Answer:
A) leveraging new core competencies to improve current market position.
Explanation:
As is given in the scenario, the people that the company Ancho is trying to get are <em>potential customers</em> rather than existing, hence they cannot be said to be building new core competencies <em>to protect and extend current market position</em>. That would have been the case if they were trying to keep those that were already customers to the company.
Ancho cannot also be said to be <em>redeploying existing core competencies to compete in future markets </em>because they are actually acquiring new competencies in electric car manufacturing which was not their original line of business.
There is also no case of <em>unlearning existing core competencies </em>because Anchor has deployed existing competencies in developing a hybrid car rather than just an electric one.
Hence Anchor is trying to get new customers while keeping the old ones and has made a car that will appeal to both existing and potential customers to improve current market position.
Answer:
One of the main economic issues in developing countries is rampant corruption or extremely inefficient government institutions. This means that less government intervention is always better in developing countries.
On the other hand, in developed countries, the checks and balances system exists within government institutions and even though corruption may exist, it is not as widely spread. The most severe economic problem in developed countries is inequality and huge economic actors. This is why activist policies may be necessary in developed countries, at least in certain economic sectors.
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.
The upside of changing its assembling frameworks is to enhanced item quality and lessened preparing time.
JIT and the lean maker has numerous bene±ts including enhanced item quality and diminished handling time, and decreased waste and stock, bring down work and generation costs, and expanded assembling adaptability.
Answer:
If Solemon wants to earn a targeted profit of $3,600, the number of units must be sold are 9,300 units.
Explanation:
In Solemon Company:
Contribution margin per unit = Sales price – Variable cost per unit = $8-$6=$2
The number of units must be sold to meet the target profit figure are calculated by using following formula:
The number of units must be sold = (Total fixed cost + Targeted profit) / Contribution margin per unit.
In there: Total fixed cost are $15,000
Targeted profit are $3,600
The number of units must be sold = ($15,000 + $3,600)/$2 = $18,600/$2 = 9,300 units.