1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
2 years ago
7

PLS HELP MEE it's due in 2 minutes​

Computers and Technology
1 answer:
svet-max [94.6K]2 years ago
3 0

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

You might be interested in
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
What is a network of high-capacity communication links is the internet?
mojhsa [17]

Social media is the high capacity of communication links

5 0
3 years ago
Read the sentence and answer the question. "Adam Cooper, a cultural strategy officer for the mayor of London, agrees. He thinks
siniylev [52]
<span>I think its pioneers!</span>
8 0
3 years ago
Okay im spamming but help me again please
Alika [10]

Answer: for 5 its b and for 6 i may be wrong but i think its also b

Explanation:

3 0
3 years ago
What is the primary way to access applications in Windows 10
REY [17]

Try using cortana, it is usally preloaded on the computer.

Its close the windows start menu.

4 0
3 years ago
Other questions:
  • Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
    11·1 answer
  • You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
    12·1 answer
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • Which is the correct process for attaching a file?
    12·1 answer
  • Which of the following is true concerning science?
    8·1 answer
  • 7.5 code practice please I can't get a 100 on it helpppp :/
    6·2 answers
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
    13·2 answers
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!