2. A machine which is used to process cheques at a bank is a/an:
a. OMR
b. OCR
c. MICR
d. POS ​

Answers

Answer 1

Answer:

C

Explanation:

Option  C is correct. Magnetic Ink Character Reader


Related Questions

which field data type would you use if youd like to store videos in that field?

A. text

B. memo

C.boolean

D. binary object

E. null​

Answers

Answer:

D - Bianary Object

Explanation:

A binary large object is a collection of binary data stored as a single entity. Blobs are typically images, audio or other multimedia objects, though sometimes binary executable code is stored as a blob. They can exist as persistent values inside some databases or version control system, or exist at runtime as program variables in some programming. - Wikipedia

what could happen if I break copyright law in the future​

Answers

um i’m pretty sure you could go to jail and you would have to pay fines
youd pay fine. amount depends on the situation. you could also potentially face time in prison

With the development of personal computers and the internet, the ability of organizations like save the children to operate successfully around the globe represents which phase of globalization?

Answers

Answer:

The forth phase

Which of the following expressions would produce an error in python? a. print( "one"+"2" )
b. print( 3 + 4 )
c. print( "7" + 'eight' )
d. print( '5' + 6 )

Answers

Answer:

c. print( "7" + 'eight' )

Explanation:

From the options listed in the question the only one that would produce an error would be option c. print( "7" + 'eight' ). This is because the second element being added is a string that says eight but it is being represented as a char variable. The ' ' is only used for single-digit character variables while the " " is used for words or strings of characters like the word eight.  In this piece of code the system will try to read this as a Char variable but will detect more than one char and produce an error.

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

To indent the first line of a paragraph, which key should you use?
O Shift key
O Tab key
O Enter key
O Space key

Answers

You push the tab key to indent the first line of a paragraph!
You would click the Tab key to indent the first line of a paragraph. Just make sure the cursor is where you want to indent it.

can someone help me answer this ASAP. I’ll give a brainliest to whoever can answer correctly. Thanks :)

Answers

Answer: The correct answer is B




Explanation:

Tom is trapped on the top floor of a department store. It’s just before Christmas


and he wants to get home with his presents. What can he do? He has tried


calling, even yelling, but there is no one around. Across the street he can see


some computer person still working away late into the night. How could he


attract her attention? Tom looks around to see what he could use. Then he has a


brilliant idea—he can use the Christmas tree lights to send her a message! He


finds all the lights and plugs them in so he can turn them on and off. He uses a


simple binary code, which he knows the woman across the street is sure to


understand. Can you work it out?

Answers

Answer:

tom wants to help her

Explanation:

Tom is rushing because he is at the top of a department store and he can't get a hold of her.  

Answer:

help im trapped

Explanation:

i solved it haha you have to use the code

16 8 4 2 1

and each little square equals one of the numbers

What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?.

Answers

Question: What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?

Answer: O(1)

Edhesive unit 2 lesson 5 coding activity 1 Write code which creates three regular polygons with 11, 14 and 19 sides respectively. All side lengths should be 1.0. The code should then print the three shapes, one on each line, in the order given (i.E. The one with 11 sides first and the one with 19 sides last). Sample run: regular hendecagon with side length 1.0 regular tetrakaidecagon with side length 1.0 regular enneadecagon with side length 1.0

Answers

Answer:

public class Polygon {

   private String name;

   private int sides;

   private double sideLength;

   public Polygon(String name, int sides, double sideLength) {

       if (sideLength <= 0) throw new IllegalArgumentException("Length cannot be zero or negative.");

       if (sides <= 0) throw new IllegalArgumentException("Sides cannot be zero or negative.");

       this.name = name;

       this.sides = sides;

       this.sideLength = sideLength;

   }

   public String getName() {

       return name;

   }

   public void setName(String name) {

       this.name = name;

   }

   public double getSideLength() {

       return sideLength;

   }

   public void setSideLength(double sideLength) {

       if (sideLength <= 0) throw new IllegalArgumentException("Length cannot be zero or negative.");

       this.sideLength = sideLength;

   }

   public int getSides() {

       return sides;

   }

   public void setSides(int sides) {

       this.sides = sides;

   }

   (use the at sign here)Override

   public String toString() {

       return "regular " + name + " with side length " + String.format("%.1f", sideLength);

   }

}

public class TestPolygon {

   public static void main(String[] args) {

       Polygon sides11 = new Polygon("hendecagon", 11, 1);

       Polygon sides14 = new Polygon("tetrakaidecagon", 14, 1);

       Polygon sides19 = new Polygon("enneadecagon", 19, 1);

       System. out. println(sides11);

       System. out. println(sides14);

       System. out. println(sides19);

   }

}

Explanation:

This java source code defines a class that creates a regular polygon based on the number of sides given to it.

Below is a screenshot of the program code and output.

List any two features of this computer
h. Who invented Electronic Discrete Variable Automatic Computer? ​

Answers

Answer:

John Mauchy 1. designed to be a stored-program computer 2. it was binary rather than decimal

Which type of device uses pixels?

A.
driver

B.
motherboard

C.
monitor

D.
mouse

Answers

Answer:

C - Monitor

Explanation:

Pixels are used to display imagery on the monitor.

Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas

Answers

Answer: idek what that is but okay ;v;

Answer:

his ultimate is fire

Explanation:

Please please help...what kind of device is this?​

Answers

Answer:

A hard drive disk for computer storage!

Explanation:

ou're installing network wiring for a new ethernet network at your company's main office building. the project specifications call for cat 5e utp network cabling and rj45 wall jacks. near the end of the project, you run out of wire before the last few runs are complete. you have a spool of cat 3 network cable in storage. upon closer inspection, it appears very similar to the cat 5e wiring. to finish the project, should you use the cat 3 cabling as a substitute for the cat 5e cabling?

Answers

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates.

While Cat 3 and Cat 5e cabling may appear similar physically, they are electrically different. Cat 5e cabling is twisted much tighter than Cat 3 cabling. This reduces cross talk and enables Cat 5e wiring to support much faster data transmission rates.

If you're looking to upgrade your home network, you may be wondering if you should go with Cat 3 or Cat 5e cabling. While Cat 3 cabling is less expensive, Cat 5e cabling offers a number of benefits that make it worth the extra investment.

Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates. This means that Cat 5e cabling can handle more data traffic, making it ideal for homes with multiple devices connected to the internet.

In addition, Cat 5e cabling is also more durable and easier to work with than Cat 3 cabling. So, if you're considering upgrading your home network, Cat 5e cabling is the way to go.

Learn more here:

https://brainly.com/question/28402675

#SPJ4

What is the first step in creating a maintenance schedule?


log the maintenance completed

read the manuals

inventory equipment

develop a reminder system

Answers

The first step in creating a maintenance schedule is: C. inventory equipment.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems, processes and resources, so as to provide specific services to end users.

The phases of SDLC.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

In Computer technology, the first step in creating a maintenance schedule is to create a list of inventory equipment based on the system development requirements.

Read more on system development here: brainly.com/question/7112675

#SPJ1

Answer:

What is the first step in creating a maintenance schedule?

(B) Inventory Equipment

Explanation:

criminals access someone’s computer and encrypt the user’s personal files and data. the user is unable to access this data unless they pay the criminals to decrypt the files. this practice is called …

Answers

"Criminals access someone’s computer and encrypt the user’s personal data and file. The user is unable to access this data and file unless they pay the criminals to decrypt the files. This practice is called" Ransomware .

Ransomware is a practice that is mostly used by ha-cker or criminals to access someone’s computer and encrypt the personal data on that computer. The user cannot decrypt the data until he pays those criminals.

In the world, cybersecurity is one of the major concerns not only for organizations but also individuals to protect their identity and data online. However, ha-ckers and criminals try to breach the security and access the system. They have different purposes or goals to access the system and steal the data. Mostly, these criminals encrypt the user’s data and ask money against decryption of that data. This practice is called ransomware.

Ransomware is an evolving form of malware. In this form, the ha-ckers or criminals, mostly threaten the owner of the system to publicize the data, in case of not paying the amount that they are asking for. Some ransomware destroy the data, while some lock the data ( encrypt the data) and ask for money to unlock it ( decrypt the data).

You can learn more about ransomware at

https://brainly.com/question/27312662

#SPJ4

What is best for a busy student to do for better results in school?

increase extracurricular activities
transfer to a new school
manage time and stress
manage and budget money

Answers

Answer:

Manage time and stress

Explanation:

This is obvious

Answer:

manage time and stress

Explanation:

the person above or below me was correct.

Why do numA and numB have the same scope in the subtract function?

def subtract(numA, numB):
return numA - numB

def divide(numC, numD):
return numC / numD

answer = subtract(24,6)
print (answer)
____________________
CHOICES
Only the subtract function can use or change the values of numA and numB.
numA and numB are both numeric.
numA and numB are similar names.
numA is passed the value 24 and numB is passed the value 6.

Answers

Answer:

Only the subtract function can use or change the values of numA and numB.

Explanation:

'scope' is about the parts of your program where a variable "exists", ie., can be used.

The other statements are factually true, but do not apply to the question.

Only the subtract function can use or change the values of numA and numB. So, the correct option is A.

What is Substract function?

In subtraction, the minuend is the primary number (from which a number must be subtracted) and the subtrahend is the second number (the number which is to be subtracted). The difference is the resultant number. In mathematics, the "minus" (-) operator is positioned in between the minuend and the subtrahend.

Use the minus symbol to carry out a basic subtraction operation (-). This is the simplest subtraction formula in Excel: =number1-number2. For instance, to subtract 10 from 100, write the equation below, which gives the answer of 90: =100-10. The values of numA and numB can only be used or modified using the subtract function.

Therefore, the correct option is A.

Learn more about Subtraction, here:

https://brainly.com/question/2346316

#SPJ2

Possible pathways for acquiring information support and services training now include

A. internships


B. part-time jobs


C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA)


D. all of the above

Answers

Possible pathways for acquiring information support and services training now include: C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA).

What is CTSO?

CTSO is an abbreviation for career and technical student organization and it can be defined as a collection of vocational and nonprofit organizations that are primarily established in high schools, colleges, and career technology centers, so as to enable participants such as students to develop and acquire leadership, information support, and teamwork skills.

In this context, we can reasonably infer and logically deduce that participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA) are possible pathways for acquiring information support and services training.

Read more on career and technical student organization here: https://brainly.com/question/17263803

#SPJ1

The _________ covers installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures.
COMPTIA NETWORK+


COMPTIA SECURITY+


COMPTIA EXCEL


COMPTIA A+

Answers

The COMPTIA A+ covers installing and configuring operating systems, expanded security, software troubleshooting, and operational procedures.

What is certification?

Certification can be defined as a process which describes the formal recognition that is given to a graduate student for the successful completion of an academic programme, course of study such as the following:

FinanceEducationSoftware engineeringInformation technology consultant.Information systems manager.Information security analyst.Computer engineering

Generally speaking, the COMPTIA A+ 220-1002 is a type of certification programme which extensively covers the installation and configuration of operating systems (OS), expanded information security (IS), troubleshooting of software, as well as operational procedures.

Read more on certification here: brainly.com/question/13412233

#SPJ1

Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? check all that apply

Answers

Answer:

Antivirus software

Antimalaware measures

The things which play an important role in keeping attack traffic off your systems and helping to protect users are antimalware measures and Antivirus software. The correct options are a and b.

What are antimalware measures and antivirus software?

Antimalware can assist in the prevention of malware assaults by checking all incoming data and preventing malware from being installed and infecting a computer.

When the operating system is unable to communicate with a mouse, the solution is to update the mouse device driver. This is because the mouse driver is frequently and always required to assist the motherboard in interacting with the device.

It is also a software that works between the Operating System and the Mouse because it can effectively and efficiently translate the signals to the motherboard appropriately or ways, which is why Microsoft's generic driver is used.

Therefore, the correct options are a and b.

To learn more about antimalware measures, refer to the link:

https://brainly.com/question/27994271

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Antimalware measures

Antivirus software

Digital attack surfaces

cybersecurity

special purpose properties include all but the following: select one: a. churches. b. hospitals. c. industrial park. d. nursing homes.

Answers

The industrial park is not a special purpose property. An industrial park is an industrial property.

Industrial property can be defined as intangible property rights (as ownership of trademarks or patents) related to agriculture, commerce, and industry.

Industrial property includes

patents trademarks industrial designs geographical indications

This explains that copyright which includes literary works, music, films, works of art, and architectural designs as well as rights related to them include the rights of actors, artists, producers, and broadcasters.

Type of Industrial Properties

Manufacturing, is a tool made to store/accommodate special equipment used to produce goods/materials.Refrigeration/cold storage, Specialized industrial buildings that offer large capacity cold storage such as refrigerators and freezers. Usually this tool is used to store an item that must be stored at low temperatures.Biotech (Wet Lab), A biotech building can be defined as a highly specialized flexible building that supports various laboratory spaces.

You can learn more about Industrial Properties here https://brainly.com/question/28359266

#SPJ4

in windows 8, which tool enables you to set up hard drives, manage devices, test system performance, and much more?

Answers

In Windows 8, Administrative Tools enable the users to perform many tasks including set up hard drives, manage devices and test system performance.

Administrative Tools in Windows are system management tools and applications to configure and troubleshoot important settings of operating systems. In Windows 8, they are by default hidden from the Start screen. Through the Control Panel, they can be accessed.

A few key Administrative Tools in Windows 8 include Computer Management, Defragment and Optimize Drives, Disk Cleanup, Registry Editor, Services, System Information, Task Scheduler, Windows Memory Diagnostic.

The tools offer different services in order to make a better user experience of using Windows 8.

For example, hard drive configuration and various devices management are performed by Computer Management Tool; system performance is monitored by Performance Monitor; Resource Monitor provides details about disk, memory, CPU, and network activity by individual processes; and Memory Diagnostics Tool is used to identify defects in computer memory etc. etc.

You can learn more about windows tools at

https://brainly.com/question/14720056

#SPJ4

let's now extend our build system to handle task dependencies. suppose we have the following tasks: cook

Answers

The ways you can define task dependencies are:

By studying how the tasks depend on each other.Categorizing dependencies into 4 types.

These four types into which a dependency is categorized are known as:

Finish to Start, Finish to Finish, Start to Start,  Start to Finish

What are Task Dependencies?

This refers to the order in which tasks must be performed and is the relationship that a task or milestone depends on other tasks to be performed (completely or partially) before it can be performed.

Hence, we can see that The ways you can define task dependencies are:

By studying how the tasks depend on each other.Categorizing dependencies into 4 types.

These four types into which a dependency is categorized are known as:

Finish to Start, Finish to Finish, Start to Start,  Start to Finish

Read more about task dependencies here:

https://brainly.com/question/14337598

#SPJ1

HELP FAST PLS PLS

Put the steps in order to produce the output shown below.
Assume the indenting will be correct in the program.
'uno'
Line 2
Line 1
Line 3

Answers

Answer: the line numbers are different on mine, but these were correct

Explanation:

Following are the description on the three-line code:

In the first line, a dictionary "games" is declared that holds "key and value" in it.In the key, it holds an integer value, and in the value, it holds a string value.In the second line, the append method is declared that adds value to the dictionary.In the third line, it holds a value of 12.

Please find the attached file for the code.

Learn more:

brainly.com/question/20250851

What are two possible challenges of online collaboration?

Answers

Answer:

A and B

Explanation:

A: In real life, you are always in the same time zone. Working across the internet, however, you are not. (Correct)

B: It's hard for people to understand what you mean, because they can't see body language. (Correct)

C: This could still happen in real life (Incorrect)

D: This is an opinion. (Incorrect)

Which of these protections covers creative works such as books and artwork?
Choose the answer.

A. trademark

B.registered trademark

C.patent

D.copyright

Answers

The answer is D copyright

10
Which key will erase text to the left of the cursor?
(1 Point)
Esc
Delete
Spacebar
Backspace
11​

Answers

Backspace is the answer

Answer:

Backspace

Explanation:

Which file is usually the first file to be displayed when you navigate to a website?

A. Starter.html
B. Home.html
C.index.html
D. Template.html

Answers

Home. HTML is the first file to be displayed
Other Questions
Use the information in the table to answer the question that follows. The Triangular Trade British North American Colonies Great Britain Africa Imported slaves and manufactured goods agricultural products and raw materials manufactured goods Exported agricultural products and raw materials manufactured goods slaves Which group in the American colonies benefited the most as a result of this trading system? If 6 -x = 12, what is x - 6? max weber stressed that sociologists should employ to gain the ability to see the world as others see it. comparison of k-wire versus screw fixation after open reduction of transitional (tillaux and triplane) distal tibia fractures Read the paragraph. Our school currently facilitates only a few methods to reduce waste. First, the administration provides blue bins for paper waste in each classroom. The lunchroom no longer provides single-use plastic straws. And last year, water bottle filling stations were installed in several hallways. When taking notes on this paragraph, which phrase should go in the center circle of a web diagram?methods to reduce wasteproviding blue bins for paperbanning strawsinstalling filling stations accounting information is if similar items are treated the same way among various companies highlighting similarities and differences between events and conditions. selye found that various types of stimuli called , such as the death of a loved one, a loss of income, or a legal problem, all result in the same stress response. giving brainlistMatch each character with their feelings about the conspiracy plot.Match Term DefinitionBrutus A) Believes Caesar should not be crowned but is not sure he should be killedCassius B) Believes that strange events are a sign that the conspiracy might go wrongCasca C) Believes Caesar is weak and undeserving of power and leads the conspiracy plot what did sheriff robinson, larry hedricks, and clarence ewalt discover in the clutters' master bedroom, and what was significant about these discoveries? SOMEONE PLEASE HELP ME I REALLY NEED HELP ON THIS 1. Is there a triangle with two right angles? What are the benefits of social behavior? check all that apply. protection foraging competition reproduction division of labor In which number does the digit 6 have that is 10 times as great as the value of the digit 6 in 283,691 is mass a physical property of matter please help math 30 points (x-j) (5x + k) = 0How do i find x from this equation Subtract. Write your answer as a decimal.5.58.1= in what IT pathway would you most likely need to be familiar with the system development life cycle? A) Information Support and Service B) Network Systems C) Programming and Software DevelopmentD) Interactive Media What are the two most common request methods that a security professional will encounter? your third period teacher asks students to come up with the list classroom rules togethera, direct democracyb, representative democracy some one help