1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
4 years ago
11

The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This funct

ion is important for budgeting purposes. The computer lab director assigns you the task of developing a data warehouse to keep track of the lab usage statistics. The main requirements for this database are to:
Computers and Technology
1 answer:
Brut [27]4 years ago
4 0

Answer:

to keep count of how many users there are in total.

Explanation:

all i had to do was read the question twice to understand the answer is pretty

much in the question.

You might be interested in
This is a while loop question for Information technology.
aev [14]

Answer: use GitHub

Or stack overflow

Explanation:

6 0
3 years ago
What does computer graphics mean?​
barxatty [35]

Answer:Computer graphics involves display, manipulation, storage of images, and experimental information for proper visualization.

( or you can say )

the products of the graphic arts, especially commercial design or illustration.

Explanation: <3

5 0
3 years ago
Using the flowchart diagram, identifythe decision point of this solution?
ELEN [110]

Answer:

Is there an early pay discount?  

Explanation:

This determines and instructs what path the code should take,

if there is no early pay discount, it has different instructions to follow.

3 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
A ---------------- enable an organization to use cloud computing technology as a means of centralizing access to IT resources by
sp2606 [1]

Answer: Private cloud

Explanation:

In a private cloud it is owned by the organization and its cloud computing technology is utilized by its various departments as a centralized access to its IT resources. Here the authority of the cloud lies entirely to the organization.

7 0
3 years ago
Other questions:
  • If you want to find out the specific questions you answered incorrectly on a particular examination, what option on the Web site
    6·1 answer
  • What are "open-loop" and "closed-loop" systems
    11·1 answer
  • Write down the complete AJAX code to avoid page caching.
    6·1 answer
  • What is related to Gamut in Adobe illustrator?
    8·1 answer
  • A developer has been asked to create code that will meet the following requirements: Receives input of: Map, List Performs a pot
    13·1 answer
  • Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
    12·1 answer
  • Classify the following skills: communication, creativity, and independence.
    15·1 answer
  • What Is entered into the system as input?
    13·1 answer
  • What are the five generations of computers?​
    13·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!