1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
12

Dorothea orginally sold her home for $92,000. At that time, her adjusted basis in the home was $95,000. Five years later, she re

possessed the home when the balance of the note was $87,000. She resold it within one year for $100,000. Original sale expenses were $1,150 and reslae expenses were $1,350. Repossession costs were $2,900. She incurred $1,100 for improvements prior to the resale. What is Dorothea's recomputed gain?
Business
1 answer:
Ray Of Light [21]3 years ago
3 0

Answer:

$3,500

Explanation:

The computation of Dorothea's recomputed gain is shown below:-

Particulars                                                Amount

Initial Sale price                                        $92,000

Less: Adjusted Cost of Home                ($95,000)

Less: Original Sale Expenses                  ($1,150)

Loss from 1st-time sale                             $4,150

Resold sale price                                     $100,000

Less: Repossessed Cost                          ($87,000)

Less: Improvements Costs prior to

Resale                                                       ($1,100)

Less: Repossession Costs                     ($2,900)

Less: Resale Expenses                           ($1,350)

Gain from Resale of Home                      $7,650

Less: Loss from 1st-time sale                  ($4,150)

Gain from Resale of Home                      $3,500

You might be interested in
During an interview, how would you answer if you are asked a question that would divulge confidential information about your cur
DochEvi [55]
I would politely tell the interviewer that I am not able to answer that question as it would be considered an invasion of personal privacy as per the Privacy Act of 1974, I would then point out that I do my best to always respect the privacy of others, and of course follow all laws and rules as set forth by my employer, and state and federal law. Emphasize to the interviewer, that I am a person who can be trusted.
5 0
4 years ago
Preparing Effective Business Presentations Getting ready for a presentation may cause feelings of anxiety. The best way to reduc
rodikova [14]

Answer:

Answers explained below

Explanation:

1. Option b) Knowing your purpose gives you a clear direction on what to present and how to present. The purpose of clarity leads to quality content that connects with the audience.

2. Option a, b and d

-> We must know the general elements such as age, gender, and education. This generally determines the topic's appeal to the audience and you need to know ways of delivery that will connect with the audience.

-> Further, the idea is that the audience remembers the content and main catch points and not what we will get out of presentation.

5 0
3 years ago
Your elderly grandma tells you: "I haven't been taking my beloved walks because I'm concerned about falling and getting hurt. Se
DENIUS [597]

Answer:

opportunity cost, the elderly woman is alsotaking a cost by not doing nothing as it renounce to doing the walks to obtain safety at home.

Under economics concepts everything has at least one opportunity cost associated with it.

Explanation:

The opportunity cost represent the best alternative we renounce for the given course of action or use of the resources.

In this case not going to walk has the cost walking.

4 0
4 years ago
Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager
Cloud [144]

Answer:  Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.

Explanation:

The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :

  • To manage information security risks to keep them at acceptable levels.
  • Protect information assets.
  • Train public servants, suppliers and stakeholders about the importance of data protection.
  • Monitor compliance with information security requirements.
  • Implement corrective and improvement actions.

Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.

The most common threats are :

  1. Unofficial applications. (Can ask you for permitions and steal your private information)
  2. Public WIFI.(Can enter in to your network and steal your private information)
  3. Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)

Always is important to protect the device with one or several of this advices:

  • Secure access networks.
  • Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
  • Write a security policy. Define which devices can access corporate information.
  • Protect WiFi connections.
  • Protect against malware.

In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.  

The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.

Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).

3 0
4 years ago
Suppose a perfectly competitive market is suddenly transformed into a monopoly (all competing firms are consolidated into a sing
Digiron [165]

just you know what it must be that i think

Explanation:

suppose a perfectly competitive market is sufdenly what think so

5 0
3 years ago
Other questions:
  • The price of strawberries falls from $1.50 to $1.00 per carton and the quantity demanded goes from 100,000 to 200,000 cartons. u
    13·1 answer
  • All professional athletes earn a lot of money. wes plays professional football so he makes a lot of money. what type of reasonin
    10·2 answers
  • Investment in human capital has opportunity costs, but investment in physical capital does not. a. TRUE b. FALSE
    10·1 answer
  • Motor Vehicle Assembly Corporation operates a plant near the border between the United States and Mexico. Due to the location, i
    12·1 answer
  • A company purchased factory equipment for $350,000. It is estimated that the equipment will have a $35,000 salvage value at the
    15·1 answer
  • Which statement best describes the AICPA ethics rules relating to a member's failure to file his or her personal tax return in a
    8·1 answer
  • Harrison, Inc. acquires 100% of the voting stock of Rhine Company on January 1, 2010, for $400,000 cash. A contingent payment of
    7·1 answer
  • Sorensen Systems Inc. is expected to pay a $2.50 dividend at year end (D1 = $2.50), the dividend is expected to grow at a consta
    10·1 answer
  • 1) Please give an example of a market that comes close to being considered perfectly competitive.2) What does it mean when firms
    5·1 answer
  • Viết lý do chọn đề tài hay về chiến lược xúc tiến của công ty grab
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!