1. The missing amounts should be determined in the following manner:
On Company A. Materials inventory December 1 Materials inventory December 31-+Materi also purchased -Cost of direct materials
Off Company Total manufacturing costs incurred in December -Direct labor Cost of direct materials used in production -Factory
2. On Company's statement of goods manufactured should be prepared as follows:
On Company Statement of Goods Manufactured For the Month of December 2016 Materials inventory December 1 Add: Purchases Total
3. On Company's income statement should be prepared as follows:
On Company Income Statement For the Month of December 2016 Sales 1,127,000 827.400 299,600 Less: Operating expenses 117,600.
Learn more about income statements at
brainly.com/question/24498019
#SPJ4
Answer:
b. $288,000
Explanation:
Data provided
Beginning retained earning = $256,000
Net income = $44,000
Dividend = $12,000
The computation of retained earnings balance is shown below:-
Retained earnings balance = Beginning retained earning + Net income - Dividend
= $256,000 + $44,000 - $12,000
= $288,000
Therefore for computing the retained earning balance we simply applied the above formula.
Answer:
Allocation rate Machining= $50 per machine hour
Explanation:
Giving the following information:
Estimated Machining cost= $4,000,000
Estimated Number of machine hours= 80,000
<u>To calculate the allocation rate for the Machining department, we need to use the following formula:</u>
Allocation rate Machining= total estimated costs for the period/ total amount of allocation base
Allocation rate Machining= 4,000,000 / 80,000
Allocation rate Machining= $50 per machine hour
<span>Zenmap identifies risks, threats, and vulnerabilities while Nessus uses a vulnerability scan to assess where loop holes are, and where the system is fragile. These two software's results can be compared. Nessus also provides a way through a patch or update to repair vulnerability. So basically Zenmap spends most of it's time in the host to give information to Nessus on where the vulnerabilities are to be further analyzed and find solutions to the problem.</span>