1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
15

A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens

e as 996. The highest account code in the system is 750. What would be the best internal control check to build into the company's computer program to detect this error?
Computers and Technology
1 answer:
kotegsom [21]3 years ago
3 0

Answer:

The correct answer to the following question will be "Valid-code test".

Explanation:

Even though no significance labels (including a standardized test score parameter) exist, valid data input codes or protocols could still be defined by having to type the correct codes as well as ranges.

  • To diagnose the given mistake, a valid code review will be the strongest internal control audit to incorporate into the organization's computer program.
  • To insert valid code the syntax is: <Code or Range>. Throughout this scenario, each code is decided to enter on another step.
You might be interested in
1. Write a program to input four numbers and store them in variables.
slega [8]
Honestly , brainly may seem like a place to get answers but it’s not , people come here to troll, like me
7 0
3 years ago
Suppose we eliminate tcp and instead rely exclusively on udp as our only transport layer protocol. ⢠how does this impact opera
evablogger [386]
TCP is a reliable protocol. Verification of the data (to an extent) is performed. UDP is an unreliable protocol. It's a "fire and forget" protocol. Since the verification ( packet counts, checksums ) isn't being done, the application[s] have to do it.
8 0
2 years ago
What is the top folder of the file tree called
m_a_m_a [10]
The root directory, or root folder, is the top-level directory of a file system.
3 0
3 years ago
Read 2 more answers
There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
Lena [83]
False u would figure out yourself if it's good or bad
6 0
2 years ago
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
sdas [7]

Solution:

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the bits per seconds.

Thus this is the required answer.

6 0
3 years ago
Other questions:
  • What is working with others to find a mutually agreeable outcome?
    6·1 answer
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • What is the traditional cognitive perspective ofHCL?
    12·1 answer
  • Write an expression to compute the quartic root of x. the quartic root of a number is the square root of its square root. exampl
    11·1 answer
  • How can i fix a all white phone screen
    11·2 answers
  • You have imported a library with the birthMonth() function. Based on the API, how many strings are inputed to calculate the birt
    11·1 answer
  • Assert statements are a tool programmers employ to help them debug their code more efficiently.
    6·1 answer
  • Please answer.
    9·1 answer
  • Describe accessibility in Windows 7 ​
    13·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!