paragraph on how atms work

Answers

Answer 1
ATM (Automatic Teller Machine) is a banking terminal that accepts deposits and dispenses cash. ATMs are activated by inserting cash (in cases of ATM Depositing) or debit /credit card that contain the user's account number and PIN on a magnetic stripe (for cash withdrawals)

Related Questions

Name 3 examples of operating system software that are not Windows based.

Answers

Ubuntu, Linux, and Mint

Write a program to compute answers to some basic geometry formulas. The program prompts the user to input a length (in centimeters) specified as a floating point value. The program then echoes the input and computes areas of squares and circles and the volume of a cube. For the squares, you will assume that the input length value is the length of a side. For the circles, this same value becomes the diameter. Use the meter value input to calculate the results in square (or cubic) meters and then print the answers in square (or cubic) meters.

Answers

Answer:

import math

l = float(input("Enter length in cm: "))

l = l / 100;

print("Entered length is " + str(l) + " meters")

area_square = l * l

print("Area of square is " + str(area_square))

area_circle =  math.pi * l/2 * l/2

print("Area of circle is " + str(area_circle))

volume_cube =  l * l * l

print("Volume of cube is " + str(volume_cube))

Explanation:

*The code is in Python

Ask the user to enter the length in cm

Convert the length to meters and print it

Calculate the area of the square and print it (Since length is equal to a side, the area is length * length)

Calculate the area of the circle and print it (Since length is equal to the diameter, you need to divide it by two to get the radius. The area is pi * length/2 * length/2)

Calculate the volume of the cube and print it (Since length is equal to a side, the volume is length * length * length)

1. Which of the following is a result of a successful negotiation?
Mediation
Win-win outcome
Conflict resolution
Consensus

Answers

Maybe a Win win outcome
I guess its Win-win outcome.
Thank you!

To the greatest extent possible, coalition members should _____.

Answers

Answer: consider the ramifications of labeling information about operational areas as intelligence

Explanation:

The options to the question are:

a. consider the ramifications of labeling information about operational areas as intelligence

b. prevent the sharing of relevant intelligence about the situation and adversary

c. occasionally seek the necessary authorization for foreign disclosure of information

d. disseminate information freely without a tear line.

To the greatest extent possible, coalition members should, consider the ramifications of labeling information about operational areas as intelligence.

It should be noted that security operations activities are conducted by U.S. forces in order to demonstrate the commitment of the U.S to its alliances, and also enhance regional stability.

What makes Java platform independent?

Answers

Answer:

Java it is the use of Byte code that makes it platform independent.

Explanation:

Java platform independent language allows its the end users to access they source code and other language automatically,its a human readable language.

Java is created in the James Gosling at the sun micro systems,and java is an open source programming language, generally the people refer the java because its source connections.Java code may be use sequence of machine that can be use executed by the directly CPU,and all the program in java are compiled by java c.Java is an independent platform and variety of methods, its object oriented language, and java is study platform.Java program are compiled into byte code and that byte code is platform independent, and they machine execute the byte code the java virtual machine.Java is the platform independent because it does not depend on the type of platform,and the virtual machine also interpret the representations.Java compiler is the .class file or the byte code and the machine native code,java is that depend on java virtual machine.Java is does not required any licence to the run and they also reliable platform to work on.

What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times. B. Only authorized personnel can access data. C. Each website should have privacy control settings. D. Clients cannot refuse to make payments once they place an order.

Answers

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

Answer:

Clients cannot refuse to make payments once they place an order.

Explanation:

PLATO Cyber-security

I got 5/5 on the quiz.

Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize relationships among a dependent variable and one or more independent variables.b. It is a collection of techniques that seek to group or segment a collection of objects into subsets.c. It is the process of selecting values of decision variables that minimize or maximize some quantity of interest.d. It is the process of generating random values for uncertain inputs in a model and computing the output variables of interest.

Answers

Answer:

d. It is the process of generating random values for uncertain inputs in a model and computing the output variables of interest.

Explanation:

Monte Carlo simulation is the process of generating random values for uncertain inputs in a model and computing the output variables of interest. It is a type of computational algorithm which is used to predict the probability of various outcomes based on repeated random samples or variables. It is used for better decisions making by providing information about the impact of a risk and for forecasting models.

what is ovoviviparous? ​

Answers

Answer:

o·vo·vi·vip·a·rous

Explanation:

(of an animal) producing young by means of eggs which are hatched within the body of the parent, as in some snakes.

ASP PLZ Study the diagram of the geologic time scale.
Which method is most likely used to identify what happened before the start of the Paleozoic era?

1) Scientists study fossils from the Jurassic period.
2) Scientists observe index fossil records of the Mesozoic era.
3) Scientists examine fossil evidence during the Precambrian time.
4) Scientists explore the emergence of mammals and humans in the Cenozoic era.

Answers

The answer is definitely number 2

Answer:

C. Scientists examine fossil evidence during the Precambrian time.

Explanation:

which of the following terms best describes the product development process?

Answers

Answer:

D - Scientific investigation aims to design and implement an experiment to learn new information, whereas technological development aims to design a product to solve a problem.

$8.25/hour; _____$/year, when working 40 hours a week.

Answers

if you work 50 weeks/year and 40 hours/week, you will make 16,500 dollars per year if you make 8.25 per hour

What problems might you encounter when using the Web for research?
a. Lack of current news
b. Undocumented sources
c. Lack of search tools
d. Time-consuming searches
e. Unreliable conten

Answers

Answer:

b. d. e.

Explanation:

The web is a vast and endless database of information and has become an invaluable resource for research. That being said it can also bring with it many problems, the main one being unreliable content due to undocumented sources, false testimonies, information with no evidence, etc. The amount of false information on the internet can sometimes make it very time consuming since you have to take the extra step of verifying the information you come across. Despite this, the WEB has information on every topic including current news, and with the wide array of search tools available it is very easy to find what you are looking for.

Help meeeee - Improved Pet App


Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.


User


Phone Sensors


Internet








Answers

Answer:

Did you do it? Can you give me the answers please‍♀️

Explanation:

Pleaseeeeeeeeeeeeeeeeeeeeeeeeeeeee

Read the following code:

x = currentAge
print(x + 20)

What value will this code calculate?

Select one:
a. Age in 20 years
b. Age 20 years ago
c. Age at 20 years old
d. Age in the year 2020

Answers

Answer:

The answer is "A) Age in 20 years"

Explanation:

Assuming currentAge is declared and is an integer, you are adding 20 to your current age which means it will print your age in 20 years.

Its Option A - Age in 20 Years.
Thank You!

>>> from hog import *
>>> test_dice = make_test_dice(4, 6, 1)
>>> test_dice()______
>>> test_dice() # Second call
______
>>> test_dice() # Third call______
>>> test_dice() # Fourth call

Answers

Answer:

This Python code is an implementation of an anonymous function like a lambda function in other function.

Explanation:

The function 'make_test_dice' with the arguments 4, 6 and 1, returns a lambda function to the test_dice variable.

The test_dice is called with parenthesis to run the lambda function. This implementation is used to hide a parameter in a calculation or process.

Discuss the different types of user-friendly interfaces and the types of users who typically use each.

Answers

Answer:

1. Natural Language Interface- Telephone users

2. Menu Driven Interface- Automated Teller machine users.

3. Graphic User Interface- Computer users

4. Form-based interface- Website visitors

5. Command-line interface- Advanced users of computers

Explanation:

User interface refers to the hardware and software features in a computer system which makes it easier for the operators to relate with the system. Some of them include;

1. Natural Language Interface- This software feature allows the user to send oral instructions to the computer system.  Telephone users experience this when they give oral commands to their phones.

2. Menu Driven Interface- Contains buttons and a touch screen feature that allows users to enter commands in a menu. Automated teller machines used by bank customers are menu-driven interfaces.

3. Graphic User Interphase- Involves the use of the cursor to draw images using graphic icons. Graphic designers can use this to create images.

4. Form-based Interface- Basically contains fields with boxes and menus that would need to be completed. For example, job seekers have to complete fields and boxes before they submit a job application form online.

5. Command-line interface- Is characterized by basic commands which are to be entered by the user to the computer. Advanced users of computes use this feature.

Assignment 1 silly sentences

Answers

Answer:

Sally sells sea shells by the sea shore

Explanation:

Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
Accessibility testing
Broken link testing
Mobile testing
Readability testing

Answers

Answer:

Broken Link testing.

Explanation:

Took the test and did research.

Answer:

Broken link testing

Explanation:

Broken link testing is when you test all of your hyperlinks in a browser window. You can do this by clicking each hyperlink to see if it works. This will ensure the best possible user experience.

How do you begin typing in a table cell?

A. Click within a cell and begin typing.

B. Highlight the table and begin typing.

C. Click on the Convert to Text button in the Layout ribbon.

D. Right-click and select Text Direction.

Answers

Its Option A - Click Within a Cell and begin typing.
Thank you!

To begin typing in a table cell, click within a cell and begin typing. The correct option is A.

What is a table cell?

A table cell is a subset of a chart table that is used to store information or data. Cells are organized both horizontally and vertically.

Each cell contains information about the combination of row and column headings with which it is collinear.

Text, numbers, and a variety of other elements can be included in table cells. Tables were originally used only to display numbers, but they are now useful for a wide variety of tasks.

To begin typing text into a cell, simply select a cell and start typing. To select text that is already inside a cell, place the insertion point within the cell.

In either mode, you can use the arrow keys to navigate around the table, making it simple to enter text into any cell.

Thus, the correct option is A.

For more details regarding a table cell, visit:

https://brainly.com/question/8059827

#SPJ5

For what purpose are high-level programming languages used for

1. Give control over the hardware to execute tasks quickly

2. Provide code that controls the computers hardware

3. Translate low-level programming languages into machine code

4. Write programs for general applications

Answers

Answer:

To speed up the compiler during run time

Explanation:

When computers are connected and operate through one main computer, it is called a _________ network. centralized client server GUI peer-peer

Answers

Answer:

the answer would be a client server

Explanation:

In a situation wherein computers are connected and operate through one main computer, it is called a client server network. Therefore, the option B holds true.

What is the significance of a client server network?

A client-server network can be referred to or considered as a network wherein all the systems that are collectively a part of the computer network are controlled and handled by a single system. This single system of computers is also known as the main computer.

The main computer has access to all the data, as well as information tracking of the activities performed by the main computer. In order to access anything between the different systems, the members systems need to get authorized access through the main computer.

Therefore, the option B holds true and states regarding the significance of a client server network.

Learn more about a client server network here:

https://brainly.com/question/28099574

#SPJ2

why is makyra a loser??​

Answers

Because she doesn’t have any friends :-(

Answer:

She dumbbbbbbbbbbbbbbbbbbbbbb

Explanation: Her mom watched too much spongebob while pregnant

the time a computer takes to start has increased dramatically, one possible explanation for this is that the computer is running out of memory. this explanation is a scientific....
a. hypothesis
b. experiment
c. observation
d. conclusion

Answers

Answer:

A

Explanation:

The appropriate answer will be Option c (observation).

Being able to comprehend or recognize something or be able to notice it his ability to observe in great depth is evident in every explanation or statement, which would be determined as an Observation.The result of observing or noting something, and then forming or expressing a judgment or a king of opinion.

The other given choices,

Experiment or hypothesis - Tests are used to examine a hypothesis or maybe even a concept through the utilization of such an experiment.

Conclusion - The final component of anything or a conclusion made following considerable deliberation.

Are not related to the given scenario. Thus the above option is the right one.

Learn more about observational learning here:

https://brainly.com/question/21861086

briefly explain the usage of the MS PowerPoint

Answers

Answer:

PowerPoint is a computer program that allows you to create and show slides to support a presentation. You can combine text, graphics and multi-media content to create professional presentations.

Answer:

Making your presentation more interesting through the use of multimedia can help to improve the audience's focus. PowerPoint allows you to use images, audio and video to have a greater visual impact. These visual and audio cues may also help a presenter be more improvisational and interactive with the audience.

How many bits are reserved for the Transmission Control Protocol (TCP) flags?

Answers

It’s 6 bits are reserved for the 6 TCP control flags. A connection, at which layer, implies that every segment of data sent is acknowledged? transport; A connection at the transport layer implies that every segment of data sent is acknowledged.

Match each task with the features necessary to complete the task

Answers

Is there supposed to be an image?

_________ attacks are becoming less common in modern operating systems.
a. Denial of service
b. SYN flood
c. Buffer overflow
d. None of the above

Answers

Answer:

c. Buffer overflow

Explanation:

In Computer programming, buffer can be defined as an area of memory set aside specially and specifically for holding data or informations.

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as buffer overflow. This ultimately implies that, buffer overflow is the process of exceeding the storage capacity of a memory buffer with data, beyond the amount it is designed to hold and therefore overwrites any adjacent memory locations.

Buffer overflow attacks are becoming less common in modern operating systems because the modern operating system usually leaves a space between buffers and randomize the layout of memory through call mapping, as well as through the use of runtime protection.

Which of the following is NOT a popular computer programming
language?
C++
Xero
C#
Java

Answers

Answer is Xero. All the other Languages are Popular and Widely Used.
Thank You!

The computer programming  language i.e. not popular is Xero.

The following are the popular computer programming  language:

C++C#Java

The computer programming  language is the language that is applying for writing the programs.

Therefore we can conclude that the computer programming  language i.e. not popular is Xero.

Learn more about the computer here: brainly.com/question/24504878

C# The video game machine at your local arcade output coupons according to how well you play the game. You can redeem 10 coupons for a candy bar or 3 coupons for a gumball. You prefer candy bars to gumballs. Write a program that defines a variable initially assigned to the number of coupons you win. Next, the program should output how many candy bars and gumballs you can get if you spend all of your coupons on candy bars first, and any remaining coupons on gumballs.

Answers

Answer:

#include<iostream>

using namespace std;

/* main is a function without a parameters which returns an int value*/

int main( )

{

/* declare int data type for numeric values initialize candyBar and gumBall */

int coupons, cabdyBr=10,gumall=3;

int candyBarAmount,gumBallAmount,remainder;

/* cout is used to show the message to user cin to read user input from keyboard and sets the value to coupon */

cout<<"Enter the number of coupons"\t";

cin>>coupons;

/* First check coupons with cabdyBar */

if (coupons >= candyBar)

{

candyBarAmount=coupons/candyBar;

remainder=coupons-(candyBarAmount*10);

}

else

{

candyBarAmount=0;

}

/* check remaining value with gumBall */

if (remainder<<candyBar && remainder>=gumBall)

{

gumBallAmount=remainder/gumball;

}

else

{

gumBallAmount=0;

}

/* show thw required output to the user */

cout<<"The number of Candy bars is "<< candyBarAmount <<endl;

cout<<"The number of gumballs is "<<gumballAmount <<endl;

/* The program ends and return 0 as the functions value */

return 0;

}

OUTPUT

Enter the number of coupons: 23

The number of candy bars = 2

The number of gumballs = 1

Which symbol is at the beginning and end of a multiline comment block?

Answers

The beginning of a block comment or a multi-line comment is marked by the symbol /* and the symbol */ marks its end.

Other Questions
pleasee answer this ASAP What natural boundary helps form the border between the United States and Mexico? Given what you know about cellular organelles, what problems do you predict a cell would have if it had a defect in a lysosomal enzyme Compare and contrast North Korea and the United States government I need help ASAP.3+2-(6-(1+1) I WILL GIVE YOU 71 PTS IF YOU ANSWER QUICK PLZ!!!!All floods have warning signs and so disasters can be prevented. TRUE OR FALSE Solve for g. C=1/2gq How would a negative rumor or public report about a product most likely affect the demand curve for that product? find If g(x) = x2 + 2, find g(3). 9 8 11 6 what is -0.5m - 0.75 = 2.15 Bentley signed up for a streaming music service that costs $13 per month. The service allows Bentley to listen to unlimited music, but if he wants to download songs for offline listening, the service charges $0.75 per song. How much total money would Bentley have to pay in a month in which he downloaded 10 songs? How much would he have to pay if he downloaded s songs 2.4 Code Practice: Question 2Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is inputted by the user.Enter a number: 15.789Sample Output0.789Can someone please help me with this because Im so stuck why should every school have a library what is the property of (4y+1)x 0=0 There is a giant spinning wheel at a carnival. The wheel is numbered 1 to 12. Each section is the same size. The wheel is spun, and, if it stops on your number, you win a prize. Molly has numbers 2, 5 and 11. What is the probability that she wins a prize? Give your answer as a fraction in its lowest terms. Were Often hostile relations with Native Americans in the British colony or French colony? How did people first hand down music from one generation to the next?by writing it on stone tabletsby memorizing it and teaching othersby writing it on paperby painting notation on cave walls 2 lines intersect. A horizontal line has points D, E, B. Line A C intersects that line at point E. Angle A E D is (x + 25) degrees and Angle A, E, B is (9 x + 10) degrees. What is the numerical sum of the degree measures of DEA and AEB? What are the numerical measures of the angles? x = mDEA = mAEB = In an arithmetic progession T7 =20 and T13 =38,. Find the first term and the common difference. The first peace talks between the United States and North Vietnam during the Vietnam War began in 1967. 1972. the late 1960s. the early 1970s.