Examples of using Data manipulation in English and their translations into French
{-}
-
Official
-
Colloquial
personnel availability, evaluation criteria and any data manipulation required for reporting purposes.
Its originality in relation to other available solutions lies in the fact that Redis includes a set of data manipulation functions that are primarily orientated toward handling stored character strings,
concern about the poorest segment of the population and the risks of data manipulation, making better quantitative and qualitative knowledge of extreme poverty necessary.
Remote execution, when all data manipulations are made on protected servers,
geographical data manipulations and stacking several predictive layers.
to carry out data manipulations.
Scan-in barcodes for less data manipulation.
Key tools and software for ease of data manipulation.
Qohash provides enterprise-grade cybersecurity solutions designed to detect data manipulation attacks.
High reliance on data manipulation in the reporting and reconciliation process;
Signal Processing nCode Fundamentals is included for basic data manipulation, analysis and visualization.
Cocoa provides a pervasive data manipulation method called key-value coding KVC.
Advanced users can use VBA to write rich solutions with advanced data manipulation and user control.
Pandas is a software library written for the Python programming language for data manipulation and analysis.
This is a modular system enabling visualization and data manipulation along with frequency spectrum analysis
allows a client to perform data manipulation operations on one or more geographic features.
Thus, the maintenance of the system as well as data manipulation and publication would be carried out in the new computer environment.
has privileges to create a schema and perform data manipulation language operations.
formerly known as kettle, is an open source ETL tool used to design and execute data manipulation and transformation operations.
designing computer systems(databases and Big Data manipulation), network security