1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
2 years ago
7

PLS HELP MEE it's due in 2 minutes​

Computers and Technology
1 answer:
svet-max [94.6K]2 years ago
3 0

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

You might be interested in
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
What is physical memory allocation
Mrrafil [7]

Windows 7 reports how much physical memory is currently installed on your computer along with how much memory is available to the operating system and the hardware reserved memory.

Windows 7 may show that the usable memory may be less than the installed memory.

The indicative Usable memory is a calculated amount of the total physical memory minus “hardware reserved” memory.

5 0
3 years ago
4.7 code practice question 1 Edhesive
laiz [17]

Answer:

Following are the code to this question:

for x in range(11, 21):#defining for loop that use range method that take two integer values

  print(x," ")#print value

Output:

11  

12  

13  

14  

15  

16  

17  

18  

19  

20  

Explanation:

In the given question, it is not clear that what question is asked about and by search I show above so, I try to help you hope you like it.

In the above-given python code, a for loop is declared that use an x variable with the range method, that uses two integer value, in which first value will start the loop and last value ends the loop, inside the loop print method is used, that print the value of the loop variable x.

3 0
3 years ago
What is a possible weakness of an expert-novice pair?
evablogger [386]

Answer:

The novice will be overwhelmed by the expert and not offer suggestions.

The novice will be overwhelmed by the expert and not offer suggestions.

Explanation:

Got it right on edge 2022

5 0
3 years ago
Rebooting a system in an attempt to fix a problem is an example of the ____ problem-solving strategy.
expeople1 [14]
Software trouble shooting
4 0
4 years ago
Other questions:
  • How does sea floor spreading relate to supercontinents? A. It lowers the overall water level in the ocean so land masses can joi
    13·2 answers
  • A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
    13·1 answer
  • What is transmission control protocol?
    9·2 answers
  • If a firm's pages are not near the top of query results, customers may never discover its website. This has led to _____ becomin
    12·1 answer
  • _________ is the start up sequence a computer conducts.
    9·1 answer
  • Write a function named countEvens that counts and returns the number of even integers in an array. The function must have this h
    5·1 answer
  • Write the definition of a function named isSorted that receives three arguments: an array of int , an int that indicates the num
    11·1 answer
  • Select the correct answer.
    12·2 answers
  • Please help, you don’t have to answer it i just need to know the best types of conversions
    12·1 answer
  • As a hardware technician and knowing the internet components of the system unit, list any five(5) of such components.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!