Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur
Last Answer : The tape is reusable
Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable
Last Answer : c. The tape is reusable
Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors
Last Answer : data entry errors
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation
Last Answer : 3) Scanning automation
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation
Last Answer : 3 Scanning automation
Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above
Last Answer : the ratioof the number ofdata units in error to the total number of dataunits
Description : How much quality will I sacrifice if I dub a vhs tape to DVD using the slp mode with reusable media?
Last Answer : Reusable media isn't really made for this strenuous an activity.
Description : Which of the following statements is true about a software verification and validation program? I. It strives to ensure that quality is built into software. II. It provides management with insights into the state ... software development activities. A. I, II&III B.II, III&IV C.I, II&IV D.I, III&IV
Last Answer : C.I, II&IV
Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above
Last Answer : Answer : B
Description : Which of the following statements would least likely appear in an auditor's engagement letter? a. Our engagement is subject to the risk that material errors, fraud, and defalcations, if they exist, ... services are based on our regular per diem rates, plus travel and other out-of-pocket expenses
Last Answer : After performing our preliminary analytical procedures we will discuss with you the other procedures we consider necessary to complete the engagement.
Description : SHARP who is responsible for ensuring the SAMFE has performed annual compeentency verification as outlined in AR 40-86 and medcom supplement 1 to medcom regulation 40-36?
Last Answer : sacc
Description : Which of the following processes are performed in the Closing process group and in what order? A. Contract Closure and then Close Project B. Scope Verification and then Close Project C. Contract Closure and then Scope Verification D. Close Project and then Contract Closure
Last Answer : A. Contract Closure and then Close Project
Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing
Last Answer : B. Static testing
Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these
Last Answer : a. syntax error
Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error
Last Answer : c. Logical error
Description : Information risk refers to the risk that a. The client may not be able to remain in business. b. Errors and frauds would not be detected by the auditor's procedures. c. ... financial statements that arematerial misstated. d. The client's financial statements may be materially false and misleading
Last Answer : The client's financial statements may be materially false and misleading
Description : Which of the following statements best describes the auditor's responsibility regarding the detection of material errors and frauds? a. The auditor is responsible for the failure to detect material ... unrecorded transactions even if there is no evidence that material errors and frauds may exist
Last Answer : The audit should be designed to provide reasonable assurance that material errors and frauds are detected
Description : The following statements relate to the auditor's responsibility for the detection of errors and fraud. Which of the statement is correct? I. Due to the inherent limitations of the audit, there is a possibility that ... . a. I only b. II only c. Both statements are true d. Both statements are false
Last Answer : Both statements are true
Description : Which of the following statements best describes the auditor's responsibility to detect material errors and fraud? a. The auditor is responsible for the failure to detect material errors and ... detect unrecorded transactions even if there is no evidence that material errors and frauds may exis
Last Answer : The audit should be designed to provide reasonable assurance that material errors and fraud are detected.
Description : State weather the following statement is true or false for Exception Reporting 1). If the user runs into trouble, this trouble can be reported to the peer using a S-U-EXCEPTION-REPORT. request primitive. 2). Exception ... . false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : The system administrator in CRC a) He will be responsible for the maintenance and security in the functioning of the system by keeping secrecy of his own password and also ensuring proper maintenance ... and periodical Back-up/Restore of data and cleaning up of records. d) All the above
Last Answer : d) All the above
Description : An auditor's examination performed in accordance with generally accepted auditing standards generally should a. Be expected to provide assurance that illegal acts will be detected where internal control is ... aspects. d. Not be relied upon to provide assurance that illegal acts will be detected
Last Answer : Not be relied upon to provide assurance that illegal acts will be detected
Description : Primary key field gives us permission to record duplicate entry. -Technology
Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.
Description : What type of objects are most easily detected by an fm system?
Last Answer : Stationary.
Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these
Last Answer : b) Proof-reading
Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these
Last Answer : B. Proof-reading
Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these
Last Answer : C. Proof-reading
Description : A document that specifies how many times and with what data the program must be run in order to thoroughly test it. a) addressing plan b) test plan c) validation plan d) verification plan
Last Answer : Answer: b Explanation: Test plan is the A document that specifies how many times and with what data the program must be run in order to thoroughly test it. It comes under testing
Description : My short story competition entry, "Among the stars", had not been reviewed. May I have some constructive critisism, and possible editing?
Last Answer : I’ll read it in the morning and let you know. :-)
Description : Why do most materials have magnetic properties too weak to be detected easily?
Last Answer : Feel Free to Answer
Description : Give examples of motion that is not easily detected.
Last Answer : a) Constituents of solid are in a state of continuous vibration, not visible to the naked eye. b) The revolution and spin of the earth is not detected inspite of their high speed. c) Theory of plate tectonics tells us that the continents are drifting at the slow speed.
Description : Is there a free photo-editing software available, that you can easily make your photos look like they came from a photo-booth?
Last Answer : cracked photoshop
Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above
Last Answer : It provides only sequential access to stored data
Last Answer : b. It provides only sequential access to stored data
Description : Which of the following statements about continuous cardiac output monitoring are true? A. Continuous cardiac output monitoring may unmask events not detected by intermittent cardiac output measurements. ... stroke volume by detecting changes in resistance to a small, applied alternating current.
Last Answer : Answer: AD DISCUSSION: Various techniques are available to measure cardiac output continuously. The advantages of continuous cardiac output monitoring, as compared with intermittent methods, are (1) ... function of the stroke volume, which then can be used to calculate the cardiac output
Description : RAID stands for __________ a) Redundant array of independent disks b) Redundant array of individual disks c) Reusable Array of independent disks d) Reusable array of individual disks
Last Answer : Answer: a Explanation: RAID is a multiple-disk database design which is viewed as a single logical disk by the operating system. Data are distributed across the physical drives of the array. It guarantees the recovery of data in case of data failure
Description : Reusable optical storage will typically have the acronym _______: a) CD b) DVD c) ROM d) RW e) ROS
Last Answer : d) RW
Description : Give one advantage of using primary key. -Technology
Last Answer : A primary key uniquely identifies the record in the table.
Description : What characteristics of Read Only memory ROM, makes it useful? 1) ROM information can be easily updated. 2) ROM provides very large amounts of inexpensive Data storage. 3) Data in ... remains there even without electrical power 4) ROM chips are easily Swapped between different brands of computers
Last Answer : 3) Data in ROM is Nonvolatile, that is , it remains there even without electrical power
Description : (i) Two sided errors are rectified by passing ________ entry.
Last Answer : Complete the following sentences : (i) Two sided errors are rectified by passing ________ ... , the suspense account will have a ________balance.
Description : What key do you use to erase an entire entry in a cell and then reenter the data from the beginning with Excel?
Last Answer : You can press the Delete key. However, if you just select a celland start typing, it will replace what is in the cell, so it is notnecessary to press the Delete key first.
Last Answer : Cable Fault Detected To do Method ,,,, 1 / Blavier Test 2 / loop Test 3 / Induction Test 4 / voltage Drop Test 5 / Capacity Test .
Description : Which of the following statements describe refractive surgery? a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is ... a stable refractive error. The corneal structure must be normal and refractive error stable.
Last Answer : a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is considered a cosmetic procedure (to achieve clear vision without ... is performed to reshape the cornea for the purpose of correction of all refractive errors.
Description : Tape winding errors can cause a deformed tape pack. What are four common types of tape pack deformation?
Last Answer : Cinching, pack slip, spoking, and windowing.
Description : You see a build-up of dust and lint on the take-up reel of a tape recorder. This can cause which of the four types of tape errors?
Last Answer : Signal dropout errors and level errors. The dust and lint on the reel will eventually get onto the tape where it can get between the tape and the recorder’s heads.
Description : What are four types of tape errors that can degrade a magnetic recording system’s performance?
Last Answer : Signal dropout, noise, skew, and level. Dropout is the most common.
Description : What term is used to describe a spread spectrum communications system in which a very fast binary bit stream is used to shift the phase of an RF carrier? A. Frequency hopping B. Direct sequence C. Binary phase-shift keying D. Phase compandored spread spectrum
Last Answer : B. Direct sequence
Description : The modulation technique used by GSM cellular system A. Phase shift keying B. Frequency shift keying C. Gaussian minimum shift keying D. QAM
Last Answer : C. Gaussian minimum shift keying
Description : ECE Board Exam March 1996 The modulation system used for telegraphy is A. frequency-shift keying B. two-tone modulation C. pulse-code modulation D. single-tone modulation
Last Answer : A. frequency-shift keying
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption