1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
2 years ago
10

In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place,

this is called ________ processing.
A) Direct
B) Batch
C) Real time
D) Immediat
Computers and Technology
1 answer:
neonofarm [45]2 years ago
6 0

Answer:

Real time

Explanation:

Real-time data processing is the execution of data in a short time period, providing near-instantaneous output. The processing is done as the data is inputted, so it needs a continuous stream of input data in order to provide a continuous output.

You might be interested in
Which type of basic building blocks (constructs) is the following algorithm?
Ksju [112]

Answer:

Sequence

Explanation:

6 0
2 years ago
A credit card can be a good way to pay when yo can’t afford something for a very long time? True or false
scoray [572]
False. Credit cards usually have high interest rates if you don’t pay them off right away. The only way to benefit from a credit card is if you pay it off by the due date monthly.
7 0
2 years ago
* Discuss how an individual’s access to a wide range of online services affects their ability to operate safely in the digital w
ehidna [41]
Honestly, no online service is safe anymore these days...People and even the government can get hacked easily with today's technology.You can search someone easily on websites like Google or Facebook and even read someone's tweets on Twitter because their account is not private. But what's the point of saying private if they can easily get hacked by someone. There is no safety these days that is why you have to be careful with what you post on the internet in general.In these times people have to be cautious to not slip and fall off the iceberg surrounded by sharks.
4 0
3 years ago
What is the primary way to access applications in Windows 10
REY [17]

Try using cortana, it is usally preloaded on the computer.

Its close the windows start menu.

4 0
3 years ago
How can file signature in headers be used to reinforce the identification of files with different extension names in forensic au
lions [1.4K]

Answer:

A file header is a 'signature' placed at the beginning of a file, so the operating system and other software know what to do with the following contents. Many electronic discovery applications will use the file header as a means to verify file types.

Explanation:

7 0
2 years ago
Other questions:
  • I made a binary sentence if you answer you get 75 points heres the code: 01101001 01100110 00100000 01111001 01101111 01110101 0
    9·2 answers
  • Which of the following is not a method for opening Word software?
    8·2 answers
  • write the cell address for the following 1. First row and first column 2.First column and last row. 3. 10th column and 19th row.
    5·1 answer
  • Which is the most efficient way to include a space after each paragraph
    10·2 answers
  • What is a orogram to block access to websites
    15·1 answer
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
    7·1 answer
  • Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
    11·1 answer
  • If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only commu
    8·1 answer
  • Edge is a video game featuring interactive extreme sports. The graphics used in the game are protected by
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!