the business intelligence layer of a system can utilize any of these options except group of answer choices classes views ajax stored procedures dynamic link libraries

Answers

Answer 1

The business intelligence layer of a system is responsible for collecting and analyzing data to provide useful insights and information to the users. In order to achieve this, the layer can utilize various tools and technologies to access and process the data. However, there are certain options that may not be suitable for this purpose.


Out of the options listed, the business intelligence layer can utilize classes, views, stored procedures, and dynamic link libraries. Classes are reusable templates that can be used to create objects and functions. Views are virtual tables that represent a subset of data from one or more tables in a database. Stored procedures are precompiled database routines that can be called from an application. Dynamic link libraries are collections of precompiled code that can be shared across multiple applications.However, the business intelligence layer may not be able to utilize AJAX for its purpose. AJAX is a client-side technology that allows web applications to update parts of a page without refreshing the entire page. It is mainly used for improving the user experience of web applications but may not be suitable for processing large amounts of data.In conclusion, the business intelligence layer of a system can utilize classes, views, stored procedures, and dynamic link libraries, but may not be able to utilize AJAX for its purpose.

Learn more about intelligence here

https://brainly.com/question/30336258

#SPJ11


Related Questions

Is not recognized as an internal or external command, operable program or batch file.

Answers

Python  Is not recognized as an internal or external command, operable program or batch file.

Which is not recognized as an internal or external?

The “Python is known to be a program that is not seen as or is one that is not recognized as what we call an internal or external command”

Note that an error is said to be often encountered in the command prompt of the  Windows. The error is said to be an outcome that is due to when Python's executable file is said to  not found in the environment variable.

Therefore, Python  Is not recognized as an internal or external command, operable program or batch file.

Learn more about  operable program from

https://brainly.com/question/25327617

#SPJ1

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement

Answers

Using an extranet
You will give the group a username and a password that each of them would use to enter your network

I don’t think this is it but I hope this gave you an understanding <3

Relational operators allow you to ________ numbers

Answers

Relational operators allow an end user to compare numbers.

What are relational operators?

Relational operators can be defined as a programming language construct which allows an end user to compare both numbers and char values.

Also, it can be used to determine whether one number is less than (<), greater than (>), equal to (=), or not equal to another.

This ultimately implies that, relational operators allow an end user to compare numbers.

Read more on relational operators here: https://brainly.com/question/14995818

#SPJ1

Have the javascript function CountingMinutes(str) take the str parameter being passed which will be two times (each properly formatted with a colon and am or pm) separated by a hyphen and return the total number of minutes between the two times. The time will be in a 12 hour clock format. For example: if str is 9:00am-10:00am then the output should be 60. If str is 1:00pm-11:00am the output should be 1320.
function CountingMinutes(str) {
// code goes here
return str;
}
// keep this function call here
console.log(CountingMinutes(readline()));

Answers

Using the knowledge in computational language in Java it is possible to write a code that function as CountingMinutes:

Writing the code in Java:

function CountingMinutes(str) {

     // code goes here  

     // Declare variables for calculating difference in minutes

     // variables in JavaScript are declared with "let" keyword

     /* Build regelar expression which will match the pattern of "12houttime-12hourtime"

        and extract time or hours in numbers from it */

     let extractedTimeStringArray = str.match(/(\d+)\:(\d+)(\w+)-(\d+)\:(\d+)(\w+)/);

     // extractedTimeStringArray array will be like- ["1:00pm-11:00am", "1", "00", "pm", "11", "00", "am", index: 0, input: "1:00pm-11:00am", groups: undefined]    for str = "1:00pm-11:00am"

     // console.log('object', time)

     

     // Extract array value at 1st index for getting first time's hours (ie time before hyphen like 1:00pm in 1:00pm-11:00am )  (like 11 from 11:32am) and convert them to minutes by multiplying by 60

     let mintsOfFirstTimeFromHours = extractedTimeStringArray[1] * 60;

     // Extract array value at 2nd index for getting first time's minutes like 32 from 11:32am

     let mintsOfFirstTimeFromMints = extractedTimeStringArray[2];

     // Extract array value at 4th index for getting second time's hours (ie time after hyphen like 11:00am in 1:00pm-11:00am ) and convert them to minutes by multiplying by 60

     let mintsOfSecondTimeFromHours = extractedTimeStringArray[4] * 60;

     // Extract array value at 5th index for getting second time's minutes like 32 from 11:32am

     let mintsOfSecondTimeFromMints = extractedTimeStringArray[5];

     // if second time's 12 hour time is in pm

     if (extractedTimeStringArray[6] === "pm") {

       // Add 12 * 60 = 720 minutes for 12 hrs

         mintsOfSecondTimeFromHours += 720;

     }

     // if first time's 12 hour time is in pm

     if (extractedTimeStringArray[3] === "pm") {

        // Add 12 * 60 = 720 minutes for 12 hrs to first time

       mintsOfFirstTimeFromHours += 720;

        // Add 12 * 60 *2 = 1440 minutes for 24 hrs to second time

       mintsOfSecondTimeFromHours += 1440;

     }

     // Calculate output minutes difference between two times separated by hyphen

    str = (mintsOfSecondTimeFromHours - mintsOfFirstTimeFromHours) + (mintsOfSecondTimeFromMints - mintsOfFirstTimeFromMints);

     // return calculated minutes difference

     return str;

   }

   // keep this function call here

   // call the function and console log the result

   console.log(CountingMinutes("1:00pm-11:00am"));

   // output in console will be-  1320

See more about Java at: brainly.com/question/12975450

#SPJ1

46. The public information _______________ includes the types of information to be distributed, the procedures for distributing information, procedures for updating or correcting information, and a method for allowing the public to express concerns or questions.

Answers

Answer:

the public information cycle or system

A type of expansion card that enables communication over cellular network is referred to as:______.

Answers

A type of expansion card that enables communication over cellular network is referred to as a WWAN card.

What are the type of expansion card?

The Network Interface Card (NIC) is known to be a kind of a card that gives room for computers to  be able to communicate over a given computer network, and it is one that is either by using cables or wireless.

The WWAN card is known to be the Wireless Wide Area Network (WWAN) and this is known to be a kind of a wireless network that links one to the Internet via the use of cellular technology.

Hence, in the case above, A type of expansion card that enables communication over cellular network is referred to as a WWAN card and thus it is correct.

Learn more about expansion card from

https://brainly.com/question/13050587

#SPJ1

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In addition to the authentification information, the data files are encrypted when using SFTP to share files.

What is SFTP?

SFTP is an abbreviation for SSH File Transfer Protocol and it can be defined as a type of secured file transfer protocol that's designed and developed to run over the SSH protocol by supporting full security and authentication, file management, as well as sharing files between two or more users on an active computer network.

This ultimately implies that, SSH File Transfer Protocol can be used for file management, file transfer and provide end users with full security and authenticated file access.

In conclusion, we can infer and logically deduce that in addition to the authentification information, the data files are encrypted when using SSH File Transfer Protocol (SFTP) to share files.

Read more on file transfer here: brainly.com/question/20602197

#SPJ1

What are the three places that store personal data

Answers

Answer: information in databases, Internet bulletin boards, newsgroups, and social media sites.

Explanation:

A framework for studying memory that uses the computer as a model of human cognitive processes defines the?

Answers

A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

What is information processing theory?

The information processing theory explains how human bras also works like a computer by converting various thought, observation to meaningful information.

The human brain is said to works in a sequential way. It receives input such as picture and processes the information to give a result.

Therefore, A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

Learn more on information processing  below

https://brainly.com/question/11610994

#SPJ1

what is non verbal communication ?​

Answers

Answer:

Nonverbal communication is the transfer of information through body language, facial expressions, gestures, created space and more.

Explanation:

For example, smiling when you meet someone conveys friendliness, acceptance and openness. Everyone uses nonverbal communication all the time whether they know it or not.

Answer:

Non verbal communication is any communication that doesn't involve words. Instead, it involves body language, such as eye contact, nodding, etc.

Brainliest, please :)

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

Answers

Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

What is iSCSI known for?

ISCSI is a word that connote Internet Small Computer System Interface, and it functions as or on top of the Transport Control Protocol (TCP) and it gives room for the SCSI command to be transmitted to the end-to-end over local-area networks (LANs), and others.

Note that Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

Learn more about storage systems from

https://brainly.com/question/24179644

#SPJ1

The _____ method of developing systems produces code that is modular and reusable.

Answers

The object-oriented analysis method of developing systems produces code that is modular and reusable.

What is object oriented system analysis?

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

https://brainly.com/question/11158544

#SPJ1

A(n) ___________ g is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Answers

A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Why is it called an elliptic curve?

In mathematics, an elliptic curve is known to be a kind of a smooth, curve that is said to be projective and also an algebraic curve which there is found to be a specified point O.

Note that  the elliptic curves are seen to be the set of points that are said to be gotten or obtained as an outcome of solving elliptic functions that is known to be over a predefined space.

Therefore, A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Learn more about binary operation from

https://brainly.com/question/26891746

#SPJ1

The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows ___________________.

Answers

The primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows the sequence of task.

What is work breakdown structure process?

A work breakdown structure (WBS) can be regarded as  the scope management process  which is considered to be entirely deliverable-oriented.

It  usually follow the order of tasks which  must be completed to eventually arrive at the final product.

It should be noted that The work breakdown structure aims  to safeguard the project members on task as well as  focused on the project's purpose, hence , primary difference between a work breakdown structure and a work sequence draft is that the work sequence draft shows the sequence of task.

Learn more about work breakdown structure at:

https://brainly.com/question/14530580

#SPJ1

You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the beginning of each year. the letter pulls parents' names and addresses, along with the children's names, from an excel file you get from the main office. the original creator of the excel file used a column labeled father name and another labeled mother name. over the summer, a new person took over and updated the file. parent names are now located in columns titled parent 1 and parent 2. what do you need to do to make your form letter work with the updated excel file

Answers

Answer:

The letter pulls parents' names and addresses, along with the children's names, from an Excel file you get from the main office. To make your form letter word with the updated Excel file, Create a new form letter in Word and use the mail merge feature to link it to the updated Excel file.

Explanation:

2. Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group

Answers

The program based on the information given is illustrated below.

What is a program?

It should be noted that a computer program is a set of instructions in a programming language for a computer to execute. In this case, computer programs are one component of software.

Basedon the information given, in order to change the owner and group that owns the directory projects from the linux terminal, the command will be:

chown fparker:fparker /home/fparker/projects

chown is the command that is used to change the owner and group of any file or directory in linux.

fparker:fparker - is in the format user:group that is, the ones that need to be changed), since user name and the group name are fparker, it is used.

/home/fparker/projects - is the path of the directory, where the owner and group are being changed.

Learn more about program on:

https://brainly.com/question/23275071

#SPJ1

Complete information

Complete the following tasks in order on CorpServer:

Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group.

You cannot view the presentation by clicking the slideshow icon on the status bar

Answers

The Statement is false,

Explination: You can view your slides in a variety of ways depending on the task at hand.

Which colour scheme and design elements would you choose for a website for a neighbourhood swim team

Answers

F this is not related to math I’d pick light blue or a teal blue with either white or gold

Which option can be used to import selected slides form a previously created presentation into a new presentation without manually copying and pasting them?

Answers

An option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them is reuse slide.

What is a presentation application?

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that contains both textual and multimedia information, which are typically used during a presentation.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Computer technology, reuse slide is an option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them.

Read more on slides here: brainly.com/question/11741377

#SPJ1

One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular ports or display all active connections and ports on which a computer is listening and, depending on the OS, can also include the total number of bytes of traffic, domain names, and IP addresses (local and foreign). Name at least two potential uses of this command, making sure at least one use is related to secure administration principles.

Answers

An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

What protocol does the netstat command use?

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

What is netstat used for?

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

Learn more about troubleshoot from

https://brainly.com/question/9572941

#SPJ1

Determine whether the compound condition is True or False.
7<12 or 50!=10

7<12 and 50<50

not (8==3)

Answers

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

What is compound condition?

A compound statement is known to be one that shows up as the body of another statement, e.g. as in if statement.

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

Learn more about compound condition  from

https://brainly.com/question/18450679

#SPJ1

How to get flash to work on chrome?

Answers

Answer:

Open Chrome on your computer. If you’re using Windows, you’ll usually find it in the Start menu.

Click the ⁝ menu.

Click Settings.

Scroll down and click Advanced.

Scroll down and click Content settings.

Explanation:

to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the

Answers

For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

What does IP group do?

The term IP Group is known to be one that looks at or is one whose purpose is so that it can  generate  a lot of a positive social and also that of environmental impact with financial returns.

Note that this is one that offers shareholders a kind of an exposure to a a lot of portfolio of opportunities that is made up of a  high-growth businesses in regards to the growth markets.

Hence, For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

Learn more about IP address from

https://brainly.com/question/24930846

#SPJ1

Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained

Answers

The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

What is cache on a browser?

The browser cache is known to be a kind of 'cache' tool that is often used by a person's internet browser so that one can fasten up the page loading act.

Hence, The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

Learn more about browser cache from

https://brainly.com/question/14598358

#SPJ1

Define a function Convert Volume() that takes one integer parameter as total Tablespoons and two integer parameters passed by reference as cups and tablespoons. Of total Tablespoons is negative, the function returns false without updating the parameters. Otherwise, the function converts total Tablespoons to cups and tablespoons, and then returns true.

Answers

Using the computational language in C++ it is possible to write a code that converts total Tablespoons to cups and tablespoons.

Writting the code in C++:

#include<iostream>

using namespace std;

void ConvertVolume(int totalTablespoons, int &cups, int &tablespoons) {

   // compute the cups and tablespoons

   // as they are passed by reference,

   // the change will also reflect in the main function

   cups = totalTablespoons / 16;

   tablespoons = totalTablespoons % 16;

}

int main() {

   int usrCups;

   int usrTablespoons;

   int totalTablespoons;

   

   // user input

   cin>>totalTablespoons;

   

   // call the function

   ConvertVolume(totalTablespoons, usrCups, usrTablespoons);

   

   // print the output

   cout<<usrCups<<" cups and "<<usrTablespoons<<" tablespoons"<<endl;

   

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Kate needs to insert 10 text boxes in a document. after inserting the first text box, how can she easily repeat the action nine more times?

Answers

Kate can easily repeat the action nine more times if she press the Redo button nine times.

What is the button about?

The button for redo is one that states that that action should be done again.

Note that for a person to redo something that they have undone, one can press Ctrl+Y or F4 and thus

Hence, Kate can easily repeat the action nine more times if she press the Redo button nine times.

See full question below

Kate needs to insert 10 text boxes in a document. After inserting the first text box, how can she easily repeat the action nine more times?

a. Press the Redo button nine times.

b. Right-click the text box border and select Repeat nine times.

c. Press CTRL+R nine times.

d. Cut the text box and then paste it.

Learn more about Redo button from

https://brainly.com/question/10383258

#SPJ1

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is:_________

Answers

Answer:

C= f(k) - dk*

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is: c= f(k) - dk*. When an economy begins above the Golden Rule, reaching the Golden Rule: produces higher consumption at all times in the future.

transmission of pinworms can occur in all following except

Answers

Transmission of pinworms can occur in contaminated clothing clothing, bedding and others.

What is the mode of transmission for pinworms?

Pinworm infection is known to be the spread of this worm via  fecal-oral route and it is one that is said to often transfer a lot of infective pinworm eggs from the anus to a person's mouth, via  hand or indirectly via contaminated clothing, and others.

Note that the Transmission of pinworms can occur in contaminated clothing clothing, bedding and others.

Learn more about pinworms from

https://brainly.com/question/8980340

#SPJ1

A security team desires to modify event logging for several network devices. One team member suggests using the configuration files from the current logging system with another open format that uses TCP with a secure connection. Which format does the team member suggest?

Answers

Since option is not given, answer will be subjective. The format that the team member suggest is the use of password.

What is a  secure connection?

This is known to be a kind of connection that is said to be often encrypted by one or a lot of security protocols to make sure that there is security of data flowing between two or a lot of nodes.

Hence, Since option is not given, answer will be subjective. The format that the team member suggest is the use of password.

Learn more about secure connection from

https://brainly.com/question/5338580

#SPJ1

______ data is data that has not been processed for use. Multiple choice question. Raw Fast Decision Source

Answers

Answer: Raw Data

Explanation:

Raw data (sometimes called source data, atomic data or primary data) is data that has not been processed for use.

Other Questions
Select the correct answer from each drop-down menu. sugar plantations were the backbone of the economy. sugar was also the main hawaiian export to the united states. for many years, hawaiian sugar was sold tariff-free in the united states. in 1890, the us congress passed the , which removed tariffs on all foreign sugar imports. this change meant that hawaiian sugar producers had to compete with other nations in the us market. what type of mining led to the establishment of breckenridge? An air cannonlaunches a T-shirt upward toward basketballfans. It reaches a maximum height and thendescends for a couple of seconds until a fangrabs it. Sketch the graph that represents thissituation.Distance (ft) please answer the question What is generally given to you to assist you in improving your workflow, skills, and interpersonal relations in the workplace? bias empathetic feedback work ethic What indication is there that he fears his time with Juilet will be brief? Given: AD // BC, AB // CD Prove: DBC BDA What is 1 in exponential form? Compare the amount of kinetic energy of particles in each state of matter. a (blank) is a rule or limit placed on the supply of a good or service by the government Was the Western Front a bloody stalemate? Define acid and what is the highest pH ________ amigas son estudiantes fantasticas. MiSuNuestrasTu what is the best way for a certifying officer to prevent pecuniary liability? Instructions: Underline the common noun using the color blue. Underline the proper nouns using the color red.Help Triangle ABC with vertices at A(3, 2), B(2, 1), C(2, 1) is dilated using a scale factor of 1.5 to create triangle ABC. Determine the vertex of point A. A(4.5, 2) A(3, 3) A(4.5, 2) A(4.5, 3) An object ___(in/of/on) beauty is a source of eternal joy. It ___(would/should/may)be a beautiful flower , a piece of music ____(and/or/although) a sweet smile of child . Equally powerful__(are/is/were) the appeal of work of art , be it a painting or a work of sculpture. How does weathering and erosion work together to shape the earth Each contour line as you go inlandrepresents ground that is at a constantelevation 5 meters higher than theprevious contour.a) At what points on the map are theresteep cliffs? Show at least threeplaces.b) There are two high areas, label theHow high are they?Mark a straight-line path to climbfrom sea level to the high point Bwith the most gentle slope.d) You are interested in how much workit takes to lift your body mass fromsea level to the B peak. If you followthe path you chose in part C willyou minimize the amount of work toclimb to the top, or will it makenodifference? How did ww1 change America?