What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer 1

Answer:

The use of Ask client and request are the two ways to send a message to your client when signed in as an accountant user.


Related Questions

ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that its promises of spur-of-the-moment car sharing is ________, streamlined, and safe.

Answers

Answer:

dependable

Explanation:

An algorithm to find the perimeter of a triangle

Answers

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

_______________________ variables do not need to be declared inside the function definition body, they get declared when the function is called.

Answers

Formal parameter variables doesn't have to be declared inside the function definition body because they are declared when the function is called.

What is a formal parameter?

A formal parameter can be defined as a type of variable which a programmer specifies when he or she needs to determine the subroutine or function.

This ultimately implies that, formal parameter variables doesn't have to be declared inside the function definition body because they are declared when the function is called.

Read more on function parameter here: brainly.com/question/20264183

#SPJ11

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

Explanation:

For Android products, your device will need to be running Nougat 7.1. 1 or newer.

how does the va assess the satisfaction of veteran care?

Answers

The VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Who is a veteran?

It should be noted that a veteran simply means an individual that has a long experience in a particular field.

In this case, the VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Learn more about veteran on:

brainly.com/question/303798

#SPJ12

Three symptoms of hacking

Answers

Answer:

1. You receive mass emails

2. Your internet searches get redirected

3. Your passwords are not working

Explanation:

Hope it helps

30 POINTS FOR THE ANSWER

Rico is about to send his first professional design project to a printer and he wants to make sure he has not forgotten any of the steps. He decides to do some research on how the colors will look on paper compared to his monitor. After he completes his research, he realizes that having a checklist for each job would help him remember all the steps.


For this discussion, do some research on how printed colors will look compared to colors on your monitor. What possible solutions may work for you to help increase the likelihood that the printed colors will match the monitor colors? After doing that research, create a checklist of the steps involved with preparing a file for printing. Make sure to include items learned in this lesson and what you learned in your research.

Answers

The possible solutions are:

Ask for a printed or click on proof to get the  right color match.One can use Pantone colors as it aids with color matching.

How do one do the above?

Computers is known to often use the same data and it often uses it to bring up clarity or light up pixels on its screen.

Therefore to get the result above, one need to check system preference system setting to get different brightness and color settings.

Therefore, The possible solutions are:

Ask for a printed or click on proof to get the  right color match.One can use Pantone colors as it aids with color matching.

Learn more about printed colors from

https://brainly.com/question/1548113

#SPJ1

What is the primary motivation of the ""cyber warrior""?

Answers

The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Who is a  cyber-warrior?

This is known to be a person that is said to be involved in cyberwarfare, mostly for personal reasons or based on religious belief or others,

Note that The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Learn more about cyber warrior from

https://brainly.com/question/1460915

#SPJ12

Outline the steps for logging into E-mail account​

Answers

Answer:

go to your email service provider, type in your username(email) and password click the log in or sign in button to continue

WAP to input the rating of a movie, and print as per the given criteria:
Rating Category
8.0-10 Blockbuster
6.0-7.9 Super Hit
4.0-5.9 Hit
2.0-3.9 Average
<2.0 Flop​
please answer fast

Answers

Answer:

What is the question?

Explanation:

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer

Answers

The transport layer must break messages received from the application layer into several packets that can be sent to the network layer.

The layers of the OSI model.

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several packets that can be sent to the network layer.

Read more on transport layer here: https://brainly.com/question/26177113

#SPJ12

setting a starting value for a variable is called _____________.

Answers

Setting a starting value for a variable is called initializing.

Setting a starting value for a variable is called:

InitializingWhat is Initializing?

Initializing is the act of assigning a value to a given piece of information classified as a variable.

Most times in programming, the starting value of 0 is often assigned to the first value. So, the correct answer is, Initializing.

Learn more about initializing here:

https://brainly.com/question/27230187

#SPJ11

A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied directly or indirectly by the person viewing the page.

Answers

Answer:

dynamic

Explanation:

A dynamic web page serves out varied material to various visitors while keeping the same layout and appearance. These pages, which are often built in AJAX, ASP, or ASP.NET, require longer to render than plain static sites. They are commonly used to display data that updates regularly, such as weather forecast or market prices.

Dynamic web pages often incorporate software applications for various services and need server-side resources such as databases. A database enables the page builder to divide the design of the website from the content that will be presented to users. When they post material to the database, the website retrieves it in response to a user request.

What should be used to prevent javascript from accessing a session id value?.

Answers

Cookies should be used to prevent javascript from accessing session-id values.

What are cookies?

Cookies are brief text messages that a website you visit sends to your browser.

Web browsers are instructed to only send cookies using encryption using the Secure cookie property.

The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.

Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,

JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.

Hence, cookies should be used to prevent javascript from accessing session-id values.

To learn more about the cookies refer to:

https://brainly.com/question/20263903

#SPJ1

what methods could you use to set up printing in an organization?

Answers

The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

What is the aim of printing?

Printing is the act of reproducing text and images  in a lot of quantities through the use of a master form or template.

Therefore, The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

Learn more about printing from

https://brainly.com/question/145385

#SP11

what are some examples of security goals that you may have for an organization? check all that apply.

Answers

An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

What is customer credentials about?

The goal of a firm in terms of security is to Safeguards or Defend customer credentials or details.

Therefore, An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

Learn more about security goals from

https://brainly.com/question/14139033

#SPJ11

What is the primary added value of relational databases over flat files?

Answers

The primary added value (advantage) of relational databases over flat files is an ability of the system to quickly scan large amounts of data.

What is a relational database?

A relational database can be defined as a type of database that is designed and developed to store, structure and recognize relation that are existing between data points and items of information.

In database management system (DBMS), an ability of the system to quickly scan large amounts of data is the primary added value (advantage) of relational databases over flat files.

Read more on database here: brainly.com/question/13179611

#SPJ12

Enumerate the 6 main shortcomings the compnents of satellite communication

Answers

The section, installation, and introduction costs, for example, are just too much. a frequency interference. This proliferation and interference run the risk of interfering with communication systems.

What is satellite communication?

The use of artificial satellites to establish communication links between different locations on Earth is known as satellite communication in the field of telecommunications.

The global communications network is not possible without satellite communications.

For instance, the section, installation, and introductory expenses are just too expensive. Interference on frequencies. The communication services may be disrupted as a result of this proliferation and interference.

Hence, the above given are the shortcomings in the components of satellite communication.

To learn more about the satellite communication refer;

https://brainly.com/question/21894964

#SPJ1

Other Questions
Assume the int variables i, lo, hi, and result have been declared and that lo and hi have been initialized. Write a for loop that adds the integers between lo and hi (inclusive), and stores the result in result. Your code should not change the values of lo and hi. Also, do not declare any additional variables -- use only i, lo, hi, and result. 1 Enter your code what is the domain of the following function: y=x^-5 + (x-1) A triangle has points monkeys, giraffes, lions. The distance between lions and monkeys is 11 feet and monkey and giraffes is 16 feet. The distance between lions and giraffes is the hypotenuse of x feet.Which equations will find the distance between the lions and giraffes? Select all that apply.11+16 = c112+ 162 = c2c2+ 162 = 112121+ 256 = c2 a food worker has nasia and diharrea the night before she is sceduled to work the opening shift. if she feels better in the morning, what should she do __________ implies that pressure for price increases reaches across _______________markets, not just one. If a company uses straight-line depreciation, the average investment is calculated as: (Check all that apply.) Multiple select question. initial investment - salvage value)/2. (beginning book value - salvage value)/2. sum of individual years' average book values/number of years of planned investment (beginning book value salvage value)/2. (initial investment salvage value)/2. What is the purpose of a conclusion paragraph? OA. To transition the reader smoothly from one idea or moment in time to the next OB. To grab readers' attention and get them interested in the essay's main topic 4 C. To provide more details and evidence that support the essay's main ideas or topic D. To leave a lasting impression on the reader while summing up the overall point of the essay A 2100-W hair dryer is operated on a 120-Vcircuit for 12 min. If electricitycosts $0.25/kWh, what was the cost (incents) of using the blow dryer? Round finalanswer to the nearest cent. can you guys please help meeeee! ok so, the question is about Luther King Jr.'s letter and in the letter if you read "Letter from Birmingham Jail it talkes about a sad girl because funtown is closed what kind of figurative language would that paragraph be??? -40 represents the height of a subway 40 feet below ground level. 40 represents the height of a kite 40 feet above ground level what does the zero rpresent in this situation "[the king] has excited domestic insurrections amongst us, and has endeavored to bring on the inhabitants of our frontiers, the merciless indian savages, whose known rule of warfare, is an undistinguished destruction of all ages, sexes and conditions." which best describes the colonists' attitude toward american indians? fearful and mistrusting sad and resigned optimistic but wary empathetic and understanding which condition in a client with a brain injury is contraindicated for magnetic resonance imaging with contrast 1. (y + x) = 4; use x = 2 and y = 2 2. x + y = 6; use x = 5 and y = 6 3. y(x + 5); use x = 1 and y = 4 4. q-m+q; use m = 3 and q = 6 Read the epitaphs of Mr. and Mrs. Purkapile from the Spoon River Anthology and answer the question that follows.Mrs. PurkapileHE ran away and was gone for a year.When he came home he told me the silly storyOf being kidnapped by pirates on Lake MichiganAnd kept in chains so he could not write me.I pretended to believe it, though I knew very wellWhat he was doing, and that he metThe milliner, Mrs. Williams, now and thenWhen she went to the city to buy goods, as she said.But a promise is a promiseAnd marriage is marriage,And out of respect for my own characterI refused to be drawn into a divorceBy the scheme of a husband who had merely grown tiredOf his marital vow and duty.Mr. PurkapileSHE loved me.Oh! how she loved me I never had a chance to escapeFrom the day she first saw me.But then after we were married I thoughtShe might prove her mortality and let me out,Or she might divorce me. But few die, none resign.Then I ran away and was gone a year on a lark.But she never complained. She said all would be wellThat I would return. And I did return.I told her that while taking a row in a boatI had been captured near Van Buren StreetBy pirates on Lake Michigan,And kept in chains, so I could not write her.She cried and kissed me, and said it was cruel,Outrageous, inhuman! I then concluded our marriageWas a divine dispensationAnd could not be dissolved,Except by death.I was right.Which best describes Mrs. Purkapile's attitude toward her husband? (10 points)Spitefuleven though she knew he wanted a divorce, she refused to grant him oneLovingshe cared for him, so much she forgave him for leavingConcernedbecause he made up a story about being abducted by pirates, she worried about his sanityDevotedeven though he did not love her anymore, she was committed to saving their marriage Drugged driving is . . .A. not a problem.OB. a serious problem.C. an occasional problem. How are mitosis and meiosis similar? Find the product (-4/9) - (-3/8) How many degrees does Earth turn in one hour? Shea and Chris drive to work.Shea drives 30 miles in 1.25 hours.Chris drives 62 km in 1 hour 15 min.Work out the difference between their average speeds in km/h.1 mile = 1.6 km Based on the tone of both excerpts, what can logically be concluded about the authors beliefs about justice system reform?