1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
7

unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt

tttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttteeeeeeeeeeeeeeeeeeeeeeessssssssssssssssssssssstttttttttttttttttttttttttttttttttttt
Computers and Technology
1 answer:
alukav5142 [94]3 years ago
5 0
What the hell is the point of this, just to waist people's time?
You might be interested in
Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you
Brut [27]

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

<h3>What are the benefits and drawbacks of the usage of an ATM card?</h3>

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

brainly.com/question/19185661

#SPJ1

3 0
2 years ago
What makes this information systems environment unique? (3 points)
QveST [7]

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

6 0
3 years ago
Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few minutes, she could hear am
GarryVolchara [31]

Answer:

I'm sure that she used deductive reasoning to make the assumption that there were people injured. So the answer is b

3 0
3 years ago
Read 2 more answers
Which of the following is an appropriale way to declinc an offer in a<br>professional environment?​
alina1380 [7]
If you’re looking for an exact answer, we weren’t given any options, but in my personal experience just explain that you appreciated them taking their time out of their day and say that you’re no longer interested in their offer.
5 0
4 years ago
Read 2 more answers
Discuss why data manipulation, efficiency, and memory are useful in programming
Keith_Richards [23]
Because read and write speed depend on the amount of ram/memory and data manipulation to copy huge pieces a of coding a once for efficiency
5 0
4 years ago
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • The most common types of utility programs fall into these categories. accessibility calculation communication data entry enterta
    6·2 answers
  • Moore's Law states that the processing power of the latest computer chips doubles about every eighteen months. Assuming the grap
    6·1 answer
  • How to change screen resolution in windows 10?
    5·1 answer
  • What is one method that can be used to open the Microsoft Word application?
    8·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Can someone help me with this
    10·1 answer
  • What can hack or code can I use to get a shadow or frost dragon in adopt me
    6·2 answers
  • Drag each tile to the correct box.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!