1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
14

ethics and internal control are important applications in accounting . Provide FIVE code of ethics and five internal control mea

sures that any business can adopt. explain fully
Computers and Technology
1 answer:
IceJOKER [234]3 years ago
6 0
Ethics:
- to ensure that privacy will not be lost.
-ensuring personal information is not lost
-information in the accountings will not be submitted or shared with anyone
-information will be saved and viewed by the business.
- The business will not falsely make the accountings.
You might be interested in
Define a class named person that contains two instance variables of type string that stores the first name and last name of a pe
Katarina [22]

Answer:

Answered below

Explanation:

//Program is written using Java programming language.

Class Person {

private string firstName;

private string lastName;

void set firstName(string a){

firstName = a;

}

string getFirstName(){

return firstName;

}

void setLastname( string b){

lastName = b;

}

string getLastName( ){

return lastName;

}

void displayDetails( ) {

System.out.print(firstName);

System.out.print (lastName);

}

}

//Test program

Class Main{

public static void main(String args [] ){

Person person = new Person( )

person.setFirstName("Karen")

System.out.print(person.getFirstName)

person.displayDetails()

}

}

5 0
3 years ago
You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Ma
Anna71 [15]

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

5 0
3 years ago
Can you show me how to code this is GDBonline? explaining each statement with notes//
MAVERICK [17]

Answer:

Create two classes, PlayingCard and Main, as depicted in the attachments.

Explanation:

The getters/setters are not actually used in this code, but creating them is pretty standard. Although, you could argue that a PlayingCard object should never change value/suit, and is what it is as long as it exists. Such objects would be called "immutable".

7 0
1 year ago
Explain the main difference between using a list and a table to organize information in a web page?
Ratling [72]

Answer:

A table is fine till we need rows and columns. However, the list is quite more flexible. Hence, the table is always going to be a great choice when the data needs to be expressed as a table. However, if we want a more flexible view for a list of products or items with quite a long list of properties. Also, we can have any level of indented lists within the list. This can be done with the help of tabs, and bullets and numbering. Both ordered and unordered lists are possible. And that proves lists are more flexible. And the main purpose of the table is the row and column type of formatting on the web page, where we create a table and then hide the borders.

Explanation:

Please check the answer section.

5 0
3 years ago
Which email writing etiquette should Ariel follow to let people know that she received their message?
gtnhenbr [62]

I'm pretty sure its either A or D

6 0
3 years ago
Other questions:
  • Define the Artist class with a constructor to initialize an artist's information and a print_info() method. The constructor shou
    9·1 answer
  • What occurs when information is copied from an internet source to another computer?
    6·1 answer
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
    14·1 answer
  • What is a set of javascript statements that result in an action?
    15·1 answer
  • One advantage of using a security management firm for security monitoring is that it has a high level of expertise.
    15·2 answers
  • Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. Promp
    10·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • Write a java program to find the perimeter of a triangle with sides measuring 10cm, 14cm and 15 cm.
    8·1 answer
  • On a client/server network, which computer initiates the process of assigning an IP address through DHCP?
    11·1 answer
  • Stroke weight - ____ of the line around a shape or size of the point
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!