____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
A. OMRs
B. OCRs
C. MICRs
D. BCRs
Answer: A
Computer Science & Information Technology
You might also like to view...
You cannot change a bulleted list to a numbered list
Indicate whether the statement is true or false
Computer Science & Information Technology
Defensive Information Warfare refers to all strategies and actions to defend against attacks on ICT assets.
a. true b. false
Computer Science & Information Technology