answersLogoWhite

0

Which method would internal users most likely use?

Updated: 9/17/2019
User Avatar

Wiki User

12y ago

Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Which method would internal users most likely use?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What group or groups of people are not considered to be the external users of accounting information?

Internal Users of accounting information would not usually be external users. Management, staff, the board, would all be classed as internal users of financial information.


Are Bondholders the internal users of company's accounting information?

Generally bondholders would be external users of financial information. Prudent investors would most likely look over a company's external financial statements and disclosures before purchasing bonds from the company.


Are shareholders internal or external users of accounting information?

Internal users would be managers so that they can make decisions about how to manage and also see how effectively they have managed. External users would be potential investors, the Government, lenders, the public, unions...


Which is the best method considered when assigning permissions to users or groups?

"Read & Execute" would be the best method for NTFS permissions. For Share permissions it would be "Change".


What are people who use computers called?

People who use the computer are often simply known as "users".


Why is net present value method theoretically superior to internal rate of return method?

Well they both have different properties. You would have to research to find the difference.


Is marijuana a tipper in a divorce case for custody of kids in the situation?

It is likely that use of marijuana would be a factor that would not be in the users favor.


Which product would be likely to be bought in the same quantity even if it doubled in price?

Pencils - (for pearson users)


What method to Restricting users in wireless LAN?

One type of restriction is to use MAC filtering in the WAP. Another would be to secure the wireless network via WEP/WPA/WPA2 security which would require other users to have the key to connect.


What account would least likely be found in the general ledger of an internal service fund?

machinery and equipment


Which methods is considered a best practice when assigning permissions to users or groups?

"Read & Execute" would be the best method for NTFS permissions. For Share permissions it would be "Change".


If you were connecting your private network to the internet which security method would you use to prevent unauthorized users from accessing your network?

loro maro = Firewall