Answer:
Explanation:
You divide the top by 2 and the bottom by two.
Answer:
The answer is because of product differentiation
Explanation:
Under monopolistic competition, the sellers' product are differentiated from one another and this gives the sellers the power to influence prices.
Like perfect competition, the market has many buyers and sellers, free entry and exit but the major difference between the two is the product differentiation.
For example in the mobile phone market, we have Samsung, Infinix, Iphones, Oppo etc. They are all mobile phones but they are different from from one another in the aspect of specifications. iPhones usually charge highest. There is customers' loyalty in this market.
Answer:
b. banned anticompetitive mergers that occurred as a result of one company acquiring the physical assets of another company.
Explanation:
- The Sailor-Kefauver Act was a United States federal law passed in 1950 that amended and strengthened the Clayton Antitrust Act of 1914, which amended the Sherman Antitrust Act of 1890.
- The Sailor-Kefauver Act was passed to eliminate a loophole to link firms to the acquisition and acquisition of assets that are not direct competitors.
- The Clayton Act prohibited stock purchase mergers, the competition was reduced, and smarter traders were able to find ways to buy competitive property around the Clayton Act. Under the Sailor-Kefauver Act, asset acquisition competition decreases, and that practice is banned.
They gain some degree of power by means of differentiating their products from those of other firms in the industry. Remember that a monopolistic competition is the one where many firms selling products that are similar but not identical which is very different from oligopoly and the one known as imperfect competition
Answer: Passive wiretap
Explanation: passive wiretap is the monitoring or recording of data that attempts only to observe a communication flow and gain knowledge of the data it contains, but does not alter or otherwise affect that flow. Wiretapping is a process in which passive devices are used to monitor or record data that are being transmitted in a line or a loop, Passive wiretapping happens when attackers are trying to obtain users information through the communication channel.