1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
12

In a computerized accounting system, each transaction that is analyzed must be entered by hand into the appropriate journal and

posted to the appropriate ledger.
Computers and Technology
2 answers:
babymother [125]3 years ago
7 0

Answer:

The statement is FALSE

tatuchka [14]3 years ago
5 0

Answer:

False

Explanation:

An effective financial management system is based on the availability of reliable, accurate and timely financial data. Usually this data is provided by the accounting system of an organization. In response to factors such as expansion, new reporting requirements, the need to work towards greater self-sufficiency and the availability of relatively low cost technology, an increasing number of organizations are adopting computerized accounting systems that they will provide the data they need, at the time they need it.

Most organizations go through a progression of accounting systems. They usually start with a manual system (using paper), then advance to a mix of paper and tools based on computerized spreadsheets, and finally adopt a simple computerized system.

You might be interested in
1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
Aleksandr-060686 [28]

?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

8 0
2 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
Which is the most common way to install memory in a laptop?
alina1380 [7]

install memory requires you to take off the bottom portion of the laptop.

7 0
3 years ago
Which of the following are reasons why it is important to properly recycle electronic equipment? Select all that apply.
faltersainse [42]
I think it is C. Sorry if I am wrong
4 0
3 years ago
Read 2 more answers
An administrative assistant types a document, saves, and prints. The assistant is using _____.
9966 [12]
The answer to your question is software. 
3 0
3 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • Which Of the following components leads to slow computer performance when it becomes outdated
    12·2 answers
  • What does a data bar in a cell represents​
    12·2 answers
  • Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
    14·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • In a linked chain implementation of a queue, the performance of the enqueue operation
    10·1 answer
  • How do you add Rulers to a document?: *
    6·1 answer
  • PLEASE ANSWER THIS ASAP‼️
    10·2 answers
  • dash is a set of communication standard using for transferring file information between computers in a network​
    5·1 answer
  • What does FTTB mean?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!