Answer:
1. Drawings A/c. dr. 15,000
To Cash A/c. 15,000
2. Cash A/c. Dr. 63,000
To Sales A/c. 63,000
3. Drawings A/c. Dr. 12,000
To Cash A/c. 12,000
4. Purchases A/c. Dr. 31,000
To Creditors A/c. 31,000
5. Drawings A/c. Dr. 16,000
To Purchases A/c. 16,000
6. Dalip Singh A/c. Dr.35,000
To Sales A/c. 35,000
7. Rent A/c. Dr. 22,000
To Bank A/c. 22,000
8. Purchases A/c. Dr. 19,000
To Cash A/c. 19,000
Answer:
The correct answer is C. the difference between the highest price a consumer is willing to pay and the price the consumer actually pays.
Explanation:
Consumer surplus arises from the law of diminishing returns. This means that the first unit to acquire we value it highly but as we acquire additional units our valuation falls. However, the price we pay for any unit is always the same: the market price. In this way, we enjoy a positive surplus of the first units we acquire until we reach the last one in which the surplus will be zero.
In graphic terms, consumer surplus is measured as the area below the market demand curve and above the price line. The demand curve measures the amount consumers are willing to pay for each unit consumed. Then, the total area below the demand curve reflects the total utility of consumption of the good or service. If the price we pay for each unit is subtracted from this area, the consumer surplus is obtained.
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.
Answer:
Topic: Customer focused Listening Workshop
Explanation:
Begin with the introduction of who is a customer and the definition of terms or words like listening and focused.
Thereafter, highlight the various types or categories of customers and their various behaviors. Back it up with possible images or signs that represents their various behavioural pattern
Then proceed to explain the ways to listen to them and get them in order to get them to purchase or secure their loyalty to your product and services.
Also explain how glistening to a customer could have its pros and cons in terms of been positive and negative to your product and services.
Coin out a question such as 'How would you manage a customer with temperament, such that you must get him to patronize your product or services using the listening approach?'
Do a small group session to discuss the above question for about five minutes and make them to report back to the general house.
Take some moment to do a final summary, conclusion and recommendations before closing the workshop.