Answer:
a) $1080
b)$19080
c) Loan given | -$18000
d)$540
e)$19620
f)loan | 18000
Interest received | $1620
g) $1620
Explanation:
a) Year 1 : a) Interest income = $18000*9%*8/12 = $1080
b) The total receivable at december 31,Year = 18000+1080 = $19080
c) Year 1 :Statement of cash flow
Loan given | -$18000
d) Interest income Year 2 = $18000*9%*4/12 = $540
e) Total cash collect in 2017 = $18000+$1080 + $540 = $19620
f) Cash flow from investing activities :
loan | 18000
Interest received | $1620
g)Total interest earned = 18000*9% = $1620
Answer:
The correct answer is letter "B": A gift inter vivos.
Explanation:
A gift inter-vivos refers to the transfer of a property from one party to another while the donor is alive. This transfer must be celebrated through a written agreement providing the beneficiary absolute ownership of the property. In such a case, the donor cannot request the property back and gives up any right over it.
The beneficiary must accept the gift for the transfer to be complete and if the property has value, the beneficiary will accept it as well.
<em>The issue between Tina and Becca relies on not having signed any document for the transfer of the diamond ring but they are involved in an inter-vivos gift.</em>
Answer:
The ethical dilemma that Marco Manager is facing having to choose between trying to keep an existing friendship (at least he believes that they are friends) or doing the right thing as a manager, which would involve investigating why the money is missing and most certainly firing the employee.
AnswerEnterprise Fund Dr. 1,300,000
Pension Fund CR. 1,300,000
Narration recognition of outstanding pension fund.
Note This will throw the Enterprise fund into a deficit of $520,000
To provide for the deficit
Income Dr. 520,000
Enterprise fund CR 520,000
Narration. Recognition of pension not covered by asset.
Answer:
TRUE
Explanation:
Current Access Control rosters should be authenticated, authorized and accounted for by the manager or their designated representative.
Bio-metrics, Electronic locks, and Smart cards are sensitive data-derivation technologies and since they are applied in a number of sectors - e.g. Telecommunications, Retail, Defense, Healthcare, Hospitality, and Information Technology - current access to devices and software applications should be authenticated by the manager or a designated representative of the manager.