Answer:
A
Explanation:
The list contains more weaknesses than strengths
The list of weaknesses are:
Excess manufacturing capacity relative to market; If you are producing more than you are selling then its a weakness
Large inventories; that dont sell its a weakness
Lack of management depth; means that management does not have a proper foundation
Management turnover; if you keep changing management it will affect the company as skilled workers will be leaving
The list of strengths are:
Cost advantages; cost advantage against your competitors is an added strength
Market leadership; having a large market share is equally an advantage
Answer:
A. a computer programmer who starts her own software Company
Explanation:
Entrepreneurship is the process through which new businesses are started. An entrepreneur is a person who takes risks by committing their time and resources to start a business.
The computer programmer is the entrepreneur in this case. She is starting a new software business. Other than her computer skills, she will need to be creative and innovate to develop products that will appeal to customers. She will take all risks of her new business but also stand to enjoy its success.
Answer:
to attract customers or other buissness man that might want to invest
Answer:
The variable maintenance cost per unit would be $8.33 and the total fixed maintenance cost would be $267
Explanation:
The computation of the fixed cost and the variable cost per hour by using high low method is shown below:
Variable maintenance cost per unit = (High maintenance cost - low maintenance cost) ÷ (High level of activity - low level of activity)
= ($1,100 - $600) ÷ (100 direct hours - 40 direct hours)
= $500 ÷ 60 direct hours
= $8.33
Now the fixed cost equal to
= High maintenance cost - (High level of activity × Variable maintenance cost per unit )
= $1,100 - (100 direct hours × $8.33)
= $1,100 - $833.33
= $267
Answer:
Security policy failure
Explanation:
A security policy is a procedure that is to be followed to protect a company from threats, mostly computer security threats and what to do incase of occurrence.
A security policy identifies the business assets and sets up ways to protect them.
When security policy fails it results in results in business losses as is seen in when the National Retailer Target Corporation suffered a major data breach that put at risk the financial information of an estimated 40 million customers, and in 2009 the health care provider Bluecross Blueshield of Tennessee suffered a theft of hard drives when it reported 57 hard drives stolen.