1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
13

Workspace Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did

the Point of Sale (POS) terminal and cashier collect from you and what pieces of data about the transaction did the POS terminal pull from a database to complete the sale? In addition to the data collected and retrieved what information was generated by the POS terminal at the end of the order, as it is being completed?
Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
8 0

Answer:

ATM card and the pin number, the status of the bank account and the total of the purchase and the account and method of payment.

Explanation:

The POS or point of service is a device that allows the purchase of product from a commercial store to be done wirelessly and cashless.

It promotes The cashless policy to reduce the circulating physical currency. The POS electromagnetic wave to wirelessly access bank database to retrieve bank account information.

It takes in the smart card, and with the command, retrieves the bank account information addressed on the card. The cashier types the total price of purchased product and it is automatically minus and updated on the account database. Then the invoice of the transaction is issued to the customer.

You might be interested in
Which of the following statements expresses why the following code is considered bad form? for (rate = 5; years-- > 0; System
OlgaM077 [116]

Answer:

l and ll only that is the answer

7 0
3 years ago
Read 2 more answers
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair
Viefleur [7K]

Answer:

scores.append(6,2)

Explanation:

This is a complicated question because in theory, scores.insert can also add values, but I am sure that the only line of code that would work is scores.append(6,2)

7 0
3 years ago
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
2 years ago
In javascript, what can I put after player. to make my character go in the center of the screen? like example:
melamori03 [73]

Answer:

0,0

Explanation:

you could try to use the x-axis and y-axis to put your character in a certain place. I'm not totally sure if that is how javascript works, but for the x-axis and y-axis, the center is always(0,0).

6 0
4 years ago
Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet.
alexandr402 [8]
The answer to this is B=MODE(A1:A65)
8 0
3 years ago
Other questions:
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • Mary is writing an article about the software development life cycle. She wants to place a flowchart besides the text. Which men
    6·2 answers
  • In a bubble sort, you use a(n) ____ loop to make pair comparisons.
    5·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • How are texting and instant messaging alike?
    6·2 answers
  • 1. asynchronous_communication
    5·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • Ns.office.com/Pages/ResponsePage.aspx?id=bd8
    9·2 answers
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!