1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
10

Jan Throng invested $39,000 in the Invesco Charter mutual fund. The fund charges a commission (load) of 4.5 percent when shares

are purchased. Calculate the amount of commission (load) Jan must pay
Business
1 answer:
Karolina [17]3 years ago
5 0

Answer:

amount of commission (load) Jan must pay is $1755

Explanation:

given data

investment  = $39,000

charges commission (load)  = 4.5 percent

to find out

Calculate the amount of commission (load) Jan must pay

solution

we get amount of commission will be here as

amount of commission = investment × charges commission %   ......................1

put here value we will get

amount of commission = $39000 ×  4.5%

amount of commission = $39000 ×  0.045

amount of commission = $1755

so amount of commission (load) Jan must pay is $1755

You might be interested in
In each of the following situations, what type of unemployment is Melanie facing? Explain.a. After completing a complex programm
arlik [135]

Answer:

A. Frictional Unemployment

B. Structural Unemployment

C. Cyclical Unemployment

Explanation:

A. Frictional Unemployment refers to people moving between jobs which is the case for the first scenario

B. Structural Unemployment is a type of unemployment when structure of the economy changes and outsourcing also comes under this

C. Cyclical Unemployment is caused by the movements of business cycle people are laid off when economy is facing recession i.e decrease in investment.

7 0
3 years ago
A call center with access to customer credit reports selling customer data to an outside organized crime organization for the pu
emmasim [6.3K]
The answer is authorized to use an organization’s system. In addition, if an authorized user tells another person his secret code, the unauthorized user can masquerade as the authorized user with significantly less likelihood of detection. People who have some motive to attack an organization and are not authorized to use the system of the organization are called outsiders and can pose a serious threat to an organization.
8 0
3 years ago
Future economic trends are not influenced by economic theories. True or false?
nikklg [1K]
That statement is false.
Economic theories will determine how companies see the market and will somehow affect the decision that they will make for the market.
This decision will influence the future economic trends because these companies usually are really forward thinkers. From this, we could draw a correlation between future economic trends and economic theories
5 0
3 years ago
_______ has been defined as the process of identifying consumers with similar attributes who are likely to exhibit a similar buy
Hoochie [10]

Global market segmentation has been defined as the process of identifying consumers with similar attributes who are likely to exhibit a similar buying behavior.

<h3><u>Explanation:</u></h3>

The process involved in the identification of a particular segment of customers to sell the products refers to the Global Market Segmentation. Those customers of the groups that has the nature of similar behavior in buying of certain products will be grouped together under this process.

The people in the identified group will have the same purchasing behavior. Thus, when the customers of similar buying behaviors are grouped then the targeting process of the business will become easier. Fir example if you are manufacturing chocolates then it will be easier to target on;ly children and the adults.

8 0
4 years ago
Which feature is a characteristic of secure access? select one: accounting deception environment simulation compliance
Arte-miy333 [17]

Compliance is a feature of secure access.

<h3>What is secure access?</h3>

This is the term that is used in cyber security to mean the bringing together of secure cloud security into the cloud services.

It works by enabling both security and network together as a service that can be rendered via cloud. What this helps to do is to ensure the safety and the security of the services.

Read more on security of computer systems here:

brainly.com/question/25720881

#SPJ1

5 0
2 years ago
Other questions:
  • Which method for calculating a credit card balance does not take into account the purchases or the payments made during the curr
    5·2 answers
  • What’s the purpose of balancing or monitoring your checking account?
    9·1 answer
  • A highly-efficient computer engineer would most likely have _____ parietal lobes.
    12·1 answer
  • Which of the following statements is true of strategic alliances as disadvantages? a.The fixed costs and associated risks of dev
    14·1 answer
  • Mcmurtry corporation sells a product for $180 per unit. the product's current sales are 12,900 units and its break-even sales ar
    8·1 answer
  • Tim, a real estate investor, Ken, a dealer in securities, and Hardware, Inc., a retail lumber store, form a partnership called H
    12·1 answer
  • On January 15, 2020, Vern purchased the rights to a mineral interest for $3,500,000. At that time, it was estimated that the rec
    6·1 answer
  • Because of the difference between the discipline imposed by market competition and the discipline imposed by political decisions
    7·1 answer
  • One part of a cooperations income is paid out to shareholders it is called a ______.​
    6·2 answers
  • What is the ground clearance of the Nissan GT-R?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!