1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
10

Me and my best friend.

Business
1 answer:
olasank [31]3 years ago
3 0
Amazing amazing amazing
You might be interested in
Which selection below is not a leadership style
EastWind [94]
Autocratic
All the other options are a type of leadership
6 0
4 years ago
Stone Pine Corporation, a calendar year taxpayer, has ending inventory of $160,000 on December 31, 2018. During the year, the co
bezimeni [28]

Answer:

The answer is $215,000

Explanation:

Cost of goods sold equal:

Opening/beginning inventory plus purchases minus closing/ending inventory

To find beginning inventory at January 1, 2018, lets rearrange the formula:

Cost of goods sold minus plus purchases plus closing/ending inventory.

Cost of sales is $470,000

Purchases is $415,000

Ending inventory is $160,000

Therefore, beginning inventory at January 1, 2018 is

$470,000 - $415,000 + $160,000

=$215,000

3 0
3 years ago
A model of demand predicts that a rise in price will cause a decrease in the quantity of a good consumers want to buy anda in pr
luda_lava [24]

Answer:

Option (a) is correct.

Explanation:

According to the law of demand, there is an inverse relationship between the price of the product and the quantity demanded for that product. Hence, if there is an increase in the price of the good then as a result this will decrease the quantity demanded for the good and if there is a fall in the prices of the goods then as a result the quantity demanded for the goods increases.

Therefore, the change in the price level of the goods represents the cause and its effect is the change in the quantity demanded for the goods that a consumer want to purchase.

8 0
3 years ago
How can the company that purchased the mine better approach the situation?
ddd [48]

The company that purchased the mine better approach the situation by developing a strategy that include all stakeholders.

In the year 2006, giant of the mining industry Xstrata purchased the Tintaya copper mine in Espinar, Peru. There has been a dispute between the community and the mine over issues including land rights,  pollution,  and social responsibility of the mining company. The previous mine owner had established a good dialogue table with the local community. According to many people , when Xstrata took over, the company did not abide by those arrangements which were made by the previous owner.

That is why if Xstrata wants to make better then it should consider the interest of every stakeholder over there.

To know more about Tintaya copper mine here:

brainly.com/question/11045973

#SPJ4

5 0
2 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
REY [17]

Answer:

The correct answer is firewall monitoring.

Explanation:

Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.

Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.

5 0
3 years ago
Other questions:
  • The two attributes that define a threat are
    7·1 answer
  • Alex repairs cars and always needs mufflers. What kind of person does he need to constantly supply him with mufflers?
    8·2 answers
  • Blossom Company reported the following selected information at March 31 Total current assets Total assets Total current liabilit
    8·1 answer
  • PLEASE HELP WILL GIVE BRAINLIEST TO CORRECT ANSWER
    13·1 answer
  • Isaac is looking for a physical access solution for his company. He needs the solution to use asymmetric cryptography or public-
    5·1 answer
  • If you invest $750 every six months at 8 percent compounded semi-annually, how much would you accumulate at the end of 10 years?
    6·1 answer
  • During its first month of operations in March, Volz Cleaning, Inc., completed six transactions with the dollar effects indicated
    13·1 answer
  • If supply-side policies succeed, less output is produced at every price level.
    8·2 answers
  • Following her 18th birthday, Madison began investing $41 at the end of each week in an account earning 5% per year. She plans to
    13·1 answer
  • What are some of the reasons that foreign manufacturers of products as diverse as automobiles, cell phones, and tires might arri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!