1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
5

Who, under SOX, is legally accountable for certifying and approving the integrity of the company and its financial reporting to

the Securities and Exchange Commission (SEC) and other financial organizations?
Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
5 0

Answer:

Corporate directors.

Explanation:

The SOX or serbanes - Oxleys, named after former united state senators,  Paul Sarbanes (D-MD) and representative Michael G. Oxley (R-OH), is a united state federal law that adds expanded requirements to public company boards, managements and accounting firms all over the states.

It is also know as the Public Company Accounting Reform and Investor Protection Act or Corporate and Auditing Accountability, Responsibility, and Transparency Act. With the reports from the SOX acts, certification of company activities and financial reports are granted.

The corporate director, in collaboration with the internal auditors, analyse company financial reports and other relevant data.

You might be interested in
Suppose users share a 1 Mbps link. Also suppose each user
torisob [31]

Answer:

The answer is below

Explanation:

A) The total bandwidth = 1 Mbps = 1000 Kbps

The requirement for each user = 100 Kbps

Total number of users = Total bandwidth /  requirement for each user

Total number of users = 1000 Kbps / 100 Kbps = 10 users

B) Since each user transmits only 10 percent  of the time, probability that a given user is transmitting is:

Probability = 0.1

C) Binomial distribution formula is given by:

P(x)= C(n,x)p^x(1-p)^{n-x}\\\\n = number\ of \ trials,x=number\ of\ success, p=probability\ of\ success \ for\ one\ trialHence:

Probability=(50\ choose\ n)p^n(1-p)^{50-n}

P=C(50,n)p^n(1-p)^{50-n}

D) The probability that there are 11 or more is:

Probability=1-\Sigma\limits^{20}_0 {(50\ choose\ n)p^n(1-p)^{50-n}}

4 0
3 years ago
What is the name of the computer through which e-mail messages are sent and received?
nalin [4]
A mail server. --------------------------------------------
8 0
3 years ago
Which is a good plan for backing up data?
IgorC [24]
A good plan for backing up data is to setup an automatic backup to an external drive or cloud based storage on a regular basis.
6 0
4 years ago
Write a function add_spaces(s) that takes an arbitrary string s as input and uses recursion to form and return the string formed
kvasek [131]

Answer:

The solution code is written in Python:

  1. def add_spaces(s):
  2.    if len(s) < 2:
  3.        return s  
  4.    else:
  5.        return s[0] + " " + add_spaces( s[1 : ] )

Explanation:

Recursive function is a function that will call itself within the same function.

Let create a function named add_spaces() that take one input string, s (Line 1).

Next, create an if condition to check if the length of the input string is less than 2 (this means if the string has only one character), return the current string (Line 2-3).

Otherwise, it should return the first character of string, s[0] concatenated with a single space " " and concatenated again with the return output from the recursive calling add_spaces() that take s[1: ] as input parameter (Line 4-5). Please note s[1: ] is an expression we get the substring of the current string from position 1 till the end of string.

5 0
3 years ago
Read 2 more answers
Which best describes TPM?
rodikova [14]

Answer:

Encryption used on hard drives

Explanation:

TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.

So, the best sentence that describes, TPM is Encryption built into hardware .

4 0
3 years ago
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • Does it matter if watch comes without box and papers
    10·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • What is distribution hardware?
    14·1 answer
  • What is a phonograph?
    15·2 answers
  • Each object in your database application is shown in the
    12·1 answer
  • Of all excavation hazards, _______ poses the greatest risk
    8·1 answer
  • Take points for free who are new and enjoye them
    9·2 answers
  • In a complex formula, how does excel determine which calculation to perform first?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!