1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
12

In a computerized accounting system, each transaction that is analyzed must be entered by hand into the appropriate journal and

posted to the appropriate ledger.
Computers and Technology
2 answers:
babymother [125]3 years ago
7 0

Answer:

The statement is FALSE

tatuchka [14]3 years ago
5 0

Answer:

False

Explanation:

An effective financial management system is based on the availability of reliable, accurate and timely financial data. Usually this data is provided by the accounting system of an organization. In response to factors such as expansion, new reporting requirements, the need to work towards greater self-sufficiency and the availability of relatively low cost technology, an increasing number of organizations are adopting computerized accounting systems that they will provide the data they need, at the time they need it.

Most organizations go through a progression of accounting systems. They usually start with a manual system (using paper), then advance to a mix of paper and tools based on computerized spreadsheets, and finally adopt a simple computerized system.

You might be interested in
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
Mnenie [13.5K]
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
6 0
3 years ago
The birthday paradox says that the probability that two people in a room will have the same birthday is more than half, provided
poizon [28]

Answer:

The Java code is given below with appropriate comments for explanation

Explanation:

// java code to contradict birth day paradox

import java.util.Random;

public class BirthDayParadox

{

public static void main(String[] args)

{

   Random randNum = new Random();

   int people = 5;

   int[] birth_Day = new int[365+1];

   // setting up birthsdays

   for (int i = 0; i < birth_Day.length; i++)

       birth_Day[i] = i + 1;

 

   int iteration;

   // varying number n

   while (people <= 100)

   {

       System.out.println("Number of people: " + people);

       // creating new birth day array

       int[] newbirth_Day = new int[people];

       int count = 0;

       iteration = 100000;

       while(iteration != 0)

       {

           count = 0;

           for (int i = 0; i < newbirth_Day.length; i++)

           {

               // generating random birth day

               int day = randNum.nextInt(365);

               newbirth_Day[i] = birth_Day[day];

           }

           // check for same birthdays

           for (int i = 0; i < newbirth_Day.length; i++)

           {

               int bday = newbirth_Day[i];

               for (int j = i+1; j < newbirth_Day.length; j++)

               {

                   if (bday == newbirth_Day[j])

                   {

                       count++;

                       break;

                   }

               }

           }

           iteration = iteration - 1;

       }

       System.out.println("Probability: " + count + "/" + 100000);

       System.out.println();

       people += 5;

   }

}

}

4 0
4 years ago
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
Tema [17]

Answer: inattention, lack of knowledge, and negligence.

Explanation: employees are often the cause of workplace incidents because they may be unknowledgeable about security protocols, negligent, or simply make a mistake.

5 0
3 years ago
Carrie is looking at the Form Properties Sheet. Which tab will control how the data is displayed and the data source it is bound
Lemur [1.5K]
The Answer is: Data


Hope this help
8 0
3 years ago
A(n) ________ HTML tag is used to mark information about the page.
Rina8888 [55]

Answer:

sorry im late ^^; but the answer is metadata!

Explanation:

8 0
3 years ago
Other questions:
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • Hybrid processors that can process 32 bits or 64 bits are known by what term?
    8·1 answer
  • What is one disadvantage of accessing the Internet through a public search engine such as Google or Yahoo?
    10·2 answers
  • What symbol following a menu command lets you know that a dialog box will be displayed? an arrow a check mark an ellipse a radio
    5·2 answers
  • What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
    14·2 answers
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • What can be designed to create annoying glitches or destroy data
    11·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months
    9·1 answer
  • Which symbol is used for an assignment statement in a flowchart?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!