1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
2 years ago
5

Isabella wants to gather competitive intelligence (CI) on toy manufacturers before she launches her toy company, which has devel

oped remote-controlled dinosaurs. Her dinosaurs are designed for children over 6 years old. Isabella plans to check some noncomputer sources. She could use all of the following sources EXCEPT _______.
a. Ci consultants
b. industry experts
c. suppliers
d. scanner research
Business
1 answer:
ser-zykov [4K]2 years ago
3 0

Answer:

d. scanner research

Explanation:

The scanner research includes the data analyze that collected via scanning the devices and same is applied at the time of purchase. It is the type of the computer based research and she wants to check that non-computer sources

So the other options would not be considered as they are doing for the research purpose

But the above option is not considered for the same

Therefore the option d is correct

You might be interested in
Now suppose that Rowe has an argument with her husband and wants to withdraw, and what effect would it have on the LLC?
ratelena [41]

A limited liability business enterprise (LLC) is a business structure allowed with the aid of state statutes. every nation might also use exclusive guidelines, you should check with your nation if you are interested in beginning a constrained legal responsibility enterprise. proprietors of an LLC are called contributors

The nation of Oklahoma, like almost every different nation, has an agency earnings tax. In Oklahoma, the corporate tax is a flat 6% of Oklahoma taxable profits. if your LLC is taxed as an employer you may need to pay this tax. The kingdom's company income tax goes back (shape 512) and is filed with the Oklahoma Tax fee.

To begin an Oklahoma LLC you may want to record the Articles of a corporation with the Oklahoma Secretary of state, which costs $one hundred. you could practice online, by way of mail, or in character. The Articles of the corporation is the felony record that officially creates your Oklahoma limited legal responsibility employer.3 days in the past.

Learn more about LLC here:

brainly.com/question/9503055

#SPJ9

4 0
1 year ago
On December 31, 2021, Coolwear Inc. had balances in Accounts Receivable and Allowance for Uncollectible Accounts of $48,000 and
Reil [10]

Answer:

$3,325

Explanation:

Bad Debt Expense = Allowance for uncollectible accounts 2022 - (Allowance for uncollectible accounts 2021 - Written off in accounts receivable

Bad Debt Expense = $4,100 - ($1,400 - $625)

Bad Debt Expense = $4,100 - $775

Bad Debt Expense = $3,325

So, the bad debt expense for 2022 would be $3,325.

6 0
2 years ago
Many companies use the Internet to allow consumers to design customized products; for example, Nike allows customers to order sh
Alja [10]

Answer:

The correct answer is A. micro-marketing.

Explanation:

In micro marketing strategy marketers give their advertising ans selling efforts on a small group of tightly targeted consumers.

For example, the market can be grouped into small groups based on a commitment to a product class or readiness to purchase a given brand.This grouping can be based on following aspect of customers

1). Locayion

2). Relationships

3). Job Title

4). Industry

5). Size

5). Customer Needs

6). Brand Loyalty

7). Customer Recovery

8). Price Sensitivity

Nike allows customers to order shoes with custom color combinations is a type of need based micro-marketing.

4 0
3 years ago
Which of the following warning signs could mean receipts are being pocketed before being deposited? A. missing documents or gaps
Natasha_Volkova [10]

Answer:

D. a difference between daily bank and cash balance

Explanation:

Once receipts are made, they will be recorded in the organisation or company's cashbook thus increasing the cash balance. If the receipts are not deposited into the bank account, there will be a difference between the cash and bank balance. Pocketing receipts in this manner is an example of a fraudulent activity.

8 0
3 years ago
Frankenstein Electric has a capital structure that consists of 60 percent equity and 40 percent debt. The company's long-term bo
Alexeev081 [22]

Answer:

Kd = 7%

Ke =      D1      +  g

        Po(1 - FC)

Ke =      $2            + 0.09

        $40(1 - 0.15)

Ke =       $2      +  0.09

              $34

Ke = 0.1488 = 14.88%

WACC = Ke(E/V) + Kd(D/V)(1-T)

WACC = 14.88(60/100) + 7(40/100)(1 - 0.40)

WACC = 8.928 + 1.68

WACC = 10.6%

Explanation:

In this case before-tax cost of debt is given. Cost of equity is expected dividend divided by current market price after flotation cost plus growth rate. WACC is calculated as cost of equity multiplied by the proportion of equity in the capital structure plus after-tax cost of debt multiplied by proportion of debt in the capital structure.

8 0
3 years ago
Other questions:
  • Matt and Meg Comer are married and file a joint tax return. They do not have any children. Matt works as a history professor at
    7·1 answer
  • Which type of account typically has low liquidity?
    13·1 answer
  • Kate is a florist. Kate can arrange 20 bouquets per day. She is considering hiring her husband william to work for her. Together
    11·1 answer
  • The owner’s equity section of the balance sheet for the Blue Top Taxi Company shows that
    14·1 answer
  • When buying component parts, risk does not include:?
    6·1 answer
  • PLEASE HELP AS FAST AS POSSIBLE MAKE SURE ANSWERS ARE CORRECT/RIGHT.
    12·1 answer
  • How does PESTLE help your strategic development team?
    5·1 answer
  • Who is down for a Amazon card trade for steam gift card
    8·2 answers
  • What is the difference between an increase in supply and an increase in quantity supplied?.
    12·1 answer
  • What is the process of giving keys to a third party so that they can decrypt and read sensitive information?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!