Answer:
Access Control List
Explanation:
An access control list is a table that tells a computer operating system(windows, Mac-os, Linux) which access rights a user or group of users have to certain object on the computer system. The object to be accessed may range from an individual file to a directory.
The most commonly allowed accesses includes the ability to read files, execute files (i.e if the files is executable; .exe), write to the file.
The answer that will fill in the blank is the emotional zone somewhere between boredom and anxiety. It is because this is what the view of mihaly csikzentmihalyi's believes. The other choices does not corresponds to the answer or not connected to his beliefs for they were not included to his view of what the people seek.
Answer:
A. Restrict access
C. Establish responsibility
D. Document procedures
B. Independently verify
Explanation:
A. Restrict access, as the password is set to address the cash register, that is a security is being provided, and this is because, there is a restricted access, for the safety purpose.
C. Establish responsibility - As the treasurer is held liable of making and receiving any checks, and that he is the person who shall monitor such things, related to transactions in checks.
D. Document procedures - since a list is prepared for the checks received in mail, it is mere preparation of records and documentation of what checks are received and what not.
B. Independently verify - Bank Reconciliation Statement is prepared to verify the transactions and match the balance in books with that of the bank pass book.