The control of data from acquisition and input through
processing, output, and storage. In microcomputers, hardware manages data by
gathering it, moving it, and following instructions to process it. The operating
system manages the hardware and ensures that the parts of the system work in
harmony so that data is stored safely and accurately. Application programs
manage data by receiving and processing input according to the user’s commands,
and sending results to an output device or to disk storage. The user also is
responsible for data management by acquiring data, labeling and organizing
disks, backing up data, archiving files, and removing unneeded material from the
hard disk.
Home »
Computers-Basics
» What is data management?
What is data management?
PMA08:59
Categories: Computers-Basics
Related Posts:
What is memory management? In operating systems for personal computers, procedures for optimizing the use of RAM (random access memory). These procedures include selectively storing data, monitoring it carefully, and freeing memory when the data is … Read More
Whst is Password Authentication Protocol Acronym for Password Authentication Protocol. A method for verifying the identity of a user attempting to log on to a Point-to-Point Protocol (PPP) server. PAP is used if a more rigorous method, such as the Challenge Hand… Read More
What is MIME? Acronym for Multipurpose Internet Mail Extensions. A protocol widely used on the Internet that extends the SMTP Simple Mail Transfer Protocol to permit data, such as video, sound, and binary files, to be transmitted by In… Read More
What is data management? The control of data from acquisition and input through processing, output, and storage. In microcomputers, hardware manages data by gathering it, moving it, and following instructions to process it. The operating system m… Read More
What is Internet domain? Internet Domains In database design and management, the set of valid values for a given attribute. For example, the domain for the attribute AREA-CODE might be the list of all valid three-digit numeric telephone are… Read More
HTTP status codes Three-digit codes sent by an HTTP server that indicate the results of a request for data. Codes beginning with 1 respond to requests that the client may not have finished sending; with 2, successful requests; with 3, furt… Read More
what is X Series for Network Communications A set of recommendations adopted by the International Telecommunication Union Telecommunication Standardization Sector ITU-T, formerly the CCITT, and International Organization for Standardization ISO for standardizing eq… Read More
what is file fragmentation? The breaking apart of files as they are stored by the operating system into small, separate segments on disk. The condition is a natural consequence of enlarging files and saving them on a crowded disk that no longer conta… Read More
What is macro assembler? An assembler that can perform macro substitution and expansion. The programmer can define a macro that consists of several statements and then use the macro name later in the program, thus avoiding having to rewrite the s… Read More
what is three-tier client/server? A client/server architecture in which software systems are structured into three tiers or layers: the user interface layer, the business logic layer, and the database layer. Layers may have one or more components. For exa… Read More
whiat is fuzzy logic? A form of logic used in some expert systems and other artificial-intelligence applications in which variables can have degrees of truthfulness or falsehood represented by a range of values between 1-true and 0 -fals… Read More
What is ini file? ini file:-Short for initialization file, a text file containing information about the initial configuration of Windows and Windows-based applications, such as default settings for fonts, margins, and line spacing. Two ini… Read More
.NET Framework A platform for building, deploying, and running XML Web services and applications. It provides a highly productive, standards-based, multilanguage environment for integrating existing investments with next generation appl… Read More
What is timing attack? An attack on a cryptographic system that exploits the fact that different cryptographic operations take slightly different amounts of time to process. The attacker exploits these slight time differences by carefully measu… Read More
What is GPS receiver? A device that includes an antenna, a radio receiver, and a processor for use with the worldwide GPS -Global Positioning System. A GPS receiver uses position and time information from four GPS satellites to calculate preci… Read More