____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.

A. OMRs
B. OCRs
C. MICRs
D. BCRs

Answer: A

Computer Science & Information Technology

You might also like to view...

You cannot change a bulleted list to a numbered list

Indicate whether the statement is true or false

Computer Science & Information Technology

Defensive Information Warfare refers to all strategies and actions to defend against attacks on ICT assets.

a. true b. false

Computer Science & Information Technology