1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
13

Which of the following are considered transactions in an information system?

Computers and Technology
1 answer:
Marrrta [24]3 years ago
5 0

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

You might be interested in
Which of the following types of operating systems does Windows® belong to?
Masja [62]

Answer:

C) Single-user, multi-tasking operating systems

5 0
3 years ago
Who knows my aunt better?
fiasKO [112]

Answer:

yes, yes, 30, November 5

6 0
3 years ago
Read 2 more answers
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
. What is suboptimization?
Vera_Pavlovna [14]

Answer: Suboptimization is referred to as a term that has been approved for common policy mistake. It usually refers to the practice of concentrating on a single component of a whole and thus making changes which are intended towards improving that component and also ignoring its effects on other components.

3 0
3 years ago
WHAT DO I DO IN MY FREE TIME????
yanalaym [24]

Answer:

what do u mean

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Can using interior light help improve a drivers visibility at night
    9·1 answer
  • On what basis can you categorize the generations of computers
    7·1 answer
  • The _________keys include the home, end, and arrow keys.
    13·1 answer
  • What is the prediction in technology for the future?
    6·1 answer
  • Assume there is a variable, h that has already been assigned a positive integer value. Write the code necessary to compute the s
    9·1 answer
  • Where can you access the property sheet
    8·1 answer
  • Hope fixes her mistake and comes up with this list.
    9·2 answers
  • Which changes the natural world? <br> technology <br> science <br> prototypes <br> feedback
    5·1 answer
  • .WAP to enter monthly sale of Salesman and give him commission i.E. If the monthly sale is more than 500000 then commision will
    6·1 answer
  • Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!