Answer:
$46,200
Explanation:
Calculation to determine the amount of S2 costs allocated to S1
S2 costs allocated to S1 =$66,000*0.70/(0.70 +0.10+ 0.20)
S2 costs allocated to S1 =$46,200/1.00
S2 costs allocated to S1 =$46,200
Therefore Under the step method of cost allocation, the amount of S2 costs allocated to S1 would be:$45,200
Answer:
27.79%; $191,840
Explanation:
Given that,
Net sales = $763,000
Cost of goods sold = $551,000
Net Income = $20,160
Gross Profit
:
= Net sales - Cost of goods sold
= $763,000 - $551,000
= $212,000
Gross margin
:
= Gross Profit ÷ Net sales
= $212,000 ÷ $763,000
= 0.2779 or 27.79%
The operating expenses can be modeled with:
Net Income = Revenues - Expenses - COGS
$20,160 = $763,000 - Expenses - $551,000
Expenses = $191,840
Answer:
d.) discretionary expenses
Explanation:
We can explain going further into what is each item.
<u>A and B are your income </u>(for this question don’t sweat about the difference between gross and realized). They will constitute all the money you have in that period (the period will depend on the regularity of your income, it could be weekly, monthly, etc.).
Your fixed expenses are the things you will expend money on which, no matter what happens, will not change (it could be your rent, tax, health insurance, etc.).
Discretionary expenses, however, are costs that are things that you WANT, not NEED. It could go anywhere from a new shoe to a new boat (if you´re feeling rich, that is lol). That kind of expense will impact your available money (hey, nothing is free) but is not part of your budget as it is not a planned cost.
However, is important to note that if you wanna be super Monica Geller with your money you should forecast your discretionary expenses. Using your history as a base for calculating will eliminate most of the margin error.
Answer:
The correct answer is firewall monitoring.
Explanation:
Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.
Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.