1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
3 years ago
13

Data management technology consists of the: Group of answer choices physical hardware and media used by an organization for stor

ing data. detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. software governing the organization of data on physical storage media. hardware and software used to transfer data. universally accepted standards for storing data.
Computers and Technology
1 answer:
Illusion [34]3 years ago
7 0

Answer:

software governing the organization of data on physical storage media.

Explanation:

Data management platform can be regarded as a foundational system utilized in collection and analyzing of large volumes of data across an organization. Data management encompass some variety of interrelated functions, the basic technology that is been utilized in

deployment and administering databases is regarded as database management system. Database technologies collect, store and also organize information then process it o that a user can easily finds needed details when they need it . It should be noted that Data management technology consists of the software governing the organization of data on physical storage media.

You might be interested in
Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
Aleksandr-060686 [28]

Answer:

def haigyPaigy(dict, text):

 # Create a regular expression  from the dictionary keys

 regex = re.compile("(%s)" % "|".join(map(re.escape, dict.keys())))

 # For each match, look-up corresponding value in dictionary

 return regex.sub(lambda mo: dict[mo.string[mo.start():mo.end()]], text)  

text = input("Enter text: ")

dict = {

   "a" : "aiga",

   "e" : "aige",

   "i" : "aigi",

   "o" : "aigo",

   "u" : "aigu",

   

 }  

print(haigyPaigy(dict, text))

Explanation:

Step 1:

define the haigyPaigy function: this function takes its argument from a dictionary and the text you you want to convert.

<em>def haigyPaigy(dict, text): </em>

<em />

In the function, there are two regular expressions:

  • <em>regex = re.compile("(%s)" % "|".join(map(re.escape, dict.keys()))) </em>

<em>this is a regular expression for the dictionary keys, it looks through the text for a match, it acts like a scanner, simply put, it looks for [a,e,i,o,u].</em>

re.compile(pattern, repl, string): is used to combine a regular expression pattern into pattern objects, which can be used for pattern matching. It also helps to search a pattern again without rewriting it.

  • <em>return regex.sub(lambda mo: dict[mo.string[mo.start():mo.end()]], text)  </em>

For each match, it looks up the key in the dictionary and replaces it with a corresponding value.

Step 2:

prompt the user to input the text that needs conversion to Haigy Paigy

<em>text = input("Enter text: ") </em>

Step 3:

Create the dictionary by inputting the key and the corresponding value.

NOTE: the key is what you want to replace in the text and the value is what you're replacing it with.

<em>dict = { </em>

<em>    "a" : "aiga", </em>

<em>    "e" : "aige", </em>

<em>    "i" : "aigi", </em>

<em>    "o" : "aigo", </em>

<em>    "u" : "aigu", </em>

<em>     </em>

<em>  }  </em>

<em />

Step 4:

Call the function and print the translated text to your screen.

<em>print(haigyPaigy(dict, text))</em>

<em />

8 0
3 years ago
With social media presence growing why is cyberbullying at an all time high
Sunny_sXe [5.5K]

There are some people who engage in cyberbullying online because of the anonymity and the fact that there’s no retaliation,” said Amanda Giordano, principal investigator of the study and associate professor in the UGA Mary Frances Early College of Education. “You have these adolescents who are still in the midst of cognitive development, but we’re giving them technology that has a worldwide audience and then expecting them to make good choices

5 0
3 years ago
Read 2 more answers
which of the following is an educated or informed guess that is proposed and supported with verifiable evidence
beks73 [17]

The answer is Hypothesis.  It is something more than just a wild guess but less than a well-established theory, a theory which can be tested through study and experimentation..  They are assumptions generally believed to be true. They are provisionally accepted in order to interpret certain events or phenomena, and to provide guides for further study.

6 0
3 years ago
The Blue Screen of death is not an common error, and it is highly likely that you have encountered and fixed several already. Di
Anna007 [38]

Answer:

your anwser is B

Explanation:

7 0
3 years ago
Can a msi b450 tomahawk motherboard fit into a darkflash dlm21 mesh micro atx tower
kobusy [5.1K]

Answer:

Use PCPartPicker

Explanation:

If you use PCPartPicker (extremely popular and good low prices), it will give you the best deals and give you information about every component compatibility.

7 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • If you want to open an application that does not have a tile pinned to the start menu
    9·1 answer
  • I need to create a function that returns Pascal's Triangle with n rows, where n is an int argument.
    12·1 answer
  • This type of handout prints only the text of the presentation.
    7·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • Write a program that:
    13·1 answer
  • What is an AUP?<br> help?????
    11·2 answers
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
  • 1. Assume that in an implementation of the RSA cryptosystem one modular squar- ing takes 75% of the time of a modular multiplica
    15·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!