The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all that apply.) A. Make sure captured data are accurate and complete.
B. Make sure the input data is processed and stored correctly.
C. Make sure company policies are followed when data is input.
D. Make sure to capture transaction data and enter them into the system.

Answers

Answer 1
Answer:

Answer:

The answer to this question is options A,C and D.

Explanation:

The different steps when processing input are as following:-

  1. Make sure that the captured data is complete and accurate.
  2. Make sure that the company's policies are followed properly on the input of data.
  3. Make sure that the transaction's data is captured and to enter them in system.

Among the options given in the question the options written above are the steps that are used in the processing input.


Related Questions

The process of determining an organization's basic mission and long-term objectives and then implementing a plan of action for attaining these objectives is called:__________A) functional management. B) tactical management. C) strategic management. D) contingency management.
What kind of material is used to make the positive electrode of a dry cell?A.carbon rod B.zine can C.steel cover. D.electrolyte paste
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core - an operation called:A. graphics coprocessingB. multiplexer processingC. arithmetic-logic processingD. parallel processing
Two types of formulas in Excel, what are they? A. Complex and simple, B. General and currency, C. Logical and Boolean, D. Trig and mathematical
____ allows you to add formatting such as shapes and colors to text

Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request.?Betty's manager wants to just see the total figures of the sales without much of the supporting details. In which of the following folders is she likely to find this category of report?a. ?Summary reports
b. ?Exception reports
c. ?Detail reports
d. ?Control reports

Answers

Answer:

a. ​Summary reports

Explanation:

​Summary reports -

It is a form of tabular report , which consists of rows and column of data , is referred to as summary report .

It acts as a source for the components of dashboard .

As summary report enables to create a chart , view subtotal etc .

The subtotal value can be viewed from this type of report for a particular field , in order to generate a hierarchical list .

Hence , from the given scenario of the question ,

The correct answer is summary reports .

What is a SIEM (Security Information and Event Management) system utilized for?a. It is an advanced intrusion protection system with a GUI-frontend.
b. it is a system used to evaluate data from security devices and generate alerts.
c. It is an intellectual property protection software that prevents data links, and generates alerts.
d. It is a system that monitors security device hardware availability

Answers

Answer:

the answer is D

Explanation:

It is a system that monitor security device hardware availability

Final answer:

A SIEM system is utilized to b) evaluate data from security devices and generate alerts. It helps organizations monitor and analyze security events in real-time, allowing them to identify and respond to potential threats promptly.

Explanation:

The system collects and correlates data from various sources such as firewalls, intrusion detection systems, and log management tools, providing a comprehensive view of the security landscape.

For example, if a SIEM system detects multiple failed login attempts from different IP addresses, it can generate an alert indicating a possible brute-force attack. Moreover, it can help with compliance requirements by providing audit logs, incident reports, and compliance dashboards.

The primary goal of a SIEM system is to improve the security posture of an organization by proactively identifying and mitigating security incidents.

Learn more about SIEM system here:

brainly.com/question/29607394

#SPJ11

Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presented with the following menu: S: hangar steak, red potatoes, asparagus T: whole trout, long rice, brussel sprouts B: cheddar cheeseburger, steak fries, cole slaw (Yes, this menu really IS a menu!) Write some code that reads the String (S or T or B) that the user types in into a String variable choice that has already been declared and prints out a recommended accompanying drink as follows: if the value of age is 21 or lower, the recommendation is "vegetable juice" for steak, "cranberry juice" for trout, and "soda" for the burger. Otherwise, the recommendations are "cabernet", "chardonnay", and "IPA" for steak, trout, and burger respectively. Regardless of the value of age, your code should print "invalid menu selection" if the character read into choice was not S or T or B. ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.

Answers

Answer:

Hi!

The method in Java:

public void chooseMenuAndDrink(int age) {

     String menu;

     Scanner stdin = new Scanner(System.in);

     menu = stdin.next().charAt(0); //read the char and save the value on menu.

     

     if ( menu.equals("S") ) {  // if menu is S

           if(age > 21) { // and age > 21

          System.out.println("cabernet");  // prints cabernet

          } else { System.out.println("vegetable juice"); } // else prints vegetable juice

      }

      if ( menu.equals("T") ) {

           if(age > 21) {

         System.out.println("chardonnay");

     } else { System.out.println("cranberry juice"); }

  }

           if ( menu.equals("B") ) {

           if(age > 21) {

            System.out.println("IPA");

     } else { System.out.println("soda"); }

  }      

  if (!menu.equals("B") & !menu.equals("T") & !menu.equals("S")) { // if menu is not B, T or S

          System.out.println("invalid menu selection"); // prints invalid menu selection

     }

}

1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force the cursor to advance forward to the next tab setting is__________: 3.The character escape sequence to represent a single quote is_________: 4.The character escape sequence to represent a double quote is__________: 5.The character escape sequence to represent a backslash is__________:

Answers

Answer:

Hi there Kaylee! The answers to the blanks are as follow:

1.The character escape sequence to force the cursor to go to the next line is \n

2. The character escape sequence to force the cursor to advance forward to the next tab setting is \t  

3.The character escape sequence to represent a single quote \'

4.The character escape sequence to represent a double quote is \"

5.The character escape sequence to represent a backslash is \\

Explanation:

Character escape sequences are used for processing of special characters that may otherwise be used in a context where those characters are reserved as keywords or carry other symbolic reference. If these are not escaped, the output will not be correct.  

Plese give three examples of specilized servers.

Answers

1.Extended border node (EBN)
2.Central directory server (CDS)
3.Branch extender (BEX or BrEx or BrNN)
-Web Servers
-
Application Servers
 
Types of specialize servers. 

File, Printer and Database Servers. 
 
Movies, audio and animations also count. 

What are the two types of formulas in excel

Answers

Hi Lisa


Complex and simple


I hope that's help :)