Answer:
c. Computer Fraud and Abuse Act.
Explanation:
Computer Fraud and Abuse Act (CFAA) is a cyber security bill that was enacted in 1986 and is an amendment of of Comprehensive Crime Control Act of 1984.
The acts forbids a person to access a computer without proper authorisation or an excess of required authority.
Before this time cybercrime was prosecuted as mail and wire fraud. This was often inadequate.
Other provisions the act addresses are distribution of malicious code, denial of service attacks, and trafficking in passwords
Answer:
$39,220
Explanation:
The maturity value of the note receivable on June 30, 2012
= Principal + Interest
= $40,000 + $40,000 x 6%
= $40,000 + $2,400
= $ 42,400
The note is discounted on September 30, 2011. Time period remaining to go till maturity as on September 30, 2011
= 12 - 3 months ( July, Aug and Sep)
= 9 months.
Amount of deduction
= $ 42,400 x 10% x 9/12
= $ 3,180
Finally, the Cash received by Ireland will be
= Maturity value - Discount
= $42,400 - $ 3,180
= $39,220
Answer:
Bad debt expense A/c Dr $4,900
To Allowance for doubtful debts $4,900
(Being bad debt expense is recorded)
Explanation:
The journal entry is shown below;
Bad debt expense A/c Dr $4,900
To Allowance for doubtful debts $4,900
(Being bad debt expense is recorded)
The computation of the bad debt expense is shown below:
= Net Credit sales × estimated percentage given - credit balance of allowance for doubtful debts
= $920,000 × 0.6% - $620
= $5,520 - $620
= $4,900
Answer:
True
Explanation:
The theory of constraints focuses on establishing the most important limiting factor or constraint in a business and improve it in order to improve the whole company's performance.
In simple terms, a company recognizes their greatest weakness and tries to improve it, so that it no longer represents a limitation.
This theory was originally developed for manufacturing companies, and it was meant to reduce bottlenecks (manufacturing constraints). Therefore one of its main goals is to lower inventory levels and operating costs while increasing production output.
Salt is the term used in cryptography that defines a value that can be used to ensure that hashed plaintext will not consistently result in the same digest. The salt is<span> </span>random<span> data that is used </span> to <span> defend passwords against </span>dictionary attacks<span> or against its hashed equivalent.
For each password a new salt is generated randomly.</span>