Answer:
Adjustments are made at the end of the accounting period because making them on a daily basis would be inefficient.
Explanation:
Adjusting entries are adjustments made on accounts to recognize revenue or expenses that were not properly recorded before. They are usually done at the end of the month or the end of the accounting period to balance debit and credit records.
While you record daily transactions the same day in which they occur.
<span>The process of earning your income is called earning a living. It may be because we need different things to live a comfortable life. For these, we need a income first. So by earning income, we are indirectly earning a (comfortable) living.</span>
If you discover an unattended email address or fax machine in your office. What you should do is: To Contact your compliance department.
<h3>Unattended email address</h3>
If an unattended email address that is receiving appeals requests is discovered the next step of action to take is to get in touch or contact your compliance department.
You can contact your compliance department by making use of compliance hotline or any other means that you can use to contact them.
Therefore what you should do is: To Contact your compliance department.
Learn more about Unattended email address here:brainly.com/question/14983098
#SPJ12
When a student chooses to study linguistics at a college then has to choose an academic major subject.
<h3>
</h3><h3>
What is an academic major?</h3>
An academic major is referred to as a specialization an individual to choose in which he is looking for expertise or career during the college duration.
These major subjects reflect that the student will gain knowledge and developed skills by reading the subject and can utilize it in the future. This will also help to determine the interest of an individual.
Learn more about academic major, here:
brainly.com/question/26093373
#SPJ1
The three levels that an organization should have when it
comes to data classification that is accessed by its users on a small network
are the following;
High security – passwords and encrypted folder are being
provided for access
Medium security – not all the data that is shown are all accessible,
there is a presence of limited access.
Low security - a presence of public folder in the given data