A transaction file is a type of:
a) Master File
b) Data File
c) Access Method
d) None of The Above

1 Answer

Answer :

b) Data File

Related questions

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : What is the difference between a master file and a transaction file ?

Last Answer : master file The master file is considered the original file and the data is saved. Data is permanently stored in the master file. The data in this file usually does not require processing. The ... . There are two types of transaction files: a) current transaction file , b) sorted transaction file

Description : During a merger and acquisition transaction, the ability to find and use good comparable data for a valuation is relatively ____________. a) easy because each successful company within an industry ... depth, product diversity and access to lines of credit seldom match the company being valued

Last Answer : d) difficult because size differential, management depth, product diversity and access to lines of credit seldom match the company being valued

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : Define How do you search for data in a data file using the random access method?

Last Answer : Use the fseek() function to perform random access input/output on a file. After the file was opened by the fopen() function, the fseek would require three parameters to work: a file pointer to the file, the number of bytes to search, and the point of origin in the file.

Description : What is Dynamic Master File ?

Last Answer : Dynamic master files are data that need to be updated from time to time. This file usually contains information about the production , marketing, etc. of different products.

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Forms that are used to organize business data into rows and coloumns are called a) transaction sheets b) registers c) business forms d) spread sheets e) None of these

Last Answer : d) spread sheets

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Master Files contain data of: a) Permanent Nature b) Global Nature c) Temporary Nature d) Local Natur e) None of These

Last Answer : a) Permanent Nature

Description : MAC is the abbreviation for: (A) Multimedia access control (B) Media access control (C) Mobile access control (D) Master access point control

Last Answer : (B) Media access control

Description : MAC address helps in (A) multimedia access control. (B) media access control. (C) mobile access control. (D) master access point control

Last Answer : (B) media access control.

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : FAT stands for 1) File Accomdation Table 2) File Access Tape 3) File Allocation Table 4) File Activity Table

Last Answer : 3) File Allocation Table

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : FAT stands for 1 File Accomdation Table 2 File Access Tape 3 File Allocation Table 4 File Activity Table

Last Answer : 3 File Allocation Table

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Direct access of file is also known as (1) random access (2) relative access (3) file access (4) sequential access

Last Answer : random access

Description : Which of the tools available to supervisors automates a position description and provides a searchable automated master file of position descriptions?

Last Answer : fasclass

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : In Google File System (GFS) the file name, file index was maintained by a) GFS Chunk Server b) GFS Master c) Linux File System d) None of the above

Last Answer : GFS Master

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) The Distributed ... CardSpace specifications support the authentication type of data object d) None of the mentioned

Last Answer : The OpenID and

Description : Point out the wrong statement. A. Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems B. The Distributed Audit ... CardSpace specifications support the authentication type of data object D. All of the above

Last Answer : The OpenID and CardSpace specifications support the authentication type of data object

Description : Delta Air Lines wishes to purchase five new aeroplanes. Management seeks information from several aircraft manufacturers, screens the offers, and discusses price and terms of sale with the preferred company until a ... method of pricing is: A)administered. B)sealed bid. C)open bid. D)negotiated.

Last Answer : D)negotiated.

Description : Any method for controlling access to or use of memory is known A) Memory map B) Memory protection C) Memory management D) Memory instruction

Last Answer : Answer : B

Description : Which of the following is a way to access secondary memory? A) Random access memory B) Action method C) Transfer method D) Density method

Last Answer : Answer : A

Description : Which access method is used to access cassette tape? A) Direct B) Sequential C) Both of the above D) None of the above

Last Answer : Answer : B

Description : The method of Internet access that requires a phone line, but offers faster access speeds than dialup is the _____ connection. a) cable access b) satellite access c) fiber-optic service d) modem e) None of these

Last Answer : d) modem

Description : In National Electronic Funds Transfer (NEFT) maximum amount per transaction is limited to ________ A. Rs.75000 B. Rs.50000 C. Rs.80000 D. Rs.90000

Last Answer : B. Rs.50000 Explanation: No. There is no limit - either minimum or maximum - on the amount of funds that could be transferred using NEFT. However, maximum amount per transaction is ... -based remittances within India and also for remittances to Nepal under the Indo-Nepal Remittance Facility Scheme.

Description : ___________ is basically charged when a person uses a credit card to obtain cash. A. Early Repayment Charge B. Redemption Fee C. Transaction Fee D. Cash Advance Fee

Last Answer : D. Cash Advance Fee Explanation: A cash advance fee is a charge that a credit card issuer charges a customer for accessing the cash credit line on his or her account, either through an ATM, convenience check or at a bank‘s teller window.

Description : In which of the following fund transfer mechanisms, can funds be moved from one bank to another and where the transaction is settled instantly without being bunched with any other transaction? A. RTGS B. NEFT C. TT D. EFT

Last Answer : A. RTGS Explanation: In RTGS, the beneficiary branches are expected to receive the funds in real time as soon as funds are transferred by the remitting bank. The beneficiary bank has to credit the beneficiary‘s account within 30 minutes of receiving the funds transfer message.

Description : An ECS transaction gets bounced and you are unable to recover your money from your customer. Under which Act criminal action can be initiated? A. Negotiable Instrument Act 1881 B. Criminal Procedure Code C. Payment and Settlement Systems Act 2007 D. Indian Companies Act 1956

Last Answer : C. Payment and Settlement Systems Act 2007 Explanation: Under the Section 25 of Payment and Settlement Systems (PSS) Act, 2007, dishonour of an electronic fund transfer instruction due to insufficiency ... fine or both, similar to the dishonour of a cheque under the Negotiable Instruments Act 1881.

Description : B) CaixaBank Explanation: As per the agreement, they will expand banks guarantee transaction businesses by jointly providing credit to Indian-Spanish joint ventures and Indian local ... finance and export credit agency finance, infrastructure finance and networking services, among others.

Last Answer : Recently an Indian bank launched next generation features on its app „iMobile‟ which will enable customers to instantly pay taxes and book railway tickets within the app. Name the bank. A) Federal Bank B) Punjab National Bank C) Kotak Mahindra Bank D) ICICI Bank E) Bandhan Bank

Description : In which of the following types of banking, there is a direct execution of transaction between a bank and its consumers? A. Retail Banking B. Universal Banking C. Virtual Banking D. Unit Banking E. other than those given as options

Last Answer : A. Retail Banking Explanation: Retail banking also known as Consumer Banking is the provision of services by a bank to individual consumers, rather than to companies, corporations or other ... include savings and transactional accounts, mortgages, personal loans, debit cards, and credit cards.

Description : The national agency mandated to control, analyse and disseminate Suspicious Transaction Reports(STR), Cash Transaction Reports and counterfeit currency reports to various investigative agencies of the country after ... (IB) D. Central Bureau of Investigation(CBI) E. Central Intelligence Unit(CIU)

Last Answer : B. Financial Intelligence Unit(FIU) Explanation: The FIU is the national agency mandated to collect, analyse and disseminate Suspicious Transaction Reports (STRs), Cash Transaction Reports ... country after receiving it from banks and other financial intermediaries under a stipulated mechanism.

Description : Banking services provided to Special Economic Zones(SEZ) units have been exempted from _________ A. Sales Tax B. Securities Transaction Tax – STT. C. Central Excise Duty D. Service Tax E. None of the Above

Last Answer : D. Service Tax Explanation: Banking services offered to units set up in special economic zones have been exempted from paying service tax.

Description : ________ is a temporary pass through account held by a third party during the process of a transaction between two parties. A. Savings Bank Account B. Current Account C. Deposit Account D. Escrow Account E. None of the Above

Last Answer : D. Escrow Account Explanation: Escrow Account: Account in which funds are accumulated for specific disbursements. It is a temporary pass through account held by a third party during the process of a transaction between two parties.

Description : Maximum value of transaction for e-SBTR should be _________ A. Rs.1000 B. Rs.2000 C. Rs.3000 D. Rs.5000 E. No limit

Last Answer : E. No limit Explanation: There is no maximum limit.

Description : Minimum value of transaction for e-SBTR should be _______ A. Rs.1000 B. Rs.2000 C. Rs.3000 D. Rs.5000 E. No limit

Last Answer : D. Rs.5000 Explanation: Minimum value of transaction for e-SBTR should be Rs.5,000.

Description : What is the fullform of eSBTR? A. Electronic Secured Basic Transaction Receipt B. Electronic Stamp Bank Treasury Receipt C. Electronic Stamp Bank Transaction Receipt D. Electronic Secured Bank Treasury Receipt E. Electronic Secured Basic Treasury Receipt

Last Answer : D. Electronic Secured Bank Treasury Receipt Explanation: e-SBTR, is an Electronic – Secured Bank and Treasury Receipt, issued by the Officer of the participating bank, on secured Government stationery, on payment of Stamp- duty in Virtual Treasury.

Description : What is the upper transaction limit of UPI system? A. 1 lakh B. 2 lakh C. 5 lakh D. 10 lakh E. No limit

Last Answer : A. 1 lakh Explanation: The upper transaction limit of UPI is Rs.1 lakh.

Description : Which of the following is the Slogan of UPI(Unified Payment Interface)? A. Less Amount More Digital B. Less Cash More Transaction C. Less Cashflow More Digital D. Less Circulation More Digital E. Less Cash More Digital

Last Answer : E. Less Cash More Digital Explanation: Less cash more digital is the Slogan of UPI(Unified Payment Interface)