1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
4 years ago
12

In a file-oriented information system, a work file ____. stores relatively permanent data about an entity is created and saved f

or backup and recovery purposes stores records that contain day-to-day business and operational data is a temporary file created by an information system for a single task
Computers and Technology
1 answer:
zhenek [66]4 years ago
3 0

Answer:

D. is a temporary file created by an information system for a single task

(the options are given in the question and correctly provided in ask for detail section)

Explanation:

File oriented information system is the system that is used to store data temporarily. A file has been created for each new user that stores information about client for small piece of time in database. The files does not share information with each other as each independent user creates his own files. The data in this file is deleted after specific time interval.

A work file is a file that stores all the above mentioned information for single time. This is a temporary file.

You might be interested in
What field would you use to store a value from another table?
Levart [38]

Answer:

A. Lookup

Explanation:

You would use the Lookup field to store a value from another table.

7 0
3 years ago
Can someone please answer this? It isn't Insert
enyata [817]

Answer:

The answer for this question is b Add to

3 0
3 years ago
I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
irina1246 [14]

Answer:

Slide selection

Title slide

Content wise slides

Little short animations

Conclusion slide

Thank you slide

Dont forget to use Times New Roman font as using this font makes people easier to understand the concept.

Give attractive headings

Give 2 minutes per each slide for explanation

Make this presentation very good with confidence and don't forget to include tactful facts

Dont get a panic attack Haha

4 0
3 years ago
Read 2 more answers
Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). Th
Alekssandra [29.7K]

Answer:

Answer is provided in the explanation section

Explanation:

Given data:

Bandwidth of link = 10* 106 bps

Length of packet = 12* 103 bits

Distance of link = 40 * 103m

Transmission Speed = 3 * 108 meters per second  

Formulas:

Transmission Delay = data size / bandwidth = (L /B) second

Propagation Delay = distance/transmission speed = d/s

Solution:

Transmission Delay = (12* 103 bits) / (10* 106 bps) = 0.0012 s = 1.2 millisecond

Propagation Delay = (40 * 103 meters)/ (3 * 108mps) = 0.000133 = 0.13 millisecond

4 0
3 years ago
Explain the concept of scalability. How would you respond?
pantera1 [17]

Answer:

In computer science, scalability is the ability of an application or product that could be software or software to continue responding well when its context is increased in volume or size to meet the user demand. Typically, when a product becomes aging or the context demands a rescaling to a larger size or volume, if the product is prepared to respond to this demand, then it's called a scalable product.

6 0
3 years ago
Other questions:
  • In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
    12·1 answer
  • The computer mouse is used to
    7·1 answer
  • Which keyword should return web pages about guitars and about guitarists?
    11·1 answer
  • Advancements in nuclear science have led to technological advances which are both harmful and beneficial. Which would be conside
    15·1 answer
  • Block elements start a new line when rendering? (true or false)
    7·1 answer
  • Implement a program called genes.py that does the following: a. Reads a DNA sequence t as command-line argument b. Reads strings
    9·1 answer
  • B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
    5·1 answer
  • When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
    7·1 answer
  • Pls answer 10 points ​
    10·2 answers
  • Authenticating information can be something a user knows, like a password; something a user has, like a smart card; or something
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!