Answer and Explanation:
The journal entries are shown below:
1. On Sep 30
Cash $15750
To Sales $15,000
To Sales taxes payable ($15000 ×5%) $750
(Being the cash receipts is recorded)
For recording this we debited the cash as it increased the assets and credited the sales and sales tax payable as it increased the revenue and liabilities
2 On Sep 30
Cost of goods sold $12,000
To Merchandise inventory $12,000
(Being the cost of goods sold is recorded)
For recording this we debited the cost of goods sold as it increased the expenses and credited the merchandise inventory as it reduced the assets
3 On Oct 15
Sales taxes payable $750
To Cash $750
(Being cash paid is recorded)
For recording this we debited the sales tax payable as it reduced the liabilities and credited the cash as it decreased the assets
Để gia tăng thị phần, sắp tới, MWG sẽ tăng tốc mở mới các cửa hàng Điện máy XANH Supermini, "đánh" vào khu vực nông thôn.
Answer: 187%
Explanation:
The percentage increase in the price of dozen egg would be:
= ( 2.75-0.96) × 100/ 0.96
= 1.79 × 100 / 0.96
= 186.45%
The percent increase in the price of dozen egg = 187%
If Martin had 24 5 pounds of grapes left. The expression that shows the pounds of grapes martin has if he doubles his current amount is: (2) (2) (2) (four-fifths).
<h3>
Double amount of grapes</h3>
Given: Current amount of grapes=2 4/5=14/5
Double amount of grapes=2×14/5=28/5
Hence:
2(2)+(2) 4/5
=4+8/5
=28/5
The expression is: (2) (2) (2) (four-fifths) or 2(2)+(2) 4/5.
Therefore If Martin had 24 5 pounds of grapes left. The expression that shows the pounds of grapes martin has if he doubles his current amount is: (2) (2) (2) (four-fifths).
Learn more about Double amount of grapes here:brainly.com/question/17044886
#SPJ1
Answer:
The correct answer is firewall monitoring.
Explanation:
Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.
Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.