1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
2 years ago
14

How does one commit accounts receivable fraud?

Computers and Technology
2 answers:
disa [49]2 years ago
5 0
The answer is B) bill customers for the amount they purchased, but record lower purchases in the ledger and pocket the money. A fraud is one of two types of mistake in the recording process which done with a deliberate intention. The account receivable department responsible for recording sales transaction and billing the customers. Thus, the account receivable fraud can be committed in this process.
soldier1979 [14.2K]2 years ago
3 0

Answer:

Bill customers for the amount they purchased but record lower purchases in the ledger and pocket the money ( B )

Explanation:

Accounts receivable Fraud is an intentional act of stealing/diverting company or business funds made from the sales of goods and services made by the company. the staffs mostly responsible for this kind of Fraud is usually the cashiers or account clerks.

The duties of the cashiers or account clerks is to record transactions whether cash or card transactions made by the business/company in the company ledger. the most vulnerable of this kind of payments are cash receipt payments because the cashier might issue a receipt not equivalent to what is entered in the ledger book.

You might be interested in
2 ways to assign a value to a variable
Art [367]
Assigning values at run time
Assigning values as command line argument, before execution of the program

4 0
3 years ago
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
3 years ago
Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the foll
Likurg_2 [28]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

int n;

double average,sum=0,x;

cout<<"enter the Value of N:";

// read the value of N

cin>>n;

cout<<"enter "<<n<<" Numbers:";

// read n Numbers

for(int a=0;a<n;a++)

{

   cin>>x;

   // calculate total sum of all numbers

   sum=sum+x;

}

// calculate average

average=sum/n;

// print average

cout<<"average of "<<n<<" Numbers is: "<<average<<endl;

return 0;

}

Explanation:

Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.

Output:

enter the Value of N:5

enter 5 Numbers:20.5 19.7 21.3 18.6 22.1

average of 5 Numbers is: 20.44

7 0
3 years ago
Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
Hatshy [7]

Answer:

.N. Generación & Descripción

1

Primera Generación

El período de primera generación: 1946-1959. Base del tubo de vacío.

2

Segunda Generación

El período de la segunda generación: 1959-1965. Base del Transistor

3

Tercera generación

El período de tercera generación: 1965-1971. Circuito integrado de base.

4

Cuarta Generación

El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.

5

Quinta Generación

El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.

Explanation:

espero y esto te sirva de algo

3 0
2 years ago
Which of the following was a major economic concern in the mid to late 1970
Charra [1.4K]
Without knowing any definite answer I would probably guess the military spending in Vietnam
7 0
3 years ago
Read 2 more answers
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • Page No.:
    11·1 answer
  • Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    5·1 answer
  • Modify the countUp( ) you wrote in the previous question to countUp( num), where num is a parameter. The function displays from
    9·1 answer
  • Searching for a particular record in a database is called “querying the data.”<br> True<br> False
    9·2 answers
  • The Last Free brainliest<br><br> This Is The Last Brainliest That Im Doing Forever Sorry Guys
    8·2 answers
  • How many comparisons will be done to find 8 in this list using a linear search?
    8·1 answer
  • Guyssss......urgent helppp plsss answerrrr
    5·1 answer
  • One way to check if a website is secure is to look for a/an<br> in the address bar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!