Answer:
Falls:rises.
Explanation:
The MU/P (Marginal Utility/Price) ratio for good X is greater than the MU/P (Marginal Utility/Price) ratio for good Y. To achieve consumer equilibrium, the consumer reallocates dollars from the purchase of good Y to the purchase of good X. If the law of diminishing marginal utility holds, the marginal utility of good X falls and the marginal utility of good Y rises.
The law of diminishing marginal utility states that as the unit of a good or service consumed by an individual increases, the additional satisfaction he or she derives from consuming additional units would start decreasing or diminishing as the units of good or service consumed increases.
Also, the marginal utility of goods and services is the additional satisfaction that a consumer derives from consuming or buying an additional unit of a good or service.
Hence, the marginal utility of good X falls and the marginal utility of good Y rises because the consumer no longer derive satisfaction or benefits (utility) from the consumption of good X while he would switch to good Y for satisfaction.
Answer:
first find a business idea and make a plan (logo, name, what item ur selling..etc.)
Answer: information system audit
Explanation:
The information system audit is the process through which organizations periodically have an external entity which helps in reviewing the controls in order to uncover any potential problems in the controls
In order to know how effectivene the information system controls is, the information systems audit is vital. It is required to verify the accounting records of an organization as well as the financial statements.
Answer:
Potter Corporation should turn to activity-based costing.
Explanation:
Potter Corporation should change to activity-based costing. Since Its present system seems to be deforming product costs, resulting in prices of specialty products that are below average and prices of simple products that are too high. This may lead Potter to push products that produce low profit margins.
<span>The answer is false. The answer must be an information
security blueprint. This is the basis for the design, selection, and
implementation of all security program elements. The blueprint specifies tasks
and the order in which they are to be accomplished, just like an architect’s
blueprint serves as the design template for a construction of a building. </span>