1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
4 years ago
8

"When a large data file needs to be processed in ascending or descending order based on a particular field, the most efficient a

pproach is usually to store and access records based on their logical order."
Computers and Technology
1 answer:
Alona [7]4 years ago
7 0

Answer:

Yes

Explanation:

For example, We need to write down the names of student in a school for survey purposes, rather than tell everyone to write their names on a sheet of paper and submit, we can instruct that names be written according to their classes and then written on the class sheets alphabetically.

Logically names will be written according to the classes from Class 1 - 10, then on the class sheet alphabetically from A - Z. its better represented that way for easy understanding and better collation and interpretation of data.

You might be interested in
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
2Discuss the difference between overriding and overloading. (This is a very common interview question in programming)
nordsb [41]

Explanation:

Following are the difference between overriding and overloading

(1) Method overloading means method having same name but different parameter or method signature Whereas  Method overriding means method having same name and same parameter or signature.

(2) Method overloading is achieved the compile time Polymorphism whereas Method overriding is achieved the Run time Polymorphism .

(3 ) In method overriding child class have facility to provide a specific implementation of a method which is already defined by parent class method whereas there is no such facility is available in method overloading

(4 )Programming structure of method overloading

class test

{

 void fun()

{

// statement

}

void fun(int b)

{

// statement

}

}

In this fun() method name is same but different signature I.e void fun() and void fun(int a);  

Programming structure of method overriding  

class parent

{

  void fun()

{

// statement in parent class

}

}

class child extends test

{

void fun()

{

// override the statement in child class

}

}

In this fun() method have same name and same signature in both class  

7 0
3 years ago
Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) R
Alisiya [41]

Answer:

Physical layer

Explanation:

The physical layer is responsible for the physical cable or wireless connection.

6 0
3 years ago
The idea that the number of transistors on integrated circuits doubles approximately every two years is known as Moore's Law.
igor_vitrenko [27]
False<-------------------
7 0
4 years ago
Utility software is also known as _____​
stiks02 [169]

Answer:

Utility programs

7 0
4 years ago
Other questions:
  • What feature did the 32X add to the Sega Genesis?
    13·1 answer
  • Which protocol would you utilize to upload files to a web server?
    14·1 answer
  • Which major and minor keys have no sharps or flats apex?
    5·2 answers
  • Tim is trying to explain to his aunt how her computer works, but she does not understand what a CPU does. Which description will
    6·2 answers
  • 7.6 LAB: Checker for integer string Forms often allow a user to enter an integer. Write a program that takes in a string represe
    12·1 answer
  • Drag the correct type of update to its definition.
    5·1 answer
  • A speech why friends are important 2 min​
    11·1 answer
  • Explain how devices on a lan access resources in a small to medium-sized business network.
    15·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!