1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
4 years ago
13

Which of the following are examples of transactional information? A. Airline ticket, sales receipts, and packing slips B. Trends

and sales statistics C. Product sales results, grocery receipts, and growth projections D. Airline tickets and sales growth spreadsheets
Computers and Technology
1 answer:
Elenna [48]4 years ago
4 0

Answer: A) Airline ticket, sales receipts, and packing slips

Explanation:

Transactional information is the data that is used for supporting transaction action of every day in a business unit. This information keeps the record whether the transaction is complete or failed.

  • Example - slip of packing,  sale receipt etc.
  • Other options are incorrect because statistic of sales , spreadsheet ,outcome of sale and projection of growth does not relate with transaction process.
  • Thus, the correct option is option(A).

You might be interested in
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
mote1985 [20]

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

3 0
3 years ago
Cloud Kicks is undergoing a GDPR-focused implementation to ensure access to personal information data is limited to only users w
bija089 [108]

Answer:

Option A.

Explanation:

It is experiencing a GDPR-focused execution to assure only users who require full rights to a corporation's account have access to sensitive information and data. It has a design of their personal account.

So, the Consultant allows particular Account privileges to the sustainable and Sales Procedure teams through which they create Renewals and Sales Operation Account team membership roles and has sales team members allocated to the suitable customers.

5 0
3 years ago
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
mina [271]

Answer: IDK

Explanation: ummm I have no idea wut ur asking meh

6 0
3 years ago
Flammable and combustible materials should be stored according to: A. Their color B. Their fire characteristics C. Their size
iris [78.8K]

B. their fire characteristics

this should be fairly obvious

6 0
3 years ago
Read 2 more answers
Other questions:
  • Heavenly bodies formed because of gravity<br><br> T or F
    10·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • Tiff is the default file format for most digital cameras. <br> a. True <br> b. False
    12·1 answer
  • Can somebody please halp meeee?? I'm doing Web design.
    12·2 answers
  • In order to create strong neural networks (connections) in your brain, you've got to __________ the learning process.
    14·1 answer
  • Who is your favorite smite god in Hi-Rez’s “Smite”
    14·1 answer
  • Which goal of design theory can be described as the proper distribution
    7·1 answer
  • William created a spreadsheet and he would like to enter the data he collected. What information should he put in the first row?
    15·1 answer
  • Do OBS mic filters apply everywhere? Such as discord and other apps similar. Or is it just on streaming?
    15·1 answer
  • Assuming auto-mdix is not supported, which of these devices would require a crossover cable when connecting to a router? (select
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!