Discuss the term internal control​

Answers

Answer 1

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST

Related Questions

What the central difference between negative and positive politeness?

Answers

Answer:

      Politeness is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.

    Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.

What are positive face needs?

  One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.

Negative politeness :

  Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.

What is politeness in discourse analysis?

    In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.

Hope u got it

If you have any question just ask me

in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?

Answers

A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.

Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.

Learn more:

brainly.com/question/23886562

Mouse is .....ware.

Answers

Mouse is hardware.

Explanation:

because we can touch it and in the hardware definition we say that it can be touched.

Please help not to sure if I’m right ?

Answers

Answer:

Explanation:

b

Answer:

A) When setting up the e-mail program for each employee’s computer, the IT professional has the employee enter his or her e-mail password to protect privacy.

Explanation:

Password access should be protected as much as possible by IT specialists. Rather than asking clients or workers for their password information, have them input it themselves.

Maintain the secrecy of all password information. Do not make it available to the public in any form.

Without their knowledge and permission, do not access clients' or employees' computers for any purpose. It is a breach of privacy to view another person's browser history without their agreement.

OAmalOHopeO

____ are ideal for people who use the computer only for Web access.
A) Desktop Computers
B) All-in-one Computers
C) Internet Applicances
D) Handheld Computers

Answers

Answer:

A) Desktop Computer

Explanation:

because there is no such thing as All-in-one Computers and everything can be covered in desktop computers

What is your favorite photograph in the presentation? Why?

... I'm very confused about what presentation they're talking about. help

Answers

Answer:

is there a presentation in your lesson maybe?

Explanation:

define what is evaluation​

Answers

Answer:

the making of a judgment about the amount, number, or value of something; assessment.

Explanation:

be smart

Answer:

Evaluation is a systematic determination of a subject's merit, worth and significance, using criteria governed by a set of standards. It can assist an organization, program, design, project or any other intervention or initiative to assess any aim, realisable concept/proposal, or any alternative, to help in decision-making; or to ascertain the degree of achievement or value in regard to the aim and objectives and results of any such action that has been completed.[1] The primary purpose of evaluation, in addition to gaining insight into prior or existing initiatives, is to enable reflection and assist in the identification of future change.

State the major different between fours types of computers

Answers

Answer:

1. Supercomputers

Supercomputers are very expensive and very fast. They are the most powerful computers we have in the world.

Supercomputers are optimized to execute only a small number of programs. This makes it possible for them to execute these few programs at a very high speed. Due to their inhibiting cost, they are used in high-end places like in scientific research centers. The supercomputer consists of thousands of processors, allowing it to clock in at very high speeds measured by petaflops.

These computer types are also very large in size due to the numerous parts and components involved in their design.

A good example of a supercomputer is Tianhe-2, which is located in the National Supercomputer Center in Guangzhou, China. It features 3.12 million cores, allowing it to run at speeds of 33.86 petaflops.

2. Mainframe Computers

These are large and expensive computers that are capable of supporting thousands of users simultaneously. They are mostly used by governments and large organizations for bulk data processing, critical applications, and transaction processing. They are ranked below supercomputers.

3. Minicomputers

Minicomputers are mid-sized computers. In terms of size and power, they are ranked below mainframes. A minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.

The use of the term minicomputer has diminished since the introduction of microprocessors. These machines are now more commonly called midrange computers.

4. Microcomputers

A microcomputer, also known as a personal computer, is designed to be used by one user at a time. The term microcomputer relates to the microprocessor that is used for the purpose of processing data and instruction codes. These are the most common computer types since they are not very expensive

IPO cycle eexample three examples

Answers

ATM machine.
micro oven.
washing machine.
making tea.
calculator.

Selection sort starts at the beginning of the list and compares pairs of data items as it moves down to the end.
a) true
b) false

Answers

Answer:

false

Explanation:

Hope, it helps to you

Any computer expert to help me answer this question.. am giving brainliest

Answers

Answer and explanation:

1. It asks for the total expenses for the month of March. So, let's add all of the March expenses up.

1,600 + 2,100 + 850 + 480 + 2,800 = $7,830 (which is the answer)

2. It asks what the highest expense for wages are. That would be $5,080. Out of all of the times that the wages have been paid, in April, it was the highest, at $5,080. So, $5,080 is the answer.

3. It asks how many items cost less than $1,000 in April. The only thing that cost less than $1,000 in April was the water because it only cost $370. So, the answer would be 1.

Hope this helps!

Data modeling may be the most important part of the systems development process because: Group of answer choices data are less stable than processes. data characteristics are important in the design of programs and other systems components. it is the easiest. the data in a system are generally less complex than processes and play a central role in development.

Answers

Answer:

please mark me brainlist

Explanation:

I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.

Answers

Answer:

But iam 9th class student.

What are the three benefits of incremental development, compared to the waterfall
model?

Answers

Answer:

The cost of accommodating changing customer requirements is reduced

Consider the LIBNAME statement below: LIBNAME 'path-to-file'; TRUE/FALSE: The name of the SAS library you are creating must match the name of the folder it references.

Answers

The SAS Library is a collection of a SAS file or more that is SAS recognized and stored as a unit.

Every file is a library member, it assists you to get your job organized. It consists of all your files in the same library if a SAS program needs or more than one SAS.A logical name termed a libre is a reference in a SAS library. The single SAS library can't store files at various physical sites, in which SAS deletes the temporary SAS library contents but not SAS libraries.

That's why the given statement is "false".

Learn more:

brainly.com/question/14354148


When is innovation good, and when is it problematic?

Answers

Answer:

Innovation is the ability to change the course of the future. ... Finally, innovation is neither good nor bad, however, it is always new. When done correctly it has the power to impact, improve and change the way we live, work and interact. Every company should aspire to be a leader in innovation

Explanation:

The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False

Answers

SNORT is the powerful IDS and IDS (IPS) program that enables real-time traffic data and analytical packet logging. It delivers a sophisticated IDS system to detect potential malicious activities. It employs a common language that integrates animality, protocol, and signatures analysis methodologies.It is used to monitor traffic in and out of a network utilized. It monitors travel in real-time and sends users alerts to detects potentially malicious packets or dangers on the IP networks.It analyses and searches for the content and matches protocols.

That's why the answer is "False".

Learn more:

brainly.com/question/14288353

CSS At-rules provide a way for designers to define "if this, then that" scenarios.
True or false?

Answers

True true true true

When you use an IDE instead of a simple text editor to develop a program, ____________.

Answers

Answer:

your answer is :

some help is provided

Explanation:

An integrated developed environment (IDE) provide more programming help than a plain text editor.

please mark me brainlist

The text between < html > and < /html > defines the _____.

a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page

Answers

Answer:

active text on a page

Explanation:

In the year 2008, which of the digital devices was a carrier of the virus in the supply chain environment? [Choose all that apply]

Android device

USB drive

Hard drive

Digital Photo frame

Answers

Answer:

usb drive

Explanation:

risk of transporting viruses to another system

Digital devices or USB drive have been the virus carrier within the supply chain environment in the year 2008.

The USB hard drive is a "solid-state" device, which also means doesn't have moving parts. Flash drives are, even so, significantly smaller than the hardest drives and can't hold so much information. It is a small, portable device that helps connect to the USB computer’s USB drive that also called a Flash drive or storage machine. Utilizing USB drives, data storage, backup as well as transmit between devices have been commonly used.

Therefore, the final answer is "USB drive".

Learn more:

brainly.com/question/16737681

What is the blue screen of death?

Answers

Answer:

A blue screen of death, officially known as a stop error, or exception error, blue screen error, is an error screen that the Windows operating system displays in the event of a fatal system error.

Explanation:

Hope it will help you

Answer:

A blue screen of death, officially known as a stop error, or exception error, blue screen error, is an error screen that the Windows operating system displays in the event of a fatal system error

PLS mark me as brainliest

The first electric, general-purpose computer, ENIAC, was programmed by

Answers

Answer:

Designed by John Mauchly and J. Presper Eckert, ENIAC was the fastest computational device of its time, able to do 5,000 additions per second, but because it had no internal storage, it had to be programmed manually for each new set of calculations.

Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false

Answers

Answer:

True

Explanation:

hop it's helpful for you ☺️

Suppose now the file is broken up into 1000 packets with each packet
containing 4,000 bits. Suppose that each packet is acknowledged by the
receiver and the transmission time of an acknowledgement packet is
negligible. Finally, assume that the sender cannot send a packet until the
preceding one is acknowledged. How long does it take to send the file?

Answers

Answer:

The delay to send each packet will be ttrans + tprop. However there is an  additional tprop delay for the acknowledgement packet to arrive at the sender, prior  to which the next packet can be transmitted. Hence the total delay to transmit 10  packet is = 10 * (ttrans + 2 tprop) = 10*(40 msec + 80 msec) = 1.2 sec

Explanation:

general description of the problem

Answers

Explanation:

problem is the misunderstanding misbehaviour etc which harm us and others

A matter or situation regarded unwelcome or harmful is known as problem

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

What was revolutionary about Web 2.0?

Answers

Answer:

social media and sites allow people to communicate with others

Explanation:

Hope this helps <3

write a c++ program to find the factorial of a number.

Answers

Answer:

I'm not gonna use recursion for this program.

#include <iostream>

using namespace std;

int main()

{

int input,factorial=1;

cout<<"Enter a number to get it's factorial: ";

cin>>input;

for(int i=1;i<=input;i++)

{

factorial *=i;

}

cout<<"The factorial of the number you entered is: "<<factorial;

return 0;

}

#include
using namespace std;
int main() {
int num,factorial=1;
cout<<" Enter Number To Find Its Factorial: ";
cin>>num;
for (int a=1;a<=num;a++) {
factorial=factorial*a;
}
cout<<"Factorial of Given Number is ="< return 0;
}

Which are the correct commands to create and run an ReactJS project?

npm create-react-app my-app && cd my-app && npx start
npm create-react-app my-app && cd my-app && npm start
npx create-react-app my-app && cd my-app && npx start
npx create-react-app my-app && cd my-app && npm start
npx create-react my-app && cd my-app && npm start

Answers

Answer:

Step 1: Initialize NPM (Node Package Manager) mkdir new-react-app cd new-react-app npm init --y. ...

Step 2: Install React, Webpack, and Babel. ...

Step 3: Create the files. ...

Step 4: Create NPM run scripts.

Other Questions
Can anybody tell me how I know preposition Solve 2x 13 = 8x + 7. What were the 3 old worlds? A softball team has a budget of $200 for visors they athletic Director pays $90 for 12 visors is there any money in the budget to purchase 15 more sunvisors Which terms represent the two types of client requirements? 1. What are the Dietary Guidelines and what is the purpose of the Dietary Guidlines? A soccer field is 99 meters long (x-axis) and 66 meters wide (y-axis). The field crew needs to find the midpoint of one of the diagonals so they can paint a new center circle. What are the coordinates of the midpoint? 1. tres + diez = 2. veinte - cinco = 3. dos + diecisiete = I 4. nueve - tres = 5. diecinueve + uno = Which number sentence is not true?O A) |1>OB) |-1=-1O C) what is the relationship between the variables on this graph? The temperature does not have an effect on flow time. As the temperature increases, the flow time increases. As the temperature increases, the flow time decreases. From the SeaThe sea is a hungry dog,Giant and gray.He rolls on the beach all day.With his clashing teeth and shaggy jawsHour upon hour he gnawsThe rumbling, tumbling stones,And, "Bones, bones, bones!"The giant sea-dog moans,Licking his greasy paws.James ReevesFind an example of a metaphorFind an example of alliteration.Find three examples of personification.Identify the rhyme scheme of the poem.Within the context, the word "gnaws" in line 5 meansa) climbsb) chews onc) spits outd) gulpsThe poet's attitude toward the sea is one ofa) admirationb) hatec) feard) sadness IF 4 bottles of juice cost $7, how much would 9 bottles costI am giving 40 points!Help please! What was the name of the group of thugs the Nazis used to harass voters Sign an experiment.A: John Smith has been hired by the city of Virginia Beach to investigate the recent increase in shark attacks offthe resort's coast. The resort has also heard from its guest recently an increased number of elephant seals thatare seen at the beach. Elephant seals are highly migratory and move with the seasons. He has a budget of$40,000, a 25 foot boat, and three graduate student assistants to help him. A helicopter has also been donated bya local television station, should he need one.1. List 2 hypotheses John and his crew may have come up with for the recent shark attacks.a. Ifthenb. Ifthen2. Pick one of the two hypotheses and determine the following:a. Control Group:b. Experimental Group:c. Dependent Variable:d. Independent Variable:3. What type of data do you think John will collect (What will be the results of the experiment)?4. What conclusions will John be able to make from the results of the experiment? What is the difference between Context and Content Niko wants to add something to his Can Do Circle, so he has decided to join Student Government. What is Niko's Explorer voice most likely to say?You don't know enough people to join.You will love getting involved in school.You will dislike the required meetingsYou don't need to be well-rounded Help ASAP pleasentjjt jjhb ft fv tuning Denise l Debbie A large pumpkin weighs 10.4 pounds. A smaller pumpkin weighs 3.6 pounds. How much less does the smaller pumpkin weigh? what is a equivalent ratio of 16:18