Answer:
firm must borrow $288000 to achieve the target debt ratio
Explanation:
given data
assets = $720,000
debt to total capital ratio = 40%
to find out
How much must the firm borrow to achieve the target debt ratio
solution
we get here debt here by Debt to Total capital ratio that is express as
Debt to Total capital ratio = Debt ÷ ( Debt + Equity ) ....................1
put here value we get debt
0.40 = 
debt = $288000
so firm must borrow $288000 to achieve the target debt ratio
Answer:
It is departmentalized in a functional way
Explanation:
Functional departmentalization is the type of organizational structure based on common job functions. In Mitchell's case all similar jobs, like legal or marketing, are grouped in one place or on the same floor. This type of organization provides space for further employee's specialization by putting staff in places where their skills can further develop.
Answer:
The opportunity cost = $2.5
Explanation:
Given:
You own a building that has four possible uses: a cafe, a craft store, a hardware store, and a bookstore. The value of the building in each use is $2,000; $3,000; $4,000; and $5,000, respectively.You decide to open a hardware store.
<u>Question asked:</u>
The <u>opportunity cost of using this </u><u>building for a hardware store</u> ?
<u>Solution:</u>
As we know:

What you sacrifice = Value of a cafe + Value of a craft store + Value of a bookstore
= $2000 + $3000 + $5000 = $10,000
What you gain = Value of a hardware store
= $4000
Thus, the opportunity cost of using this building for a hardware store is $2.5
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
