
Accounting Information Systems 8th Edition by James Hall
Edition 8ISBN: 978-1111972141
Accounting Information Systems 8th Edition by James Hall
Edition 8ISBN: 978-1111972141 Exercise 76
ACCESS METHODS
For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.
a. Retrieve a record from the file based upon its primary key value.
b. Update a record in the file.
c. Read a complete file of records.
d. Find the next record in a file.
e. Insert a record into a file.
f. Delete a record from a file.
g. Scan a file for records with secondary keys.
For each of the following file processing operations, indicate whether a sequential file, indexed random file, indexed sequential access method (ISAM), hashing, or pointer structure works the best. You may choose as many as you wish for each step. Also, indicate which would perform the least optimally.
a. Retrieve a record from the file based upon its primary key value.
b. Update a record in the file.
c. Read a complete file of records.
d. Find the next record in a file.
e. Insert a record into a file.
f. Delete a record from a file.
g. Scan a file for records with secondary keys.
Explanation
Access Methods
Sequential Structure:
S...
Accounting Information Systems 8th Edition by James Hall
Why don’t you like this exercise?
Other Minimum 8 character and maximum 255 character
Character 255