Answer:
(a) 0; 0
(b) $150 per hour; $16.67 per hour
(c) (b) $150 per hour; $53.57 per hour
Explanation:
(a) Number of hours = 125
Marginal cost = 0 (since service is cost less upto 200 hours)
Average cost = 0
(b) Number of hours = 225
Marginal cost = $150 per hour
Total cost = $150 × (225 - 200)
= $150 × 25
= $3,750
Average cost = Total cost ÷ Number of hours
= $3,750 ÷ 225
= $16.67 per hour
(c) Number of hours = 325
Marginal cost = $150 per hour
Total cost = $150 × (325 - 200)
= $150 × 125
= $18,750
Average cost = Total cost ÷ Number of hours
= $18,750 ÷ 325
= $53.57 per hour
Answer:
Net income increase - $4,890
Explanation:
The computation of the effect on net income is shown below:
= Number of pounds of inferior product × (standard price for the materials - inferior product price per pound)
= 3,000 pounds × ($13 - $11.37)
= 3,000 pounds × $1.63
= $4,890 increase
For determining the effect we took the difference of the prices and then multiply it with the number of pounds of the inferior product
Answer:$0
Explanation:
Because because Black must actually grant a bonus to Hewlett and Martin
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.

Answer:
Demand is the same as quantity demanded.
Explanation: