Answer:
c. $40,000
Explanation:
Reduction in Account Receivables $500,000
($2,500,000 * 20%)
<u>* Interest rate 11% </u>
Annual saving $55,000
Less: Annual cost of system <u>-$15,000</u>
Pretax Net annual savings <u>$40,000</u>
Answer and Explanation:
The Journal entry is shown below:-
1. Sales revenue Dr, $226,700
To Income revenue $226,700
(Being close accounts with credit income balances is recorded)
2. Income revenue Dr, $134,010
To Sales discount $4,410
To Cost of goods sold $129,600
(Being close accounts with debit expenses account is recorded)
<h2>Joshua would lose and Sue would benefit from unanticipated inflation.</h2>
Explanation:
- Both Joshua and Sue are associated with fixed pension and fixed interest respectively.
- Now the value of money goes down due to inflation
- So to live as usual, Joshua need to spend some extra money. But considering the fixed income, it's a lose to Joshua
- Whereas Sue is associated with fixed interest of mortgage. She is benefited because, though the inflation has changed the value of all other products, but the fixed interest rate does not change.
- "Fixed-rate mortgage holders are inflation winners", says "Thoma, professor of economics at the University of Oregon"
Answer:
Before issuing the note
Current ratio
= <u>Current assets</u>
Current liabilities
= <u>$502,000</u>
$274,000
= 1.83: 1
After issuing the note
Current ratio
= <u>$538,400</u>
$274,000
= 1.96:1
Explanation:
Current ratio is the ratio of current assets to current liabilities. Before issuing the note, current assets amounted to $502,000 while current liabilities were $274,000. After issuing the note, current assets increased to $538,400 as a result of $39,400 received on note issue. This increases the current ratio from 1.83 to 1.96.
Answer:
By practicing simulated cyber attacks. They help in improving the security and firewall of organization thereby enhancing their resistance to cyber infiltration.
Explanation:
Organizations may often intend to evaluate and their degree of vulnerability and test their security standard, hence, they employ the use of a simulated threat pattern whereby the red team act as a threat by using several infiltration techniques usually used by actual infiltrators, the blue team on the other hand acts to repel the advances of the red team by implementing security protocols and architecture capable of neutralizing the simulated attacks of the red team. This way organizations beef up their security in other to forestall actual potential attacks against capable of invading their information and digital systems.