Answer:
B) $3,000
Explanation:
Since this is defined as a derivative operation, its result must be reported either as a gain or loss as part of normal income. Imp entered a contract to buy 100,000 euros at $0.90. If the exchange rate remained at $0.90 in 90 days, no gain or loss should be recognized.
But the currency exchange increased to $0.93 per euro, so the contract now results in a $0.03 gain per euro (= $0.93 - $0.90), so a gain of $0.03 x 100,000 = $3,000 must be reported.
Answer:
Explanation: The implementation of resource management policies can be achieved through the following: control theory, machine learning, utility-based, and market-oriented method.
1. Control theory:
Benefit- it can analyse linear and non linear systems, single or multiple systems.
Problem- It is complex and requires multiple computations
2. Machine learning Theory:
Benefit- It does not sole depend on extracting information and it gives room for improvements. It performs routine and non routine tasks
Problem- It requires a complex to understand and need trained professional to operate it.
3. Utility-based method:
Benefit - It gives urgency to tasks, it gives users better satisfaction.
Problem- the tasks needs to be carried out continuously
4. Market-oriented method:
Benefit - it gives room to know and understand the market, it leads to an increased organisational performance.
Problem- requires a professional.
Answer:
Two important ways are debt and equity
Explanation:
Companies has two ways in which they could raise the capital is debt which is an amount borrowed by one party from another and it is borrowed under a condition that is to be paid back at date which is decided along with the interest and equity is called as the shareholder equity which the amount that would be returned to the shareholders of the company if all the assets are liquidated.
Answer:
The correct answer is a) Define
Explanation:
In the define step, the information about business problem, goals, project scope, potential resources, objectives, and potential teams are placed in a project charter document.
Answer:
a)
Explanation:
Phishing is a type of deception in which an intruder disguises himself in email or other means of communication as a reputable individual or person. Attackers would normally use phishing e-mails to spread a range of malicious links or attachments. Some people will gather login credentials or victims' account details.
So as per above definition only option A seems the correct alternative among al the other option when discussing about Phishing.
A con executed using technology, typically targeted at acquiring sensitive information, or tricking someone into installing malicious software.