1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
5

What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo

ading it into a database. It is a process that is performed at the end of the data warehouse model prior to putting the information in a cube. It is a process that is performed at the beginning of the data mining model. t is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
7 0

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

You might be interested in
Is Filmora 9 or Final Cut Pro Better for personal use?
padilas [110]
Final Cut Pro is better for personal use
3 0
3 years ago
Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
zhuklara [117]

Excel formulas are expressions used to perform computation.

The Excel formula to enter in cell B13 is =IF(B9 < 600, "Denied","Approved)

From the question, we have:

  • Cell B13 represents the applicant's eligibility status
  • Cell B9 represents the credit score

The eligibility criteria are given as:

  • Credit Score < 600 = “Denied”
  • Credit Score >= 600 = “Approved”

To write the formula, we make use of an IF function

An IF function in Microsoft Office Excel has the following syntax

=IF([condition],[value if true],[value if false]).

So, the required formula to enter in cell B13 is:

=IF(B9 < 600, "Denied","Approved)

Read more about Excel formulas at:

brainly.com/question/25683602

4 0
3 years ago
Mhairi believes that if a site’s information is detailed enough, it is more likely to be true. Is she correct? Answers
inysia [295]
In my opinion, I would say No. So I think the answer is C.
6 0
3 years ago
Read 2 more answers
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
What was the computer works in binary functions
Mariulka [41]
Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.
7 0
3 years ago
Other questions:
  • Which is the main reason why IT professionals need to pursue continuing education and self-directed learning?
    6·2 answers
  • First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==&gt; Close All Projects).
    6·1 answer
  • Running stop signs and lights is an blank that a driver may be operating their vehicle under the influence of drugs
    8·2 answers
  • Let’s use that simple branch instruction to do the following: Load the two words declared in the data statement shown to the rig
    14·1 answer
  • Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A
    9·1 answer
  • Why was unicode invented?
    10·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Input images into a computer
    11·1 answer
  • Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser o
    11·1 answer
  • what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!