1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
3 years ago
8

When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.

Computers and Technology
1 answer:
nydimaria [60]3 years ago
4 0

Answer: Transaction processing system

Explanation:

A transaction processing system basically records all the data in the system. It is the set of data that basically monitor all the transaction process in the system. It basically perform various transaction oriented applications in the system.

It also allow time delay in the system when the item is supposed to being sold to the actually selling of the item. There are basically various types of transaction processing system arr payroll, account payable and the inventory control.

You might be interested in
The purchase of one cup of coffee a day what's going to do
xz_007 [3.2K]
Well if you add it up , if one cup of coffe is $1, then in one year it would be $365 on coffe.
7 0
3 years ago
Read 2 more answers
What is the term used for describing the judgement or common sense part of problem solving​
Triss [41]

Answer:

Explanation:

Heuristic

6 0
3 years ago
Riodic Table
Ksenya-84 [330]

Answer:

riodic Table

A museum wants to store their valuable documents in cases that contain a gas that will protect the documents.

She should not choose one of the other gases because they are too

The museum director should choose

Explanation:

I didn't understand

8 0
3 years ago
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
german

Answer:

You should install a personal firewall, a program that protects your computer from unauthorized access by blocking certain types of communications.

Explanation:

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

8 0
3 years ago
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
Other questions:
  • Write a MARIE program to calculate some basic statistics on a list of positive numbers. The program will ask users to input the
    6·1 answer
  • Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
    10·1 answer
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • How would you define media literacy?
    12·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • How does a Cloud-first strategy approach a client's migration to the Cloud?
    11·1 answer
  • Help with this please anyone
    15·2 answers
  • Which common online presentation medium do people use to present their own articles?
    8·2 answers
  • What is the optimal number of members for an Agile team?
    10·1 answer
  • Pleaseeeee helpppppppp​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!