Answer:
variable costs
Explanation:
Fixed costs are costs that do not vary with output. e,g, rent, mortgage payments
If production is zero or if production is a million, Mortgage payments do not change - it remains the same no matter the level of output.
Hourly wage costs and payments for production inputs are variable costs
Variable costs are costs that vary with production
If a producer decides not to produce any output, there would be no need to hire labour and thus no need to pay hourly wages.
Answer:
Explanation:
The direct cost is the cost that is directly related to production. The example is direct material cost, direct labor cost, etc whereas the indirect cost is the cost that is not directly related to the production. It is also known as overhead cost only records all indirect cost i.e depreciation on equipment of factory, property taxes, etc
Based on this, the classification is as follows
1 The wages of pediatric nurses / The pediatric department = Direct cost (D)
2 Prescription drugs / A particular patient = Direct cost (D)
3 Heating the hospital / The pediatric patient = Indirect cost (D)
4 The salary of the head of pediatrics / The pediatric patient = Direct cost (D)
5 The salary of the head of pediatrics / The particular pediatric patient = Indirect cost (D)
6 Hospital chaplain's salary / A particular patient = Indirect cost (D)
7 Lab tests by outside contractor / A particular patient = Direct cost (D)
8 Lab tests by outside contractor / A particular department = Direct cost (D)
Answer:
detective control.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.
Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;
1. Statistical anomaly-based detection.
2. Stateful protocol analysis detection.
3. Signature-based detection.
Hence, the operations in this scenario is an example of a detective control which avails a business firm information about vulnerabilities that exist in its network system.
Answer:
The number of shares needed to raise $26 miliion will be 590909 shares.
Explanation:
To calculate the number of shares needed to raise $26 million, we first need to findout the price per share at which shares are issued. The fair value or the price per share can be caclculated using the constant growth model of the DDM approach. Thus, the price per share today will be:
P0 = 2.46 / (0.1024 - 0.0465)
P0 = $44.007 rounded off to $44
Thus, at the price of $44 per share, number of shares needed to raise $26 million will be:
No of shares = 26,000,000 / 44 = 590909.0909 rounded off to 590909 shares
D. You should always check before if there would be delays