Answer:
a. It is a collection of all accounts with their activity and balances that exist in a business. - A general ledger
The General Ledger is the central record in an accounting system and contains a record of all financial transactions in the company.
b. It is a book of original entry that includes a chronological record of all transactions that Have occurred within a business during a period occurred. - A Journal
When a transaction takes place in a business, it is recorded first in a Journal. As such, a journal contains a chronological record of all transactions that have occurred within a business during a period occurred.
c. It is a list of each account and its balance at any given time and is used to verify that debits = credits
. - Trial Balance
The Trial Balance helps a business balance its debits and credits by listing them so then equating them to verify that indeed the debits match the credits.
d. It is a list of all ledger accounts which exist in a business and includes an identification number assigned to each account
. - A chart of accounts
Answer:
Fixed overhead application rate
= <u>Budgeted fixed overhead</u>
Budgeted direct labour hours
= <u>$114,000</u>
60,000 hrs
= $1.90 per direct labour hour
Amount of overhead applied to job X387: $
Variable overhead $4.90 x 170 hours = 833
Fixed overhead $1.90 x 170 hours = 323
1,156
Explanation:
In this case, there is need to calculate the fixed overhead application rate based on direct labour hours by dividing the the budgeted fixed overhead by budgeted direct labour hours. Then, we will calculate the overhead applied to Job X387 by multiplying the fixed and variable application rate by actual direct labour hours of 170 hours.
D maybe sorry if wrong i am not the best in history
Anomaly-based IDS pg. 250 is an intrusion detection system that compares
current activity with stored profiles of normal (expected) activity. While an
intrusion detection system that uses pattern matching and stateful matching to
compare current traffic with activity patterns (signature) of known network
intruders is Pattern-(signature) based IDS pg. 250.