1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
12

Give two benifets to the supermarket maneger and two benifets of customers of using barcods on all items

Computers and Technology
1 answer:
sergey [27]3 years ago
5 0

Answer:

The benefit of barcodes on items for the manager and the customers are as follow-

Explanation:

Benefits of using bar codes on all items to the manger are as follow -

  • The process of customer dealing increases by quickly scanning the item, rather than manually noting down the details.
  • The track record of all the items can be maintained properly.

Benefits of using bar codes on all items to the customers are as follow -

  • The time period to purchase any item increases, hence the customer can shop for many items in short span of time.
  • The chances of any mistake gets reduced, as everything is done digitally.
You might be interested in
The template code provided is intended to take two inputs, x and y, from the user and print "pass" if one or more of the followi
just olya [345]

import java.util.Scanner;

public class U3_L6_Activity_Two{

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       int x = scan.nextInt();

       int y = scan.nextInt();

       if(x>=4|| ((y < 5) && ((x+y) < 7))){

           System.out.println("pass");

       }

   }

}

I'm pretty sure this is what you're looking for. Best of luck.

7 0
3 years ago
Which sentences or phrases in the passage hint at a bad work habit? Samantha works as an intern at a marketing firm. She always
Verdich [7]
<span>There are two sentences here that hint at a bad work habit.

1.She always shows up for work later than she is expected to but delivers her assignments as per her deadlines.

Here we see that Samantha not only is late to work, but she does it regularly. This is an example of a bad work habit, as being on time is one of the responsibilities of an employee. This also sends a bad massage to her coworkers, if she is not punished for it. That can lead to disorganization and loss of production.

2.She always tries her best to learn new skills even though she does not show up for work regularly.

Again, showing up for work is a must, except your company does not explicitly have a flexible work schedule that allows people to work from home or make their own working hours. In Samantha's case that does not seem to be the case and thus this is a bad habit. </span>
<span />
3 0
3 years ago
What is web based<br> What is local <br> What is mobile in computer
Radda [10]

Answer:

The mobile web refers to browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, or a device. hope this helps :)

Explanation:

6 0
3 years ago
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat
Flura [38]

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

5 0
3 years ago
Each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network
Citrus2011 [14]

Answer:

A. True.

Explanation:

It is true that each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

5 0
3 years ago
Other questions:
  • What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
    7·1 answer
  • Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
    10·1 answer
  • ____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its par
    8·1 answer
  • Households pay taxes to the government and receive public services. Which of the following is a public service?
    8·1 answer
  • What tab must you click on to view any previously read messages from instructors in the message center?
    14·2 answers
  • Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA'as two inputs and returns two independent sets
    10·1 answer
  • Why is it important to install updates? Why should you use the Power button on the Start menu instead of the Power button on you
    7·1 answer
  • Scott does not use privacy settings on his social media
    10·2 answers
  • What is the best definition of a network?
    9·2 answers
  • Question # 9
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!