1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
3 years ago
7

Cassie is preparing her federal income tax return. Which of the following items should be excluded from Cassie's gross income?

Business
1 answer:
Masja [62]3 years ago
8 0

Answer:$100,000 in cash received by Cassie when her grandmother died.

Explanation: In preparing federal income tax return, there are some income that are excepted from tax and they include:

1. Any payment received as an inheritance

2. Cash gift for the purchase of a property

3. Income received as compensation for loss.

4. Income earned outside the taxing jurisdiction.

You might be interested in
The Yurdone Corporation wants to set up a private cemetery business. According to the CFO, Barry M. Deep, business is "looking u
icang [17]

Answer:

A) NPV= - $428,888.89 B) Company would break Even if g = 5.68%

Explanation:

Hi, we have to bring to present value all the inflows and outflows of cash, this is the formula to use and the math of it.

NPV=-Invesment+\frac{CashFlowYr1}{(return-growth)}

NPV=-1440000+\frac{91000}{(0.12-0.03)} = -428888.89

The question says that "at what constant growth rate would the company just break even..." and well, a NPV=0 is not precisely break even, actually, it means that the company is obtaining exactly what is asking for any investment, but let´s assume that the question was, what should the growth rate be for the company to accept this project?. So we have to solve the first equation for "g", that is:

g=\frac{(Invesment*return-CashFlowYr1)}{Invesment} =\frac{(1440000*0.12-91000)}{1440000} =0.0568

So the constant growth rate has to be at least 5.68% for the company to accept this project (NPV=0)

Best of luck

6 0
4 years ago
2. How are school rules similar to state and federal laws? What woud the typical American high school be like if there were no r
jenyasd209 [6]
School rules and government rules are very similar, some similarity are no steeling and drugs and an average high school with no rules would be chaotic. 
7 0
4 years ago
Northwest Fur Co. started 2021 with $103,000 of merchandise inventory on hand. During 2021, $560,000 in merchandise was purchase
Naya [18.7K]

Answer:

The cost of goods available for sale is $650,100

Explanation:

Credit terms of 3/15, n/45 means that 3% discount for the payment within 15 days and the full amount to be paid within 45 days.

The discounts Northwest Fur Co. took = $560,000 x 3% = $16,800

Northwest uses a perpetual inventory system and the gross method to record purchases.

Net Purchases = Purchases - Purchase Returns - Purchases Discounts + Freight-In = $560,000 - $4,900 - $16,800 + $8,800 = $547,100

The cost of goods available for sale = Beginning merchandise inventory + Net Purchases = $103,000 + $547,100 = $650,100

4 0
4 years ago
Nicole works from home full-time for a non-profit organization. She receives work from and sends work to the office via a comput
BartSMP [9]

Answer:

telecommuting

Explanation:

Telecommuting is also generally referred to as teleworking and it can be defined as an act which typically involves the process of completing a job function, tasks or work assignments through the use of the internet and in a location other than the office itself.

In this scenario, Nicole works from home full-time for a non-profit organization. She receives work from and sends work to the office via a computer and modem. Thus, this is an example of telecommuting.

3 0
3 years ago
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpag
Mariana [72]

Answer:

This kind of malware attack is known as ransomware.

Explanation:

-Ransomware is a type of malicious software that typically involves encrypting the files of a victim's PC, laptop or systems. The hacker(s) This essentially denies the victim any access to their data.They then demands payment in order to allow the victim access to their own data. The payment is always required to be transferred in crypto-currency to the hackers.

-Examples of ransomware includes Reveton, CryptoLocker, CryptoWall and the infamous Wannacry which attacked many victims PC across the globe in 2017. Ransomware attacks can be initiated by a user unknowingly visits an infected website.The malware then self downloads and installs itself onto the user’s PC without their knowledge.

-Ransomware attacks can be prevented by using advanced antivirus.

7 0
3 years ago
Other questions:
  • In nonprofit marketing, direct consumers of a product are called _____.
    11·1 answer
  • Maynard, Joan, Jaco, and Neil are trying to form a band. They each have some basic skills on most instruments, so their current
    10·1 answer
  • The chi-square goodness-of-fit test for multinomial probabilities with 5 categories has _____ degrees of freedom.
    7·1 answer
  • . Mortgage Affordability. Seth and Alexandra Moore of Elk Grove Village, Illinois, have an annual income of $110,000 and want to
    11·1 answer
  • In projecting operating expenses for the second and third year costs like ________ are likely to remain stable unless new equipm
    8·1 answer
  • Betty made a 20% profit on a residential lot she sold for $30,000. What did she pay for the property
    9·1 answer
  • Which scenario is not a violation of your rights as a debtor?
    7·1 answer
  • A project has several teams. Team C has repeatedly missed deadlines in the past. This has caused team D to have to crash the cri
    11·1 answer
  • The cost object(s) of the activity-based costing method is(are)?
    15·1 answer
  • What is the process of giving keys to a third party so that they can decrypt and read sensitive information?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!