The use of transfer files (Fig. A.5) might be a security risk. Does the use of transfer files have any advantages over allowing applications to access each other’s master files directly?
Is better clerical procedures design the answer to inconsistent updating of duplicated data?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here