They both could be working together to find out how and when the truck driver would have fallen asleep and what could have caused him to fall asleep. Next, they could both figure out if the ammonia was in sealed containers and if not why. You could even come to the conclusion of the ammonia could have leaked from the containers and exposed the driver putting him to sleep.
Answer:a company's ability to utilize money and workforce when producing goods or offering a service.
Explanation:
Answer: Discussing about the services and inexpensive items in the menu.
Explanation: In the given case, Leila's target customers are the students in college campus. The college students do not have a lot of money to spend. Therefore, she should inform the audience about the inexpensive items in the menu that they can purchase.
She can also persuade them by telling them the services provided by cafe. The nearness of the cafe from the campus could save time of the students, thus it could be a good point to attract the students.
Answer:
COGS overstated for 5,000
Explanation:
<em>The COGS will be overstated for the same ammount,</em> that is because of the inventory identity.

If ending Inventory has a problem, it will be transferred to COGS as well to equalize the formula
If ending Inventory is understated it means their alue is less than it's real value,

so to balance the formula COGS need to be overstated.

Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.