Which of the following is not true of activity cost drivers?
A. They are used in Stage 2 cost allocations.
B. They are measures of the underlying activity that occurs in each activity cost pool.
C. They are strictly volume-based allocation measures.
D. They ideally have a cause and effect relationship with underlying activities.
Answer: C
You might also like to view...
Suppose a discount bond costs $5,000 today and pays off some amount b in one year. Suppose that b is uncertain according to the following table of probabilities: b:$5,000 $5,500 $6,000 $6,500 $7,000 Probability:0.1 0.2 0.3 0.2 0.2 ? a.Calculate the return (in percent) for each value of b. (Note: you may just calculate the total return and not worry about how this is split up between current yield and capital-gains yield.) b.Calculate the expected return. c.Suppose an investor has a choice between buying this security or purchasing a different security that also costs $5,000 today, but pays off $5,500 with certainty in one year. How is an investor's choice of which security to purchase related to her degree of risk aversion?
What will be an ideal response?
Which is correct?
A. If a service desk analyst is aware of a customer using an unauthorized, unlicensed software package for a critical assignment, the analyst should let the customer use the package until the assignment is over and instruct the customer to not use the package again. B. If a customer is late in completing a critical assignment, a service desk analyst may reset his password without proper authorization as long as he logs a ticket and indicates that he has bypassed the proper procedures in the comments field. C. If a new employee has started work, and his user id and password have not been created yet, a service desk analyst should let the new employee sign in using a coworker's id for a maximum of 3 days and log a request to create an id and password for the new employee. D. If a senior level manager, trying to complete a critical project, requests access to data to which he is not authorized to access, a service desk analyst should log the request and follow the proper procedures for granting access.
Which of the following is sometimes considered to be a sixth-S?
a. Scrap b. Satisfaction c. Self-awareness d. Safety
A company borrowed $10,000 by signing a 180-day promissory note at 9%. The maturity value of the note is: (Use 360 days a year.)
A. $11,800 B. $10,900 C. $10,075 D. $10,300 E. $10,450