1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
7

A __________ is a repository of data gathered from operational data and other sources that is designed to serve a particular com

munity of knowledge workers .
a. Data-Mining
c. Data Mart
b. Metadata
d. Data warehouse
Computers and Technology
1 answer:
VMariaS [17]3 years ago
8 0
Data Mart is a smaller amount of data that is collected from a data warehouse.
You might be interested in
Please help me. i will mark you brailiest
Stolb23 [73]

Answer:

Simple, really

Explanation:

3Rd one is pretty easy, all you have to do is read closely.

3 0
3 years ago
The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
BaLLatris [955]

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

8 0
3 years ago
How do I learn coding? Python
pickupchik [31]

first learn the basics about the computer than just slowing move into it you feel?

5 0
3 years ago
Read 2 more answers
Usually, in organizations, the policy and mechanism are established by the:
Ivanshal [37]

Answer:

Sorry Sorry Sorry

Explanation:

Sorry Sorry Sorry

5 0
3 years ago
Read 2 more answers
__________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
sergey [27]

<u>Swap files </u>contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost any other work that has occurred during past Windows sessions.

Explanation:

I order to simulate extra space an operating system like windows use hard disk space in order to stimulate extra memory.When a computer system is running low with the memory space the swap file swaps a section of RAM onto the hard disk in order to obtain a free memory space.

This Process at times results in  slowing down of the computer  computer considerably.

<u>The combination of RAM and swap files is known as virtual memory.</u>

It is due to the  use of virtual memory that our computer is able to  run more programs than it could run in RAM alone.

4 0
3 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • Write the definition of a function named alternator that receives no parameters and returns true the first time it is invoked, r
    12·1 answer
  • Which of the following situations represent(s) resource scarcity? I. Rapidly growing economies experience increasing levels of w
    9·1 answer
  • While performing disk and file maintenance on the company file server, you determine a user in the accounting department has bee
    13·2 answers
  • Which of the following statements is true?
    8·2 answers
  • How can users open a shared worksheet if they do not have Excel installed on a computer? visit Microsoft’s website use Office365
    6·1 answer
  • Which of the following is not a form of technology?
    15·2 answers
  • Why is it saying I don’t have a subscription when I paid for it and it shows deducted from my account? I can’t find any phone #
    7·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • Need comments added to the following java code:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!