1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
2 years ago
12

Family members may lend you money based on

Business
2 answers:
Katarina [22]2 years ago
6 0

Answer :a obligation.

The word obligation means “to be bound to act in a certain way either morally or legally.”

Hence when one is in need of money to start a business, family members may lend the money because they are bound to help you in times of need.  

Loans from family members are usually interest free.

However, if the loan is not repaid, relationships quickly turn sour.

Hence loans from family member must be treated with respect and care, in order to maintain relationships.


Airida [17]2 years ago
4 0

Answer:

The correct answer is Obligation.

Explanation:

When we live with the family, we have responsibilities towards the members of the family. We are responsible to help them in the time of their need. Normally it is our obligation to stand beside our family members through thick and thin. So if any member of the family needs to lend money, the money is given due to our obligation towards him or her. This interest free, easy to pay lending helps the member to stand on his or her feet. This increases the bonding between the family members.

You might be interested in
​if an employee feels she is underpaid for the effort she exerts, she will probably:
9966 [12]
Quit or ask for a raise
4 0
3 years ago
Tax cuts increase consumer incentive to save. which determinant(s) of aggregate demand cause the change?
Sidana [21]

In the given problem above, what will most likely happen if the tax cuts increase consumer incentive to save is that the aggregate demand will likely change as it will increase in the given situation, mainly because of the tax cut in which it will consume or spend the money earned.

8 0
3 years ago
A company purchased inventory for $74,000 from a vendor on account, FOB shipping point, with terms of 3/10, n/30. The company pa
marysya [2.9K]

Answer:

Cost of inventory =$73,280

Explanation:

The term 3/10 implies that the company would get a discount of 3% off the gross purchase price if its settles its account within 10 days of purchase. Since the payment was made 9 days after then the  discount is secured.

The cost of inventory =  the net purchase price + the freight charges

Net purchase price = Gross amount - discounts

Net purchase price = 74,000 - (3%× 74,000)=$71780

The cost of inventory = 71,780 + 1500= 73280

Cost of inventory =$73,280

8 0
3 years ago
Stock Y has a beta of 1.2 and an expected return of 14.5 percent. Stock Z has a beta of .7 and an expected return of 9.3 percent
emmasim [6.3K]

Answer:

Reward to risk ratio = (Expected return - Risk free rate) / Beta  

Reward to risk ratio of Y = ( 0.145 - 0.056) / 1.2

Reward to risk ratio of Y = 0.089 / 1.2

Reward to risk ratio of Y = 0.0741666

Reward to risk ratio of Y = 7.42%

Reward to risk ratio of Z = (0.093 - 0.056) / 0.7

Reward to risk ratio of Z = 0.037 / 0.7

Reward to risk ratio of Z = 0.0528571

Reward to risk ratio of Z = 5.29%

Security market line (SML) reward-to-risk ratio is the market risk premium itself which is 6.6%.

Stock Y has a reward-to-risk ratio that is higher than the market risk premium, it is currently under-valued in the market. Similarly, since stock Z has a reward-to-risk ratio that is lower than the market risk premium, it is currently over-valued in the market.

8 0
2 years ago
An authentication token is a(n):____________
bezimeni [28]

Answer:

The correct answer is:

device the size of a credit card that contains access permission data. (A)

Explanation:

An authentication token, also known as a security token is a device used to authorize access to a network service. Tokens use the two-factor authentication method to ensure security of a system. Usually the authentication devices have access pins before access to the main tokens, and tokens are unique sets of numbers that uniquely identifies a user in a service, and they are changed frequently, usually within a 5-minute period.

5 0
3 years ago
Other questions:
  • Which of the following is true about solving problems?
    7·2 answers
  • Which of the following is NOT an example of a financial market?
    6·1 answer
  • Jerry Rice and Grain Stores has $4,430,000 in yearly sales. The firm earns 2 percent on each dollar of sales and turns over its
    15·1 answer
  • Grace wants to become a manager at the bank where she is currently a teller. Which of the following goals would be appropriate f
    14·1 answer
  • Which of the following statements comparing debit and credit cards is TRUE?
    5·1 answer
  • How much should be in the reserve for fixed expenses?
    15·1 answer
  • What are the essential skills of management​
    15·2 answers
  • What is meant by conversational style and is a conversational style  as appropriate in cross-cultural communication as it is in
    7·1 answer
  • Calvert Corporation expects an EBIT of $23,300 every year forever. The company currently has no debt, and its cost of equity is
    10·1 answer
  • Design quality is considered a(n) __________ for the firm. Multiple choice question. insignificant cost strategic decision servi
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!