1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
2 years ago
7

PLS HELP MEE it's due in 2 minutes​

Computers and Technology
1 answer:
svet-max [94.6K]2 years ago
3 0

The answer is False, Double entry is a type of verification when you enter something 2 times to ensure it matches the original source.

You might be interested in
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
What statement best describes operating systems?
GenaCL600 [577]

Answer:

An operating system, or "OS," is software that communicates with the hardware and allows other programs to run

3 0
3 years ago
When saving my template, I will need to select Word Template in the _____ dialog box.
Bond [772]
You will need to select the file type to be saved as a template in the save as dialog box 
4 0
3 years ago
Select the correct answer.
Svetradugi [14.3K]

Answer:

C. Universal

Explanation:

7 0
3 years ago
Suppose that you created an robot that was so advanced it could act independently in very complex situations. It made its own de
Mashutka [201]
It should not be capable of free action because there's no telling if it would be friendly for good remarks or mean for rude remarks
8 0
4 years ago
Other questions:
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • How do you add a picture to your questions? (on computer)
    10·1 answer
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • In risk management what does risk evaluation involved
    14·1 answer
  • HELP ME FAST???
    15·1 answer
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • Lian is asked to create a variable that will keep track of how many times the user has tried to enter their password. What kind
    9·1 answer
  • WILL MARK BRAINLIEST!!!!!!!!!!!
    13·2 answers
  • Three PCs are on an Ethernet LAN, connected by a hub. Describe how the Ethernet protocol deals with collisions in this situation
    9·1 answer
  • A user of Augmented Reality is able to experience<br> of information on their surroundings.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!