1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
2 years ago
13

How is computer use in banking sector ?please give me fast answer its very urgent for me ​

Computers and Technology
1 answer:
raketka [301]2 years ago
8 0

Answer:

<em>How is computer use in banking sector ?</em>

  • <em><u>In banks, computers are used for keeping account information of customer accounts. </u></em>
You might be interested in
For BitTorrent, which of the following is true:
Bumek [7]

Answer:

d. All of the above

Explanation:

All the above mentioned statements are true about BitTorrent.

8 0
3 years ago
What executable programs have names that are just one character long, and what do they do??
12345 [234]
Any program can be an executable, and it can be named anything the user chooses, and would still function exactly the same.

PC games are often run via an executable. If you rename that executable to something else, it will still function perfectly fine.

Therefore, one character long executable programs are just executable programs that have been renamed one character long, and will function as intended.
5 0
3 years ago
Which fact does lean green eco machines present to show that electric cars are not perfect
Yuri [45]

Answer: HOPE THIS HELPED YOU! :D ;)

Eco cars are still too expensive for most car buyers

Explanation:

5 0
3 years ago
Read 2 more answers
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
According to the author. Consider diverse and various domains of programming languages and applications.
elixir [45]

Answer:

A system programming language has low - level features that allow a software interface to write in an external device. Some computer uses computer languages such as PL/S, PL/I. This is an example of System Programming or Language programming.

Explanation:

The system language is a language used for system programming such as writing system software, which requires different development approaches when compared with application software.

System programming is the activity of the computer system. The characteristic of system programming when application programming produces software is that application that provides services to create software platforms.                    

                     

5 0
3 years ago
Other questions:
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Why is it important to protect people's intellectual property online?
    10·1 answer
  • Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the intern
    12·1 answer
  • What are Important points to include about preventing the download of malware?
    14·1 answer
  • How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
    15·1 answer
  • *
    6·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
  • What can be used to help diagnose and fix computer hardware problems?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!