Answer:$9,000
Explanation:
The tax credit offered to adoptive parents to encourage adoption is reffered to as ADOPTION TAX CREDIT. The adoption tax credit is a nonrefundable tax credit. This means that people owing taxes are also fit or qualified to apply for the adoption tax credit.
In the United States of America, adoption tax credit qualified expenses include court costs, traveling expenses, lawyer's or Attorney's fee and other expenses for legal adoption of an eligible child.
It can be calculated by subtracting
the max's employer provided for the couple with adoption benefits of $4,000 from the incurred expenses of a total of $13,000 in qualified adoption expenses(from the question).
That is; $13,000-$4,000.
= $9,000.
Hence, the maximum amount of adoption credit they can take this year is $9,000.
Answer:
a) $3
b) $2
c) 1449
Explanation:
Given:
The cost for a carton of milk = $3
Selling price for a carton of milk = $5
Salvage value = $0 [since When the milk expires, it is thrown out ]3
Mean of historical monthly demand = 1,500
Standard deviation = 200
Now,
a) cost of overstocking = Cost for a carton of milk - Salvage value
= $3 - $0
= $3
cost of under-stocking = Selling price - cost for a carton of milk
= $5 - $3
= $2
b) critical ratio =
or
critical ratio =
or
critical ratio = 0.4
c) optimal quantity of milk cartons = Mean + ( z × standard deviation )
here, z is the z-score for the critical ration of 0.4
we know
z-score(0.4) = -0.253
thus,
optimal quantity of milk cartons = 1,500 + ( -0.253 × 200 )
= 1500 - 50.6
= 1449.4 ≈ 1449 units
Answer:
By practicing simulated cyber attacks. They help in improving the security and firewall of organization thereby enhancing their resistance to cyber infiltration.
Explanation:
Organizations may often intend to evaluate and their degree of vulnerability and test their security standard, hence, they employ the use of a simulated threat pattern whereby the red team act as a threat by using several infiltration techniques usually used by actual infiltrators, the blue team on the other hand acts to repel the advances of the red team by implementing security protocols and architecture capable of neutralizing the simulated attacks of the red team. This way organizations beef up their security in other to forestall actual potential attacks against capable of invading their information and digital systems.