Internal controls and the assertions they control.
Software compares the recording date on vouchers with the date on the underlying receiving report.

Answers

Answer 1

The internal control being used here is the "software comparison of dates on vouchers and receiving reports," and it helps ensure the accuracy and completeness assertions related to the recorded transactions.


Internal controls are processes and systems implemented by organizations to help ensure the reliability and accuracy of financial reporting. Assertions are representations made by management about the accuracy and completeness of the financial statements.

In this specific scenario, the software compares the recording date on vouchers (documents that authorize payment) with the date on the underlying receiving report (document that confirms goods have been received). This internal control helps verify that transactions are recorded accurately (dates match) and completely (all necessary documents are present). By doing so, it supports the accuracy and completeness assertions related to the organization's financial transactions.

Learn more about Internal controls visit:

https://brainly.com/question/31428317

#SPJ11


Related Questions

Which characteristic is shared by all prime lenses?

Answers

A characteristic that is shared by all prime lenses is that by construction, it does not give the possibility of modifying the focal length from the same lens.

What are prime lenses?

A prime lens has a fixed focal length, which means that it has only one focal length, that is, the angle of view is fixed.

Characteristics of prime lenses

A prime lens does not allow to zoom in or out of the surrounding environment from the lens body.

A prime lens can be classified according to their focal length, but what characterizes them all is that they only have a single focal length.

Therefore, we can conclude that prime lenses are those that only have one focal length.

Learn more about prime lenses here: https://brainly.com/question/2548694

1.Explain what service is offered over an ISDN BRI circuit to the residential telephone subscriber.2.How many voice channels are available on one ISDN BRI circuit?3.Can an ISDN line carry data information along with voice information simultaneously? If yes at what bit per second rate is available for the data transmission?4.When commercial power is lost at the resident’s home the ISDN line continues to function.​ A. True B. False

Answers

Answer:

Following are the solution to the given points:

Explanation:

For point 1:

Integrated Communications Networks is a technology used to transmit digital signals using telephone lines cables over a local loop.

Due to its larger capacity, it's far faster than just a 's got. ISDN Basic Rate Service (BRI) offers a total bandwidth of 144 kpbs, which would be based on two B channels and a 16 Kbps D channel. As private and small company customers, however, it is adequate.

The BRI is split into two categories: a) in-house cable from the ISDN end to the NT (S/T reference or S-bus) and b) broadcast from the NT to a headquarter (U reference point).

It enables a full-duplex operating point.

This BRI section's maximum length is between 4 to 8 km.

You pay for the speed you utilize using an ask service. In all other words, the price cost of how long you remain connected was evaluated. One can also buy flat-rate usage plans because you can with the phone service.

Given the fact ISDN uses an existing Cat 3 cable, re-connection to a service is not necessary.

In regions in which no additional high-speed access to the internet is available, ISDN can be available.

For point 2:

In the BRI configuration, 2 Data (bearer) lines with 64 kbit/s are available. With voice and user information the B-channels have been used.

For point 3:

Yes, It offers concurrent voice & data communications with improved signaling capacity at 64 kb/s.

For point 4:

It is true.

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Given the following class declarations: public class Base { public void methodOne() { System.out.print("A"); methodTwo(); } public void methodTwo ()
{ System.out.print("B"); } } public class Derived extends Base { public void method One() { super.methodOne(); System.out.print("C"); } public void methodTwo() { super.methodTwo(); System.out.print("D"); } } Assume that the following declaration appears in a client program: Base b = new Derived(); what is the result of the call b.method One();? A. A B. AB C. ABB D. ABCC E. ABC D

Answers

The result of the call b.methodOne() when Base b = new Derived(); is executed is D. The methodOne() in Derived class overrides the methodOne() in Base class and calls super.methodOne() which calls the methodOne() in the Base class. So, "A" is printed.

Then, the methodTwo() in Derived class is called which calls the methodTwo() in the Base class first, printing "B", and then prints "D" in the Derived class. Finally, "C" is printed in the methodOne() of the Derived class. Therefore, the output is "ABD" followed by "C". It is important to note that when we create an object of Derived class and assign it to a reference variable of type Base, we can only access the methods and variables that are defined in the Base class.

The result of the call b.methodOne(); in this scenario is E. ABCD. Let's break down the steps to understand why:

1. Base b = new Derived(); creates a new object 'b' of type Base, but its actual implementation is the Derived class.

2. When you call b.methodOne(), since the object 'b' is of the Derived class, it executes the methodOne() of the Derived class.

3. Inside methodOne() of the Derived class, the first statement is super.methodOne(); which calls the methodOne() of the Base class.

4. In the Base class's methodOne(), it first prints "A" using System.out.print("A");, and then calls methodTwo() of the Base class.

5. Inside methodTwo() of the Base class, it prints "B" using System.out.print("B");.

6. Execution returns to the Derived class's methodOne(), and now it prints "C" using System.out.print("C");.

7. Finally, it calls methodTwo() of the Derived class. Inside methodTwo() of the Derived class, it first calls super.methodTwo() which is the methodTwo() of the Base class, which prints "B" again.

8. Then, it prints "D" using System.out.print("D"); in the Derived class's methodTwo().

So, the output is "ABCD", which corresponds to option E.

Learn more about base at : brainly.com/question/485375

#SPJ11

Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers. What type of security do you recommend?
answer choices
Smart cards
Key fobs
Hardware tokens
Biometric locks

Answers

Based on the given scenario, the type of security that is most recommended for the company to add a second security check that will identify its employees while they are logging in to their computers is smart cards.

A smart card is a device that appears like a credit card with a computer chip embedded in it that can be used to securely store and exchange data. Smart cards are typically used to authenticate an individual or to verify their identity, allowing access to specific locations, services, or devices. Smart cards can be used for a variety of purposes, including payment processing, ID verification, and access control, among others.The implementation of smart cards in a security system would guarantee a higher degree of security, enabling users to use their smart card as an authentication method. Smart cards provide a secure and convenient way of accessing sensitive data while also ensuring the security of the data stored within them.

Learn more about smart cards: https://brainly.com/question/9635432

#SPJ11

PLEASE HELP!!!!!! ASAP

What are two ways to create forms in Base to search data?


Use a wizard, or use Design View.

Use a wizard, or use a report.

Use a report, or use Design View.

Use a report, or use a table.

Answers

Answer:

use a wizard or use a design view

Explanation:

i took the test

Answer: A

Explanation:

A. Who will use the database?

1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?

Answers

Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.

They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.

The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.

During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

What is the correct way to create an inline frame with no border and scroll? Choose all that apply. Pick ONE OR MORE options

Answers

The way to create an inline frame with no border and scroll is to use the style attribute to set the border CSS property to 0 and the overflow CSS property to hidden, like so:

<iframe style="border: 0; overflow: hidden;" src="https://example.com" width="400" height="400"> </iframe>

This will ensure that the frame has no border and is not scrollable. Additionally, you can use the HTML attribute scrolling="no" to prevent the frame from being scrollable, like so:

<iframe scrolling="no" src="https://example.com" width="400" height="400">

</iframe>

Learn more about  inline frame

https://brainly.com/question/29534530

#SPJ11

What is the correct way to create an inline frame with no border and scroll? Choose all that apply. Pick

Write a program to declare an integer array of size 10 and fill it with random numbers using the random number generator in the range 1 to 5. The program should then perform the following: . Print the values stored in the array Change each value in the array such that it equals to the value multiplied by its index. Print the modified array. You may use only pointerioffset notation when solving the programt Example run: The sales red the fa (& 7 4- 8 A hp 144 ( 9 Add text 1 Draw P

Answers

We declare an integer array 'arr' of size 10. We then use the 'srand' function to seed the random number generator with the current time to ensure different random numbers on each program run.

Here's a program in C that fulfills the requirements you mentioned:

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main() {

   int arr[10];

   srand(time(NULL)); // Seed the random number generator

   // Fill the array with random numbers between 1 and 5

   for (int i = 0; i < 10; i++) {

       arr[i] = rand() % 5 + 1;

   }

   // Print the original array

   printf("Original Array: ");

   for (int i = 0; i < 10; i++) {

       printf("%d ", arr[i]);

   }

   printf("\n");

   // Modify each value in the array by multiplying it with its index

   for (int i = 0; i < 10; i++) {

       arr[i] = arr[i] * i;

   }

   // Print the modified array

   printf("Modified Array: ");

   for (int i = 0; i < 10; i++) {

       printf("%d ", arr[i]);

   }

   printf("\n");

   return 0;

}

We fill the array with random numbers between 1 and 5 using the rand function. To limit the range, we use the modulo operator (%) to get the remainder when divided by 5 and add 1 to shift the range from 0-4 to 1-5.

We then print the original array using a for loop. After that, we modify each value in the array by multiplying it with its index. Finally, we print the modified array.

Each array element is accessed using pointer arithmetic notation, 'arr[i]', where 'i' represents the index of the element.

Upon running the program, you should see the original array printed first, followed by the modified array.

To know more about integer array

brainly.com/question/32893574

#SPJ11

Consider the following data regarding students' college GPAs and high school GPAs. The estimated regression equation is
Estimated College GPA=2.56+0.1582(High School GPA).Estimated College GPA=2.56+0.1582(High School GPA).
Compute the sum of squared errors (SSESSE) for the model. Round your answer to four decimal places.
GPAsCollege GPAHigh School GPA3.963.964.42

Answers

The sum of squared errors (SSE) for the model is 0.2639 (rounded to four decimal places).

To calculate the sum of squared errors (SSE) for the model, we need to use the following formula:

SSE = ∑(y - ŷ)²

where y is the actual value, and ŷ is the predicted value.

We are given the estimated regression equation as:

Estimated College GPA = 2.56 + 0.1582(High School GPA)

Using this equation, we can calculate the predicted college GPA for each high school GPA value in the table:

College GPA High School GPA

3.96 3.96

4.17 4.42

Now, we can calculate the sum of squared errors:

SSE = (3.96 - (2.56 + 0.1582(3.96)))² + (4.17 - (2.56 + 0.1582(4.42)))²

= 0.2639

Therefore, the sum of squared errors (SSE) for the model is 0.2639 (rounded to four decimal places).

Learn more about error here:

https://brainly.com/question/30524252?

#SPJ11

To compute the sum of squared errors (SSE) for the given model, we need to compare the estimated college GPAs obtained from the regression equation with the actual college GPAs provided in the data. The formula for SSE is given by:

SSE = Σ(yi - ŷi)2

where yi is the actual college GPA, ŷi is the estimated college GPA from the regression equation, and Σ is the summation over all the observations.

We can use the given regression equation to compute the estimated college GPAs for each observation:

Estimated College GPA = 2.56 + 0.1582(High School GPA)

For the first observation with High School GPA = 3.96, the estimated College GPA is:

Estimated College GPA = 2.56 + 0.1582(3.96) = 3.147392

Similarly, we can compute the estimated college GPAs for the other two observations:

For High School GPA = 3.96, Estimated College GPA = 3.147392

For High School GPA = 4.42, Estimated College GPA = 3.265424

Now we can compute the SSE by using the formula above:

SSE = (3.96 - 3.147392)2 + (3.96 - 3.265424)2 + (4.42 - 3.265424)2

= 0.5711856 + 0.4945218 + 2.7869269

= 3.8526343

Therefore, the sum of squared errors (SSE) for the given model is 3.8526 (rounded to four decimal places).

For such more question on equation

https://brainly.com/question/29174899

#SPJ11

does anyone have a pdf of the greatest by eddie van der meer????

Answers

Answer

aight' so im finding it but i have to asnwer before someone else so look in the comments for it.

Explanation:

Just wait i getting it rn

Stonewalling sends a(n) ______ message to the other person.a. assertive messageb. confirmingc. disagreeingd. disconfirminge. competing

Answers

A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

What is finance charge of credit card?

The interest you'll pay on a loan is defined as a finance charge, and it's most commonly used in the context of credit card debt. A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

Given that,

Interest rate = 15.5%

Date: 1-3 (3 days)

Average daily balance = amount paid × day

 = $200 × 3 = $600  

Date: 4-20 (17 days)

Average daily balance = amount paid

= $300 × 17 = $5100  

Date: 21-30 (10 days)

Average daily balance = amount paid × days

= $150 × 10 = $1500  

So, total average daily balance for the month

= $(600+5100+1500)

= $7200

Now, the finance charge = $7200 × (15.5÷1

  = $93.00

Therefore, A financing fee is computed by taking your annual percentage rate, or APR, the amount you owe, and the time period into account.

To know more about finance charge refer to,

brainly.com/question/22717601

#SPJ1

Identify way computer are used in television production​

Answers

Answer:

image editing, text om screen, weather graphics, animation, sattelites ... a lot more possibilites are endless just limited

In early 2021 a social media company was de-hosted by a cloud service provider because the service provider believed the social media company promoted extreme points of view that were dangerous.Do you believe cloud service providers have the right to discriminate against customers because of their political beliefs or because of their customers' customer's political beliefs? Why or why not? Is there any danger in the precedence this type of censorship sets?

Answers

Cloud service providers are private entities and have the right to set their own terms and conditions for providing services to customers.

If the terms of service prohibit certain types of content or behavior, then the cloud service provider has the right to enforce those policies. However, cloud service providers should also be transparent about their policies and communicate them clearly to their customers.

Discriminating against customers based on their political beliefs or the beliefs of their customers may raise concerns about censorship and freedom of speech. It is important to ensure that any restrictions on speech are applied fairly and without bias.

Setting a precedence for this type of censorship could lead to a chilling effect on free expression and could be a concern for those who value freedom of speech. It is important to balance the need for free expression with the need to protect against harmful or dangerous content.

To know more about  Cloud service, click here:

https://brainly.com/question/29531817

#SPJ11

what social conditions gave rise to the memphis lynching? view keyboard shortcuts edit view insert format tools table 12pt paragraph

Answers

The Memphis Lynching was a result of the deep racial tensions that had been escalating in the city since the end of the Civil War.

African Americans had been the victims of racial violence, economic exploitation, and political oppression since the end of the war. White supremacists had targeted African American political activists, labor organizers, and religious leaders, and had used tactics of intimidation and terror to ensure that African-Americans could not exercise their civil rights. The Memphis Lynching was a result of this hostile environment, as the alleged perpetrator of the murder, Ell Persons, had been accused without evidence and was subjected to an extra-judicial mob execution.

This event was an example of how the social conditions of the time had given rise to a culture of violence and fear, and how African Americans were denied basic civil rights.

You can learn more about racial tension at: brainly.com/question/8148930

#SPJ11

what will the following display to the console (don't run the code until you work it out by hand!) public class person {string name;public person(string name

Answers

Given the provided code snippet, here's an explanation of what it does, including the terms "display," "console," and ensuring conciseness in my response.

The code snippet you've shared is a part of a C# class called "Person" with a single property called "name" of the type "string". The class has a constructor that takes a string parameter named "name" and assigns it to the "name" property of the class. Currently, this code does not have any functionality to "display" anything to the "console" since it only defines a class structure. To display the "name" property to the console, you would need to create an instance of the "Person" class and then use the Console. WriteLine() method to print the "name" property to the console. For example, in the Main method of your program, you could write the following code to display the "name" property of a "Person" instance:
```csharp
public static void Main(string[] args)
{
   Person person1 = new Person("John Doe");
   Console.WriteLine(person1.name);
}
```

This code creates a new instance of the "Person" class called "person1" with the name "John Doe". Then, it uses Console. WriteLine() to display the "name" property of "person1" to the console, which will output "John Doe".

Learn more about code here:

https://brainly.com/question/29590561

#SPJ11

Given an undirected graph G=(V, E) and an edge e=(u, v) E E, design a O(|V+|El) time algorithm to determine whether there exists a cycle in G that contains e.

Answers

The algorithm determines the existence of a cycle in an undirected graph containing a given edge by removing the edge, performing DFS on the graph, and checking if the edge is encountered. Time complexity is O(|V| + |E|).

Given an undirected graph G=(V, E) and an edge e=(u, v) E E, let's see the algorithm to determine whether there exists a cycle in G that contains e or not. The algorithm is as follows:

Algorithm

Delete the edge e from graph G.Perform depth-first search (DFS) on the remaining graph G.If DFS encounters the edge e during the search, then a cycle containing the edge e exists in G, so return True.Otherwise, return False.

To check whether there exists a cycle in G that contains e or not, we will remove the edge e from the graph G and then perform a depth-first search (DFS) on the remaining graph G. If DFS encounters the edge e during the search, then a cycle containing the edge e exists in G, so return True. Otherwise, return False.

The time complexity of this algorithm is O(|V| + |E|) because we perform DFS on the graph G and DFS takes O(|V| + |E|) time.

Learn more about algorithm : brainly.com/question/13800096

#SPJ11

Thinking carefully about a speaker's reasoning and purpose can help you _____ that speaker's message. In other words, you consider the message and decide whether it is believable.

Answers

Thinking carefully about a speaker's reasoning and purpose can help you comprehend (understand) that speaker's message. In other words, you consider the message and decide whether it is believable.

What do you think is the purpose of the speakers in their speech?

Making sense of the world around us is referred to as reasoning. A communication must be evaluated during critical listening in order to be accepted or rejected.  Critical listening can be practiced while listening to a sales pitch.

Speakers must provide proof to back up their claims in order to be convincing. Listeners who pay close attention are wary of assertions and generalizations. When the speaker is not regarded as an authority on the subject of the speech, strong evidence is especially crucial.

Therefore, When communicating, speakers aim to achieve both broad and detailed goals. There are two main goals for speaking in college and beyond: to inform or to persuade. There is no clear distinction between the two; many talks will combine elements of both.

Learn more about reasoning from

https://brainly.com/question/25175983
#SPJ1

What is web
searching engine ?​

Answers

A Web search engine is a specialized computer server that searches for information on the Web. The search results of a user query are often returned as a list. The hits may consist of web pages, images, and other types of files.

Explain the process of creating a switch statement to replace an if-then-else statement in Java.

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

Let look at an if the else statement

if (condition1) {

 //some code if condition 1 is true

} else if (condition2) {

 // some code if condition 2 is true

} else {

 // some code if condition 3 is true

}

No let look at switch statement

switch(expression) {

 case x:

   // code block

   break;

 case y:

   // code block

   break;

 default:

   // code block

Now let look at your answer.

if then else should be replaced with switch if conditions are fixed.

in the process of replacing

write your condition of if statement  in the case area of swatch

Answer:

The answer to this question is given in the explanation section.

Explanation:

Let look at an if the else statement

if (condition1) {

//some code if condition 1 is true

} else if (condition2) {

// some code if condition 2 is true

} else {

// some code if condition 3 is true

}

No let look at switch statement

switch(expression) {

case x:

  // code block

  break;

case y:

  // code block

  break;

default:

  // code block

Now let look at your answer.

if then else should be replaced with switch if conditions are fixed.

in the process of replacing

write your condition of if statement  in the case area of swatch

In order for the "Detector" in the side-chain to react quicker, we must select ___________.

Answers

In order for the "Detector" in the side-chain to react quicker, we must select a faster attack time.

The detector in a compressor's side-chain is responsible for detecting changes in the input signal and triggering the gain reduction process. The attack time determines how quickly the detector reacts to changes in the input signal. A faster attack time means that the detector will react more quickly to changes in the input signal, resulting in a more aggressive compression effect. Slower attack times can be used to preserve the transient content of the signal.

Choosing the appropriate attack time for a given signal is an important part of achieving the desired compression effect.

You can learn more about input signal at

https://brainly.com/question/29520180

#SPJ11

What are the differences between online platforms sites and content?.

Answers

Websites offer one-way interaction, with visitors taking in whatever content is presented.

Platforms provide reciprocal engagement, with user interactions resulting in individualized experiences. Marketplaces, search engines, social media, blogs, app stores, communications services, payment systems, services included in the so-called "collaborative" or "gig" economy, and many more online services have all been referred to as "online platforms." A digital service known as an online platform makes use of the Internet to enable communications between two or more dissimilar but related users. Platforms are locations where electronic demand and supply collide.

Learn more about communication here-

https://brainly.com/question/14809617

#SPJ4

With the exception of the ____________________ operator and the member selection operator, operators must be overloaded to be used on class objects.

Answers

With the exception of the assignment operator and the member selection operator, operators must be overloaded to be used on class objects.

The two operators in C++ that do not need to be overloaded are the assignment operator (=) and the member selection operator (.). These operators are not overloaded because they can only be used with fundamental types in C++. The remaining operators must be overloaded to be used with class objects, such as the multiplication operator (*), the addition operator (+), and the subtraction operator (-).

This means that when you use these operators with objects of your class, you must define the operation's behavior. A class can overload a member function that provides an operator definition, allowing it to be used with objects of that class. When using an operator on a class object, the definition of that operator for that class will be used.

When an operator is overloaded for a class, the overloaded operator can be used with objects of that class in the same way that other operators can be used with objects of built-in types.

You can learn more about operator overloading at

https://brainly.com/question/29990215

#SPJ11

FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___

Answers

Spreadsheets  software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.

Why do people use spreadsheets?

One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.

Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.

Learn more about Spreadsheets from

https://brainly.com/question/26919847
#SPJ1

Using AD FS terminology, the trusting company is referred to as which of the following choices? a. account partner b. resource partner c. relying party

Answers

In AD FS (Active Directory Federation Services) terminology, the trusting company is referred to as the "relying party."

AD FS is a Microsoft technology that allows for the authentication and authorization of users across different organizations. It enables the use of single sign-on (SSO) for accessing resources and applications between trusted entities.

In the context of AD FS, the trusting company is referred to as the "relying party." The relying party is an organization or service that relies on the identity provider (account partner) to authenticate and provide access to its resources. It trusts the identity provider to verify the identity of users and provide the necessary security tokens.

The relying party establishes a trust relationship with the identity provider, allowing it to accept and process authentication requests and assertions. This enables users from the account partner's organization to access resources and services within the relying party's environment without the need for separate authentication.

By referring to the trusting company as the "relying party," AD FS emphasizes its role in relying on the identity provider's authentication services to enable secure access to its resources.

Learn more about AD FS here:

https://brainly.com/question/29910420

#SPJ11

Select the one that uses the heading tag correctly.

a.


b.

c.

d.

Answers

what is it the choices

Answer:

yes . where is option please check it

Initially licensed and used in NeXT software by Steve Jobs, then used later to code Mac OS X for Apple.

Answers

The term that is being referred here is "Objective-C". It was initially licensed and used in NeXT software by Steve Jobs, who co-founded the company after leaving Apple in the 1980s.

Objective-C was initially licensed and used in NeXT software by Steve Jobs.

Steve Jobs and his team developed Objective-C as an object-oriented programming language that could be used for building software applications. Later on, when Jobs returned to Apple in the late 1990s, Objective-C was used to code Mac OS X, which was a major overhaul of the company's flagship operating system. Today, Objective-C is still used by some developers, but it has largely been replaced by newer programming languages like Swift.

To learn more about Apple visit : https://brainly.com/question/28732063

#SPJ11

what career cluster allows you to act direct or produce

Answers

Answer:

finance analyst, treasurer, economist, bank worker, debt counselor or insurance professional.

Explanation:

Select the correct answer.
What is also known as a visual aid in a presentation?
OA. background
OB. animation
OC. review
OD. slide.

Answers

Answer: Slide

Explanation:

A visual aid is something which makes the viewer under the presentation without using the audio and it enhances the presentation. The photographs, graphs, charts are usually included in the slides to make people understand the presentation more clearly.

The slides includes the information in a written form and along with it are attached some photos, pie charts, et cetera.

So, even when the people are not listening to the presentation they can understand the presentation.

Where do you want to install?
It looks like you don't have any applicable device(s) linked to
your Microsoft account. To install, sign in on a device with
your Microsoft assount,
Get more info
How do I do this

Answers

This really depends on the thing you are trying to install, and the device you are trying to install it on.

try to find the app info and see what devices it is compatible with. make sure you are using a compatible device, and make sure you are signed in.

Other Questions
Can someone please put this in correct Spanish for me? Only if you know Spanish, if you depend on google translate than id rather have an answer from someone else. Thanks! vMy house is white. My park is in the middle of a big neighborhood. My house has three bedrooms, two bathrooms, a kitchen, and a living room. I have to take out my dog and vacuum. help me please?? solve using proportion if it takes 96 rocks to completely cover the triangular region, there are select one rocks per square foot in the triangular region. the hospital nursing group has reviewed current nursing and federal literature to establish standards of care for a newly organized patient care unit. the final report generated by this hospital nursing group should assure hospital administration that the standards meet which level of care? The graph shows neutron number versus proton number for stable nuclei. What conclusions can be drawn from the graph the client with osteoarthritis is seen in the clinic. which assessment finding indicates the client is having difficulty implementing self-care? How did Hae Min Lee die? Write each number as apower of 10.100 = 10 what are the strengths of the electric theory of fdi? can you see any shortcomings? You lose three points each time you answer a question incorrectly in a trivia game if you answer 8 questions in a row incorrectly what is the change in your score Which of the following is a characteristic of a guideline document? two people both plan to purchase a washing machine. consumer a plans to make this purchase within the next month, while consumer b plans to make this purchase in three years. whirlpool (the washing machine maker) should advertise to find the measure indicated How much would $5,000 due in 25 years be worth today if the discount rate were 5.5%? The problem that is supposed to arise with the Two Envelopes Paradox is that it looks as though it is always beneficial (from the perspective of expected monetary value or expected utility) for you to switch from one envelope to the other, endlessly back and forth between the two envelopes. True False The annual demand for a product is 1,000 units. The company orders 200 units each time an order is placed. The lead-time is 6 days. There are 250 working days per year. If the reorder point is 50, what safety stock are they using? a metal cylinder with rigid walls contains 3.0 moles of oxygen gas. the gas is heated until the pressure doubles. neglect the thermal expansion of the cylinder. draw a pv-diagram for this process. calculate the work done by the gas i scrubbed the floors,washed the dishes,and did all of the laundry even though i hate cleaning simple or compound or comped or compound-complex What is the 11TH Amendment in simple terms for kids? You are one of the first settlers on Mars. Youhave lived there for one year. Write aboutyour first year. What problems did you have?How did you solve them? What was the bestthing that happened? What was the worst thingthat happened?