Answer:
Explanation:
Step 1 – Locating and Defining Issues or Problems. ...
Step 2 – Designing the Research Project. ...
Step 3 – Collecting Data. ...
Step 4 – Interpreting Research Data. ...
Step 5 – Report Research Findings.
Answer:
current ratio for MARJORAM = Current asset / current liabilities
= $173,000/ $108,400
= 1.59
Explanation:
step 1 :calculate the total current asset of the company which is calculated below.
current asset
Cash $19,000
Note Receivable 35,000
Account Receivable 48,400
Inventory <u> 70,600</u>
Total <u> 173,000</u>
Note receivable is included in the current asset because its due date is less than 12 months.
step 2 : divide the current asset by the current liabilites in order to determine the current ratio
If peanuts cost .25 per bag, you would divide $10 by .25 to determine how many bags you are able to buy.
Answer:
C. Insurance expense will increase $2,250
Explanation:
On April 1 2016, the following journal entry will be recorded in respect of the premium paid on a one year insurance policy:
Debit Credit
Prepaid Insurance $3,000
Cash $3,000
The year end given in this question is December 31, 2016 and the insurance premium is for one year and since the insurance premium is paid on April 1, 2016, therefore, only expense in respect of 9 months i.e. from April 1, 2016 to the December 31, 2016 will be recognised in this year. Remaining expense of three months will be recognised in the Year ended December 31,2017.
The following Journal entry will be recorded in respect of insurance expense in accounts on December 31, 2016.
Debit Credit
Insurance expense(3,000*9/12) 2,250
Prepaid Insurance 2,250
So the answer will be C. Insurance expense will increase $2,250
Answer:
A. determining the likelihood that vulnerable system will be attacked by specific threats.
Explanation:
When carrying out risk management, it is important to first identify the risks, and then to assess and prioritize the risks in order of likely occurrence, and the find ways to reduce them.
In the <u>risk identification stage, it is important to </u><u>determine what systems are vulnerable and how likely they are to be attacked by specific threats.</u>