1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
2 years ago
5

What are the characteristics of: Master file Transaction file Reference file

Computers and Technology
1 answer:
IRISSAK [1]2 years ago
7 0
<h3>Master File :-</h3>
  • Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

<h3>Transaction File :-</h3>
  • Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

<h3>Reference File :-</h3>
  • Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information.
  • Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

<h3>Hope it helps you!</h3>
You might be interested in
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
4 years ago
Read 2 more answers
Suppose you wanted to save your master audio recording in an uncompressed format. Which of the following audio file formats shou
faust18 [17]

Answer:

MP3

Explanation:

It is MP3 because it is the best audio to use for audio input

5 0
3 years ago
Read 2 more answers
Diana is running a successful remarketing campaign. She wants to expand her reach with other targeting options. While creating a
mart [117]

Answer:

B: Audience interest around different topics.

Explanation:

When using Google Ads, and the main aim is to create a campaign for a particular marketing activity, there are several options that makes Google Ads the ideal application for this purpose. However, choosing similar audiences under the targeting option is simply telling google to find users or audiences that are interested in the different topics, but are in one way or the other connected to your marketing activity or campaign.

8 0
4 years ago
Which term represents a computational instruction stored in computer memory? A. operator B. opcode C. operand D. command
STALIN [3.7K]

Answer:

B - Opcode

Explanation:

A computational instruction with operands is a command so computational instructions is just an opcode.

5 0
3 years ago
Read 2 more answers
Which components of an information system most directly affected by the study of computer security? Which are most commonly asso
Masja [62]

Answer:

Hardware, Software, People, Data, Network, and Procedures are among the six components which are directly affected by the study of the security of the computer.

Explanation:

  • Humans would have been more influenced by network security analysis. Individuals could be the weakest point in the cyber-security system of an organization.
  • Software and hardware are those components generally associated with the study of the security of the computer. Networking, however, seems to be the component that has created much about the need for greater information and computer security.

Therefore, those six components are the right answer.

5 0
3 years ago
Other questions:
  • Type the correct answer in the box. Spell the word correctly.
    14·2 answers
  • . What physical characteristic does a retinal scan biometric device measure?
    8·1 answer
  • Which of the following describes the operating system
    5·1 answer
  • 2.1 Changes in which factors could cause aggregate demand to shift from AD to AD1? What could happen to the unemployment rate? W
    8·1 answer
  • What is internal storage device
    14·1 answer
  • Which of these is not a feature of a CPU?<br><br>Multicore<br>64-Bit Processing<br>L1 Cache<br>DDR
    15·2 answers
  • Write a Python function prime_generator that takes as argument positive integers s and e (where s
    11·1 answer
  • A state university locks in costs for a student once a student starts attending the university. The total cost is $24,500. A stu
    10·2 answers
  • What is the organizational management practices on planning during a pandemic like corona virus.
    5·1 answer
  • Phân tích 5 phương hướng nhiệm vụ phát triển nông -lâm -ngư nghiệp ở nước ta hiện nay
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!