1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
3 years ago
5

The reliance on _____ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems

.a. star schema b. multidimensional schema c. normalization d. denormalization
Computers and Technology
1 answer:
hammer [34]3 years ago
3 0

Answer:

The reliance on ______ as the design methodology for relational databases is seen as a stumbling block to its use in OLAP systems:

c. normalization

Explanation:

  • The OLAP systems are those type of software that are used to analyse the data stored in a database. OLAP stands for online analytical processing. This software allows the user to analyse different data like demographic data etc.
  • The reliance on normalization as the design methodology for relational databases is seen as stumbling block to its use in OLAP systems because in operations like creating, retrieving, updating or deleting of data, the de-normalization structure is preferred instead of normalization as we can avoid the data duplication as well as to increase the speed of processing.
You might be interested in
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
What are the core scripting and coding technolies used to build ai platforms?
boyakko [2]
<span>Artificial Intelligence is a huge field. </span>
4 0
3 years ago
Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
olganol [36]
The answer is:bbbbbbbb
6 0
3 years ago
What is the name of the FOLDER in which the file named "script" is contained?
yulyashka [42]

Answer:

The default location for local logon scripts is

  • the Systemroot\System32\Repl\Imports\Scripts folder

5 0
3 years ago
True or false? any webb app can be accessed and run on any computing
Mademuasel [1]

Answer:

B. False

Explanation:

A web application is a computer program that  works over the internet. So, in order to access and run it you need a web browser and this will also require to have an internet access. If you don't have one of these you will not be able to run the app.

6 0
3 years ago
Other questions:
  • Why should spain go to Africa ​
    15·1 answer
  • The type of database that uses fields, records, and measure as data attributes is
    7·1 answer
  • _______ can be used to prevent busy waiting when implementing a semaphore.
    15·1 answer
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res
    11·2 answers
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • Describe two types of software suites supporting your answer with three examples each.
    12·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!