Answer:
The total amount of paid-in capital is $552,000
Explanation:
The computation of the total amount of paid-in capital is shown below:
= Issue of common stock + issue of preferred stock
where,
Issue of common stock = Number of shares × issued price
= 20,000 shares × $18 per share
= $360,000
Issue of preferred stock = Number of shares × par value
= 1,200 shares × $160 per share
= $192,000
Now put these values to the above formula
So, the value would equal to
= $360,000 + $192,000
= $552,000
Answer:
1. $714.798
2. $66.402
3. $141.484
Explanation:
1. Gross pay = 62 hours worked x $14.00 per hour
= $868
Net paycheck = Gross pay - Tax
= 868 - [(868) x (6.2%+1.45%+10%)
= $868 - $153.202
= $714.798
2. Employer's payroll tax expense = (6.2%+1.45%) x 868
= $66.402
3. Jim's employer's total payroll tax liability for the period.
868*6.2% (FICA taxes - Employee) + 868*6.2% (FICA taxes - Employer's share) + 868*1.45% (Medicare taxes - Employee) + 868*1.45% (Medicare taxes - Employer's share) + 868*10% (Withholding tax).
= 53.816 + 53.816 + 12.586 + 12.586 + 8.68
Total = $141.484
Answer:
Availability Section
Explanation:
All the information in a job application needs to be very detailed and with little to no room for interpretation. This is because a job application is a one-time deal meaning you do not get to redo it once you turn it in. If the hiring manager does not understand something in the job application they will simply throw it away and pass on to the next application on the list, they will not waste time on it. Therefore, the only thing that can be abbreviated would be the Availability Section when dealing with days of the week. Instead of spelling out every day you can say any of the following...
Mon, Tue, Wed, Thu, Fri, Sat, Sun
Sat-Sun
Mon-Fri
Answer: false
Explanation:
Vulnerability assessment is defined as the systematic and methodical evaluation of security posture of the enterprise. It is used to expose the assets to the things that can harm them.
The steps that are involved in vulnerability assessment are the identification of asset, threat evaluation, the vulnerability appraisal, the risk assessment and finally the risk mitigation.
Therefore, the question is false