1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
15

Which of the following is not a method of data management?

Computers and Technology
1 answer:
Vesnalui [34]3 years ago
4 0

The following is not a method of data management

Formulas

Explanation:

  • Data management is an administrative process that includes acquiring, validating, storing, protecting, and processing required data to ensure the accessibility, reliability, and timeliness of the data for its users
  • Data managers work with software and internet applications.
  • They deal with performance issues, maintenance, system resources, and service and support internet sites.
  • Data management professionals may design, develop, and implement data collection databases.
  • Data management includes the following functions: practicing the disciplines in the development, execution, and supervision of plans, programs, policies and practices that protect, control, deliver and enhance the quality and value of data and information in the organization
  • Data Management (DM), Master Data Management (MDM) or Database Management (DBM) systems are sophisticated and very powerful software tools, capable of ensuring a rigorous storage, synchronization, analysis and distribution of the company's data
You might be interested in
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
Bogdan [553]

Answer:

Change default username and password.

Explanation:

The corporation under which Derek works has assigned him an assignment of establishing and safeguarding a SOHO router. He intends to ensure that maybe the wireless connection is protected and no further unauthorized person would connect the device to the router. So, the first task is to simply change the username and password that the wifi routers will be secured.

So, the following answer is correct about the given scenario.

6 0
3 years ago
Giải thích mục đích của các thao tác open() và close().
kicyunya [14]

Answer:

Which lan is it

8 0
2 years ago
Read 2 more answers
which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
Pani-rosa [81]
The correct answer is Graph Search for Daily News

This does not exist on Facebook, unlike the timeline and the activity log.
3 0
3 years ago
Which building-block feature is available in the Text grouping on the Insert tab?
saveliy_v [14]

Answer:

Business information

Explanation:

The building blocks are durable objects for content like corporate material, headings, timetables, and gallery advertising. The user can retrieve and utilize the building blocks at any time. The user can also design, saves, categorize and enter a description of their own building blocks, and tag them with keywords to help them find easily. 

Business information is one of the main features of the building block galleries that is found on the insert tab in text group.

3 0
3 years ago
HELP!!!
jeyben [28]

Answer:

A. a tool tip

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • Which sentence is an example of an I-statement?
    6·1 answer
  • Which view would you need to use to make
    14·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    15·1 answer
  • Users can customize their Windows device by going to the Control Panel under __________.
    15·2 answers
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
  • What is software?
    6·1 answer
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!