Answer:
What is the probability that the next student to purchase a meal plan will be assigned to the Commons?a. 0.33
Explanation:
P(A) = (No. of ways A can occur)/(Total no. of possible outcomes)
P=1/3
P=0,333
 
        
                    
             
        
        
        
Answer:
$525,000
Explanation:
The computation of the net inflow or outflow is shown below:
= Total outflow - total inflow 
where, 
Total outflow = ∈2,000,000 × $1.05 = $2,100,000
Total inflow =  ∈1,500,000 × $1.05 = $1,575,000
Now put these values to the above formula  
So, the value would equal to
= $2,100,000 - $1,575,000
= $525,000
This amount shows a net outflow as total outflow is greater than the total inflow. 
 
        
             
        
        
        
Answer:The answer is A
Explanation:The one that is not commonly contacted by Typical investors to purchase stocks or bonds are : REALTORS
The investors will approach realtors if they want to invest their equity on properties such as land, houses , or apartment 
 
        
             
        
        
        
Answer:
$372,000
Explanation:
The computation of the amount to be reported in the balance sheet is shown below:
= Number of shares of common stock × fair value of the Papa stock on that date per share 
= 6,200 shares × $60
= $372,000
Since in the question it is given that the Nana company does not have significant influence over Papa Company which means that the net income, retained earning, dividend is not be considered. 
Therefore, the investment should be reported at the fair value 
 
        
             
        
        
        
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.