1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
4 years ago
5

A particular BI analysis might require data from an ERP system, an e-commerce system, and a social networking application, but s

uch a data collection will likely have relationships that are not represented in primary key/foreign key relationships. This is an example of ________.
Computers and Technology
1 answer:
maxonik [38]4 years ago
8 0

Answer:

Data not integrated.

Explanation:

The Integration of data is the method of integrating data from various outlets into one consistent, coherent view.Integration starts  with the process of intake, which involves steps such as washing, ETL simulation and integration.

The data which is not represent  primary key/foreign key  relationship such a data is known data not integrated In this given question the BI is analysed the data from the ERP system and other from e-commerce system as well as from networking application the data is not described in primary key/foreign key relationships this kind of data is known as data not integrated .

You might be interested in
Read the scenario, A manager wants to hire a new technician for the help desk that typically assists clients with simple compute
Yuliya22 [10]
The correct option is D.
The main reason for hiring the technician is to get someone who will be helping the clients to solve their computer problems. Since most of the clients  will probably know little about computer, the manager will need to hire someone who is ready to serve the clients [service oriented], someone who is a problem solver and someone who is great at communicating with different types of people.
8 0
4 years ago
In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
zhannawk [14.2K]

Answer:

Follows are the code to this question:

import math as x #import math package

#option a

radius = 10#defining radius variable  

print("radius = ", radius)#print radius value

realA = x.pi * radius * radius#calculate the area in realA variable

print("\nrealA = ", realA)#print realA value

#option b

a1 = 3.1  * radius * radius#calculate first area in a1 variable  

print("Area 1= ", a1)#print Area

print("Percentage difference= ", ((realA - a1)/realA) * 100) #print difference  

a2 = 3.14  * radius * radius#calculate first area in a2 variable                            

print("Area 2= ", a2)#print Area

print("Percentage difference= ", ((realA - a2)/realA) * 100)#print difference  

a3 = 3.141  * radius * radius#calculate first area in a2 variable                       print("Area 3= ", a3)#print Area

print("Percentage difference= ", ((realA - a3)/realA) * 100) #print difference  

Output:

please find the attached file.

Explanation:

In the given Python code, firstly we import the math package after importing the package a "radius" variable is defined, that holds a value 10, in the next step, a "realA" variable is defined that calculate the area value.

In the next step, the "a1, a2, and a3" variable is used, which holds three values, that is "3.1, 3.14, and 3.141", and use the print method to print its percentage difference value.  

4 0
3 years ago
As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
strojnjashka [21]

Answer:

TACACS+

Explanation:

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.

3 0
3 years ago
Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group me
Zigmanuir [339]

Answer:

Apple iWork.

Explanation:

Apple iWork would not work for whole group.

6 0
4 years ago
A block signature indicating that a text message was typed on a mobile device is an example of ____________.
Katarina [22]

A block signature indicating that a text message was typed on a mobile device is an example of  <u>impression management</u>.

The correct option is A.

<h3>What is  impression management?</h3>

Impression management is a conscious or unconscious process whereby individuals strive to regulate and control information in social interactions in order to affect how others perceive a person, an item, or an event.

<h3>What is the main goal of impression management?</h3>

The actions people take to influence others' perceptions of a notion are referred to as impression management. Depending on their objectives, people can work to reinforce existing beliefs or make an effort to change them.

<h3>What is block signature?</h3>

A signature block is the text that surrounds a signature and offers context for the signature as well as additional details. An email message, Usenet article, or forum post's signature block is a customized block of text that is automatically attached at the bottom of these types of documents.

To know more about  block signature visit:

brainly.com/question/2123747

#SPJ4

I understand that the question you are looking for is :

A block signature indicating that a text message was typed on a mobile device is an example of ____________.

A. impression management

B. convergence

C. evaluative language

D .pragmatic rules

6 0
2 years ago
Other questions:
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • What is an advantage of sharing documents in PDF format instead of Word format?
    6·2 answers
  • Which of the following is real job title on the interactive media career pathway?
    12·2 answers
  • Jamie posted all the journal entries into ledgers. After the postings, Jamie realizes that the debit side of the travel account
    10·1 answer
  • Which of the following is the most-polluting energy source?
    7·2 answers
  • Consider the following code: public static void mystery(int a) { System.out.println("A"); } public static void mystery(double a)
    6·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • Storage that is wiped clean when power is cut off from a device is known as _____.
    13·1 answer
  • Which of these is not part of the art director's job?
    9·2 answers
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!