1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
3 years ago
9

Present all the journal entries including the adjustments that would be made on July 31, 2015, the end of the fiscal year, for e

ach of the following. 1. The supplies inventory on August 1, 2014 was $9,350. Supplies costing $22,150 were acquired in cash on September 11, 2014 and charged to the supplies inventory. A count on July 31, 2015 indicated supplies on hand of $8,810. There was no other transaction related to supplies during the fiscal year ending July 31, 2015. 2. On April 30, a ten-month, 6% note for $30,000 was received from a customer for lending the same amount to the customer. 3. On May 1, $12,000 was collected as rent for one year and the same amount was credited as Unearned Rent Revenue.
Business
1 answer:
Kamila [148]3 years ago
3 0

Answer:

Account Title                                                            Dr            Cr

Supplies Expense (22,150+9,350-8,810)..............22690

      Supplies....................................................................................22690

Interest Receivable .....................................................450

      Interest Revenue .......................................................................450

Rent Revenue.............................................................$7,000

      Unearned Revenue...............................................................$7,000

You might be interested in
When offered paid medical insurance——-consider benefit?
Verdich [7]
I believe the answer is B
5 0
3 years ago
Read 2 more answers
Rom what you know of the company so far, what will be among the variousconstituencies that the CSIRT will serve?
son4ous [18]

The question is incomplete, Below is the complete question.

Brody had been enjoying a nice, calm shift in HAL's network operations center. The calmness of the evening was interrupted, however, when a pop-up notification appeared on his monitor. The NIDS had detected malicious traffic on a brance network in Tuscaloosa, Alabama, specifically targeting the branch Web server. As Brody picked up the telephone to contact the on-call network tech for that office, the NIDS displayed another pop-up notification, this time reporting malicious traffic on a branch network in Mobile. In short order, it also displayed notifications for branches in Athens, Columbia, Auburn, and Starkville. Even more alarming, the NIDS indicated that the traffic was all coming from other branches within the company.

Brody immediately recognized that this was different from the typical attacks he'd seen in his time with the company and decided to call his boss, Nick Shula. It was 3:30 AM when he made the call.

"Hello?" said Shula, groggy with sleep.

"Boss, it's Brody," Brody said. "Sorry to be calling like this, but i think we've got a problemm. The NIDS is showing that Web servers in multiple branch offices are under attack, and the traffic is coming from inside our network. What do you want me to do?"

Shula, suddenly awake, thought back to the proposal that was sitting on his desk, concerning the creation of an incident response team for the company. Shula had een so busy with other things that he hadn't been able to consider the proposal at all. Mentally kicking himself, he muttered into the phone, "Why didn't I look at that proposal?"

"What was that, boss?" Brody said.

"Never mind," Shula said. He had to think quickly in order to guide Brody through the situation. "Call the firewall guy on duty," he said, "and have him put in a temporary rule on the DMZ firewall to block all inbound traffic to the Web servers from internal IP addresses." After all, it was the middle of the night, and very few, if any, employees would be doing any work that involved the Web servers. Shula figured he would jsut get up a little early and have the rule removed before normal working hours; hopefully, by then the attack would have stopped.

"OK boss, will do. Get back to sleep, now," Brody said.

Shula headed back to bed, thinking everything was OK. But as soon as his eyes closed, the phone rang again. He took a look at the caller ID and blanched. It was Mal Bryant,, the company CEO.

"Nick, it's Mal," Mal said. "Listen, I'm in Belgium and attached to the corporate network via the VPN. For some reason, I can't get to our internal Web server. You have ny idea what's going on?"

Shula sighed as he realized it was going to be a long night...

Two weeks later, Brody got an e-mail from Nick Shula inviting him to attend a meeting during the day shift later in the week. The meeting was being called to discuss the formation fo the company's new CSIRT.

Brody would be one of the employees identified to perform specific actions when events became incidents and the response plans were activated. As a front-line watch stander in the network operations center, Brody would play a critical role. In addition to his role as a key memeber of the response team, Brody was going to be invited to help develop the plans and procedures and would then be trained in how to be a first responder.

Discussion Questions:

A) From what you know of the company so far, what will be among the various constituencies that the CSIRT will serve?

B) Will the company need to hire more employees to meet the needs of the CSIRT, or would you suggest it outsource some of that effort?

ANSWER;

A) When we talk of CSIRT, it typically mean computer security incident response team.

It will actually help employees report,discuss and disseminate information as it regards computer security related information across the entire organization and it's various verticals.

CSIRT will actually help in timely response that is 24/7 and a coordinated effort in the handling of incident.

The department of information technology and other departments to that are partly or heavily making use of it's systems would actually be the ones typically affected by the formation of this body.

B) For CSIRT to be efficiently constructed,the organization should also outsource the work initially in majority.

However,in the later stages, once the employees are well trained,the company can then build upon it as in house department much more effectively and efficiently.

Also,the company should have at least a part of the work outsourced to have access continuously to the respective systems at all times. This will be required mainly because information security is a fast moving technology and the company as well as it's employees need to be updated regularly and also informed of external threats.

3 0
3 years ago
CalPERS, the California Public Employees Retirement System, manages over 240 billion dollars in assets. As an example of shared
Sphinxa [80]

Answer:

The correct option is true

Explanation:

Shared activism refers to the use of direct action in achieving a goal as in the case of people refusing to leave a house marked for demolition in order to protect the house from being demolished.

CalPERS as a pension fund manager coupled with being a major shareholder in many of the firms where it holds investment has just employed the strategy of direct intervention known as shared activism in order  that the value of its  portfolio is optimized.

5 0
3 years ago
A society can produce two goods: donuts and beer. The society's production possibility frontier is negatively sloped and "bowed
monitta

Answer:

c. increases

Explanation:

Opportunity cost is the cost of the next best option forgone when one alternative is chosen over other alternatives.

The production possibility frontier is graph that shows the two combinations of goods that an economy can produce given its resocurces.

As the production of donuts increases, the amount of beers that would be forgone in order to increase production of donuts rises.

I hope my answer helps you

5 0
4 years ago
Identify the following as a fixed asset (FA), or intangible asset (IA), natural resource (NR), or none of these (N). a. Computer
julsineya [31]

Answer:

a. Computer - fixed asset

b. Patent - intangible asset

c. Oil reserve - natural resource

d. Goodwill - intangible asset

e. U. S. Treasury note - none of these (N)

f. Land used for employee parking - fixed asset

g. Gold mine - natural resource

Explanation:

Intangible assets are the assets of a company that cannot be seen or they are not physical in nature. They are usually difficult to evaluate. They include:

  1. Goodwill
  2. Patent
  3. Trademarks
  4. copyrights

a fixed asset is a long term tangible piece of property or equipment that a company has and uses it to generate income. they include plant, property and equipment.

A natural resource is a substance that occurs in nature that can be used to generate economic profit.

5 0
3 years ago
Other questions:
  • How would the economy of Canada be likely characterized?
    10·2 answers
  • Porsche AG uses the label "Top Guns" to describe one segment of its customers, namely those who care about power and control and
    13·2 answers
  • 2. One of the most fundamental determinants of the exchange rate is ______________ whereby the exchange rate between the currenc
    13·1 answer
  • Justin signed a finance agreement for his rent purchase what is the total amount he will pay back under this agreement?
    13·2 answers
  • Jazz Corporation owns 10 percent of the Williams Corp. stock. Williams distributed a $10,000 dividend to Jazz Corporation. Jazz
    13·1 answer
  • Employees at Between the Rounds believe that the company is fair to all employees, regardless of their age, gender, race, ethnic
    14·1 answer
  • Sending employees on international assignments is an example of the _________approach to employee development. Group of answer c
    12·1 answer
  • You are in the middle of an interview, and you feel like things are going horribly. The interviewer is asking questions that you
    8·2 answers
  • Which of the following would be an example of a WANT?
    11·2 answers
  • Please help me solve this question
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!