1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
3 years ago
10

As the senior analyst responsible for data staging, you are responsible for the design of the data staging area. If your data wa

rehouse gets input from several legacy systems on multiple platforms, and also regular feeds from two external sources, how will you organize your data staging area? Describe the data repositories you will have for data staging.
Computers and Technology
1 answer:
adelina 88 [10]3 years ago
3 0

Answer:

The corresponding schemas I use such as given below.

Explanation:

  • <u>Dim</u>: Used in the design for certain artifacts belonging to measurements.
  • <u>Fact</u>: Used for these artifacts throughout the design relevant to the truth
  • <u>Admin</u>: Used for all configuration-related artifacts that could be open to professional end-users.
  • <u>Audit</u>: That used to hold audit-related particles.
  • <u>Etl</u>: Is used for keeping objects, particularly staging details, directly connected to something like the ETL method.
  • <u>Report</u>: Used to keep objects utilized explicitly for programs for documentation.
  • <u>Olap</u>: Used for keeping objects directly used for systems for study.
  • <u>Test</u>: Used to carry objects which have been used exclusively for research.
  • <u>Useful</u>- Used to carry objects that just about any member including its implementation may typically use.
You might be interested in
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
kumpel [21]

Answer:

Make install

Explanation:

In Computer programming, after compiling source code, make install still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem.

In general, the commands that are executed by make install are defined in the Makefile.

5 0
4 years ago
How much time does a computer take to big calculations ?​
Alex17521 [72]

Answer:

one billion (9 zeros) is being reached fast – 15 seconds. but to get to one trillion (12 zeros) – the difference is amazing – 4 hours and 10 minutes. Basically 1000 times more.

Explanation:

6 0
3 years ago
Enter the name of your school or work URL and generate report.What score did it receive?
natta225 [31]

Answer:

Harold Washington College. 21.1

4 0
3 years ago
What sequence would a user need to follow to change Chart A into Chart B?
alexandr402 [8]

Either options C or D

You can change the chart type of the whole chart or for single data series in most 2-D charts to give the chart a different look. In 3D or bubble charts, you can only change the chart type of the whole chart. By following the steps in the answers above, you will be in a position to select available chart type like column chart or line chart.

3 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • Help! I turned on my computer and this screen came on out of nowhere, I don't know what to do to fix it.
    11·2 answers
  • When a piston has three rings, the bottom ring will be?
    9·1 answer
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • One concern some users have about storing data or accessing applications in the cloud is .
    10·1 answer
  • Which feature of a website takes you to a different part of the website or a totally different website when you click on it? A.
    8·1 answer
  • Element primer a partir del qual es generarà l'energia central solar fotovoltaica
    9·1 answer
  • What type of software is used to create letters and papers? ​
    9·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • How to hack a I'd Indian brainly bot​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!