A ________ is a segment or category of data that has been extracted from a data warehouse.
A) data mart
B) cleaning mine
C) cloud cover
D) transformed cloud
Answer: A
Learn More :
INFO 370
- Which of the following are examples of data mining tools?
- To say that data have been ________ means that the data have been checked for missing values, incorrect values, and other syntactical problems.
- Advances in hardware, software, storage, and database technologies have given businesses a new tool that better allows them to competitively use their mountains of data. This tool is called ________.
- For data to become information, the data must be ________.
- What is a data service that is used to carry voice communications?
- The use of ________ encryption creates a secure VPN.
- Before a trusted VPN path can be established, the ________ and addressing have to be defined between the sender and the receiver.
- For a ________ VPN, no one other than the carrier can affect the creation or modification of the VPN's path.
- A NAS appliance must be attached to a network that supports ________ protocols.
- In addition to Fibre Channel, one type of networking connection technology is ________.
- What is the name of Microsoft's application development platform?
- _______ is an umbrella term used to describe technologies that, utilizing the Internet and particularly the WWW, provide access to a host of services for customers, employees, and business partners.
- Which of the following is NOT one of the four most common VPN tunneling protocols?
- The three types of VPN include:
- ________ refers to a technique that allows packets from one protocol to be wrapped, or encapsulated, within a second protocol.
- ________ is a process that businesses follow to generate value from their intellectual property and knowledge-based assets.
- ________ is a means of viewing a wide variety of data that can offer a comprehensive view of business conditions at a given point in time.
- _______ is a high-speed (100 million bytes per second) switched-fabric technology capable of connecting hundreds or even thousands of devices.
- A standard SCSI parallel cable should be no longer than ________, which limits how far an external storage device can be from its direct-connect server.
- Standard voice is ________; VoIP is ________.
- Three common cloud models are ________.
- Three significant reasons cited in the text for the popularity of cloud computing are ________.
- _______ computing in essence virtualizes the networking infrastructure such that the user of ________ services and resources does not need to be concerned with, or aware of, how the ________ is configured, maintained, or implemented.
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.