A characteristic of card systems is:
a. Slowness in processing data
b. Using cards as records of transactions
c. Needing a larger DP staff
d. All of the above

1 Answer

Answer :

All of the above

Related questions

Description : A characteristic of card systems is: A) Slowness in processing data B) Using cards as records of transactions C) Needing a larger DP staff D) All of the above

Last Answer : Answer : D

Description : A characteristic of card systems is: a. Slowness in processing data b. Using cards as records of transactions c. Needing a larger DP staff d. All of the above

Last Answer : d. All of the above

Description : A characteristic of card system is 1) slowness in processing data 2) using cards as records of transactions 3) needing a larger data staff 4) All of these

Last Answer : 4) All of these

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : In the third generation of computers: a. Distributed data processing first became popular b. An operating system was first developed c. High-level prcedu7ral languages were firs used d. On-line, real time systems first became popular

Last Answer : On-line, real time systems first became popular

Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch

Last Answer : Mouse

Description : Administrate supervision of database activities is the responsibility of the A. Databaseadministrator B. DP Manager C. DB Manager D. DP administration E. None of the above

Last Answer : Databaseadministrator

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : Rama, a bright pupil, is openly impatient of the errors and slowness of other students in the class and wishes to answer much more than his share of questions. His teacher should Options: A) Ask ... D) Make him realize that he is not so smart by asking him difficult questions that he cannot answer

Last Answer : D) Make him realize that he is not so smart by asking him difficult questions that he cannot answer 

Description : (i) A system of book-keeping which records only one aspect of business transactions and ignores other aspects.

Last Answer : Write a word, term, or phrase which can substitute each of the following statements : (i ... approximate or estimated values as on a particular date.

Description : The main objective of Bookkeeping is to keep permanent records of business transactions.

Last Answer : State whether the following statement are true or false with reason : The main objective ... is to keep permanent records of business transactions.

Description : The underlying conditions that create demand by users for reliable information include the following except: a. Decisions are not time-sensitive. b. Transactions that are numerous and complex. c. ... records by distance and time. d. Financial decisions that are important to investors and users

Last Answer : Decisions are not time-sensitive

Description : Which of the following is an example of an error? a. Defalcation b. Misapplication of accounting policies. c. Suppression or omission of the effects of transactions from the records or documents. d. Recording of transactions without substance

Last Answer : Misapplication of accounting policies.

Description : Which of the following factors most likely would influence an auditor's determination of the auditability of an entity's financial statements? a. The complexity of the accounting system. b. The ... c. The adequacy of the accounting records. d. The operating effectiveness of control procedures.

Last Answer : The adequacy of the accounting records.

Description : What records a country's transactions (made by individuals, firms and government bodies.) with the rest of the world? a) Trade deficit b) Capital Budget c) Foreign imports d) Balance of Payments or BoP

Last Answer : b) other things remaining equal

Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above

Last Answer : they contain clock recovery circuits

Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D

Last Answer : b. A,B,C

Description : What is Software ? Set of computer programs, procedures and possibly associated document concerned with the operation of data processing. A set of compiler instructions A mathematical formula None of above

Last Answer : Set of computer programs, procedures and possibly associated document concerned with the operation of data processin

Description : Actual data processing operations are performed in the arithmetic logic section, but not in the “. Storage section of a processor unit a. Primary b. Accumulator c. Buffer d. Secondary

Last Answer : Primary

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accuratel

Last Answer : Input, storage, manipulation and outputting of data

Description : The most commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called a. ASCII b. EBCDIC c. BCD d. All of above

Last Answer : ASCII

Description : A remote batch-processing operation in which data is solely input to a central computer would require a. telegraphp line b. simplex lines c. mixed bad channel d. all of above

Last Answer : simplex lines

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : What's a great way to stop using credit cards but keep Mint-friendly electronic transaction records?

Last Answer : Is it possible to use a debt card (linked to a checking or savings account) or a charge card (like American Express) for you business? What specifically don’t you like about credit cards?

Description : The Aadhaar-Enabled Payment Systems(AEPS) is a bank led model that facilitates banking facilities by allowing transactions at Point of Sale through the Business Correspondent (BC) using the Aadhaar ... . Cash Withdrawal C. Online Payment D. Cash Deposit E. Aadhaar to Aadhaar funds transfer

Last Answer : C. Online Payment Explanation: Services Offered by AEPS: Balance Enquiry Cash Withdrawal Cash Deposit Aadhaar to Aadhaar Fund Transfer Gateway Authentication Services

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Who is credited with the idea of using punch cards to control patterns in a waving machine ? Pascal Hollerith Babbage Jacquard

Last Answer : Jacquard

Description : Who is credited with the idea of using punch cards to control patterns in a waving machine? a. Pascal b. Hollerith c. Babbage d. Jacquard

Last Answer : Jacquard

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is an "error" as distinguished from "fraud"? a. Lapping b. Embezzlement of company's fund c. Clerical mistakes in the processing of transactions d. Window dressing

Last Answer : Clerical mistakes in the processing of transactions

Description : Grouping and processing all of a firm's transactions at one time is called: a) a database management system b) batch processing c) a real - time system d) an on - line system e) None of The Above

Last Answer : c) a real - time system

Description : Which of the following is characteristic of an MIS? (A) Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing alternatives. (B) Draws on ... Has as its goal the efficiency of data movement and processing and interfacing different TPS. 

Last Answer : (B) Draws on diverse yet predictable data resources to aggregate and summarize data.

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number

Description : Which of the following is true? a. Fields are composed of bytes b. Records are composed of fields c. Fields are composed of characters d. All of above

Last Answer : All of above

Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every

Last Answer : A. domain, particular

Description : Which of the following transmission systems provide the highest data rate to in individual device? a. computer bus b. telephone lines c. voice and mode d. lease lines

Last Answer : computer bus

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : .Inherent risk is not a characteristic of the a. Major types of transactions. b. Client’s business. c. Substantive procedures. d. Effectiveness of the client’s accountants

Last Answer : Substantive procedures

Description : One way in which passengers can be reassured during an emergency is: a. To regularly see members of the flight crew calmly moving about the cabin in a relaxed manner b. For the ... to direct passengers' attention to the emergency passenger brief cards and make sure that they have read them

Last Answer : c. For the cabin staff to ensure the passengers are aware of what is happening and that they are complying with instructions

Description : In the third Generation of computers A) Distributed data processing first became popular B) An operating system was first developed C) High level procedural language were first used D) Online real time systems first become popular

Last Answer : Answer : D

Description : Educational institutions,libraries, hospitals and industries store concerned information by- a)Operating systems b) Word Processing c) Data management d) informing systems

Last Answer : c) Data management

Description : In the third Generation of computers a. Distributed data processing first became popular b. An operating system was first developed c. High level procedural language were first used d. Online real time systems first become popular

Last Answer : d. Online real time systems first become popular