What is MICR (Magnetic Ink Character Recognition) ?
- MICR systems use special ink which can be magnetized, to print characters that canthen be read and decoded by special magnetic devices.
- The common E13B font is used to write these special kinds of cheques.
- E13B font contains 0-9 numbers & 4 symbols.
- Detection of characters is a two step process.
- First MICR Reader-Sorter reads the data on cheques & sorts the cheques for distribution for further processing.
- The reading station is used to sense and identify the magnetic characters as they pass through.
- Magnetized characters are read by the head. E.g. MICR is used in Banks to cheques the MICR systems use
- special ink which can be magnetized, to print characters cheques.
MICR (Magnetic Ink Character Recognition) ADVANTAGES –
- Speedy data entry.
- Accurate output.
- Folded or roughly handled cheques are also scanned with same accuracy.
MICR (Magnetic Ink Character Recognition) DISADVANTAGE –
- MICR software is required.
- Limited fonts are used so used in banking industries only.
Latest Computer Post :- Click Here
Basic Computer Questions
Q : The main system board of the computer is called ____.
(A) Motherboard
(B) Processor
(C) Microchip
(D) None of these
Click to show/hide
Q : Which of the following system components is the brain of a computer?
(A) Circuit board
(B) CPU
(C) Memory
(D) Network card
Click to show/hide
Q : What is the built-in permanent memory in a computer called?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
Click to show/hide
Q : Which of the following is the full form of NTFS?
(A) New Tree File system
(B) New Technology file system
(C) New Table file system
(D) Both B and C
Click to show/hide
Q : Which of the following is not a hardware processing chip ?
(A) Processing chip
(B) printer
(C) mouse
(D) Java
Click to show/hide
Q : The monitor of a computer is-
(A) storage device
(B) processing device
(C) input device
(D) output device
Click to show/hide
Q : Which protocol does Ping use?
(A) TCP
(B) ARP
(C) ICMP
(D) BootP
(E) None of these
Click to show/hide
Q : If you wish to extend the length of the network without having the signal degrade, you would use a ___.
(A) Gateway
(B) Router
(C) Modem
(D) Repeater
(E) Resonator
Click to show/hide
Q : A series of instructions that tells a computer what to do and how to do it is called a ______.
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Click to show/hide
Q : Verification of a login name and password is known as_____.
(A) Configuration
(B) Accessibility
(C) Authentication
(D) logging in
(E) None of these
Answer ⇒ ??