Answer:
a) dollar amount of the gross profit = 17000
b) dollar amount of the income from operations = 11700
c) dollar amount of the income before income tax = 11900
d) dollar amount of the net income = 8400
Explanation:
(a) Gross profit:
= Sales - Cost of goods sold
= 50,000 - 33,000
= $17,000
(b) Income from operation:
= Gross profit - Bad debt expenses - other operating expenses - Selling and administrative expenses
= $17,000 - $100 - $500 - $4,700
= $11,700
(c) Income before income tax:
= Income from operation + Interest Income and Other Non-operating Revenues
= $11,700 + $200
= $11,900
(d) Net income:
= Income before income tax - Income tax
= $11,900 - $3,500
= $8,400
Answer:
C. straight back chairs will be overcosted
Explanation:
Miller Company makes two types of chairs. One of the chairs is a rocking chair. The other is a straight-back chair. Both chairs are made by hand. Miller Company uses a company-wide overhead rate that is based on direct labor hours to assign overhead costs to the two products. If Miller automates the production of straight-back chairs and continues to use direct labor hours as a company-wide allocation basis:
A. rocking chairs will be undercosted
B. There should be no impact on unit cost
C. straight back chairs will be overcosted
D. rocking chairs will be overcosted.
EXPLANATION
If Miller automates the production of straight-back chairs and continues to use direct labor hours as a company-wide allocation basis then the straight back chairs will be overcosted<u> because the automation process directly implies that it no longer drives labor hours since it is no longer made by hand.</u>
Automated processes should use machine hours rather than labor hours, for the allocation of its overhead.
Answer:
Tolerance
Explanation:
Risk tolerance: It is defined as level of risk that an organization is willing to take for completing any specific task. Evaluating the risk in the trade off between perfect security and unlimited accessibility as risk of security breach is still there instead of perfect security as there is unlimited accessibility, however, how much risk can be tolerated or accepted need to be evaluated and can be mitigated.
There are different technique been used to minimize the risk factors are:
- Avoidance.
- Reduction.
- Sharing.
- Retention.