Computer Science - Management Information Systems - Discussion

Discussion Forum : Management Information Systems - Section 2 (Q.No. 8)
8.
A key verifier machine is used In controlling
transaction entry
data communication
computer processing
transaction origination
None of the above
Answer: Option
Explanation:
No answer description is available. Let's discuss.
Discussion:
Be the first person to comment on this question !

Post your comments here:

Your comments will be displayed after verification.