Answer: Transaction processing system
Explanation:
A transaction processing system basically records all the data in the system. It is the set of data that basically monitor all the transaction process in the system. It basically perform various transaction oriented applications in the system.
It also allow time delay in the system when the item is supposed to being sold to the actually selling of the item. There are basically various types of transaction processing system arr payroll, account payable and the inventory control.
Answer: is a unified standard used when recording the sounds of instruments
Answer:
Excel is a multipurpose program that is useful in many different ways and not just in payroll. It has uses from Accounting to scientific research and everything in-between.
Elena might not need it for payroll but there are other ways to use Excel such as:
- Database of Donor details - Elena can use Excel to keep a list of the businesspeople who donate their old clothes to the organization. She can also add details to these names such as when they donated, the frequency at which they have donated, what they donated and the like. The donor details will therefore be organized such that information on donors can be easy to acquire for whatever reason it is needed for.
- Inventory - Excel can be used to keep an inventory list of the clothes that the organization has in stock. This will enable them better serve those they want to help as well as ensuring accountability in the workplace. A well kept inventory list will enable all sorts of analysis to be carried out such as which types of clothes are most in stock, which clothes are needed, which clothes are preferred and the like.
Answer:
Uhyuuuuufuddirueueurururururru
The question has the multiple choices below
A) Input validation
B) output correction
C) compiler criticism
D) output validation
The answer is (A) Input validation
Also known as data validation, it is the correct and proper
testing of any input supplied by an application or a user. It prevents wrongly
formed data from entering the system. Applications should be able to check and
validate every input entered into the system since it is hard to detect a
malicious user trying to gain entry into software.