A key verifier machine is used In controlling

A. transaction entry

B. data communication

C. computer processing

D. transaction origination

E. None of the above

Answer: Option A

This Question Belongs to Computer Science >> Management Information Systems

Join The Discussion

Related Questions on Management Information Systems

A lockbox service is used for

A. depositing cash when bank is closed

B. paying bank customer bills automatically

C. storing papers in a bank vault

D. depositing payments to bank customers

E. None of the above

Critical path of the PERT chart is:

A. path which takes the longest time to complete the project

B. the shortest path

C. both of the above

D. path which takes the shortest time to complete the project

E. None of the above