2 Answers
1) Consistency of performance.
2) Programmed control Procedures.( eg. Protection of data against unauthorized access)
3) Single Transaction Update of Multiple or Data base computer files.
4) System Generated Transaction ( interest may be calculated and charged to automatically to customer account balance. )
5) Vulnerability of Data and program storage media.