Answer:
A.rose making the interest rate fall
Explanation:
According to the liquidity preference theory developed by John Keynes, if the money supply rises, price level also rises, interest rate falls. If interest rate falls, the price of bond rises which would increase capital gains. People would prefer to hold bonds instead of money, therefore, investment spending would rise.
The liquidity preference theory states that we hold money for transactive, speculative and precautionary motives.
Answer:
It should be greater than $36
Explanation:
The opportunity cost of working is the amount of money sacrificed or could have earned if the individual was not working. In this case, Claire has decided to go with her friend which means that the opportunity cost of not working is less than the benefits receives from going out. Because she is not working it means that the opportunity cost of working is more than 36 dollars, which is the income she could have earned in 3 hours.
Fixed cost remained constant regardless of how many products are sold. Fixed cost is a cost behavior which always emerged regardless of the quantity product sold. Machine depreciation expense, insurance expense, and rent expense are several examples of this cost behavior. On the contrary, variable cost is an another type of cost behavior that changes relating to the quantity of the sold product.
Answer:
High
Low
Explanation:
When a company borrows funds it has opportunity to avail tax shield on the interest amount of the borrowing fund. If the company borrows more fund then the discounted value of tax shield will increase while the financial distress cost will decrease.
Answer:
B.
Explanation:
Threat Modeling is the process of identifying and optimizing network security. This practice helps to find the possible threats to confidential information.
<u>Threat Modeling is used to protect the systems. In this practice, the consultant identifies the enterprise's assets and analyze the work of all applications. Then it sets the security profile on all applications and documenting adverse effects of it</u>.
In the given scenario, the consultant will use the tool or technique of threat modeling to identify the potential attackers.
So, the correct answer is option B.