Answer:
<u>December 31, 2018</u>
Debit : Dividend $40,000
Credit : Shareholders for dividends $40,000
Explanation:
When dividends are declared, we Debit an Equity Element - Dividend and Credit the Liability - Shareholders for dividends.
Calculation of this dividend is made on the stockholders in existence at the on a stated date (January 15 in this case) and at par value ($2) as follows :
Dividend = 100,000 x $2.00 x $0.20 = $40,000
Answer:
$1400 U
Explanation:
Total direct materials cost variance = (47,000 actual pounds × $1.20 actual cost per pound) − (50,000 standard pounds × $1.10 per pound) = $1,400 unfavorable
Answer:
Alice's consumer surplus = $5
Jeff's consumer surplus = $16
Nicole's producer surplus = $1
Explanation:
Consumer surplus is the difference between the willingness to pay of a consumer and the price of a good.
Consumer surplus = willingness to pay - price of the good
Producer surplus is the difference between the price of a good and the least price the producer is willing to accept
Producer surplus = price of the good - least price the producer is willing to accept
Alice's consumer surplus = $30 - ($35 - $10) = $5
Jeff's consumer surplus = $20 - [$16 - (0.75 x $16)] = $16
Nicole's producer surplus = $501 - $500 = $1
Answer: C. Promotion
Explanation:
Furs unlimited needs to use the technique of marketing mix called promotion, to give more exposure to their products then get more popular that should result in a incrementation of their sales. The purpose of the promotion is also to capture the customer to obtain brand loyalty.
Answer:
The correct answer is firewall monitoring.
Explanation:
Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.
Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.