Answer:
Correct answer is letter D, $11,000 cost, five-year life and $1,000 salvage value
Explanation:
To compute depreciation expense of an asset using straight-line method of depreciation, the information we needed is 3,
1. cost of an asset
2. life of an asset (in year)
3. residual value (if available)
<em>* residual value of an asset is to be determined by the company, some asset don't have scrap value assigned.</em>
<em />
<em>FORMULA </em>
<em>The difference between the cost of an asset and the expected residual value over the number of years it is expected to be useful.</em>
<em>(cost of an asset - residual value ) / life of an asset</em>
<span>An opportunity cost is the value or benefit that must be given up to acquire or achieve something else. In this case whatever you choose (Coke, Dr.Pepper or 7-UP) everything would be free , at zero cost. This means that the opportunity cost in this case is zero, because the drink is free.</span>
New skills in self-honesty will help your study habits.
Option C
Costly to imitate criteria for sustainable competitive advantage
<h3><u>
Explanation:</u></h3>
Sustainable competitive advantages are business assets, properties, or skills that are hard to replicate or exceed; and render a higher or complimentary long term situation over competitors. A company must produce distinct goals, plans, and methods to create a sustainable competitive advantage.
It needs huge expenditure in time and money to create a brand. It demands very limitedly to destroy it. A good brand is precious because it prompts customers to favor the brand over competitors. A unique product or service increases customer support and is less suitable for a competitor to imitate.
John is responsible for security of his company's new e-commerce server. he wants to ensure that online transactions are secure. He should use transport layer security.
A widely used security technology called Transport Layer Security, or TLS, enables privacy and data security for communications over the Internet. Encrypting communication between web applications and servers, such as when web browsers load a website, is one of the main applications of Transport Layer Security.
The Transport Layer Security protocol achieves its goals primarily through the use of encryption, authentication, and integrity.
Data transfer is protected from third parties by encryption.
Authentication is the process of confirming the identity of the persons sharing information.
Integrity: demonstrates that the data hasn't been altered or falsified.
To learn more about Transport Layer Security click here:
brainly.com/question/15021716
#SPJ4