1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
6

In a transaction processing cycle, capturing data at its source and recording it accurately in a timely fashion with minimal man

ual effort and in an electronic or digital form so that it can be directly entered into the computer is known as:
Computers and Technology
1 answer:
AnnZ [28]3 years ago
4 0

Answer:

The answer for the following question is source data automation .

Explanation:

It is the process in which collect the data at point of origins in digital forms.

It eliminates the duplicate efforts, potential errors by initially collect the data in the digital form and delay in extra handling.

The person who collects the ready for process the transaction data, those who knows about events that data represents.

You might be interested in
Similarities between human and computer​
Zielflug [23.3K]

Answer: Both have a center for knowledge; motherboard and brain. Both have a way of translating messages to an action. Both have a way of creating and sending messages to different parts of the system.

5 0
3 years ago
Permission must be sought in order to use a play that is in the public domain. True or False?
sertanlavr [38]

Answer:

False

Explanation:

Permission can't be sought in order to use a play that is in the public domain.

5 0
4 years ago
Read 2 more answers
Saving a file as a new filename can be accomplished through the Save As dialog box? True<br> False
aliina [53]
Your answer would be true, (brainliest answer please)
7 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
What did Stalin hope the Western powers would do because of the blockade?​
Elodia [21]

Answer:

Stalin's plan was to cut western Germany off from its capital

Explanation:

Stalin's plan was to cut western Germany off from its capital so that the new government, based in Berlin, could not control its territory in western Germany. He hoped that this would prove that a divided Germany would not work in practice.

6 0
3 years ago
Other questions:
  • Which of the following statements is true about scalability? Choose 3 options.
    9·2 answers
  • "Technician A says that Ohm's law can be used to determine circuit current flow if total circuit resistance and total voltage ar
    14·1 answer
  • HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
    12·1 answer
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • You change a document that is saved on your computer by cutting text from the document what happens to the text when you preform
    5·1 answer
  • Why are online payment services necessary?
    10·2 answers
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • Explain the term creating in word processing​
    12·1 answer
  • Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!