1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
4 years ago
9

Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,

(3) customer adding an item to the online shopping cart, are considered transactions in an information system?
Computers and Technology
1 answer:
tamaranim1 [39]4 years ago
3 0

An Information System is when key components such as hardware, software, data, and process are combined for collection, processing, and distribution of data. All of these scenarios mentioned on the choices above are considered transactions in an information system. There is an exchange of information that fully satisfies the request of a user and describes what transactions in information systems are. They are good examples of users entering information whether, physically or electronically, as data into computers. This data is then processed, and the database changes adjusted with some being made permanent.

You might be interested in
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Use the conversion table below to help you answer the question.
andrew-mc [135]
Correct answer is 11
7 0
3 years ago
30 POINTS FOR THE ANSWER
vladimir2022 [97]

The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

<h3>How do one do the above?</h3>

Computers is known to often use the same data and it often uses it to bring up clarity or light up pixels on its screen.

Therefore to get the result above, one need to check system preference system setting to get different brightness and color settings.

Therefore, The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

Learn more about printed colors from

brainly.com/question/1548113

#SPJ1

4 0
2 years ago
Which CGI technology uses the Java programming language to process data received from a Web form?This task contains the radio bu
Rufina [12.5K]

Answer:

B. JSP

Explanation:

CGI, or Common Gateway Interface, is a specification for transferring information between a World Wide Web server and a CGI program.

JSP (Java Server Pages)  is a universal CGI technology that uses the Java interpreter. JSP is used for developing Webpages that supports dynamic content.

4 0
3 years ago
What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
stiks02 [169]
The answer is c and sorry for being so rude I didn't realize it was you girly

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following are possible ways to
    6·2 answers
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • Brake fluid is made up of a chemical that:
    13·2 answers
  • What is one advantage of top-down programming design?
    8·1 answer
  • Which statement describes Augmented Reality (AR) technology?
    12·1 answer
  • Pls help now the question is very hard someone help me pls​
    6·1 answer
  • Which tabs are expandable and collapsible
    14·1 answer
  • Select the correct text in the passage.
    12·1 answer
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!