1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
2 years ago
11

________ uses the signals transmitted over the phone to access the database, retrieve account information and input data. Group

of answer choices Electronic reported outcome Dialog system Interactive voice response Structured query language
Computers and Technology
1 answer:
Jobisdone [24]2 years ago
3 0

Answer:

Interactive voice response

Explanation:

Interactive voice response (IVR) is a technological innovation which allows computer systems to interact with individuals with the use of voice and Dual-tone multi-frequency signaling (DTMF) tones input through a keypad. In telecommunications sector, IVR enables customers to interact with a company’s host system through the use of a telephone keypad or by using speech recognition, after which services can be accessed by the use of the IVR dialogue.

You might be interested in
One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
Artyom0805 [142]
<h2>Dead lock is possible in Bank Transactions</h2>

Explanation:

Let us understand the term "Dead lock"

A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.

Deadlock is possible during bank transaction in the following situation:

A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.

When both tries to transfer funds at the same time, deadlock occurs.

A deadlock can be avoided by any one of the four methods.

They are: Mutual exclusion, No preemption, circular wait, hold and wait.

4 0
3 years ago
Read 2 more answers
Advantages of Linux include_____.
Assoli18 [71]

Answer:

The ability to tweak an application, and i think security. I've barely scratched the surface of linux so my answer may not be 100% accurate

Explanation:

8 0
3 years ago
When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
mariarad [96]

When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if the answer to the question if it is _______YES_____ and the other corresponds to what happens next if the answer to the question is _____NO_____ .

Explanation:

When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if the answer to the question if it is <u>Yes and the other corresponds to what happens next if the answer to the question is No.  </u>

The Below symbol(in attachment ) is used to take decisions. This decision taking step is represented as a diamond in a flowchart.

8 0
3 years ago
When installing conduit for a mast service, what type of conduit should you use?
lesya692 [45]
The answer is (b) Rigid-metal

If you are installing a conduit for a mast service, the type of conduit to be used should be a rigid metal type. Among the three types of steel conduit, the most preferable to install is the rigid metal type instead of an intermediate metal conduit and electrical metallic tubing. Rigid metal conduit is a ferrous metal.
7 0
3 years ago
Read 2 more answers
In the context of web and network privacy issues, new employees in an organization have to sign a(n)__________ before they acces
Lunna [17]
In the context of web and network privacy issues, new employees in an organization have to sign an acceptable use policy (AUP) before they access the network. This usage policy<span> or fair use policy, </span> provides guidance and set of rules for using the network and network resources and protects the network and the users. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • Test Average and Grade
    12·1 answer
  • nswer the following questions concerning chapter 1:1.1 Which pair of layers are NOT peer layers?a.Transport layer in the sender
    9·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • Ile 1 cm<br> ?<br> 50 m<br> The an
    5·2 answers
  • Write a SELECT statement that returns three columns: EmailAddress, OrderID, and the order total for each customer. To do this, y
    14·1 answer
  • First Person Who Answers Fast As Possible Will Be Marked As Brainiest ​
    12·1 answer
  • 6. Python indexes lists beginning with the number 1.<br> True<br><br> False
    15·1 answer
  • What is polymerization1​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!