The policy is not practical because it is not enforceable. Lots of shops or businesses will not practice this as it will scare customers away.
<h3>Why is the policy not fair?</h3>
The policy is not fair because throw away paper is recyclable while plastic bags are not. Hence people who use paper should not be charged as much as those who use plastic bags, if at all.
<h3>What is the saving due if a person brings their own container to bag their groceries?</h3>
They most likely wills save 5% on every purchase made.
<h3>Why are environmental policies important?</h3>
The goal of environmental law is to safeguard the
- land,
- air,
- water, and
- soil.
Infractions of these rules result in a variety of penalties, including fines, community service, and, in severe circumstances, jail time.
Without environmental regulations, the government would be unable to penalize people who harm the environment.
Learn more about environmental policies:
brainly.com/question/3316812
#SPJ1
Answer:
$70,875
Explanation:
By definition, a flexible budget is when a budget has been adjusted or flexed to accommodate the changes in the level of activity.
If the company wanted to create a flexible budget for 9,000 units, then the value that would be recorded for variable costs will be:
Indirect materials, $22,000/8000*9000 = 24,750;
Indirect labor, $25,000/8000*9000 = 28,125 ;
Utilities, $12,000/8000*9000 = 13,500;
Supervision, $4,000/8000*9000=4,500
Total of variable costs = ........................70,875
Answer:
Peter's percent value-added time is just over 3%. is the correct statement
Explanation:
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
