1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
2 years ago
5

What are the characteristics of: Master file Transaction file Reference file

Computers and Technology
1 answer:
IRISSAK [1]2 years ago
7 0
<h3>Master File :-</h3>
  • Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

<h3>Transaction File :-</h3>
  • Fast performance with a rapid response is critical. Organisations rely heavily on their TPS with failure possibly stopping business.

<h3>Reference File :-</h3>
  • Information in one drawing can be overlaid on a different drawing, eliminating the need to redraw information.
  • Proper use of reference files will result in significant time savings and greater coordination of drawings.

Explanation:

<h3>Hope it helps you!</h3>
You might be interested in
PLEASE HELP
lesantik [10]

Answer:

follow me pls tank you

Explanation:

im very happy if you follow me

3 0
3 years ago
What is the highest payed country
DiKsa [7]
I think its New Zealand 
4 0
4 years ago
Early photographers take to work with what in order to produce photographs? (Btw this is photography, it just isn't a subject in
Kruka [31]
1, they used to use chemicals.
4 0
3 years ago
A large corporation uses:<br>LAN<br>WAN<br>Wireless network<br>Ethernet connection​
Katen [24]

Answer:

Probably would use LAN

Explanation:

Schools use LAN to connect students to their networks, so it would make sense for them to use LAN for offices. They could use ethernet if all their PCs are hard wired in, though.

3 0
4 years ago
Read 2 more answers
Who created identity theft ? &amp; what is the content of it
sergij07 [2.7K]

Answer:

The term identity theft was coined in 1964

Explanation:

5 0
4 years ago
Other questions:
  • Which of the following sentences is written in the active voice
    12·2 answers
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • We say that a sequence of numbers is a palindrome if it is read the same backward or forward. For example, the sequence: 6, 15,
    11·1 answer
  • Select the term being defined. This term is also called live, or hot, which means that a voltage is present and it can cause an
    12·2 answers
  • Write a program that reads in investment amount, annual interest rate, and number of years, and displays the future investment v
    5·1 answer
  • What is the real meaning of hack and crack?
    6·1 answer
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • To make sound decisions about information security, management must be informed about the various threats facing the organizatio
    10·1 answer
  • What is the best description of a raster image?
    10·1 answer
  • ______ controls are information security safeguards that focus on the application of modern technologies, systems, and processes
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!