Please HELP

Which of the following is not a method of data management?
A- sorting
b- filtering
c- formula's
d- graphing

Answers

Answer 1

formula's, Data management does not involve formulas.

What is formula?

A formula is a statement that instructs the computer what mathematical operation to carry out on a given value. Formulas are most frequently used in spreadsheet software, like Microsoft Excel, when referring to computer programs.

What is Data Management?

Data management is the process of gathering, storing, and using data in a cost-effective, efficient, and secure manner. In order to make decisions and take actions that will benefit the organization as much as possible, data management aims to assist individuals, organizations, and connected things in optimizing the use of data within the constraints of policy and regulation. An effective data management strategy is more crucial than ever as businesses depend more on intangible assets to generate value.

To know more about Data Management, check out:

https://brainly.com/question/29310787

#SPJ1


Related Questions

3.5 code practice python

Answers

Answer: This chapter is about variables in Python. So a variable can be any data type. And to find the datatype of a variable we need to use below code: x =10 print (type (x)) This will output: integer Now we can covert a string into integer as below:x=input("Enter X:")But above x is considered as string, and we need to convert it to integer to make use in for loop or any calculation.we can use:int(x), and this will convert x to int from string.Also, we have operators to change the variable values like =. +=, -=, /=, *= etc. So you need to remember these, and you will be up with all that is required for understanding variables. And rest is self explanatory certainly.

Explanation:

The answer is self explanatory

How to edit slides into video.

Answers

Answer:

use videostar. or funimate. but for school use powerpoint

Explanation:

what is the most common size for footings for an 8 inch foundation​

Answers

Answer:

#4 rods at 12 inches o.c.

Explanation:

Help PLEASE ILL MARK as brainlest

Answers

Answer:

computer animation (3d)

You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need

Answers

Answer:

You will use a secure connection

Explanation:

You need VPN so that your IP cant be tracked which will help hackers to find you

A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.

What is Secured connection?

A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.

A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.

VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.

Learn more about Secured connection here:

https://brainly.com/question/25556545

#SPJ2

If you want to share information with individuals who are internal to your organization, which type of network would you want to use

Answers

it is globe because I want a successful the all people

A leading global vendor of computer software, hardware for computer, mobile and gaming systems, and
cloud services. Its corporate headquarters is located in Redmond, Washington, and it has offices in more
than 60 countries
Apple
Microsoft
IBM
Global Impact

Answers

Answer:

Microsoft

Explanation:

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Answers

Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.

Read more: https://brainly.com/question/24112967

___1. What is the first thing you should do if you received a package?
a. count the number of items c. accept it immediately then leave

b. check out the whole package d. check for the delivery receipt

________2. What should you do with the copy of your request for inspection?

a. return to the delivery man c. dispose it immediately

b. keep the copy of your request letter d. do not accept the letter

________3. What form is used to request for tools and equipment to be used for a

particular job written instruction to perform a work?

a. job order / order forms c. inventory of Materials forms

b. borrower’s forms d. purchase requisition

Answers

1.C
2.D
3.D
4.B
5.A
6.A
7.C
8.D
9.A
10.C

In order to help prevent collisions with motorcycles, one of the hosts of the video recommends thinking of motorcycles as __________. A. fast-moving bicycles B. occupying a space the same size as a car C. unpredictable road users

Answers

There are lot of accidents on the high way due to motorcycles. In order to help prevent collisions with motorcycles, one of the hosts of the video recommends thinking of motorcycles as occupying a space the same size as a car.

There are some recommendations following distance when traveling behind a motorcycle. it is often longer for motorcycles than the normal two seconds that are recommended when following most vehicles.

The best recommendation is to give a three or four second  distance when travelling behind a motorcyclist.

Motorcycles often stays at your blind spot and you may not see them. This can lead to an unwanted collision and result in serious injury or death. It is best you give much space as you would a normal vehicle.

Learn more from

https://brainly.com/question/13408307

which scenario describes a function provided by the transport layer?

Answers

The scenario that best describes a function provided by the transport layer of the open systems interconnection (OSI) model is: C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems) and they include the following in sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

The transport layer accept data packets from session layer, breaks them into smaller units and then transmits (sends) them to the network layer, without any duplication of data.

In this scenario, a function provided by the transport layer of the open systems interconnection (OSI) model is transportation (transmission) of the correct web page (data) to the correct browser window (software application), especially through the use of source and destination port numbers assigned to the software application.

Read more: https://brainly.com/question/22883762

Your question is lacking the necessary answer options, so I will be adding them here:

A. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.

B. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.

C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

D. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.

shang chi Critique (6-8 sentences)

Answers

Explanation:

.......................

What core components are involved with all games?

Player actions, humor, rewards, coins

Player goals and actions, rules, challenges

Challenges, riddles, mind-benders, tasks

Injury, re-birth, rules, questions

Answers

Answer:

B.) Player goals and actions, rules, challenges

Explanation:

1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False

Answers

The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on a network interface: False.

An IP address is an abbreviation for Internet protocol address and it refers to a unique number that is assigned to a computing device or network device, so as to differentiate each computing device from one another in an active network system.

This ultimately implies that, an IP address is typically designed and developed to uniquely identify each computing device or network device that is connected to the Internet or an active network system.

Note: NetworkManager (GUI tool) are configured on desktop computers only while Systemd Networkd are typically configured on servers.

For a Linux system, you don't have to install the NetworkManager or Systemd Networkd before configuring an IP address on a network interface.

Read more: https://brainly.com/question/20629962

Independence Day celebration in school paragraph ​

Answers

Answer:

We celebrated the Independence day in our school compound, with great pump and show. The school building and the ground were cleaned and decorated for the occasion. A flag pole was put up at the top of the school building. The seating arrangement was made on the platform

Explanation:

please Mark my answer in brainlist

List four types of Web browsers

Answers

Answer:

internet explorer safari tor firefox

Explanation:

Diane changes the size of an image with the format picture pane and keeps the original ratio of height to width of the object. What has Diane done to the image?

chose D. she scaled, got 100%

Answers

Answer:

it's d.  

Explanation: post protected

A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?

Answers

myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.

Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.

These Advisors are  known worldwide community of technical resources. They have a thorough  knowledge of cloud technologies and practices.

Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.

Learn more from

https://brainly.com/question/24918185

I need help with this question.

Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____

Answers

The answer is persona

it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT

Answers

Ansgokublue

Explanation:

Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?

Answers

Answer:i don’t know sorry

Explanation:

A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called

Answers

A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.

In the field of artificial intelligence (AI), a bot is an abbreviation for robot.

A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.

Read more: https://brainly.com/question/21656851

Which tcp/ip utility gives you the following output?.

Answers

Answer:

Nbstat -c is the correct answer.

The TCP/IP utility gives you the following output is nbtstat -c. The correct option is b.

What is TCP/IP utility?

TCP/IP provides end-to-end communications that specify how data should be divided into packets, addressed, transmitted, routed, and received at the destination. This defines how data is exchanged over the internet.

The TCP/IP model has four layers: application, network access, internet, and transport. These layers function as a set of protocols when combined.

When a user sends data through these layers, the TCP/IP model does so in a specific order and then does so again in the opposite order when the data is received.

Therefore, the correct option is b, nbtstat -c.

To learn more about TCP/IP utility, refer to the below link:

https://brainly.com/question/29912510

#SPJ12

The question is incomplete. Your most probably complete question is given below:

netstat -r

nbtstat -c

netstat -a.

Arp -a.

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account

Answers

A lot of services are being provided over the Internet. If you do not want to use your Internet service provider (ISP) for your email account, you can you acquire a webmail account through online services

An online service is simply known as body that gives access to various types of data for different uses through the use of the the Internet.

Examples are: online banking, news, shopping, social media networks, e-mail etc.

This services done online gives an avenue in which subscribers can communicate with one another via exchanging e- mail messages or through online conferences or forums.

Learn more from

https://brainly.com/question/9930336

1.What is the output of the following program? [10 Marks]namespace ConsoleApp1{class Program{static void Main(string[] args){int i, j;int [,] A = new int[5,5];for (i = 0; i < 5; ++i){for (j = 0; j < 4; ++j){A[i,j] = i*j;}}for (i = 0; i < 5; ++i){for (j = 0; j < 4; ++j){if (i < 5){A[j, i] = A[i, j];}elsebreak;Console.Write(A[i, j] + " ");}Console.WriteLine();}Console.ReadLine();}}}

Answers

The program outputs the following rectangular array:

0 0 0 0

0 1  2 3

0 2 4 6

0 3 6 9

0 4 8 12

This is the correctly formatted C# program:

namespace ConsoleApp1{

   class Program

   {

       static void Main(string[] args)

       {

           int i, j;    // declare index variables used to iterate over the array A

           int [,] A = new int[5,5];   // create a 5 by 5 array

           

           /* Iterate over the array with the index variables i and j

               and initialize each location A[i, j] with the product

               of i and j. */  

           for (i = 0; i < 5; ++i)

           {

               for (j = 0; j < 4; ++j)

               {

                   A[i, j] = i*j;

               }

           }

           

           /* Iterate over the array again. This time, swap locations

               A[i, j] with A[j, i] */

           for (i = 0; i < 5; ++i)

           {

               for (j = 0; j < 4; ++j)

               {

                   if (i < 5)

                   {

                       A[j, i] = A[i, j];

                   }

                   else

                       break;

                   

                   // display the current location A[i, j]

                   Console.Write(A[i, j] + " ");

                   

               }

               /* print a newline to prepare for the next line of printing

                   which corresponds to the next column i */

               Console.WriteLine();

                // pause and wait for user keypress before continuing

               Console.ReadLine();

               

               }

           }

       }

   }

When executed, this program simply prints a rectangular array like so;

0 0 0 0

0 1  2 3

0 2 4 6

0 3 6 9

0 4 8 12

Learn more about predicting program output here: https://brainly.com/question/20259194

NO LINKS Please
Based on the information presented in the article, do you think that schools should invest in technology to improve academic outcomes for their students? Explain.

Answers

Answer:

ok po majsbejwwlaodhd susbvskwmoskwaubsbsiwnwis sisbsbsb is a good 2AM 2AM 2nd edition 2and I am a nanny 2and and u 2122feet 225feet to see how 2nd grade are you 22feet but not yet a lot more because it has alot of people who is the key to the girl in your life of your own life NATO is the most powerful and I was a great person in a sentence and a very nice meeting you had to do nothing babe and she had an affair in a way maker that I am in a relationship with u are in bed now babe and my mom and my dad a lot of my cousn and my kids in the morning and my kids were in the same boat and 5PM was the first of my two 5th grade boys in school to be with u at work now babe on my messenger then the Lord was in bed and she had no probs and no babe to be in Philippines and my kids had to be a good 58 and a little more because I was so happy bday sis had a lot to say about the girl and she was busy with me I will be having dinner with the kids on me sometime next time because she is very good at home now babe ruth is it ur wife is still single forever ni mama ne is a good girl also a big part in her to be the center babe if I will be a good person and I think they 5th 5 and 5 and u have a lot more to lose than me if u have a lot

Answer:

Yes because using technology in classrooms has the potential to create increased student motivation, increased social interactions, positive outcomes, enhanced student learning, and enhanced student engagement.

In a computer network, a _____ server is a specialized server that manages resources for the network.

Answers

Answer:

Directory Server

Explanation:

Maps network resources, such as files and user accounts, to network addresses. This allows the resources on a network to be discoverable.

How to test nativeelement in angular.

Answers

Answer:

Dim or Overly Bright Lights. ...

Dead Battery. ...

Slow or Malfunctioning Accessories. ...

Trouble Starting or Frequent Stalling. ...

Growling or Whining Noises. ...

Smell of Burning Rubber or Wires. ...

Battery Warning Light on Dash.

Explanation:

make sure you check

What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?

non-player characters (NPCs)

artificial intelligence (AI)

avatar

roguelikes

Answers

Answer:

AI - Artificial Intelligence

Explanation:

If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect three function call direct continuous

Answers

If, in a recursive solution, function A calls function B which calls function C, this is called Indirect recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

https://brainly.com/question/3169485?referrer=searchResults

Other Questions
By how many millions of dollars did U.S. investment in foreign countries The hole for a support needs to be 4 feet deep. It is currently 2 feet 9 inches deep. How much deepermust the hole be? Use pencil and paper. Show two ways to solve this problem. Use the conversion12 inchesfactor1 footThe hole needs to be inches deeper.Enter your answer in the answer box and then click Check AnswerAll parts showingCAReview progressQuestionsBackType here to searchOT Find the median for the following group of data items.36, 33, 32, 31, 37, 34, 30, 32 1. Which phrase in Passage 1 tells us the most about Lonnie's character and how heapproaches new experiences?A. "When Celeste had emailed to ask him to meet her train, his first instinct had been tosay no." (paragraph 1)B. "So here he was, waiting." (paragraph 1)C. "Instead, he was waiting for someone he hadn't seen in years." (paragraph 1)D. Plus, all his friends had gone to this awesome film festival downtown, and he'dto skip it. (paragraph 1) helpppppppppppppppppppppppppppppppppppp An entrepreneur is considering the purchase of a coin-operated laundry. The current owner claims that over the past 5 years, the mean daily revenue was $6750 with a population standard deviation of $265. A sample of randomly selected 30 days reveals a daily mean revenue of $6280. If you were to test the null hypothesis that the daily mean revenue was $6750, which test would you use?. Why did the judges accuse Joan of being a witch and a blasphemer crude oil is a liquid kind of___________what is the answer? A store sells 5 T-shirts for $48.05. What is the unit cost per T-shirt? heeeeeyyyyy someone can aswer plz? Thx Help me plz I really need help Blake delivers food for Uber eats. He charges customers a $3 delivery fee plus $0.25 per mile. Write a function that can be used to find t, the total Blake would charge if he delivered food that is m miles away What are the ideas of equality found in the Bill of Rights? How did the Bill of Rights establish equality?What are the ideas of justice found in the Bill of Rights? How did the Bill of Rights establish justice? question below................ help its due monday number 12 Which equation has a value less than 2,175? 1 x 2,175 = ________ 2 x 2,175 = ________ two halves x 2,175 = ________ one half x 2,175 = ________ 3x-4y=3x4y=\,\,99-5x+4y=5x+4y=\,\,-2323 Acidity can be measured on the ______ scale. Order from greatest to least: 3.008,3.825,3.09,3.18 The main term: Chronic hepatitis