<span>being frequently exposed to drugs would be one of the characteristics.
The exposure could be caused by living on the same neighborhood where the drugs syndicates focus their operation on, Or simply by socializing (hanging out) who use the illict drugs as a form of recreation, which will give us a peer pressure to bow down and follow the habbit.
</span>
        
             
        
        
        
The technology associated with the manufacturing computers has advanced tremendously. This change has led to the price of a computer <u>falling</u> and the quantity <u>increasing</u>.
Lower prices most likely results in a higher demand for the product in question, which will increase the production rate of that product.
        
                    
             
        
        
        
Answer:
Interest payment on bonds payable is a cash outflow from financing activities.
Explanation:
The only statement which is false from the list is : Interest payment on bonds payable is a cash outflow from financing activities.
Interest payment on bonds payable is an expense in the income statement used to determine the income for the year. Net Income falls under the Cash flows from Operating Activities.
 
        
             
        
        
        
Answer:
 a) liabilities only 
Explanation:
The journal entry to record the payroll tax expense is shown below:
Payroll tax expense A/c Dr 
      To Social security tax payable A/c 
      To Medicate tax payable A/c 
      To State Unemployment tax payable A/c 
      To Federal Unemployment tax payable A/c 
(Being the payroll tax expense is recorded)
The payroll tax expense is shown on the debit side of the income statement whereas payroll tax payable is shown on the liabilities side of the balance sheet
 
        
             
        
        
        
Answer:
Role-Based Access Control (RBAC) 
Explanation:
Instead of assigning access for each user account individually, Role-Based Access Control (RBAC) is a more efficient and easier-to-manage approach.
In computer systems security, role-based access control or role-based security is an approach to restricting system access to authorized users. <u>It is used by the majority of enterprises with more than 500 employees,</u> and can implement mandatory access control or discretionary access control. 
Hence, access need not be assigned for each user individually.