Answer:
1. Verify transactions independently
.
2. Restricting access to programmers to change programs and data files when there is an error.
Explanation:
- Verifying transactions independently by involving another employee re-entering transactions, then programming the software in order to compare the inputs and search out errors, is an essential control method.By doing this, errors are identified, reducing risk of incorrect transactions.
- When programmers have access to changing data and programs, this indicates a lack of internal control. Unrestricted access enables a programmer include or subtract certain elements of programs which could lead to errors in operations and transactions. There should be proper identification of duties and a programmer should be bound by specific functions, reducing the risk of this type of error.
Answer:
If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.
Answer:
RAM
Explanation:
RAM or Random Access Memory is a type of memory that can also read and write data.
As its name is saying it can simultaneously read and write and with no particular order.
The difference between RAM and ROM is that the ROM stands for Read Only Memory... Memory that can only read and cannot write.
Latest generation of RAM is DDR4 that does 2133 Million transfers per second.
Im guessing a cell is named by the scientist that found that cell in the fist place.
The sun I don't know I'm terrible at this stuff.