Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 16MCQ
To determine
Identify the advantage of physical address pointer.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Which statement is NOT correct?a. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.b. Indexed random files use disk storage space efficiently.c. Indexed random files are efficient when processing a large portion of a file at one time.d. Indexed random files are easy to maintain in terms of adding records.
Which statement is true about a hashing structure? a. The same address could be calculated for two records. b. Storage space is used efficiently. c. Records cannot be accessed rapidly. d. A separate index is required.
Explain the GPC backup technique. Is it used for sequential files or direct access techniques? Explain.
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Name the major subsystems of the revenue cycle.Ch. 2 - Prob. 6RQCh. 2 - Name the two types of journals.Ch. 2 - Distinguish between a general journal and journal...Ch. 2 - Name the two types of ledgers.Ch. 2 - Prob. 10RQ
Ch. 2 - Prob. 11RQCh. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Distinguish between batch and real-time...Ch. 2 - Prob. 21RQCh. 2 - Prob. 22RQCh. 2 - Prob. 23RQCh. 2 - Prob. 24RQCh. 2 - Prob. 25RQCh. 2 - Prob. 26RQCh. 2 - Prob. 27RQCh. 2 - Prob. 28RQCh. 2 - Prob. 29RQCh. 2 - Prob. 30RQCh. 2 - Prob. 31RQCh. 2 - Prob. 32RQCh. 2 - Prob. 33RQCh. 2 - Prob. 34RQCh. 2 - Prob. 35RQCh. 2 - Prob. 36RQCh. 2 - Prob. 37RQCh. 2 - Prob. 38RQCh. 2 - Discuss the flow of cash through the transaction...Ch. 2 - Explain whether the cost accounting system...Ch. 2 - Prob. 3DQCh. 2 - Prob. 4DQCh. 2 - Would the writing down of obsolete inventory be...Ch. 2 - Are both registers and special journals necessary?Ch. 2 - Discuss the relationship between the balance in...Ch. 2 - Prob. 8DQCh. 2 - Prob. 9DQCh. 2 - Are large batch sizes preferable to small batch...Ch. 2 - Prob. 11DQCh. 2 - Prob. 12DQCh. 2 - Prob. 13DQCh. 2 - Prob. 14DQCh. 2 - Prob. 15DQCh. 2 - Prob. 16DQCh. 2 - Prob. 17DQCh. 2 - Prob. 18DQCh. 2 - Prob. 19DQCh. 2 - Prob. 1MCQCh. 2 - Prob. 2MCQCh. 2 - Prob. 3MCQCh. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Which of the following is NOT a true statement? a....Ch. 2 - Which of the following is true of the relationship...Ch. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - The production subsystem of the conversion cycle...Ch. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 1PCh. 2 - Prob. 2PCh. 2 - Prob. 3PCh. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Prob. 7PCh. 2 - Prob. 8PCh. 2 - Prob. 9PCh. 2 - Prob. 10PCh. 2 - Prob. 11PCh. 2 - Prob. 12PCh. 2 - Prob. 13PCh. 2 - Prob. 14PCh. 2 - Prob. 15PCh. 2 - Prob. 16PCh. 2 - Prob. 17PCh. 2 - Prob. 18PCh. 2 - Prob. 19PCh. 2 - The following describes the payroll procedures for...Ch. 2 - Prob. 21PCh. 2 - Prob. 22PCh. 2 - Prob. 23PCh. 2 - Prob. 24PCh. 2 - Prob. 25PCh. 2 - Prob. 26PCh. 2 - CODING SCHEME Devise a coding scheme using block...
Knowledge Booster
Similar questions
- Distinguish between a database lockout and a deadlock.arrow_forwardWhich of the following statements about the client-server model is correct?a. It is best suited to the token ring topology because the random-access method this topology uses detects data collisions.b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and prevents data loss during transmissions.d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node rather than only a single record.e. It is not used in conjunction with either the bus or ring topologies.arrow_forwardIn a relational database, what is a foreign key? a) A key that uniquely identifies a record within its table b) A key that is used to speed up searches c) A key used to link two tables together d) A key that can accept null values\arrow_forward
- Which statement is NOT correct? The indexed sequential access methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few inser- tions or deletions.arrow_forwardWhich of the following is NOT a database management task?a. retrievalb. storagec. summarizationd. deletionarrow_forwardThe advantages to using a partitioned database approach include all of the following EXCEPT a. the possibility for the deadlock phenomenon is reduced.b. user control is increased.c. transaction processing time is decreased.d. the potential for wide-scale disaster is reduced.e. these are all advantages of partitioned databases.arrow_forward
- In one sentence, what does updating a master file record involve?arrow_forwardIn a hashing structurea. two records can be stored at the same address.b. pointers are used to indicate the location of all records.c. pointers are used to indicate location of a record with the same address as another record.d. all locations on the disk are used for record storage.arrow_forwardWhat are some advantages of using a software system versus recording transactions manually (by hand)?arrow_forward
- Replicated databases create considerable data redundancy, which is in conflict with the database concept. Explain the justification of this approach.arrow_forwardFor each of the following file processing operations, indicate whether a sequential file, indexed random file, virtual storage access method, hashing, or pointer structure would work best. You may choose as many as you wish for each step. Also indicate which would perform the least optimally. a. Retrieve a record from the file based on its primary key value. b. Update a record in the file. c. Read a complete file of records. d. Find the next record in a file. e. Insert a record into a file. f. Delete a record from a file. g. Scan a file for records with secondary keys.arrow_forwardWhat is a flat-file system?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,