1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
9

Which 3 statements are true about journal entries? (Quick Books)

Computers and Technology
1 answer:
Sonbull [250]3 years ago
6 0

Answer:

1.Total debits must equal total credits

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Explanation:

1.

A Journal entry follows the concept of double-entry. In the double-entry principle, a debit entry equals a credit. After posting all the required entries total debits are equal to the total credits.

4.

The business makes sales to customers. Some sales are made on cash or some are made on credit. In the case of credit sales, the receivables are made. To record the credit sale entry we must specify the customer in the debit entry against the credit entry of sales.

5.

in recording the credit sales or purchases multiple receivable or payable accounts can be used and a single entry of sales of purchases can be posted against these accounts. For example

Journal Entry with multiple receivables accounts.

DR. Customers A $1,000

DR. Customers B $2,000

DR. Customers C $3,000

CR. Sales ______$6,000

You might be interested in
In what medium do web applications operate?
ki77a [65]

Answer

web browser

Explanation:

5 0
2 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
4 years ago
1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
Lera25 [3.4K]

Answer:

GIRL

Explanation:

DALAGANG FILIPINA

14 YEARS OLD

NEED FRIENDS

6 0
2 years ago
Please solve in 5 mins very fast​
Dmitriy789 [7]

Answer:

a. virtual reality

b. Master Boot Records

c. Primary function of a router

d. zoom

Explanation:

4 0
3 years ago
Read 2 more answers
1. How are computers helpful
d1i1m1o1n [39]

Answer:

Brainliest

Explanation:

It’s hard to imagine banks without technology. In fact, computers have been in use in banking since the 1950s, when Bank of America introduced a computer designed specifically for processing checks. Each new decade has brought innovations that change the way banks manage daily operations and serve customers. Today, you may not even leave your house to do your banking. As much as technology has changed the use of the computer in the banking sector, banks continue to adjust the way they do things.

8 0
3 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • What is wrong, logically, with the following code? if (x &gt; 10) System.out.println("Large"); else if (x &gt; 6 &amp;&amp; x &l
    11·1 answer
  • What is an accessory?
    6·1 answer
  • In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh
    15·2 answers
  • A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo
    7·1 answer
  • Using 2 bytes, how many different characters can Unicode represent?
    14·1 answer
  • What does the CPU do in a computer?
    7·2 answers
  • Information about hardware engineers?
    9·1 answer
  • What is the missing line of code?
    7·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!