Answer:
a)
P 175
Q = 250
Profit6,250
b)
P 325
Q = 875
Profit 153,125
c)
Q = 1200
P = 260
Profit = 287,000
Explanation:
It maximize profit at MR = MC
MR = 200 - 0.2Q
MC = 150
150 = 200-0.2Q
Q = 50/0.2 = Q = 250
Price:
250 = 2000 - 10P
P = 1750/10 = 175
<u></u>
<u>Profit: revenue - cost</u>
$175 x 250 session - $150 per session = 6,250
<em>At new functions:</em>
150 = 500-0.4Q
Q = 350 / 0.4 = 875
Price:
875 = 2,500 - 5P
P = (2500-875)/5= 325
<u>Profit</u>
(325 - 150) * 875 = 153,125
<u>If cost changes:</u>
cost: 1000 + 20Q
marginal cost: 20
20 = 500 - 0.4Q
Q = 480 / 0.4 = 1,200
Price:
1,200 = 2500 - 5P
P = 1300/5 = 260
<u>Profit</u>
(260 - 20)Q - 1,000 = 287,000
Answer:
Purchases= 696,000 pounds
Explanation:
Giving the following information:
Production= 222,000 units.
To make one unit of a finished product, three pounds of direct material Z are required.
<u>To calculate the purchases of direct material, we need to use the following formula:</u>
Purchases= production + desired ending inventory - beginning inventory
Purchases= 222,000*3 + 420,000 - 390,000
Purchases= 696,000 pounds
Answer:
The company's net income for the month was $27 comma 000
Explanation:
Net income = Total Sales - total expense
During the month of May,
Total Sales = credit sales + cash sales = $35,000 + $25,000 = $60,000
The company paid wages of $ 24 comma 000, the wages expense was $ 24 comma 000.
The company paid utilities of $ 9 comma 000, the utilities expense was $ 9 comma 000
Total expense = wages expense + utilities expense = $24,000 + $9,000 = $33,000
The payment that the company received from its customer was not the sales or expense. It made increase cash and reduce account receivable.
Net income = $60,000 - $33,000 = $27,000
Answer:
The correct answer is firewall monitoring.
Explanation:
Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.
Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.
The correct answer is D
D- Randomly corruption files
Have a good day and good luck.