1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
13

Computers process information consistently for all transactions. This creates a risk that:______

Computers and Technology
1 answer:
Anna007 [38]3 years ago
6 0

Answer:

b. erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.

Explanation:

Because of the consistent nature of processing in computers, this is capable of creating certain kinds of risk. From the option, one of the probable risk that can result from consistent information processing for multiple transactions at the same time is erroneous processing. This can therefore lead to a pile of misstatements in only a short period of time.

You might be interested in
According to ________ law, in a sealed chamber, the pressure and temperature of a gas are directly related to each other.
Vaselesa [24]

Gay- Lussac's Law.  <span>A law stating that the volumes of gases undergoing a reaction at constant pressure and temperature are in a simple ratio to each other and to that of the product</span>

<span>.</span>


6 0
3 years ago
What is the difference between front-end and back-end?
IgorLugansk [536]

Front-end the part with which the user interacts.

usually people who write this are called layout designers what languages ​​are used (Html, css, js)

Beck-end The northern part is the structure of the site due to which it works, this includes the DBMS, logic, etc. which languages ​​will be used(python, php, java)

People who can do both are called: full stack developr

3 0
2 years ago
Atieno is a musician who records music on her computer. Which devices do you think she would need the most?
AURORKA [14]

Answer:

Midi Synthesizer, Mic,Boom Mic, Laptop

Explanation:

At the end of the day a keyboard and a pc is all you need as the keyboard alone can cover nearly any instrument.

8 0
3 years ago
You are working with an older relative who is writing their last will and testament and you two are sharing the document back an
zloy xaker [14]

Answer:

In word there is a setting where you can mange all of user's permission in the document. These are a few permission settings: Read only and Can edit.

6 0
3 years ago
The RAM memory of a computer contains the volatile memory, which includes
lara31 [8.8K]

The RAM memory of a computer contains the volatile memory, which includes; Websites recently visited

<h3>Random Access Memory(RAM)</h3>

Random access memory (RAM) is defined as a computer's short-term memory that it utilizes to handle all active tasks and applications.

Now, no single program, file, game, or stream would work without a RAM. Thus, RAM is a temporary storage that goes away when we shut down the computer.

Examples of things that RAM store from the options given is only websites visited recently.

Read more about Random Access Memory at; brainly.com/question/86807

3 0
2 years ago
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • Floppy disks hold more data than a CD-R/RW.<br> true or false?
    8·2 answers
  • Write an expression to print each price in stock_prices. sample output for the given program: $ 34.62 $ 76.30 $ 85.05
    6·1 answer
  • What are some good editing software apps for pc?
    11·1 answer
  • A base class named Garden contains a private field width and a property public int Width that contains get and set accessors. A
    11·1 answer
  • Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
    14·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • The 'WIMP' environment is much more user friendly,why?​
    11·2 answers
  • How does 5G technology enhance the Internet of Things (IoT)?
    9·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!