A. bar coding, OCR, pen, and voice recognition
B. mouse, OCR, pen, and voice recognition
C. keyboard, OCR, pen, and voice recognition
D. all of the above
A. bar coding, OCR, pen, and voice recognition
B. mouse, OCR, pen, and voice recognition
C. keyboard, OCR, pen, and voice recognition
D. all of the above
A. randomization
B. stratification
C. people sampling
D. work sampling
A. Internal source
B. External source
C. Both internal and external source
D. None of the above
A. Entity
B. Source
C. Process
D. Attribute
A. object modeling
B. prototyg
C. fact-finding
D. data modeling
A. determine data entry errors on primary keys
B. ensure that the correct type of data is input
C. determine whether a known relationship between two fields is valid
D. determine whether all required fields of the input have actually been entered
A. enterprise applications
B. object technologies
C. knowledge asset management
D. collaborative technologies
A. Allowable use of systems
B. Legal obligations
C. Encryption policies
D. User responsibilities
A. created in XML
B. structured information
C. normal information
D. unstructured information
A. middle managers
B. executive managers
C. supervisors
D. mobile managers