1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
3 years ago
14

The type of manager that services all requests for data is known as?

Computers and Technology
1 answer:
3241004551 [841]3 years ago
8 0
The type of manager that services all requests for data is known as IT service management (ITSM)
You might be interested in
A company Digicom Parts manufactures 2 types of unique products for laptop and desktop computers. It manufactures 10 types of la
Alisiya [41]

Algorithms are used as a prototype of an actual program, during project design.

The algorithm the manager can use to find the productID of the desktop products is as follows:

Start

i = 0

if i > N, then Exit:

  Input productID:

       If productID.upper() == 'A' or 'I' or 'E' or 'O' or 'U':

                 Process data as desktop products

  i++

Go to step 2

Stop

Note that algorithms do not conform to programming syntax.

Read more about algorithms at:

brainly.com/question/24793921

6 0
3 years ago
What are the text or graphics that are lighter than the main text located in a document's background called?
faust18 [17]
That would be a watermark
7 0
3 years ago
What feature of excel allows you to automatically calculate common formulas with selected data
Nostrana [21]
It would be autosum your welcome:)
7 0
4 years ago
At the monthly product meeting, one of the Product Owners proposes an idea to address an immediate shortcoming of the product sy
Mrrafil [7]

Answer:

Correct limitation for Attribute Name and value is option

b: Value and name combined must not exceed 400KB

Explanation:

For amazon dynamo db You can have unlimited attribute per item but one attribute cannot exceed 400 kb in size.400Kb is the limit of an item which can be stored in db.

If bigger data is required to store than data is stored some where and links/url to data are stored in the db.

For Item max size is 64KB

7 0
3 years ago
Use any platform to write about cybersecurity
Amiraneli [1.4K]

Answer:

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The main circuit board in a computer is called the ________. RAM dongle motherboard power supply unit
    14·1 answer
  • What's is the contribution of technology to the country?
    15·1 answer
  • What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
    14·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • Lets computer know what to do when it starts up...
    9·1 answer
  • When you navigate inside a compressed folder, you click the
    6·1 answer
  • What do you notice about the cinematography
    14·1 answer
  • 7 TH GRADE QUESTION...PLS HELP
    12·2 answers
  • What is the 6 example of computer hardware and explain​
    6·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!