This technique is used to testify the authenticity of any document whether it is authentic or no. The work revolves around the concept that the ink so used is actually magnetic field sensitive. So, this ink is used when the original documents are getting prepared. During this process, the ink is used to encode certain magnetic characters. This makes it unique because the MICR is able to read it hence the authenticity gets checked.
The reason this technique is used in order to protect it from unlawful acts and also piracy. This ink increases the security of the documents, for example, a counterfeit check produced using a color photocopying machine, the magnetic-ink line will either not respond to magnetic fields or will produce an incorrect code when scanned using a device designed to recover the information in the magnetic characters. Aiding to this, the MICR scanner is also able to detect if the owner of the document has had previous history of fraud and other related crime. So, then also the person in charge is notified.
This technique is widely popular nowadays but more importantly, it is used in the industries where the document-related practice is carried forward on a very regular basis.
Acronym | Full Form |
---|---|
IRDA | Infrared DATA Association |
SLR | Single Lens Reflex |
GPRS | General Packet Radio Service |
ASR | Automated Speech Recognition |
CCTV | Closed Circuit Television |
CRT | Cathode Ray Tube |
DSL | Digital Subscriber Line |
EDGE | Enhanced Data Rates for GSM Evolution |
EDP | Electronic Data Processing |
FTP | File Transfer Protocol |
GIF | Graphics Interchange Format |
GNU | GNU's Not UNIX |
GPS | Global Positioning System |
HDMI | High Definition Multimedia Interface |
HVAC | Heating Ventilation and Air Conditioning |
IC | Integrated Circuit |
IDE | Integrated Development Environment |
IDE | Integrated Drive Electronics |
RSS | Really Simple Syndication |
MSC | Mobile Switching Center |
DP | Data Processing |
IMEI | International Mobile Equipment Identity |
INTERNET | Interconnected Network |
JSF | Java Server Faces |
LASER | Light Amplification by Stimulated Emission of Radiation |
MTS | Microsoft Transaction Server |
PING | Packet InterNet Groper |
PNG | Portable Network Graphics |
RADAR | Radio Detection And Ranging |
RAM | Random Access Memory |
RO | Reverse Osmosis |
SMPS | Switched-Mode Power Supply |
SONAR | Sound Navigation and Ranging |
UF | Ultra Filtration |
UPS | Uninterruptible Power Supply |
UV | Ultraviolet |
VHDL | VHSIC (Very High Speed Integrated Circuit) Hardware Description Language |
VPI | Virtual Path Identifier |
WPA | Wi-Fi Protected Access |
CTS | Clear to Send |
ECC | Error Correcting Code |
ECC | ERP (Enterprise Resource Planning) Central Component |
IT | Information Technology |
STD | Subscriber Trunk Dialing |
MIS | Management Information System |
ASCII | American Standard Code for Information Interchange |
ASP | Application Service Provider |
ATA or PATA | Advanced Technology Attachment / Parallel Advanced Technology Attachment |
BIOS | Basic Input Output System |
VIRUS | Vital Information Resources Under Seize |
CNC | Computerized Numerical Control |
DNS | Domain Name System |
DTP | Desk-Top Publishing |
DTP | Distributed Transaction Processing |
HTTP | HyperText Transfer protocol |
ICT | Information and Communications Technology |
ITES | Information Technology Enabled Services |
JPG / JPEG | Joint Photographic Experts Group |
MMS | Multimedia Messaging Service |
MMS | Microsoft Media Server |
Portable Document Format | |
RIP | Routing Information Protocol |
SEO | Search Engine Optimization |
SIM | Subscriber Identity Module |
SMS | Short Message Service |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
WWW | World Wide Web |
XMPP | Extensible Messaging and Presence Protocol |
EVM | Electronic Voting Machine |
UPI | Unified Payment Interface |
SSD | Solid-State Drive |
ASAT | Anti-satellite Weapons |
ASLV | Augmented Satellite Launch Vehicle / Advanced Satellite Launch Vehicle |
ATS | Application Tracking System |
RSA | Rivert-Shamir-Adleman |
IOS | Iphone Operating System |
SATA | Serial AT Attachment |
UDP | User Datagram Protocol |
RFID | Radio-Frequency Identification |
IVR | Interactive Voice Response |
SAS | Statistical Analysis System |
CMS | Content management system |
TCP | Transmission Control Protocol |
SSL | Secure Sockets Layer |
CRM | Customer Relationship Management |
SPSS | Statistical Packages for the Social Sciences |
HTTPs | Hyper Text Transfer protocol secure |
IP address | Internet Protocol |
IPV4 | Internet protocol version 4 |
IPV6 | Internet protocol version 6 |