1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
15

Henrietta, the owner of a very successful hotel chain in the Southeast, is exploring the possibility of expanding the chain into

a city in the Northeast. She incurs $35,000 of expenses associated with this investigation. Based on the regulatory environment for hotels in the city, she decides not to expand. During the year, she also investigates opening a restaurant that will be part of a national restaurant chain. Her expenses for this are $53,000. She proceeds with opening the restaurant, and it begins operations on September 1.
Computers and Technology
1 answer:
iragen [17]3 years ago
5 0

Answer: Explanation:

The amount that Nancy can deduct in the current year for investigating these two businesses.

Nancy could deduct the $35,000 for hotel investigation expenses.

Nancy can deduct $2,000 + $1133 = $3,133 of the restaurant expenses the first year and then the other $51,000 over a period of 180 months, that is $1133 per month.

You might be interested in
1111111111111111111111111111
NISA [10]

Answer:

in order to use correct codes, ensure the variables in loops are in brackets

3 0
3 years ago
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
Write a function called reverse() with this prototype:
tresset_1 [31]

Answer:

void reverse(char dest[], char source[], int size)

{

   for(int i=0;i<size;i++)//using for loop.

   {

       dest[i]=source[i];//assigning each element of source array to dest array.

   }

   int s=0,e=size-1;//initializing two elements s with 0 and e with size -1.

   while(s<e){

       char t=des[s];             //SWAPPING

       dest[s]=dest[e];            //SWAPPING

       dest[e]=t;                  //SWAPPING

       s++;

       e--;

   }

}

Explanation:

I have used while loop to reverse the array.I have initialize two integer variables s and e with 0 and size-1.Looping until s becomes greater than e.

It will work as follows:

first s=0 and e=0.

dest[0] will be swapped with dest[size-1]

then s=1 and e=size-2.

then des[1] will be swapped with dest[size-2]

and it will keep on going till s is less than e.

4 0
3 years ago
Ugh these are hard questions
SVEN [57.7K]
9 is B, and 10 is D I think ... brainliest pls
8 0
3 years ago
The Internet may best be compared to a/an
Usimov [2.4K]
A volcano because its always erupting
3 0
3 years ago
Other questions:
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
    15·2 answers
  • __________________ are evaluations of a network
    6·1 answer
  • In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?
    9·1 answer
  • What helps in determining the reliability of a person to repay debt?
    13·2 answers
  • <img src="https://tex.z-dn.net/?f=%20%5Csf%20%7B%20%5Cfcolorbox%7Bgold%7D%7Bg%7D%7B%20Define%20malware%7D%7D%20" id="TexFormula1
    9·1 answer
  • Research: Using the Internet or a library, gather information about the Columbian Exchange. Takes notes about the specific goods
    15·1 answer
  • All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break do
    15·1 answer
  • How do you get a blank business card template in word?
    15·1 answer
  • How does one decide which businesses to invest in.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!