1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
13

Fact Pattern: A sales transaction record designed to contain the information presented below. Column Information 1-10 Customer a

ccount number 11-30 Customer name 31-38 Amount of sale 39-44 Sales date 45-46 Store code number 47-49 Sales clerk number 50-59 Invoice number If the last letter of a customer’s name is erroneously entered in column 31, which of the following is most likely to detect the error during an input edit run? A logic check. A field check.
Computers and Technology
1 answer:
ozzi3 years ago
4 0

Answer:

The answer is field check.

Explanation:

The sales transaction record was designed to enter information by range, so the data validation is oriented for range validation and not for a specific logic. In other words, the transaction will check if the information is in a valid range and not if the information is logically valid.

You might be interested in
What will be the output of the following code? <?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
SCORPION-xisa [38]

Answer: b. My name is BobBob

Explanation:

  • $foo = 'Bob'; // Assigns foo variable the value Bob
  • $bar = $foo; // Assigns the value of foo to bar
  • $bar = "My name is $bar"; //changes the $bar this is the way to  include variables directly in the string.
  • print $bar; // this prints My name is and moves to the variable $bar which prints the value of $bar which is the value of $foo i.e. Bob
  • print $foo; // prints another Bob
7 0
3 years ago
Read 2 more answers
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
Write a Python function that will accept as input three string values from a user. The method will return to the user a concaten
Aleks04 [339]

Answer:

Following are the program in python language

def cat_rev(x,y,z): # function definition  

   x=x[::-1]# reverse the first string  

   y=y[::-1]# reverse the second string  

   z=z[::-1]# reverse the third string  

   z=x+y+z;  #concat the string

   return(z)#return the string

   #main method

s=input("Enter the first string:") #read the first string

r=input("Enter the second string:")#Read the second string  

t=input("Enter the third string:")#Read the third string by user

rev1= cat_rev(s,r ,t ) #function calling

print(rev1)# display reverse string

Output:

Enter the first string:san

Enter the second string:ran

Enter the third string:tan

nasnarnat

Explanation:

Following are the description of program

  • In the main function we read the three value by the user in the "s", "r" and "t" variable respectively.
  • After that call the function cat_rev() by pass the variable s,r and t variable in that function .
  • Control moves to the function definition of the cat_rev() function .In this function we reverse the string one by one and concat the string by using + operator .
  • Finally in the main function we print the reverse of the concat string   .

5 0
3 years ago
What is workflow? how do you create your own workflow?
lana66690 [7]
A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization of resources into processes that transform materials, provide services, or process information.


Create a detailed outline of what you want to achieve and sketch a workflow diagram before using workflow chart software or templates. This will help to ensure your chart is accurate and complete. Always consider your process and workflow manageability when inserting logic in your workflow chart. You can use decision symbols, connectors and text boxes. Always confirm the accuracy of your workflow chart with other stakeholders.


(If you need to know what the workflow diagrams layout is just look it up. GL.)
6 0
4 years ago
DEFINE WHAT COPYRIGHT?
Reika [66]
Copyright is when someone is given the right to print, publish or make a film.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • What does an approved project summary document indicate?
    13·1 answer
  • The ____ category of apps makes the computer easier for blind people to use.
    9·1 answer
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • How do I get more points?
    13·2 answers
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • You are in the windows power shell window and decide to encrypt folder which of the following command do you use
    7·1 answer
  • Which of these is a type of social engineering attack?
    10·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
  • Select the correct text in the passage.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!