1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
4 years ago
5

Your client has asked you to turn on warnings for duplicate check and bill numbers in their QuickBooks Online company. Take a lo

ok at the steps below. 1. ______________ 2. Under Your Company, select Account and Settings 3. Select the Advanced tab 4. In the Other preferences section, select the option to warn if duplicate check number is used and warn if duplicate bill number is used 5. ______________
Computers and Technology
1 answer:
lana66690 [7]4 years ago
7 0

Answer:

( 1 ) Select the gear icon

( 5) Select save

Explanation:

we have given that client ask turn on warning in Quick Books Online company so

we do 1st step that is

the first is step we we select the gear icon

after that select Account and Settings

and we go for advance tab

after that we perform the action that is Other preferences section

and  select the option there to warn when we use duplicate check number

then we select the save button for save over above performance

so here fill up are first ( 1 ) Select the gear icon and last ( 5) Select save

You might be interested in
Which of the following best meets the requirements of a strong password?
Hoochie [10]

Answer:

having a capital and lower case letters and a special characters and numbers.

Explanation:

it should be hard but easy enough to remember and no one will know

6 0
3 years ago
Read 2 more answers
Briefly explain the cooling mechanism implemented in FANLESS Laptops
Akimi4 [234]

The primary function of a fan in a computer system is to cool down the internal components and prevent overheating. Fanless computers use alternative cooling methods and lower-powered components that give off less heat. As a result, these machines are quieter during operation, use less energy and are often more compact than fan-based computers. These advantages are particularly important in business settings.
8 0
3 years ago
When the computer begins to run a program
Ne4ueva [31]

Answer:

1.the program is moved from secondary storage to memory.

Explanation:

Secondary storage media generally have greater storage capacity than RAM (random access memory), for this reason the data and program are stored there.

but ram memories are much faster, for example, a solid state disk (SSD) with SATA III connection can have read and write speeds of approximately 500 MB/s, while a DDR III RAM can have speeds between 12 and 18 GB/S, that is, more than 20 times faster.

 So that the flow of data at the time of running a program is optimal, the data from the secondary storage unit is copied to the RAM and this ensures that the speed at which the programs run is at least 20 times faster, and our processes run better.

7 0
3 years ago
Which word best completes the comparison of Beowulf and Grendel?
Hatshy [7]

Answer:

sympathetic

Explanation:

If you will have a go at Beowulf, you will find that Grendel is a dangerous demon for whom humanity means nothing, and people for him are just like something that is to be eaten. However, when you will have a go at Grendel, you will find that he is not just a beast without the brain, as he does have affection and conception.

4 0
4 years ago
Read 2 more answers
If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
Alisiya [41]

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

4 0
3 years ago
Other questions:
  • To display or distribute information from a database, programmers or database administrators create ___ .
    12·1 answer
  • In "When Is a Planet Not a Planet?" why does the author say that the outer planets are made of gas when the inner planets are ma
    5·1 answer
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • 60 POINTS!! WILL MARK BRAINLEST!!
    11·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • Tribology is a branch of physics concerned with friction in mechanical motion. Knowledge of tribology would be useful working wi
    14·1 answer
  • Video is a medium that's looks real anyways, but is real________________.
    10·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • Can someone send me reference on communication, importance , communication cycle , pros and cos​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!