Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 2, Problem 16MCQ
To determine
Identify the advantage of physical address pointer.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An advantage of a physical address pointer is thata. it points directly to the actual disk storage location.b. it is easily recovered if it is inadvertently lost.c. it remains unchanged when disks are reorganized.d. all of the above are advantages of the physical address pointer.
Which statement is NOT correct?a. Indexed random files are dispersed throughout the storage device without regard for physical proximity with related records.b. Indexed random files use disk storage space efficiently.c. Indexed random files are efficient when processing a large portion of a file at one time.d. Indexed random files are easy to maintain in terms of adding records.
Which statement is true about a hashing structure? a. The same address could be calculated for two records. b. Storage space is used efficiently. c. Records cannot be accessed rapidly. d. A separate index is required.
Chapter 2 Solutions
Accounting Information Systems
Ch. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Name the major subsystems of the revenue cycle.Ch. 2 - Prob. 6RQCh. 2 - Name the two types of journals.Ch. 2 - Distinguish between a general journal and journal...Ch. 2 - Name the two types of ledgers.Ch. 2 - Prob. 10RQ
Ch. 2 - Prob. 11RQCh. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Distinguish between batch and real-time...Ch. 2 - Prob. 21RQCh. 2 - Prob. 22RQCh. 2 - Prob. 23RQCh. 2 - Prob. 24RQCh. 2 - Prob. 25RQCh. 2 - Prob. 26RQCh. 2 - Prob. 27RQCh. 2 - Prob. 28RQCh. 2 - Prob. 29RQCh. 2 - Prob. 30RQCh. 2 - Prob. 31RQCh. 2 - Prob. 32RQCh. 2 - Prob. 33RQCh. 2 - Prob. 34RQCh. 2 - Prob. 35RQCh. 2 - Prob. 36RQCh. 2 - Prob. 37RQCh. 2 - Prob. 38RQCh. 2 - Discuss the flow of cash through the transaction...Ch. 2 - Explain whether the cost accounting system...Ch. 2 - Prob. 3DQCh. 2 - Prob. 4DQCh. 2 - Would the writing down of obsolete inventory be...Ch. 2 - Are both registers and special journals necessary?Ch. 2 - Discuss the relationship between the balance in...Ch. 2 - Prob. 8DQCh. 2 - Prob. 9DQCh. 2 - Are large batch sizes preferable to small batch...Ch. 2 - Prob. 11DQCh. 2 - Prob. 12DQCh. 2 - Prob. 13DQCh. 2 - Prob. 14DQCh. 2 - Prob. 15DQCh. 2 - Prob. 16DQCh. 2 - Prob. 17DQCh. 2 - Prob. 18DQCh. 2 - Prob. 19DQCh. 2 - Prob. 1MCQCh. 2 - Prob. 2MCQCh. 2 - Prob. 3MCQCh. 2 - Prob. 4MCQCh. 2 - Prob. 5MCQCh. 2 - Prob. 6MCQCh. 2 - Which of the following is NOT a true statement? a....Ch. 2 - Which of the following is true of the relationship...Ch. 2 - Prob. 9MCQCh. 2 - Prob. 10MCQCh. 2 - Prob. 11MCQCh. 2 - Prob. 12MCQCh. 2 - Prob. 13MCQCh. 2 - Prob. 14MCQCh. 2 - Prob. 15MCQCh. 2 - Prob. 16MCQCh. 2 - Prob. 17MCQCh. 2 - Prob. 18MCQCh. 2 - Prob. 19MCQCh. 2 - The production subsystem of the conversion cycle...Ch. 2 - Prob. 21MCQCh. 2 - Prob. 22MCQCh. 2 - Prob. 1PCh. 2 - Prob. 2PCh. 2 - Prob. 3PCh. 2 - Prob. 4PCh. 2 - Prob. 5PCh. 2 - Prob. 6PCh. 2 - Prob. 7PCh. 2 - Prob. 8PCh. 2 - Prob. 9PCh. 2 - Prob. 10PCh. 2 - Prob. 11PCh. 2 - Prob. 12PCh. 2 - Prob. 13PCh. 2 - Prob. 14PCh. 2 - Prob. 15PCh. 2 - Prob. 16PCh. 2 - Prob. 17PCh. 2 - Prob. 18PCh. 2 - Prob. 19PCh. 2 - The following describes the payroll procedures for...Ch. 2 - Prob. 21PCh. 2 - Prob. 22PCh. 2 - Prob. 23PCh. 2 - Prob. 24PCh. 2 - Prob. 25PCh. 2 - Prob. 26PCh. 2 - CODING SCHEME Devise a coding scheme using block...
Knowledge Booster
Similar questions
- Explain the GPC backup technique. Is it used for sequential files or direct access techniques? Explain.arrow_forwardWhat is the advantage of selecting the “Only Create Connection" option when importing data?arrow_forwardWhich statement is NOT correct? The indexed sequential access methoda. is used for very large files that need both direct access and batch processing.b. may use an overflow area for records.c. provides an exact physical address for each record.d. is appropriate for files that require few inser- tions or deletions.arrow_forward
- The advantages to using a partitioned database approach include all of the following EXCEPT a. the possibility for the deadlock phenomenon is reduced.b. user control is increased.c. transaction processing time is decreased.d. the potential for wide-scale disaster is reduced.e. these are all advantages of partitioned databases.arrow_forwardWhich of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user. c. The decision to partition a database assumes that no identifiable primary user exists in the organization. d. Message switching is used to establish temporary connections between network devices for the duration of a communications session. e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.arrow_forwardIn one sentence, what does updating a master file record involve?arrow_forward
- Which of the following is NOT a database management task?a. retrievalb. storagec. summarizationd. deletionarrow_forwardThe installation of a database management system is likely to have the least impact ona. data redundancy.b. entity-wide sharing of common data.c. exclusive ownership of data.d. the logic needed to solve a problem in an application program.e. the internal controls over data access.arrow_forwardWhich of the following statements about the client-server model is correct?a. It is best suited to the token ring topology because the random-access method this topology uses detects data collisions.b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and prevents data loss during transmissions.d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node rather than only a single record.e. It is not used in conjunction with either the bus or ring topologies.arrow_forward
- Which of the following statements is not correct? a.The database approach uses one common database to promote the concept of single user view. b.Database systems resolve task data dependency. c.The flat-file model encourages data redundancy. d.A primary goal of databasesystems is to minimize data redundancy. e.Database systems provide increased accessibility to data and data integration.arrow_forwardDiscuss why control procedures over access to the data resource become more crucial under the database approach than in the flat-file environment. What role does the DBMS play in helping to control the database environment?arrow_forwardWhich statement is NOT correct?a. Legacy systems may process financially significant transactions.b. Some legacy systems use database technology.c. Mainframes are exclusive to legacy systems, while modern systems use only the client-server model.d. All the above are true.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,