1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arisa [49]
4 years ago
12

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended use

r’s understanding of the reports, analyses, or recommendations is ________.
Computers and Technology
1 answer:
Damm [24]4 years ago
4 0

Answer:

Credibility.

Explanation:

The IMA or institute of management and accounting is one of the largest and most respected group or association of accountants and other financial professionals in the business industry, with the collaborative intent to advance and promote the management and accounting profession.

All members of the association obligatorily adhere to four principles. They are, honesty, fairness, objectivity and responsibility. And they also follow four IMA standards, which are credibility, competence, integrity and confidentiality.

The credibility standard includes disclosing all relevant information that could reasonably be expected to influence an intended user's understanding of the reports, analyses or recommendation.

You might be interested in
Katherine wants to open a bank account that allowed her to perform frequent transactions without being charged a penalty and she
Pavlova-9 [17]

Answer:

C

Explanation:

8 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
Which layer in the Internet Protocol Suite model verifies that data arrives without being lost or damaged?
zloy xaker [14]
It is D I believe

Explanation:
4 0
3 years ago
Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
ad-work [718]

Answer:

CUBIE MiniDrawer Bin

Explanation:

MiniDrawers comes in two configurations, and each fitting comes in one drawerslot. The MiniDrawer (1-6) comes with the most primary pocket dimensions. And we have the 18-tray MiniDrawer (1-8) comes with another dimensions in its basic form. You will in fact find various pocket dimensions like 1,2,3,4,6,12, and these comes within the 18-tray and 6-tray MiniDrawers. And they come in all the dispensing modes mentioned in the question. Hence, the above answer. The answer is clear from the options as well, and since it has the matrix mode as well apart from single dose mode and multi dose mode.

6 0
3 years ago
Which of the following statements is true? Computer disks are volatile storage devices Volatile storage is lost when a computer
arsen [322]

Answer:

Volatile storage is lost when a computer loses power.

Explanation:

There are different types of storage in the computer. We have those that stores permanently like the disk while we have those that are very volatile.

The permanent storage retain storage in the event of power failure but volatile storage is lost if there is power failure. Example of volatile storage in the computer is RAM

4 0
3 years ago
Read 2 more answers
Other questions:
  • When advising a customer on the purchase of a new power supply, you should explain that if the power supply runs at peak perform
    9·1 answer
  • What would be a situation in which you could use an Excel chart to present your data?
    11·2 answers
  • Which symbol is used to identify edge-triggered flip-flops? a triangle on the clock input. the letter e on the enable input. a b
    14·1 answer
  • Know when the double, int, String, and char data types are best used. Example: I would store a social security number in a strin
    7·1 answer
  • Can i add ADSence on bangla content in blogsopt website?
    12·1 answer
  • Implement the Dining Philosophers problem (described on pages 167-170 in the textbook (chapter 2.5.1)). Create a Graphical User
    13·1 answer
  • Write a program that uses nested loops to collect data and calculate the average rainfall over a period of years. The program sh
    6·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • Assume you're using a three button mouse.To access shortcut menus,you would
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!