Answer:
d. Enrique subscribes to the "bird in the hand "theory when it comes to dividends
Explanation:
Cash that is ready to use is better than having other assets that need to be converted into cash to be enjoyed later. This is the simple explanation of the "bird in the hand" theory. An investor who subscribes to this theory will highly likely prefer a cash dividend over a stock dividend.
Answer:
Explanation:
There are two things that Aaron can do to make sure of this. The first is to make the office wheelchair-friendly. Meaning installing ramps in the necessary places so that the candidate can easily traverse the office and get to and from the places she needs easily and by herself. The second thing that Aaron can do is make sure that the candidate's abilities are better than the other candidates. These skills will make her an asset because she will be able to bring insight and experience that the other candidates would never be able to.
Answer: b. $30; $20; $0
Explanation:
<em>Admission prices to Dollywood are $50 for a one-day ticket, $80 for a two-day ticket, and $100 for an annual pass. Based on these prices, the marginal cost of visiting Dollywood the second day is </em><em><u>$30</u></em><em>, the third day is </em><em><u>$20</u></em><em>, and the fourth day is </em><em><u>$0.</u></em>
The marginal cost is the extra cost per day of going to Dollywood.
Second day
Marginal cost = Second day price - First day
= 80 - 50
= $30
Third day
Marginal cost = Third day price - Second day
= 100 - 80
= $20
Fourth Day
Marginal cost = Fourth day price - third day
= 100 - 100
= $0
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
