1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
7

What are six types of records your company is likely to need?

Business
1 answer:
NikAS [45]3 years ago
6 0

What are six types of records your company is likely to need?

When running a business there are a lot of different types of records your company is likely to need some common records are: proof of business for tax purposes, revenue and loss, accounting journals, petty cash, payroll and deductions. There are a lot of different records needed so here are a few as an idea to get started, depending on the type of business being ran there may be more or less records needed.

You might be interested in
If the reserve ratio is 15 percent, and banks do not hold excess reserves, and people hold only deposits and no currency, then w
Anna71 [15]
To figure the simple money multiplier, you divide 1 by the required reserve ratio. For example, if the required reserve ratio is 3 percent, divide 1 by 0.03 to find the simplemoney multiplier<span> equals 33.3.</span>
7 0
4 years ago
Gloria deposited $500 into a bank account that earned 7. 5% simple interest each year. She earned $225 in interest before closin
timama [110]

The number of years in which the money is in the account is 6 years.

<h3>What is simple interest?</h3>

Simple interest denotes the amount of payment that is received or paid by a person in return for anything pledged or given a loan.

The interest computed on the principal amount for a specified duration of time and rate of interest is called simple interest.

The formula of simple interest:

\text{SI}= \text{P}\times r \times t

Where, (P) stands for principal, (r) for interest rate, and (t) is for the time period.

<u>Computation </u><u>of a number of years:</u>

According to the given information,

P=$500,

r=7.5%,

t=?

SI= $225

Now, substitute the given values in the above formula, we have:

\text{SI}= \text{P}\times r \times t\\\\\$225=\$500\times\ 7.5\%\times t\\\\t= 6 \text{Years}

Therefore, the number of years is 6 years.

To learn more about the simple interest, refer to:

brainly.com/question/2793278

5 0
2 years ago
Following are the transactions of a new company called Pose-for-Pics.Aug. 1 Madison Harris, the owner, invested $8,000 cash and
Rama09 [41]

Answer:

Aug 1

Dr cash $8,000

Dr photography equipment $34,400

Cr Common Stock $42,400

Aug 2

Dr Prepaid Insurance $3,000

Cr Cash$3,000

Aug 5

Dr Office supplies $1,520

Cr Cash$1,520

Aug 29

Dr Cash $4,000

Dr photography fees earned $4,000

Aug31

Dr Utilities expense $884

Cr Cash $884

Explanation:

Preparation of the general journal entries for the above transactions.

Aug 1

Dr cash $8,000

Dr photography equipment $34,400

Cr Common Stock $42,400

(8,000+34,400)

Aug 2

Dr Prepaid Insurance $3,000

Cr Cash$3,000

Aug 5

Dr Office supplies $1,520

Cr Cash$1,520

Aug 29

Dr Cash $4,000

Dr photography fees earned $4,000

Aug31

Dr Utilities expense $884

Cr Cash $884

4 0
3 years ago
Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highes
alukav5142 [94]

Answer:

C. hacking

Explanation:

Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.

Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.

There are several ways of hacking which includes;

Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.

Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.

Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.

Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.

3 0
3 years ago
Charging someone higher interest on a loan because they missed a payment in the past is:
posledela

Answer:D

Explanation:

6 0
3 years ago
Other questions:
  • How does the economy of Cuba differ from the economy of North Korea? In North Korea, the government’s control of the economy has
    8·1 answer
  • To prepare a budgeted balance sheet as of December 31, 2020, data is needed from the ______ December 31, 2019. income statement
    13·1 answer
  • _________ is calculated by taking _________ and then subtracting the value of how much physical capital is worn out, or reduced
    7·1 answer
  • Tropical Inc. has reported ROE of 0.07 and a dividend payout ratio of 0.6. Its expected earnings for the next year is $2.7 per s
    12·2 answers
  • 10 mangerials role in orgniztion
    13·1 answer
  • On January 1, Year 1, Marino Moving Company paid $48,000 cash to purchase a truck. Marino planned to drive the truck for 100,000
    13·1 answer
  • Fogerty Company makes two products, titanium Hubs and Sprockets. Data regarding the two products follow: Direct Labor-Hours per
    6·1 answer
  • Escareno Corporation has provided its contribution format income statement for June. The company produces and sells a single pro
    8·1 answer
  • What is cold Storewhat is cold Store <br>​
    12·1 answer
  • a. As prices rise, the cost for businesses to finance new equipment increases, causing a drop in quantity demanded of real GDP.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!