1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
12

Discuss the term internal control​

Computers and Technology
1 answer:
inessss [21]3 years ago
5 0

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

<h3><u>PLEASE</u><u> MARK</u><u> ME</u><u> BRAINLIEST</u></h3>
You might be interested in
Countries need to engage in trade of natural resources because of distribution in the earth. For instance, countries such as Sau
maks197457 [2]
Water is a scarcity in this area
4 0
3 years ago
2) What is the value stored in the variable z by the statements below?
Dmitriy789 [7]

Answer:

7

Explanation:

Because the q.length is a inbuilt function in the programming which used to get the length of the array. In the array, there are 7 values are store. Therefore, the size 7 store in the variable z.

For example:

int[] array={1,2};

int x = array.length;

the answer of above code is 2, because the elements present in the array is 2.

 

5 0
3 years ago
Sincerely is an example of a salutation true or false
Setler79 [48]
No, I don't think so.
5 0
3 years ago
Read 2 more answers
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
4 years ago
Felicia is a computer programmer.
dolphi86 [110]

A: SSD, HDD, CPU or RAM

Whether you go with the faster SSD or slower but larger HDD, keep in mind you may end up needing a drive large enough to run a dual boot system if you plan on coding in multiple environments. Virtualization of other operating systems is another option, but that requires a fast CPU and a large amount of RAM to work well.

B: Ram because its larger than the others, and will work better.

C: i don't really have a suggested system but here

You may appreciate the seamless experience iOS offers, the flexibility of Android or the familiarity of Windows with your everyday PC. It might take some time to acclimate to a new system, so it may be best to stick with what you know.

Please consider marking brainliest.. thx

8 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • A misfire code is a type _______ diagnostic trouble code (DTC).
    5·1 answer
  • I only want someones opinion on this not anything you would find in a book.
    7·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • In codd's model of a relational database, data is stored in a(n) _____, which maintains information about a(
    7·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • he superclass Student contains: a constructor that accepts a String corresponding to the name of the school the student attends
    15·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!