Which is not a way that the analyst can inspect a record?
A) checking for consistency in report font types and logo placement
B) looking for opportunities for improving the recording form design
C) observing the number and type of transactions
D) watching for instances where the computer can simplify the work
A) checking for consistency in report font types and logo placement
You might also like to view...
A CRUD matrix is used to show:
A) places in the system where the data is inaccurate. B) where records are updated, added, deleted or used. C) which Web pages are placed on a secure server. D) the partitioning of data flow diagrams in a client/server environment.
Sequencing software:
a. places audio clips in order in a sound track b. records and edits MIDI data c. applies filters to digital audio clips in a predetermined order d. manages a project by creating a timeline of events e. helps synchronize images with a sound track
You cannot apply conditional formatting in an Access report.
Answer the following statement true (T) or false (F)
?
A. ?An open-source data acquisition format that stores image data and metadata B. An area of a disk drive reserved for booting utilities and diagnostic programs; it is not visible to the computer's OS C. ?A data acquisition method used when a suspect computer can't be shut down to perform a static acquisition D. ?A data acquisition method that captures only specific files of interest to the case or specific types of files, such as Outlook.pstfiles E. A data acquisition format that creates simple sequential flat files of a suspect drive or data set F. Two or more disks combined into one large drive in several configurations for special needs G. ?A data acquisition method that captures only specific files of interest to a case, but also collects fragments of unallocated (deleted) data H. ?A data acquisition method used when a suspect drive is write-protected and can't be altered I. An encryption technique that performs a sector-by-sector encryption of an entire drive; each sector is encrypted in its entirety, making it unreadable when copied with a static acquisition method J. ?A ProDiscover Group file, which includes instructions for how ProDiscover should load each physical disk's image data