1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
4 years ago
11

Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni

que (not duplicated), so that downstream uses in reports and databases are more trusted and accurate B. the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives; C. established frameworks and best practices to gain the most leverage and benefit out of IT investments and support the accomplishment of business objectives D. None of the above
Computers and Technology
1 answer:
alina1380 [7]4 years ago
4 0

Answer:

A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate

Explanation:

Data governance consists of the processes, methods, and techniques to ensure that data is of high quality, reliable, and unique (not duplicated), so that downstream uses in reports and databases are more trusted and accurate. Master data management (MDM) tools can assist in this effort.

Once the definitions of these three information-related governance disciplines are clear, their differences become more distinct.

You might be interested in
You are in charge of five software development projects. The project characteristics of each of the sys are as follows:
wariber [46]

: have you found the solution?

6 0
3 years ago
Which program or security application prevents access between a private and trusted network, and other untrusted networks?
zavuch27 [327]

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

7 0
3 years ago
Read 2 more answers
What computer has best software
Kruka [31]
Dell computers have pretty good software.
4 0
4 years ago
Why do TV shows/Movies from the 90's and early 2000s look so much different compared to today?
icang [17]
Back then, movies were black and white because they had cameras that could only see black and white. In the late 1900's and early 2000's, they developed color cameras. But the common resolution and screen size was 640x480 or 4:3. Nowadays, in the late 2000's and early 2010, the widescreen format was more commonly used for many reasons. Today, the common colors are RGB 1M colors, and the resolution is 16:9. Some movies like to go even farther, like me, and use 21:9,which is super widescreen. That is more immersive than 16:9, and gives the watcher a wider, better experience. 
7 0
3 years ago
3.
jenyasd209 [6]
Data label and pie slice
3 0
3 years ago
Other questions:
  • The document responsible for describing the type of data stored in the database is called the:
    5·1 answer
  • In step 2 of the mail merge process you must be prepared to
    6·2 answers
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • What is the best way to protect computer equipment from damage caused by electrical spikes
    15·1 answer
  • Justin signed a rental agreement for his new condo. How long is his lease? a p e x
    15·1 answer
  • How do I take this prodram back off
    15·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • HELP PLEASE 100 POINTS
    8·2 answers
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!