1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
3 years ago
12

In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place,

this is called _____ processing.
Computers and Technology
1 answer:
slavikrds [6]3 years ago
7 0

Answer: real time

Explanation:

In real time processing similar to real time operating system, all the processing and the actions are done at real time i.e at the time when a particular event or an action occurs.

In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called real time processing.

You might be interested in
Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
Dafna11 [192]

NumPy is the key scientific Python computing package. This makes things simpler to display large numbers of data in advanced maths and other operating types. These operations are typically extra efficient and less code-based than that of the built-in sequences in Python are possible, and the further discussion can be defined as follows:

  • It offers a multidimensional array object, as do variations such as masks and matrixes that can be used for different mathematical activities.
  • It is an external library of basic levels in Python used for complex mathematical procedures.
  • It has integrated functions that <em><u>convert various algorithms into arrays</u></em>.

So, the answer is "NumPy".

Learn more:

brainly.com/question/24817911

6 0
2 years ago
1. Why is it important to compare features of a computer before making a purchase?
Ede4ka [16]
1. Because you can get the same features for a better price
2. CPU, GPU, RAM, Storage, OS, etc.
7 0
3 years ago
Read 2 more answers
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
Part of metacognition involves making a plan to address <br> .
Ray Of Light [21]

Answer:

weaknesses

Explanation:

hope this helps :)

8 0
3 years ago
Read 2 more answers
Other questions:
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • The device used to connect a network to the internet is called a
    7·1 answer
  • Dylan, an interior designer, has sketched out a layout for a client's living room. He wants the client's approval of the layout
    11·2 answers
  • The building blocks of coded language are called
    11·2 answers
  • You’re configuring a Web-based intranet application on the WebApp server, which is a domain member. Users authenticate to the We
    13·1 answer
  • What is the difference between the Internet and the World Wide Web? Explain in your own words.
    13·2 answers
  • After assembling a computer system the very first software to be installed is​
    10·2 answers
  • Consider the following code.
    7·2 answers
  • What can be used to help diagnose and fix network connection problems?
    8·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!