Answer:
a. Failure to pay penalty = 400
b. Failure to file penalty = $4,000
Explanation:
The monthly rate for failure to pay penalty is 0.5% while the failure to file penalty.
Since it is assumed that there are 30 days in a month, the 35 days after the due date of the return without obtaining an extension from the IRS is will be counted as 2 months regardless of the fact that the second month is just 5 files when she filed.
Therefore, we have:
a. Failure to pay penalty = $40,000 * 0.5% * 2 = 400
b. Failure to file penalty = ($40,000 * 5% * 2) = $4,000
c. Total penalties = (Failure to file penalty - failure to pay penalty for the same period) + Failure to pay penalty = ($4,000 - $400) + $400 = $4,000.
Therefore, the total penalty Isabella will pay is $4,000.
Answer:
C) Situational interviews focus on hypothetical incidents rather on actual work incidents
Explanation:
situational interview give rooms to individual that is going through interview from interviewer to pass across his/ her expertise, talent as well as skills that could be used in overcoming any challenges that come with the job.
Behavior Description Interview on other hand utilize premise which goes that behavior of the past can be use in predicting the future, it uses a techniques that finds out what applicant has done in a kind similar situation in the past. It should be noted that one main difference between situational interviews and behavioral description interviews is that Situational interviews focus on hypothetical incidents rather on actual work incidents
John is responsible for security of his company's new e-commerce server. he wants to ensure that online transactions are secure. He should use transport layer security.
A widely used security technology called Transport Layer Security, or TLS, enables privacy and data security for communications over the Internet. Encrypting communication between web applications and servers, such as when web browsers load a website, is one of the main applications of Transport Layer Security.
The Transport Layer Security protocol achieves its goals primarily through the use of encryption, authentication, and integrity.
Data transfer is protected from third parties by encryption.
Authentication is the process of confirming the identity of the persons sharing information.
Integrity: demonstrates that the data hasn't been altered or falsified.
To learn more about Transport Layer Security click here:
brainly.com/question/15021716
#SPJ4
Answer:
The Final Step is 'post to a trial balance so financial statements can be prepared'
Explanation:
The accounting cycle has, in most theory analysis, 8 steps that will serve to record and process all financial transactions of a company, beginning at the transactions itself and ending at resetting the balance so a new cycle can begin. The steps are:
1) The occurrence of Financial Transactions
2) The record of those transactions in the company journal
3) The summary of all journal’s transactions in the general ledger
4) The calculation of a total balance for all accounts
5) The corrections of error in balances by the bookkeeper
6) The posting of adjustments in all accounts
7) The manufacture of financial statements using the correct balances
8) The close of revenue and expense accounts to open a new cycle
Answer:
Take a look to the following explanation
Explanation:
Reserve ratio ,10%=0.1
Money multiplier=1/reserve ratio=1/0.1=10
If feds sells 1million$ bond the economy reserves increases by 1 million$ and money supply decrease by 10 million $(1*money multiplier).
If fed changes RR to 5% but banks choose to hold another ,5 percent as excess reserve ,then on aggregate actual reserve ratio will be 10%. So money multiplier would remain same,10 and so the money supply