Answer:
easy
Explanation:
1. address
2. greeting
3. reason for this letter
4. in 2 paragraph state what u want
5. conclusion
6. end greeting
Answer:
The correct answer is letter "C": Positive confirmations.
Explanation:
Positive confirmations are audit procedures by which ambiguous information is clarified. It also implies the confirmation of the accuracy of the data provided in the company's books and Financial Statements. By doing so, liabilities, bank accounts, accounts receivables and payables amounts are verified.
Answer:
a. Value.
Explanation:
The opportunity cost of a choice is the value of the opportunities lost.
In Economics, Opportunity cost also known as the alternative forgone, can be defined as the value, profit or benefits given up by an individual or organization in order to choose or acquire something deemed significant at the time.
Simply stated, it is the cost of not enjoying the benefits, profits or value associated with the alternative forgone or best alternative choice available.
Hence, the opportunity cost of a choice is the benefits that could be derived in from another choice using the same amount of resources.
<em>For instance, if you decide to invest resources such as money in a food business (restaurant), your opportunity cost would be the profits you could have earned if you had invest the same amount of resources in a salon business or any other business as the case may be.</em>
Answer:
A learning and effectiveness paradigm is not in place
Explanation:
Managers are more likely to employ people of like manners that will always follow the dame line of thought with them , an act that is not seen as a good practice as diversity of human resources can always bring out the best practice.
One of the tools of managing diversity towards achieving plurality in organisation is a learning and effectiveness paradigm.
It is a tool used in integrating diverse personality , beliefs and attitudes in an organization.
The answer is "conduct a penetration test".
A penetration test, informally known as a pen test, is an approved simulated assault on a PC framework, performed to assess the security of the framework. The test is performed to recognize the two shortcomings, including the potential for unauthorized parties to access the framework's features and information, and additionally its strength, empowering a full risk assessment to be done.