1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
9

What is transaction model?

Computers and Technology
2 answers:
Alexandra [31]3 years ago
6 0
Cash register 
ATMs
these types of machines
Papessa [141]3 years ago
3 0
For example, from one subsystem and back. It's that simple!!! Hope this helps!!!
You might be interested in
What is the next line?
Evgen [1.6K]

Answer:3

Explanation: it’s 3

3 0
3 years ago
Read 2 more answers
How do I insert a row in between 1 and 2 in excel?
Vlada [557]
This link should help: https://uhasct.com/insert-an-empty-row-between-each-row-of-data-in-excel/
5 0
3 years ago
Read 2 more answers
Rather than entering an IP address into our browser, we use a text-based address known as a(n
zalisa [80]

Answer:

url

Explanation:

7 0
2 years ago
How do I get my text box to stop moving continuously on a Chromebook?
pickupchik [31]

Answer:

Go to Settings. Click on Advanced Settings. Scroll down to the Accessibility section. Make sure that the box next to “Automatically click when the mouse pointer stops” is Unchecked.

Explanation:

here you go hope this helps!!

5 0
2 years ago
Read 2 more answers
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
3 years ago
Other questions:
  • A __engineer specializes in computer hardware design and integration.
    15·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels.â
    6·1 answer
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • Quick SearchLinks to an external site. lets you refine or narrow your search results using links on the right side of the screen
    5·1 answer
  • Complete the following conversions. You MUST show all of your work to receive full credit.
    13·1 answer
  • I want pizzzzzzzaaaaaaaaaaa
    9·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • 35 POINTS
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!