نتایج جستجو برای: consideration
تعداد نتایج: 103627 فیلتر نتایج به سال:
for management override of controls. Auditors are discouraged from placing too much reliance on client representation and are required to maintain a skeptical attitude throughout the audit. The standard encourages auditors to engage in frequent discussion among engagement personnel regarding the risk of material misstatement due to fraud. SAS 99 also requires auditors to inquire of management a...
Logistic regression may be useful when we are trying to model a categorical dependent variable (DV) as a function of one or more independent variables. This paper reviews the case when the DV has more than two levels, either ordered or not, gives and explains SAS R © code for these methods, and illustrates them with examples.
recent studies in scientific education as well as foreign and second language instruction suggest that thinking has rarely been an integral part of education and training in classroom. some scholars decried the lack of emphasis on thinking in the institutes and schools. they noted that memorization and drills were rewarded,while inquiry, reflection, and consideration of alternatives were frowne...
در عصر حاضر که رقابت بین سازمان ها بسیار گسترش یافته است، مطالعه و طرحریزی سیستم های تولیدی و خدماتی به منظور بهینه سازی عملکرد آنها اجتناب ناپذیر می باشد. بخش عمده ای از رقابت پذیری سازمان ها نتیجه رضایتمندی مشتریان آنها است. میزان موفقیت سازمان های امروزی به تلاش آنها در جهت شناسایی خواسته ها و نیازهای مشتریان و ارضای این نیازها بستگی دارد. از طرفی کوتاه کردن زمان ارائه محصول/خدمات به مشتریان...
The concept of a “Fraud Triangle” is introduced to the professional literature in SAS No. 99, Consideration of Fraud in a Financial Statement Audit. The Fraud Triangle consists of three conditions generally present when fraud occurs: Incentive/Pressure, Opportunity, and Attitude/ Rationalizations. Input from forensic experts, academics and others consistently show that evaluation of information...
AODV (Ad hoc On Demand Vector) is a reactive routing protocol in wireless mobile ad hoc network (MANET). AODV is accepted because of its capacity to adjust quickly in dynamic system environment with least overhead and small management packet size. The adhoc networks are all that much helpless against Dos attacks on the network layer. Blackhole and Grayhole attacks are the far reaching attacks o...
The seventh paper in this series discusses the importance of statistical techniques in research.
Previous analyses of Prolog as a programming language have adopted both theoretical and empirical perspectives. Additionally, the uniqueness of the language has elicited many subjective comments. The result is an inconsistent collection of often contradictory statements. Within this muddle, this paper attempts to outline a more consistent statement of the usefulness of Prolog as a programming l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید