The primary advantage of key-to-tape data entry system is
a. A large percentage of editing can be performed at the time of data entry
b. Key verification is easily performed
c. The tape is reusable
d. Keying errors can be detected as they occur

1 Answer

Answer :

The tape is reusable

Related questions

Description : The primary advantage of key-to-tape data entry system is A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.

Last Answer : Answer : C

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable

Last Answer : c. The tape is reusable

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : If digitaldata rateof 9600 bps is encoded using 8-level phaseshift keying (PSK) method, the modulation rate is A. 1200 bands B. 3200 bands C. 4800 bands D. 9600 bands E. None of the above

Last Answer : 3200 bands

Description : Actual data processing operations are performed in the arithmetic logic section, but not in the “. Storage section of a processor unit a. Primary b. Accumulator c. Buffer d. Secondary

Last Answer : Primary

Description : How much quality will I sacrifice if I dub a vhs tape to DVD using the slp mode with reusable media?

Last Answer : Reusable media isn't really made for this strenuous an activity.

Description : Which of the following statements is true about a software verification and validation program? I. It strives to ensure that quality is built into software. II. It provides management with insights into the state ... software development activities. A. I, II&III B.II, III&IV C.I, II&IV D.I, III&IV

Last Answer : C.I, II&IV

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : Which of the following is not a primary storage device? a. Magnetic tape b. Magnetic disk c. Optical disk d. None of above

Last Answer : None of above

Description : Which of the following statements would least likely appear in an auditor's engagement letter? a. Our engagement is subject to the risk that material errors, fraud, and defalcations, if they exist, ... services are based on our regular per diem rates, plus travel and other out-of-pocket expenses

Last Answer : After performing our preliminary analytical procedures we will discuss with you the other procedures we consider necessary to complete the engagement.

Description : SHARP who is responsible for ensuring the SAMFE has performed annual compeentency verification as outlined in AR 40-86 and medcom supplement 1 to medcom regulation 40-36?

Last Answer : sacc

Description :  Which of the following processes are performed in the Closing process group and in  what order?  A. Contract Closure and then Close Project B. Scope Verification and then Close Project C. Contract Closure and then Scope Verification D. Close Project and then Contract Closure

Last Answer : A. Contract Closure and then Close Project

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these

Last Answer : a. syntax error

Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors

Last Answer : data entry errors

Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error

Last Answer : c. Logical error

Description : Information risk refers to the risk that a. The client may not be able to remain in business. b. Errors and frauds would not be detected by the auditor's procedures. c. ... financial statements that arematerial misstated. d. The client's financial statements may be materially false and misleading

Last Answer : The client's financial statements may be materially false and misleading

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation

Last Answer : 3) Scanning automation

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation

Last Answer : 3 Scanning automation

Description : An auditor's examination performed in accordance with generally accepted auditing standards generally should a. Be expected to provide assurance that illegal acts will be detected where internal control is ... aspects. d. Not be relied upon to provide assurance that illegal acts will be detected

Last Answer : Not be relied upon to provide assurance that illegal acts will be detected

Description : Primary key field gives us permission to record duplicate entry. -Technology

Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.

Description : What type of objects are most easily detected by an fm system?

Last Answer : Stationary.

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : Which most popular input device is used today for interactive processing and for the one line entry of data for batch processing? a. Mouse b. Magnetic disk c. Visual display terminal d. Card punch

Last Answer : Mouse

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : In an Ethernet local area network, which one of the following statements is TRUE ? a. A station stops to sense the channel once it starts transmitting a frame. b. The purpose ... collision is detected. d. The exponential backoff mechanism reduces the probability of collision on retransmissions

Last Answer : The exponential backoff mechanism reduces the probability of collision on retransmissions

Description : Reading data is performed in magnetic disk by a. Read/write leads b. Sectors c. Track d. Lower surface

Last Answer : Read/write leads

Description : In OSI network architecture, the routing is performed by a. network layer b. data link layer c. transport layer d. session layer e. none of above

Last Answer : network layer

Description : In OSI network architecture, the routing is performed by a. network layer b. data link layer c. transport layer d. session layer

Last Answer : a. network layer

Description : The data recording format in most of the modern magnetic tape is a. 7-bit ASCII b. 7-bit EBCDIC c. 8-bit ASCII d. 8-bit EBCDIC

Last Answer : 8-bit EBCDIC

Description : My short story competition entry, "Among the stars", had not been reviewed. May I have some constructive critisism, and possible editing?

Last Answer : I’ll read it in the morning and let you know. :-)

Description : Why do most materials have magnetic properties too weak to be detected easily?

Last Answer : Feel Free to Answer

Description : Give examples of motion that is not easily detected.

Last Answer : a) Constituents of solid are in a state of continuous vibration, not visible to the naked eye. b) The revolution and spin of the earth is not detected inspite of their high speed. c) Theory of plate tectonics tells us that the continents are drifting at the slow speed.

Description : The word processing task associated with changing the appearance of a document is a. Editing b. Writing c. Formatting d. All of above

Last Answer : Formatting

Description : Is there a free photo-editing software available, that you can easily make your photos look like they came from a photo-booth?

Last Answer : cracked photoshop

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : b. It provides only sequential access to stored data

Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system

Last Answer : To uncover errors

Description : Which of the following statements about continuous cardiac output monitoring are true? A. Continuous cardiac output monitoring may unmask events not detected by intermittent cardiac output measurements. ... stroke volume by detecting changes in resistance to a small, applied alternating current.

Last Answer : Answer: AD DISCUSSION: Various techniques are available to measure cardiac output continuously. The advantages of continuous cardiac output monitoring, as compared with intermittent methods, are (1) ... function of the stroke volume, which then can be used to calculate the cardiac output