1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
8

The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t

hat apply.)
A. Make sure captured data are accurate and complete.
B. Make sure the input data is processed and stored correctly.
C. Make sure company policies are followed when data is input.
D. Make sure to capture transaction data and enter them into the system.
Computers and Technology
1 answer:
Rus_ich [418]3 years ago
4 0

Answer:

The answer to this question is options A,C and D.

Explanation:

The different steps when processing input are as following:-

  1. Make sure that the captured data is complete and accurate.
  2. Make sure that the company's policies are followed properly on the input of data.
  3. Make sure that the transaction's data is captured and to enter them in system.

Among the options given in the question the options written above are the steps that are used in the processing input.

You might be interested in
_______ _____ is the process of creating usable computer pograms and applications and the theories behind those processes. Quest
stepladder [879]
<span>The correct answer is


C. Computer Science</span>
7 0
3 years ago
Read 2 more answers
In a swap you need a variable so that one of the values is not lost ? Need help
emmasim [6.3K]

Answer:

In a swap, the variable is cuttly.x

Explanation:

7 0
3 years ago
Read 2 more answers
What structures in which lighting heating and other systems are controlled by computers
Ilia_Sergeevich [38]

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
ch4aika [34]
The answer here is hacker
6 0
3 years ago
Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group me
Zigmanuir [339]

Answer:

Apple iWork.

Explanation:

Apple iWork would not work for whole group.

6 0
4 years ago
Other questions:
  • Your crt monitor flickers. what should you do
    6·1 answer
  • Write a setInterval() function that increases the count by 1 and displays the new count in counterElement every 400 milliseconds
    14·1 answer
  • What is the result of segmenting a network with a bridge (switch)? (Choose two)
    14·1 answer
  • What type of mitigation provision is utilized when redundant communications links are installed?
    8·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • Write a Bash script that takes the name of a file or directory as an argument, 1. reports if it is a directory or a file, and if
    14·1 answer
  • While working with style formatting for a Microsoft Word document, when you change the text or paragraph formatting of a single
    13·1 answer
  • What is the creative nature of a computer<br> Help
    15·2 answers
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRIST AND CORRECT
    10·2 answers
  • Please help me
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!