1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
15

Which of the following is not a method of data management?

Computers and Technology
1 answer:
Vesnalui [34]3 years ago
4 0

The following is not a method of data management

Formulas

Explanation:

  • Data management is an administrative process that includes acquiring, validating, storing, protecting, and processing required data to ensure the accessibility, reliability, and timeliness of the data for its users
  • Data managers work with software and internet applications.
  • They deal with performance issues, maintenance, system resources, and service and support internet sites.
  • Data management professionals may design, develop, and implement data collection databases.
  • Data management includes the following functions: practicing the disciplines in the development, execution, and supervision of plans, programs, policies and practices that protect, control, deliver and enhance the quality and value of data and information in the organization
  • Data Management (DM), Master Data Management (MDM) or Database Management (DBM) systems are sophisticated and very powerful software tools, capable of ensuring a rigorous storage, synchronization, analysis and distribution of the company's data
You might be interested in
If a user would like to modify margins to specific settings, users would need to select the _____ option.
RSB [31]
If a user would like to modify margins to specific settings, users would need to select the <span><u>Custom Margins</u> </span>option.
4 0
3 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total num
vredina [299]

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

6 0
2 years ago
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
3 years ago
Read 2 more answers
What are informational sessions?
arsen [322]

Answer:B

Explanation:

7 0
3 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • Combination lock uses three numbers beween 1 and 36 with repetition , how mant combinations are possiable
    6·1 answer
  • What aspect does not provide context in a portrait?
    10·2 answers
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Which of these is the proper flow for an Auto Trans cooling system?
    7·2 answers
  • 1.6 code practice: question 1 edhesive
    12·2 answers
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • Which of the following is an advantage of using
    6·2 answers
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • Write steps for converting decimal to binary numbers?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!