Answer: The general journal is used to post all accounting entries.
Explanation:
The general journal is the journal where all company transactions are recorded in. In other words, a general journal is the book of original entry where bookkeepers and accountants record business transactions according to the date the transactions take place.
It is the initial place where transactions are recorded, every page in the journal is divided into columns for dates, debit or credit records, serial numbers etc. Some companies keep specialized journals, such as sales journals or purchase journals, which records only a particular type of transactions. When a transaction has been recorded in the general journal, the amount is then posted to the appropriate accounts.
<span>Which promotion exemplifies the use of a fixed-ratio schedule of reinforcement? A café prints "you are a winner" on a random one-twelfth of its coffee lids; patrons receiving such a lid can redeem it for a free beverage. A fixed-ratio schedule of reinforcement, which a response is reinforced when there is a set number of responses. Every set number of people purchasing the coffee have a chance to win a free beverage. </span>
Answer:
(A) A wholly owned Subsidiary
Explanation:
A wholly owned subsidiary is a company that is completely owned by another company called the Parent/Holding Company. The parent company will hold all (100%) of the subsidiary's common stock.
A wholly owned subsidiary allows the parent company to diversify, manage, and possibly reduce its risk.
Some of the disadvantages of a wholly owned subsidiary include the possibility of multiple taxation, lack of business focus, and conflicting interest between subsidiaries and the parent company if not properly managed.
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.