1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
3 years ago
14

Two devices used by the supermarket point-of-sale (POS) terminal are a bar code reader and a keyboard. Name two other input/outp

ut devices used at the POS and give a use for each device.
Computers and Technology
1 answer:
Svetllana [295]3 years ago
6 0

Answer:

1. Receipt printer

Use of receipt printer:

i. They are used to print customer transaction receipts for proof.

2. Touch screen monitor

Use of touch screen monitor:

i. Allow record of when, where, price, and other important information about the sale conducted.

Explanation:

A Point of sale (POS) terminal takes record of transactions at the point where a product is purchased or a service is rendered. A barcode reader is a price scanner that is an input device used in a point-of-sale (POS) terminal. The keyboard is also an input device. The receipt printer is an output device since it converts information into a readable format. While only a touch screen monitor among the other devices mentioned above is an input and output device, because of its touch panel and its ability to display information.

             

You might be interested in
when I was playing Mobile legends bang bang online Match The game logged Me out and when I was Trying To reconnect it failed and
Helen [10]

Answer:

it's most prolly a bug.The game crashes a lot tbh

5 0
3 years ago
Which layer of the OSI model do network administrators typically check first when issues arise?
bazaltina [42]

Answer:

B

Explanation:

Typically I check the physical layer to ensure that the nodes are plugged accordingly.

4 0
2 years ago
What is a attack vector<br>​
kogti [31]

Answer: A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology

Explanation:

give me a Brainliest

3 0
3 years ago
Peter automates his email inbox such that his incoming mails are filtered with all junk mails sent directly to the spam folder.
ANEK [815]

Answer:

Improve individual productivity

Explanation:

Improving individual productivity as to do with efficiency, achieving more within a shorter period of time. One of the ways to achieve this is by using Information system tools. Information system tools supports processes, operations and intelligence which will help a worker to do more quality work spending lesser time, as well as reduce spending time on unnecessary tasks.

6 0
3 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • Defination of computer Software​
    7·2 answers
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • ?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
    7·1 answer
  • SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater th
    14·1 answer
  • Return the "centered" average of an array of ints, which we'll say is the mean average of the values, except ignoring the larges
    6·1 answer
  • Data ____ refers to the accuracy of the data in a database
    9·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • The lower band and upper band of integer data type​
    6·1 answer
  • What are the two types of electronic components
    15·2 answers
  • The computer stores currently used programs and data in ________.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!