b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer 1

Answer:

b

Explanation:


Related Questions

jessica has connected her new printer to her windows 10 computer, but windows is not recognizing it. what should she do?

Answers

reconnect the printer or you could  Explanation:

If Windows 10 is not recognizing Jessica's new printer, she should take the following steps:

Check the physical connections: Ensure that the printer is properly connected to the computer via a USB cable or a network connection.

The Steps to take

Restart both devices: Restart the computer and the printer to refresh the system and establish a new connection.

Update printer drivers: Visit the printer manufacturer's website and download the latest drivers specific to her printer model. Install the drivers on the computer.

Run the printer troubleshooter: Go to the Windows settings, select "Update & Security," then "Troubleshoot." Choose "Printer" and follow the on-screen instructions to diagnose and fix any issues.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ2

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

Which of the following developed technologies has NOT greatly increased the speed of information dissemination? A. Smartphones B. E-mail C. Typewriter D. Teleconferencing.

Answers

Answer:Email

Explanation:

Answer:

The answer would be C

Explanation:

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

which of the following are benefits of designing a scalable system? choose 3 options.

-guaranteed systems access for all users

- users may never know that a site has experienced tremendous growth

- ability to respond to user volume issues more quickly

- system will never need to grow again

-ability to maintain a high level of service for customers ​

Answers

I asked my brother since he’s kinda of tech geek and he said

The 1st, 3rd, and 5th answers are correct

Hope this helps and I hope my brother is not wrong.

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

Answers

Answer:

Electronic evidence on computer storage media that is not visible to the average user is called​ ambient data.

What are the revised versions of water grinding mill and horse cart

Answers

What are the revised versions of water grinding mill and horse cart

ANSWER

A watermill or water mill is a mill that uses hydropower.

It is a structure that uses a water wheel or water turbine to drive a mechanical process such as milling (grinding), rolling, or hammering. Such processes are needed in the production of many material goods, including flour, lumber, paper, textiles, and many metal products.

These watermills may comprise gristmills, sawmills, paper mills, textile mills, hammermills, trip hammering mills, rolling mills, wire drawing mills.

Helpppppp meeeeeeeeeeeee pleaseeeeee

Answers

Answer:

B

Explanation:

PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.

Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.

Answers

A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.

A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, the different types of server include:

Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb server

A typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.

Read more: https://brainly.com/question/21078428

In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data.

Answers

Answer:

In the context of data-flow diagrams (DFDs), a(n) entity symbol shows either the source or destination of the data

Explanation:

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

Can you predict what changes will come to data storage in the next decade? 

Answers

Answer:

Explanation:

More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Answers

Answer:

Hey there!

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Hope this helped! :)

true or false? multimedia components such as audio and video do not significantly contribute to increased computer network traffic.

Answers

Answer:

false

Explanation:

are you KIDDING ME? imagine streaming a 4k video through YT.. yeah you know how much storage and bandwidth that takes up? it is VERY BIG. this is false

multimedia components such as audio and video do not significantly contribute to increased computer network traffic. The statement is false.

What is multimedia ?

Multimedia is an user engaging type of  media which offers a variety of effective ways to give information to user and user  can interact with digital information through it.

Multimedia can act a   communication tool, it has many application like Education, training, reference materials, corporate presentations, marketing, and documentary application.

Multimedia use text, audio, video, graphics, and animation to give information in a dynamic way and it is a technological way of presenting information  with textual data like video conferencing, Yahoo Messenger, email, and the Multimedia Messaging Service ( MMS Service (MMS).

For more details regarding multimedia, visit

https://brainly.com/question/9774236

#SPJ2

It is most commonly used for self-running presentations.
A. Slide Transition
B. Hyperlink
C. Action Buttons
D. Animation​

Answers

Answer:slides

Explanation: because in the slide you can make a presentation

using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies?

Answers

There are technology that are used to detect and identify objects with tracking tag. The statement is an example Smart logistics IOT technologies.

Smart logistics is commonly called Connected logistics.  It helps or allows us to have near real-time tracking of movement/delivery of goods and services.

It is often used by ECommerce companies, food delivery companies, app-based taxi service companies, online markets etc.

 

In the logistics process, Internet of things can aid an individual by tracking goods and services as it saves time.

Learn more from

https://brainly.com/question/19995128

If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)

What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

If you suspect cyber crime what do you u do?​

Answers

Answer:

Hey mate.....

Explanation:

This is ur answer.....

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Hope it helps!

Brainliest pls!

Follow me! :)

Answer:

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Explanation:

What in a database table is an item of information with some characteristics?

Answers

Answer:

Attributes describe the characteristics or properties of an entity in a database table. An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course.

Explanation:

CAN I GET BRAINLIEST

If an Intel central processing unit (CPU) has two physical processing cores but is able to make the operating system software act as if it using four processing cores, what technology is that processor using

Answers

Answer:

A Quad-core CPU

Explanation:

because it acts as if it uses four processing cores, so it will be using the Quad-core for the Central Prossesing Unit (CPU)

define the term software with example​

Answers

Answer:

A software or computer software essentially a type of programs which enable the users to perform some particular specific task or actually used to operate their computer. It essentially directs all of the peripheral devices on the entire computer system- what exactly to do and how exactly to perform a task. A software plays a key role of a mediator between the user and the computer hardware. In the absence of software, a user essentially can’t perform any task on a computer. A software product development company is the one which develops software for the users.

Explanation:

hope it will helpful for you

In computing we generally have two parts, the Hardware which we can feel and touch and the Software which are a set or collection of instructions or commands the computer can understand and executes, We cannot touch it

Examples of softwares are

Excel WindowsiTunesMs Word

Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system.

In summary we use programming Languages to write software programme for the computer to execute.

Learn more about softwares :

https://brainly.com/question/1538272

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

Other Questions
Please help and no links, thanks:) that would be nice If z varies directly as x and inversely as y and is equal to 4 when x and y have the values 12 and 8 respectively, what is the value of z when x is equal to 6/7 and y is equal to 5/28? what are the keyboard features Hello. I am trying to figure out how to convert 17cm2 or cm squared to in2 (in squared) A savings account is an example of ainvestment.A. high risk, high returnB. low risk, high returnc. low risk, low returnOD. high risk, low return what technological development increases commercial activity in new york city and led to the growth of the citys population in the early 1800s? Question 2(Multiple Choice Worth 1 points)(03.04 LC) Read and choose the correct words for the blank that match the image.A person sprinkling salt on some french friesT necesitas ________ para las papas. el pollo el tomate la sal la pimienta why is there an unbalanced distribution of population by Geography regions explain with justification 7433654 round to the nearest thousand Can someone please do this for me? The term pluralistic ignorance describes: a. ignoring the calls of officers in need. b. conflicts between management and officers being reflected in inmate behavior. c. competing interest groups operating within the prison. d. the vocal minority shaping the perception of subcultural values. -6x + 30 < -18. Help pls how long does it take to recover from a torn meniscus A desk is on sale for 15% off. The sale price is $612.What is the regular price? (3,1);m=4(Write an equation in point slope form of the line that passes through the given point and has the given slope) Could New York stategrant a monopoly thatoperates acrossmultiple states? What is the cost of 4 pounds of apples, if 3 pounds of apples cost $5.28 and the unit price for each pound of apples is the same?HELP ASAP! help Which relation is a function? (HELP PLEASE 1!!!!!1!!) How can you tell if data is continuous or discrete what type of event is an agent conducting when he presents plan information that includes benefits and cost sharing in an audience-presenter format?