toilet paper/ soap/water/food
The correct option is C.
Fiscal policy refers to the method that the government use to adjust its spending levels and tax rates in order to monitor and influence the nation's economy. Fiscal policy are divided into three types, these are: neutral, expansionary and contractionary fiscal policy. A contractionary fiscal policy is one which occurs when a government lowers its spending and increase the tax rate<span />
Answer:
1,200 hours
Explanation:
Solving mathematically this will be :
<em>y = ax^b</em>
where,
y is the cumulative average time required to produce x units
a is the time required to produce the first unit of output
x is the number of units of output under consideration
b is the log of the Learning Curve % divided by Log 2
The firm use 150 hours to work on the product during the second month
Amount of time used in the first month will be calculated as :
y = 400(8)^(-0.322)
= 204.8 hours (average)
Total for 8 units = 204.8 hours × 8 units
= 1,638.40 hours
Amount of time used for the total months to manufacture 18 units :
y = 400(18)^(-0.322)
= 157.74 hours (average)
Total for 18 units = 157.74 hours × 18 units
= 2,839.32 hours
Therefore,
Hours to be used in the second month = Time on 18 units - Time on 8 units
= 2,839.32 hours - 1,638.40 hours
= 1,200 hours
So, the firm use 1,200 hours in total for the 10 units. Which gives an average of 120 hours per unit
Answer:
Dr Cash $825
Cr Sales Returns and Allowances $800
Cr Sales Discounts $25
Explanation:
Preparation of the journal entry that Concord Company make upon receipt of the check
Dr Cash $825
($800+$25)
Cr Sales Returns and Allowances $800
Cr Sales Discounts $25
(To record receipt of the check)
Sales discount=(Sales Price -Sales return) × 1%
Sales discount=($3300 - $800) × 1% = $25
A phishing assault occurs when someone sends credit card-related emails, texts, or information and then clicks on a link to verify account information.
What is a suspicious charge?
The term "suspicious charge" refers to the feeling that somebody has done something wrong, fraudulent or illegal. Somebody misuses personal information and details.
Phishing is the process of obtaining vital or sensitive information for malevolent objectives, such as a username, password, code, current bank balance, and credit card information.
As a result, phishing scams are the most common type of attack.
Learn more about on suspicious charge, here:
brainly.com/question/2621041
#SPJ1