions.

6 0
3 years ago
A database is a collection of integrated and related _____.
ioda
C) files
Because technologys data goes into files
4 0
3 years ago
Read 2 more answers
Write two lines of code to draw the following circles centered at 600,600. The radius of the smallest circle is 200. There are 5
Bad White [126]

Answer:

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

Explanation:

# include < conio.h>

# include < iostream.h>

int canvas.draw_circle,

namespace std

{

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

}

return,

7 0
3 years ago
Other questions:
  • 1- Design a brute-force algorithm for solving the problem below (provide pseudocode): You have a large container with storage si
    10·1 answer
  • Which of the following may businesses use to screen out applicants for a position? A. social media B. applications C. resumes D.
    15·2 answers
  • students at a camp can choose between boating and fishing in the morning and between hiking and horseback riding in the afternoo
    11·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • How are computers used in producing weather forecasts?
    8·1 answer
  • When you insert a photo into a document, its placed at the ​
    13·2 answers
  • A website whose URL ends with .gov, .edu, or .org is necessarily a reliable source. True or False
    8·1 answer
  • An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
    10·1 answer
  • The Sleeping-Barber Problem:
    15·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!