Answer:
A) Year 1 cost of goods sold
B) Year 2 cost of goods sold
D) Year 2 beginning inventory
Explanation:
A) Year 1 expense of merchandise sold : The Current year cost of Goods Sold is processed by deducting finishing stock from Opening Inventory and Purchases made during the year. So in the event that the completion stock isn't right, at that point the result of above calculation will not be right so the Year 1 expense of merchandise sold for example (Current year cost of Goods Sold) will be inaccurate.
D) Year 2 starting stock: year 2 starting stock is equivalent to year 1 completion stock. So on the off chance that off-base stock estimation is made at end of earlier year, at that point current year opening worth will be carried on as off-base.
B) Year 2 expense of merchandise sold: The explanation is same as ans q(i.e. Year 1 expense of merchandise sold) as off-base convey forward opening stock worth will bring about wrong calculation of cost of products sold for year 2.
Answer:
see below
Explanation:
Endorsing a check is communicating to the bank how a check is to be cashed. A restrictive endorsement puts limits on how a check or other financial instruments are to be used.
The most common type of restrictive endorsement is for the payee to write the words" for deposit only" at the back of the check. The payee then signs and indicates their account number. This instructs the banks to pay the check amount to that account.
Sandra walker should write the words "for deposits only" at the back of the check. She has to indicate the bank account number for The Book Nook and sign at the back.
The answer is <u>"D. Network vulnerability management".</u>
A network vulnerability assessment is the way toward auditing and dissecting a PC arrange for conceivable security vulnerabilities and escape clauses.
It is utilized by system chairmen to assess the security design and safeguard of a system against possible vulnerabilities and dangers.
A network vulnerability assessment helps network administrators or organize security staff to evaluate the security quality of a specific system.