The primary advantage of key-to-tape data entry system is A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.

1 Answer

Answer :

Answer : C

Related questions

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable

Last Answer : c. The tape is reusable

Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors

Last Answer : data entry errors

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation

Last Answer : 3) Scanning automation

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation

Last Answer : 3 Scanning automation

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : How much quality will I sacrifice if I dub a vhs tape to DVD using the slp mode with reusable media?

Last Answer : Reusable media isn't really made for this strenuous an activity.

Description : Which of the following statements is true about a software verification and validation program? I. It strives to ensure that quality is built into software. II. It provides management with insights into the state ... software development activities. A. I, II&III B.II, III&IV C.I, II&IV D.I, III&IV

Last Answer : C.I, II&IV

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : Which of the following statements would least likely appear in an auditor's engagement letter? a. Our engagement is subject to the risk that material errors, fraud, and defalcations, if they exist, ... services are based on our regular per diem rates, plus travel and other out-of-pocket expenses

Last Answer : After performing our preliminary analytical procedures we will discuss with you the other procedures we consider necessary to complete the engagement.

Description : SHARP who is responsible for ensuring the SAMFE has performed annual compeentency verification as outlined in AR 40-86 and medcom supplement 1 to medcom regulation 40-36?

Last Answer : sacc

Description :  Which of the following processes are performed in the Closing process group and in  what order?  A. Contract Closure and then Close Project B. Scope Verification and then Close Project C. Contract Closure and then Scope Verification D. Close Project and then Contract Closure

Last Answer : A. Contract Closure and then Close Project

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : which type of errors are detected by the assembler: a. syntax error b. logical error 9 run time error a none of these

Last Answer : a. syntax error

Description : What type of errors are not detected by assemblers: a. Syntax error b. Runtime error c. Logical error

Last Answer : c. Logical error

Description : Information risk refers to the risk that a. The client may not be able to remain in business. b. Errors and frauds would not be detected by the auditor's procedures. c. ... financial statements that arematerial misstated. d. The client's financial statements may be materially false and misleading

Last Answer : The client's financial statements may be materially false and misleading

Description : An auditor's examination performed in accordance with generally accepted auditing standards generally should a. Be expected to provide assurance that illegal acts will be detected where internal control is ... aspects. d. Not be relied upon to provide assurance that illegal acts will be detected

Last Answer : Not be relied upon to provide assurance that illegal acts will be detected

Description : Primary key field gives us permission to record duplicate entry. -Technology

Last Answer : False A primary key is a key which identifies records uniquely in a table so it does not give us permission to record duplicate entry.

Description : What type of objects are most easily detected by an fm system?

Last Answer : Stationary.

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : A document that specifies how many times and with what data the program must be run in order to thoroughly test it. a) addressing plan b) test plan c) validation plan d) verification plan

Last Answer : Answer: b Explanation: Test plan is the A document that specifies how many times and with what data the program must be run in order to thoroughly test it. It comes under testing

Description : My short story competition entry, "Among the stars", had not been reviewed. May I have some constructive critisism, and possible editing?

Last Answer : I’ll read it in the morning and let you know. :-)

Description : Why do most materials have magnetic properties too weak to be detected easily?

Last Answer : Feel Free to Answer

Description : Give examples of motion that is not easily detected.

Last Answer : a) Constituents of solid are in a state of continuous vibration, not visible to the naked eye. b) The revolution and spin of the earth is not detected inspite of their high speed. c) Theory of plate tectonics tells us that the continents are drifting at the slow speed.

Description : Is there a free photo-editing software available, that you can easily make your photos look like they came from a photo-booth?

Last Answer : cracked photoshop

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : b. It provides only sequential access to stored data

Description : Which of the following statements about continuous cardiac output monitoring are true? A. Continuous cardiac output monitoring may unmask events not detected by intermittent cardiac output measurements. ... stroke volume by detecting changes in resistance to a small, applied alternating current.

Last Answer : Answer: AD DISCUSSION: Various techniques are available to measure cardiac output continuously. The advantages of continuous cardiac output monitoring, as compared with intermittent methods, are (1) ... function of the stroke volume, which then can be used to calculate the cardiac output

Description : RAID stands for __________ a) Redundant array of independent disks b) Redundant array of individual disks c) Reusable Array of independent disks d) Reusable array of individual disks

Last Answer : Answer: a Explanation: RAID is a multiple-disk database design which is viewed as a single logical disk by the operating system. Data are distributed across the physical drives of the array. It guarantees the recovery of data in case of data failure

Description : Reusable optical storage will typically have the acronym _______: a) CD b) DVD c) ROM d) RW e) ROS

Last Answer : d) RW

Description : Give one advantage of using primary key. -Technology

Last Answer : A primary key uniquely identifies the record in the table.

Description : What characteristics of Read Only memory ROM, makes it useful? 1) ROM information can be easily updated. 2) ROM provides very large amounts of inexpensive Data storage. 3) Data in ... remains there even without electrical power 4) ROM chips are easily Swapped between different brands of computers

Last Answer : 3) Data in ROM is Nonvolatile, that is , it remains there even without electrical power

Description : (i) Two sided errors are rectified by passing ________ entry.

Last Answer : Complete the following sentences : (i) Two sided errors are rectified by passing ________ ... , the suspense account will have a ________balance.

Description : What key do you use to erase an entire entry in a cell and then reenter the data from the beginning with Excel?

Last Answer : You can press the Delete key. However, if you just select a celland start typing, it will replace what is in the cell, so it is notnecessary to press the Delete key first.

Last Answer : Cable Fault Detected To do Method ,,,, 1 / Blavier Test 2 / loop Test 3 / Induction Test 4 / voltage Drop Test 5 / Capacity Test .

Description : Which of the following statements describe refractive surgery? a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is ... a stable refractive error. The corneal structure must be normal and refractive error stable.

Last Answer : a) Refractive surgery is an elective, cosmetic surgery performed to reshape the cornea. Refractive surgery is an elective procedure and is considered a cosmetic procedure (to achieve clear vision without ... is performed to reshape the cornea for the purpose of correction of all refractive errors.

Description : Tape winding errors can cause a deformed tape pack. What are four common types of tape pack deformation?

Last Answer : Cinching, pack slip, spoking, and windowing.

Description : You see a build-up of dust and lint on the take-up reel of a tape recorder. This can cause which of the four types of tape errors?

Last Answer : Signal dropout errors and level errors. The dust and lint on the reel will eventually get onto the tape where it can get between the tape and the recorder’s heads.

Description : What are four types of tape errors that can degrade a magnetic recording system’s performance?

Last Answer : Signal dropout, noise, skew, and level. Dropout is the most common.

Description : What term is used to describe a spread spectrum communications system in which a very fast binary bit stream is used to shift the phase of an RF carrier? A. Frequency hopping B. Direct sequence C. Binary phase-shift keying D. Phase compandored spread spectrum

Last Answer : B. Direct sequence

Description : The modulation technique used by GSM cellular system A. Phase shift keying B. Frequency shift keying C. Gaussian minimum shift keying D. QAM

Last Answer : C. Gaussian minimum shift keying

Description : ECE Board Exam March 1996 The modulation system used for telegraphy is A. frequency-shift keying B. two-tone modulation C. pulse-code modulation D. single-tone modulation

Last Answer : A. frequency-shift keying

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption