Answer:
a. Annually equal instalment = Principal x rate x ( (1+rate)n / (1+rate)n -1 )
Explanation:
Accrding to the following formula, we calculate the anually equal instalment.
So, instalment = 56000 x 0.10 x ( (1.10)8 / (1.10)8 -1) = $10496.86498 ~ $10496.86
Answer:
Both a recessionary gap and cyclical unemployment.
Answer:
B is the correct option.
Explanation:
In theory, the perfect market is the structure in which all the firms sell identical products,They all are price takers, the market share doesn't influence the prices, firms can enter or exit the market without cost and resources are perfectly mobile. No markets are in the sphere of the perfect competition model. so they are classified as imperfect. The imperfect and perfect market is the outcome of post-classical economic thought of the Cambridge tradition.
Answer:
Overhead rate= 34.24
Explanation:
Giving the following information:
Labor-hours for the upcoming year at 38,600.
The estimated variable manufacturing overhead was $5.90.
The estimated total fixed manufacturing overhead was $1,093,924.
Overhead rate= Estimated indirect cost/allocation measure
Overhead rate=[(38600*5.90+1093924)]/38600= 34.24
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.