1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
3 years ago
12

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended use

r’s understanding of the reports, analyses, or recommendations is ________.
Computers and Technology
1 answer:
Damm [24]3 years ago
4 0

Answer:

Credibility.

Explanation:

The IMA or institute of management and accounting is one of the largest and most respected group or association of accountants and other financial professionals in the business industry, with the collaborative intent to advance and promote the management and accounting profession.

All members of the association obligatorily adhere to four principles. They are, honesty, fairness, objectivity and responsibility. And they also follow four IMA standards, which are credibility, competence, integrity and confidentiality.

The credibility standard includes disclosing all relevant information that could reasonably be expected to influence an intended user's understanding of the reports, analyses or recommendation.

You might be interested in
In the mouse properties window you can
Nikitich [7]
When u are in the mouse properties window you can change the speed in which your pointer moves, change the speed of your double click on the mouse, change the look of the pointer make the pointer automatically move to default button in a dialog box have the pointer hide while you are typing. and change the number of lines that the scroll wheel will move when using it. there's actually a lot of optoons available in the mouse properties window. HOPE I WAS HELPFULL
4 0
3 years ago
Sometimes data you export from Access needs to be formatted as a text file instead of an Excel file.
g100num [7]

Answer:

b. False

Explanation:

Microsoft access is a database management application that can store data that can be queried from every other microsoft applications like Word, Access, Onenote etc. its attachments can be converted to best best suit the application or client that needs the file or data.

Accesss database sheets are very to Excel worksheets or books. Tabular data, Graphs and most (if not all) data format can be linked, imported or queried between Access and Excel application. Formatting files (example csv files) to text are not necessary or encouraged when exporting files.

8 0
3 years ago
Some web and mobile applications allow users to share pictures and videos, as well as chat and message. True False
pishuonlain [190]
True ever heard of Instagram or snap chat
8 0
3 years ago
Read 2 more answers
Write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be follo
Yuliya22 [10]
If user output is ''red purble yellow exit'': red purple yellow  import java.util.Scanner;  import java. io.PrintWriter;  import java. io.StringWriter;    public class StringStreamOutput {   public static void main (String [] args) {   Scanner snr = new Scanner(Scanner.in);   Stringuseritem = '''';    StringWriter itemcharStream = new StringWriter();  PrinterWriter itemsOSS = new PrintWriter(itemcharStream);    System.out.printIn(''Enter items (type Exit to open):'');  useritem = scnr.next();    while (!userItems.Equals(''Exit'')) {  /*Your solution goes here*/     UserItem = scnr.nxt();    }     useritem = itemCharStream.toString()   System.out.printin(useritem);     return;     }    }
5 0
4 years ago
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • The MIQ inventory measures how much you value status. Which two measures are measures of status?
    11·1 answer
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the last character of s1 followed by
    10·1 answer
  • - Consider the relation R = {A, B, C, D, E, F, G, H, I, J} and the set of functional dependencies F = { {B, C} -> {D}, {B} -&
    14·1 answer
  • What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2
    9·1 answer
  • The most common types of effects include entrances and exits
    11·1 answer
  • Units of distance on a computer’s screen are measured in microns.
    10·1 answer
  • How do you open an application on the macOS?
    11·2 answers
  • DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the g
    12·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!