1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

A filing system in which an intermediary source of reference, such as a file card, must be consulted to locate specific files is

called a(n) _____________ system.
a. shelf filing

b. direct filing

c. indirect filing

d. shingling
Computers and Technology
2 answers:
Rufina [12.5K]3 years ago
8 0

Answer:

c. indirect filing

Explanation:

A filing system in which an intermediary source of reference, such as a file card, must be consulted to locate specific files is called an indirect filing. This system is considered "indirect" because it requires an intermediate step, which is that of the file card. When archiving files online, the intermediate step is often a code that must be referenced before gaining access to a file.

Jet001 [13]3 years ago
7 0

correct me if i'm wrong and forgive me if i am wrong but it may or may not be A.

You might be interested in
FIRST TO Answer for free brainlest. GOG GOGOGO
oksano4ka [1.4K]

Answer:

ME

Explanation:

5 0
2 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
Just answer in five-line. Question:
Eddi Din [679]

Answer:

It is a half-duplex serial transmission mode, and this can be provided through the RS-485 two wired electrical interface. And this can be connected to the ethernet if required, connect to the LAN, and finally transmitting the video footage to all the screens. And the two reasons are:

1. Noiseless

2. Allows around 32 receivers.

Explanation:

Please check the answer.

3 0
3 years ago
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
3 years ago
Choose the correct term to complete the sentence
notka56 [123]

Answer:

popleft

Explanation:

5 0
3 years ago
Other questions:
  • You are attempting to update a Windows image that has been mounted under C:\mount on your local system. What command must you us
    13·1 answer
  • What is an effective way to display calculations in a Word document
    7·2 answers
  • Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
    8·1 answer
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • What are the two types of lighting?
    7·2 answers
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • Fill this blanks with the given words​
    6·1 answer
  • What is the difference between a LAN and WAN? how do these two networks interact?​
    14·1 answer
  • Question #1
    13·2 answers
  • as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!