1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
11

Question 8 OT TU

Computers and Technology
1 answer:
Semenov [28]3 years ago
4 0
The qualities that are generally required are A. Vision
You might be interested in
QuickBooks Online (QBCU) Session 4: Post Assessme
Arada [10]

<em>Hence, I don't really know since I'm NOT 21 Years Old. If you're trying to record a credit/refund for a returned item, you'll have to enter a deposit, then link it to the vendor credit.  </em>

<em> </em>

<em>  </em>

<em> </em>

<em>First, you'll have to enter the refund as a deposit. Here's how: </em>

<em> </em>

<em>Click the Plus sign (+) icon. </em>

<em>Choose Bank Deposit. </em>

<em>Under Add funds to this deposit, choose the vendor name in the Received from field. </em>

<em>Choose Accounts Payable in the Accounts field, then enter the credit/refund amount in the Amount field. </em>

<em>Click Save and close. </em>

<em>Next, link the deposit to the vendor credit. Here's how: </em>

<em> </em>

<em>Click the Plus sign (+) icon. </em>

<em>Choose either Expense or Check. </em>

<em>Choose the vendor name. </em>

<em>On the right pane, under Add to Expense/Check, add the deposit by clicking Add. </em>

<em>Click Save and close. </em>

<em>Though, if you want to apply a vendor credit to a bill, check this article for the steps (Scenario 2): Manage vendor credits. </em>

<em> </em>

<em>  </em>

<em> </em>

<em></em>

3 0
3 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
4 years ago
WILL GIVE 100 POINTS AND GIVE BRAINIEST TO THE FIRST PEOPLE THAT ANSWER CORRECTLY!!!!!! Marcus wants to create a spreadsheet wit
maks197457 [2]

Answer:

tell me bar

Explanation:

5 0
4 years ago
Read 2 more answers
To create a query string, you add a ____ immediately after a url, followed by the query string.
salantis [7]
The answer is question mark (?).  To create a query string, you add a question mark (?) immediately after a url, followed by the query string.
5 0
3 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • Which of the encryption standards listed offers the greatest amount of security? A. WPA2 B. WEP2 C. WPA D. WEP
    5·1 answer
  • What's the best way to change the font size of all your notes pages at once?
    14·2 answers
  • Which css property is used to change the text color of an element?
    15·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • Aaron has elaborate systems set up on his computer to remind him of all the things he has to do and when he has to do them. The
    12·1 answer
  • 40 points to answer ALL
    9·2 answers
  • A manufacturing company inspects all products before selling them. Less than 1% are defective and do not pass inspection. You ar
    9·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • Which of these can be considered data ?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!