1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
7

Lets assume we are writing a system to backup a list of transactions: class Transaction 1 String TransactioniD: Date TranactionT

ime: Account account: enum Type(ADD, EDIT, ADMIN): Type type: Transactions are constantly added to the system as quickly as possible (hundreds a minute) and occasionally, your system will need to retrieve them but only if there is a error with the main system (once or twice per million transactions). Additionally, transactions may not come in order as some transactions take longer to process. What is the best way to store the transactions in your system? a) as a list sorted by transactionID b) As an unsorted list of transactions c) as a list sorted by transaction Time d) As a list sorted by a new systemiD int since they transactions are not coming into our system in order of time. Activate Windows Go to Settings to activate Windo e) As a 2d list with the columns sorted by Account and the rows sorted by date
Computers and Technology
1 answer:
zhannawk [14.2K]3 years ago
6 0

Answer:

The answer is "Option d"

Explanation:

In this question, the easiest way that will save the payment on your database in such a process ID-sorting list would be to mark a payment, that's been recorded mostly on the database whenever this payment became used serial number is not transaction ID, and the wrong choice can be defined as follows:

  • In choice a, It is wrong because it may be processed, however, payments aren't entered through our process, which does not help remove older.
  • In choice b, the unordered list would not enable any transaction to only be retrieved, that's why it is wrong.
  • In choice c, it will not be helpful because the includes video is either begin or complete the payment, it will not be helpful to hold it with transaction time.
  • In choice e, this approach won't help to identify the payments since one date will have a lot of payments over a certain account.
You might be interested in
You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
Elena L [17]

Answer:

step 1: sign up for an intune account

step 2: create intune user accounts

step 3: define intune policies

step 4: enroll mobile devices

step 5: link mobile devices to users.

Explanation:

The Microsoft Windows intune is a Microsoft cloud-based service that provides a central cloud service for all subscribed and linked devices. It provides a sense of security of data resource and tracking of device activities.

A company subscribes to intune to allow the use of both cooperate and BYOD (bring your own device to work), to access data. First, the administrator sign up and create the intune account, then defined the intune security policies. Then it enrolls the individual devices and links them to their respective users.

3 0
3 years ago
3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
never [62]

Answer:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char num1[20],num2[20],num3[20],num4[20];

//Checks where the conversion of string to long stops and is required by strtol

char *ptr;

//Stores the converted number string into long.

long result_num1,result_num2,result_num3,result_num4;

//Prompt to enter all the four hexadecimal numbers.

printf("Enter the first hexadecimal number: ");

scanf("%s",num1);

printf("Enter the second hexadecimal number: ");

scanf("%s",num2);

printf("Enter the third hexadecimal number: ");

scanf("%s",num3);

printf("Enter the fourth hexadecimal number: ");

scanf("%s",num4);

//Converting the hexadecimal numbers into long using strtol() function with base 16 for hexadecimal.

result_num1 = strtol(num1,&ptr,16);

result_num2 = strtol(num2,&ptr,16);

result_num3 = strtol(num3,&ptr,16);

result_num4 = strtol(num4,&ptr,16);

//Casting the long to unsigned chars.

unsigned char numb1 = (unsigned char)result_num1;

unsigned char numb2 = (unsigned char)result_num2;

unsigned char numb3 = (unsigned char)result_num3;

unsigned char numb4 = (unsigned char)result_num4;

//Applying the boolean operation on unsigned chars and storing the resultant value in result.

unsigned char result = ((numb1&numb2)|numb3)^numb4;

//Printing the result in capital hex ("%X" take care of this).

printf("%X",result);

return 0;

}

Code OUTPUT

Enter the first hexadecimal number: 1 Enter the second hexadecimal number:2

Enter the third hexadecimal number: 3 Enter the fourth hexadecimal number: 4 Resultant Value: 7 Process returned o (0×0) execution time : 3.076 s

Press any key to continue

4 0
3 years ago
What are some example of popular music for teenagers
Stells [14]

Answer: Hip Hop, Rap, Alternative, Pop Rock

Explanation:

8 0
3 years ago
Read 2 more answers
6 external parts or peripherals of a computer system and identify which are output and which are input devices.
djverab [1.8K]
A computer peripheral, or peripheral device, is an external object that provides input and output for the computer. Some common input devices include:

keyboard
mouse
touch screen
pen tablet
joystick
MIDI keyboard
scanner
digital camera
microphone
<span>
Some common Output Devices : 
</span>monitor
projector
TV screen
printer
plotter
<span>speakers</span>
3 0
3 years ago
Isabel and Jared work for the same company but in different departments. Their workstations are both part of the company's compu
Nina [5.8K]

Network access limitations implemented from their local IT Department

3 0
3 years ago
Read 2 more answers
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • Cover page styles in the cover page gallery match the preformatted styles in word, making it easier to create a coherent style b
    5·1 answer
  • The top pane of the wireshark window, referred to as the __________, contains all of the packets that wireshark has captured, in
    5·1 answer
  • 20 Points and Brainliest 5. What is the difference between a real-time light and a shadow map? Which of the two would you use if
    15·1 answer
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • Why we called COBOL as a professional language and not ataught language.(
    13·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.
    14·1 answer
  • To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
    14·2 answers
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!