Answer:
The balance will be less than $100 after 44 months payment
Explanation:
In this question, we are asked to calculate the time at which the Balance on a credit card would be less than $100.
To calculate this, we proceed as follows;
The monthly Interest rate = 23.9%/12 = 1.99166667%
Balance after t months = Credit Card balance * [(1 + Monthly interest rate ) * (1- Minimum payment rate)]^t
The credit card balance is $4,000, and the minimum payment rate is 5%
We plug these values into the equation to get;
$4,000 * [(1+1.99166667%) * (1 - 5%)]^t
= $4000 *[1.0199166667 * 0.95]^t
= $4000 * (0.968920836)^t
Balance after t months < 100
$4,000 * (0.968920836)^t < 100
(0.968920836)^t < 0.025
t = 43.9 months = 44 months
Answer:
<u>Relational </u>
Explanation:
Relational power refers to the ability of an individual to form and maintain good relations and alliances with the people around, which benefit in the performance of tasks and operations and also serve organizational interest.
Forming relations a rare ability and not all individuals possess it. Those who do, are able to coordinate with others more effectively and this raises efficiency in an individuals performance.
In the given case, Mark demonstrates great ability of forming bonds and healthy relations with the people around which isn't merely restricted to his own departmental employees and thus he is able to get his job done more effectively. This depicts "relational power" of Mark.
Answer:
A. A credit to Child Care Fees Earned of $4,500.
Explanation:
The journal entry to record this given transaction is given below:
Cash A/c Dr $4,500
To Child Care Fees Earned A/c $4,500
(Being the fees earned is recorded)
As the payment is collected that means cash balance is rise so it debited the cash account and credited the child care fees earned account.
As The monthly fee is $9,000 but we have to determine for 15 days, so it is
= $9,000 ÷ 2
= $4,500
Answer:
Option (D) is correct.
Explanation:
Given that,
Revenue on account = $54,000
Cash collections of accounts receivable = $2,300
Expenses for the period = $52,100
company paid dividends = $450
Net income for the period:
= Revenue on account - Expenses for the period
= $54,000 - $52,100
= $1,900
Therefore, the net income for the period is $1,900.
Answer: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.
Explanation:
The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :
- To manage information security risks to keep them at acceptable levels.
- Protect information assets.
- Train public servants, suppliers and stakeholders about the importance of data protection.
- Monitor compliance with information security requirements.
- Implement corrective and improvement actions.
Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.
The most common threats are :
- Unofficial applications. (Can ask you for permitions and steal your private information)
- Public WIFI.(Can enter in to your network and steal your private information)
- Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)
Always is important to protect the device with one or several of this advices:
- Secure access networks.
- Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
- Write a security policy. Define which devices can access corporate information.
- Protect WiFi connections.
- Protect against malware.
In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.
The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.
Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).