Answer:
B) $3,000
Explanation:
Since Laura acquired this property (stocks) by gift, her basis for loss will be $3,000 which is equal to the fair market value at the time she received the gift. If she had made a gain with this transaction, her basis for gain would have been the $4,000 of her father's basis.
Answer:
formed a valid contract because Rachel's outward expressions showed the formation of a contract.
Explanation:
In contract, outward expressions refers to a situation when both parties has directly communicate the terms of a certain transaction and agreed upon it.
The contract is considered as 'valid' and considered to be a verbal agreement as soon as Rachel proposed a price and Julius agreed upon it.
One thing to remember, Even though this contract is considered as valid , it would be hard for Julius to held Rachel accountable to court since he has no way to proof that the verbal agreement has been made.
Answer:
$0.013
0.010724
Explanation:
Given that :
Mean, m = 36500
Standard deviation, s = 5000
Refund of $1 per 100 mile short of 30,000 miles
A.) Expected cost of the promotion :
P(X < 30,000)
Using the Zscore relation :
Zscore = (x - m) / s
Zscore = (30000 - 36500) / 5000
= - 6500 / 5000
= - 1.3
100 miles = $1
1.3 / 100 = $0.013
b. What is the probability that Grear will refund more than $50 for a tire?
100 miles = $1
$50 = (100 * 50) = 5000 miles
Hence, more than $50 means x < (30000 - 5000) = x < 25000 miles
P(x < 25000) :
(25000 - 36500) / 5000
-11500 / 5000
= - 2.3
P(z < - 2.3) = 0.010724 (Z probability calculator)
This question is mainly about YOUR opinion. Many will say that it will, but some will say it shouldn't. This is based entirely on your opinion.
Answer:
1 and 6, 3 and 4, 8 and 9, 2 and 7
Explanation:
1 and 6: For developing IR policy, roles and responsibilities for informatino security must be clearly defined
3 and 4: a single trainer working with multiple trainees is trainees receiving presentation
8 and 9: An online resource for IR can serve as a training case for staff
2 and 7: an unsual pattern in a system log can be risky for the business