1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
2 years ago
8

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you

prefer.
Classified the two ways above under the forms of information system and explain the merits and demerits of both
Computers and Technology
1 answer:
Brut [27]2 years ago
3 0

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

<h3>What are the benefits and drawbacks of the usage of an ATM card?</h3>

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

brainly.com/question/19185661

#SPJ1

You might be interested in
How is the “conflict set” defined in Production systems?How conflict is resolved ?
Triss [41]

Answer:

The rules which could trigger at any period in time are referred to as the conflict set. A programming bug/conflict can occur when two programs compete for the same resource such as memory or register etc.

A Conflict Resolution Strategy is is a protocol which highlights which decision will be triggered first.

The best way to resolve conflict is to first determine the kind of conflict it is. Hardware conflicts can be resolved by first troubleshooting the hardware and in some instances unplugging the hardware causing the conflict.

When hardware creates conflicts it may be due to a driver issue. reverting to an old driver or updating the existing one may solve the problem.

Software conflicts can be resolved by installing updates or complete uninstallation.

Cheers!

5 0
3 years ago
How to get administrator privileges on windows 7?
Phoenix [80]
If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
4 0
4 years ago
A PHP variable name a. can be a PHP reserved word b. can start with a letter, a digit, or two underscores c. can contain special
maw [93]

Answer:

The correct answers are c. can contain special characters d. is case-sensitive

Explanation:

Variable can be referred to as a container used for storing values such as numeric values, memory addresses, characters, character string so it can be used in any part of the program. Every programming language has rules that you must strictly follow while naming a variable, and some of the rules for naming variable in PHP are A variable name can contain letters, numbers, and characters  after the first character and A variable name is case sensitive.

3 0
3 years ago
In Microsoft Access, what happens when you save a query once and run it but then add more to the query? What will happen? a)erro
Usimov [2.4K]
D)When the query is run again, the data that meets the new criteria will be retrieved.
5 0
4 years ago
What is the quotient of 8.16 ÷ 100​
Natalka [10]

Answer:

0.0816

Explanation:

8.16 ÷ 100 = 0.0816 (Ans)

6 0
3 years ago
Other questions:
  • A flowchart would be an example of what kind of programming?
    12·1 answer
  • Alison is entering text in a Word document. As she is entering data, where will the cursor move in relation to the text she is t
    6·1 answer
  • Are headphones considered a computer? Why or why not?
    13·2 answers
  • A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo
    7·1 answer
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Which key combination will allow users to move to the top of a document?
    15·1 answer
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • Which of the following is a precaution that helps to protect you from electric shock when working with electric power tools?
    7·2 answers
  • A large amount of data is stored in secondary storage is it true<br>​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!