1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
13

Workspace Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did

the Point of Sale (POS) terminal and cashier collect from you and what pieces of data about the transaction did the POS terminal pull from a database to complete the sale? In addition to the data collected and retrieved what information was generated by the POS terminal at the end of the order, as it is being completed?
Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
8 0

Answer:

ATM card and the pin number, the status of the bank account and the total of the purchase and the account and method of payment.

Explanation:

The POS or point of service is a device that allows the purchase of product from a commercial store to be done wirelessly and cashless.

It promotes The cashless policy to reduce the circulating physical currency. The POS electromagnetic wave to wirelessly access bank database to retrieve bank account information.

It takes in the smart card, and with the command, retrieves the bank account information addressed on the card. The cashier types the total price of purchased product and it is automatically minus and updated on the account database. Then the invoice of the transaction is issued to the customer.

You might be interested in
How can knowing internal and external parts of computer help me
mafiozo [28]
Going over parts of a computer and how it functions will help you understand all the vital components that make up a computer.
8 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Who developed the idea of a universal network?
polet [3.4K]
Alan Turing fathered the machines we now lovingly call computers, however it was Nicola Tesla that birthed the idea of a world-wide wireless system.
7 0
4 years ago
Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
Tresset [83]

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

8 0
3 years ago
Which actions did Sheila have to take to make the changes observed? Check all that apply.
Harrizon [31]

Answer:

Use

Explanation:

Out line view

6 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • Give the difference betewen recursion and interation in C. Sight what are the advantages and their disadvantages?
    7·1 answer
  • Why is driving a privilege?
    15·2 answers
  • What are the four types of technical drawing?​
    9·1 answer
  • (10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
    13·1 answer
  • Write smallest to largest: Byte, bit, MB, PB, GB, nibble
    12·2 answers
  • The advancement in speed of transportation is attributed to invention of this device
    8·1 answer
  • Please complete the following questions. It is important that you use complete sentences and present the questions and answers w
    6·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • What is the shortcut key to create a new desktop ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!