The answer is Clean Verbatim. In Clean Verbatim, the transcription does not include speech errors, false starts, and various filler words. It removes all of the so-called ‘extras’ that you may hear in an audio or video recording – “umms,” “likes,” “you knows” and other filler words, as well as stuttering. Clean Verbatim is ideal for business and marketing transcription purposes.
Answer:
Answer is:
Client-Server Network
- expensive to set up
- has a central server
- easy to track files
- useful for a large organization
Peer-to-peer Network
- useful for a small organization
- difficult to track files
- inexpensive to set up
- does not have a central server
Explanation:
<em>Client-Server Network is ideal for bigger network set up like offices and companies where there will be a central server involved with several clients to access and connected with the server. This is the normal network set up to companies. While, Peer to peer network is ideal for much smaller network, which consists of only two computers to communicate and share files. This network is normally temporary and inexpensive since in only works with two computers.</em>
Answer:
When the document is not saved before the application is closed, The word application assumes that the file is not important, so does not save a recovery file, but to recover the file open the application and go to the recently opened file, do not edit the file, go to the bottom of the document and click on recovery or use the CTRL-Z shortcut key.
Explanation:
Microsoft word is a word processing application used to make and edit word documents. The recovery option in the word application is an essential tool in Word that prevents a permanent loss of documents in production and can be used to retrieve saved and unsaved documents.
Answer: (C) Uniform Computer Information
Explanation:
The uniform computer information is one of the type of transactional act is basically designed the various types of electronic commerce in the united states and by using this act it helps in recognizing the electronic contract by mention all the requirements.
- The uniform computer information formalizing the various types of licensing arrangement and also standardize their specific use.
- In the united state, this model law specify their guidelines from state to another State.
According to the given question, the uniform computer information transaction act is used by the software organizations and developed for the purpose of regulate the computer data transactions products like the online based database management and software.
The allocation methods define how the files are stored in the disk blocks.
There are three main disk space or file allocation methods:
1.Contiguous Allocation-in this scheme,each file occupies a set of blocks on the disk. For example if a file requires x blocks and is given a block y as the starting location,then the blocks assigned to the file be :x,y+1,y+2,......y+x-1.
This means that given the starting block address and the length of the file(in terms of blocks required) we can determine the blocks occupied by the file.
Advantages
-both the sequential and direct accesses are supported
-this is extremely fast since the number of seeks are minimal because of contiguous allocation of file blocks.
2.linked allocation-in this scheme,each file linked list of disk blocks which need not be contiguous disk blocks can be scattered anywhere on the disk.
Advantages
it is very flexible in terms of file size.file size can be increased easily since the system does not have to look for a contiguous chunk
of memory.
this method does not suffer from external fragmentation and it makes it relatively better in terms of memory utilization.
3.Indexed Allocation-in this scheme,a special block known as the index block contains the pointers to all the blocks occupied by a file.Each file has its own index block.the entry in the index block contains the disk address of the block
Advantages
it supports direct access to the blocks occupied by the file and therefore provides fast access to the file blocks
it overcomes the problem of external fragmentation.