Answer:
Firm A will buy all of the firm B's pollution permits. Each one will cost between $100 and $200.
Explanation:
The firm B will gain from the trade of pollution permits. Firm A will need higher pollution permits since it emits 100 tons of chemicals into air and the cost for eliminating each ton is $200. This cost is higher than the cost to Firm B which is $100 only. Firm A will buy all the pollution permits from Firm B and there will advantage for the Firm B to gain from the trade.
Answer:
Artistic Floral Creations has a entitlement philosophy of compensation.
Explanation:
A compensation philosophy is simply refers to a formal statement which documents a company's position about the compensation of its employees.
It is an explanation of the reason for employee payment and it creates a framework for consistency. Employers use their compensation philosophy to attract, retain and motivate employees
Entitlement philosophy of compensation therefore assumes that the employees who have worked for another year in a company are entitled to pay increases, regardless of their performance differences. This action is often geared towards a higher job performance, and job satisfaction.
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.