Answer:
total value of ending WIP inventory: 8,400
Explanation:
unit material cost: 5.00 dollar
ending work in proces inventory
materials equivalent units:
1,500 x 100% = 1,500
as the mateirals are added entire at the beginning of the process:
material cost: 1,500 x 5 = 7,500
conversion
1,500 x 20% = 300
300 x 3.00 = 900
total value of ending WIP inventory:
materials 7,500
conversion 900
total 8,400
Answer:
a)
P 175
Q = 250
Profit6,250
b)
P 325
Q = 875
Profit 153,125
c)
Q = 1200
P = 260
Profit = 287,000
Explanation:
It maximize profit at MR = MC
MR = 200 - 0.2Q
MC = 150
150 = 200-0.2Q
Q = 50/0.2 = Q = 250
Price:
250 = 2000 - 10P
P = 1750/10 = 175
<u></u>
<u>Profit: revenue - cost</u>
$175 x 250 session - $150 per session = 6,250
<em>At new functions:</em>
150 = 500-0.4Q
Q = 350 / 0.4 = 875
Price:
875 = 2,500 - 5P
P = (2500-875)/5= 325
<u>Profit</u>
(325 - 150) * 875 = 153,125
<u>If cost changes:</u>
cost: 1000 + 20Q
marginal cost: 20
20 = 500 - 0.4Q
Q = 480 / 0.4 = 1,200
Price:
1,200 = 2500 - 5P
P = 1300/5 = 260
<u>Profit</u>
(260 - 20)Q - 1,000 = 287,000
Answer:
The correct answer is $0,20.
Explanation:
The marginal cost, at each level of concrete production, indicates the costs we incurred in carrying out said production. Basically, it is an indicator that will allow us and help to make decisions regarding the preparation and production of goods and services.
In the previous case, the cost of buying two tacos for $ 75 each plus a $ 80 bedid is as follows:
Tacos: $ 75 * 2 = $ 1,50
Drink: $ 80
TOTAL = 2,30
For its part, the second option is priced at $ 2,50
Subtracting the results, the marginal cost is defined as follows:
$ 2,50 - $ 2,30 = $ 0,20
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
