Answer:
The correct options are I and II
Explanation:
A debit card is the kind of payment card, which deducts the money directly or straight away from the checking account of the customer in order to pay for the purchase.
These cards also referred to as the check cards, which offer the person , the convenience of the credit cards as well as many of the customer protections. So, it could be used when the person involve in withdrawal of money from ATM and at point of sale, where the transaction is finalized and the customer tenders the payment in exchange of the service or good.
Answer: As far as business is concerned, the most popular ownership structure in the U.S. is SOLE PROPRIETORSHIP.
Explanation:
Sole proprietorship is the form of business that is owned by a single person, it is easy to form and the business owner exercises total control over their business.
The business owner is solely liable for losses made in the business, and also enjoys all the profits of the business alone.
Usually this kind of business will mostly end with the death of the business owner.
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.

Answer:
1. False
2. True
3. False
4. False
5. True
6. True
Explanation:
1. False: Investment spending is spending on financial assets like stocks and bonds.
2. True: Transfer payments are not counted in the calculation of GDP.
3. False: If the nominal GDP increases then the economy is definitely experiencing inflation.
4. False: An economy is not at full employment unless there is no unemployment.
5. True: Countries that have generous unemployment benefits tend to have higher natural rates of unemployment. 6. True: Lumberjacks are structurally unemployment when they are replaced by machines.