Answer:D. reject the offer because it will produce a net loss $21,000
Explanation:
Net income or loss is the total of firm's income less it's total cost( fixed and variable) . The contract will result in a loss $5 per unit which multiply by the total units of 4200 gives $21,000
<em>Answer:</em>
<em>d. delegation. </em>
<em>Explanation:</em>
<em>Delegation: </em><em>In management, delegation is described as any of the assignment related to an authority figure that is being given to another individual, for example, a task or assignment given by a manager to his or her subordinate to lead a few specific activities. Delegation is determined as one of the different concepts related to "management leadership". Therefore, an individual who is being delegated a specific work tends to remains "accountable" for the output of the "delegated work".</em>
<em>As per the question, Alex probably never learned to use the tool of delegation.</em>
Answer:
a. NAV = 8 per share
b. 250.000 shares
c. 7.95
Explanation:
a. NAV = Market value of shares/number of shares = $8m/1m = $8 per share
b. At the current NAV, it can absorb up to $2 million, or 250,000 shares.
c-1. Its loss by selling 25,000 shares of IBM at $34 instead of $36 = -$2 x 25,000 = -$50,000.
New NAV = $7,950,000 /1m = $7.95
Answer:
Option B Strategic Plan
Explanation:
The reason is that the organization strategic plan has a greater impact in formulation of marketing strategy and its execution. Strategic plan are more useful than the pestle analysis because strategic options are formulated by reviewing the SWOT, PESTLE and other information such as mission, etc. The strategic option choosed is our strategic plan so for the best results all we want is strategic plan to formulate marketing strategy.
Answer:
likely to be stolen and abused.
Explanation:
Uninterrupted information is a type of data that presented in a way that is understandably for most people (such as plain text).
When storing your information online with encrypted information, you make your data become easily identified, viewed and accessed by hackers. To prevent this from happening, you need to mask the data using encryption algorithms. This will make it really hard for a third party to decrypt your information and prevent it from being stolen.