1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
8

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you

prefer.
Classified the two ways above under the forms of information system and explain the merits and demerits of both
Computers and Technology
1 answer:
Brut [27]3 years ago
3 0

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

<h3>What are the benefits and drawbacks of the usage of an ATM card?</h3>

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

brainly.com/question/19185661

#SPJ1

You might be interested in
Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spen
ziro4ka [17]

Answer:

I will also choose a good study area and copy them and paste it

4 0
2 years ago
What is the difference between requirements and controls in the security process? Give examples of each.
konstantin123 [22]

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

4 0
3 years ago
Which of the following gives the
satela [25.4K]

Answer:

a. Competitive advantage

7 0
3 years ago
Read 2 more answers
Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly
mina [271]

Answer:

Accidental data loss

Explanation:

Accidental data loss -

It refers to the removal or loss of certain data or information from the computer , due to some accident , is referred to as accidental data loss .

The loss of data can be due to some malicious intruders , or can be due to the fault of the user .

The information can be lost due to sudden power cut , natural calamities like fires , flood earthquake etc. , problem in hard disk etc.

Hence , from the given scenario of the question ,

The correct option is accidental data loss.

4 0
3 years ago
What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
Ostrovityanka [42]

<u>Output:</u>

f1 in A

f2 in A

f1 in B

f2 in A

f1 in A

f2 in A

f1 in B

f2 in B  

<u>Explanation:</u>

In this snippet, the code makes use of virtual functions. A virtual function is defined as a function that is defined in the base class and redefined in the derived class. If the derived function accesses the virtual function, the program will get executed with the derived class’s version of the function.

In this code, we define the virtual function f1() in class A and also redefine it in class B which is the derived class of A. While executing the program, the function g which takes the object b (class B’s object) as a parameter. It will print class B’s version of f1() rather than class A’s version. This is working off the virtual function.

8 0
3 years ago
Other questions:
  • In one sentences describe how to change your home page
    10·1 answer
  • Why is fluency in information technology becoming increasingly important for many college majors?
    6·1 answer
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • Please check my answer! (Java)
    6·1 answer
  • Images using pixels are ____________________ images, while images using mathematics are ____________________ images
    13·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to oper
    5·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
  • Television, video, computers, radios, and magazines used by target audiences are all what types of channels?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!