Answer:
Pure risk
Explanation:
To the best of knowledge, will it is a situation one finds him/herself in and doesn't know how to solve the issue but has only one possible outcome if it truly happens; which could be danger.
Answer:
The correct answer is Option A. you will need to deposit $111,111 so that you can fund the scholarship forever, assuming that the account will earn 4.50% per annum every year.
Explanation:
Perpetuity is the cash flows to be receivable for an unspecified period of time. The present value of a perpetuity is calculated as the cash flows divided by the interest rate provided.
Given data;
Amount needed to be deposited = $5000
Interest rate = 4.50%
Present Value of Perpetuity = Cash Flows ÷ Interest rate
= $5000 ÷ 0.045
= $111,111
Answer:
Depreciation expense on third year is $2,400
Explanation:
First, we must compute the depreciation expense for the first 2 years.
($18,000 - 2,000)/5years = $3,200 depreciation expense per year.
Second, let’s compute the net book value before the adjustment.
$3,200 x 2 years = $6,400 (total depreciation for 2 years)
$18,000 - $6,400 = $11,600 (Net book value before adjustment)
Finally we can now compute the Depreciation expense on the third year.
($11,600 - $2,000) / 3+1
$9,600/4 = $2,400 (new depreciation expense on third year)
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.
Answer:
Queries can perform many different functions in a database. Their most common function is to retrieve specific data from the tables. The data you want to see is usually spread across several tables, and queries allow you to view it in a single data sheet.