Determine the amount of liability insurance premiums for the following automobile insurance problems using the tables.Automobile Liability Insurance Base Annual Premium

Bodily Injury Coverage
Territory 1
Territory 2
Territory 3
25/50
$86
$97
$120
50/50
$88
$101
$125
50/100
$90
$103
$129
Automobile Liability Base Annual Premiums
Property Damage Coverage
Territory 1
Territory 2
Territory 3
$15,000
$83
$95
$100
$20,000
$85
$97
$103
$25,000
$86
$99
$104
$50,000
$87
$101
$107
$100,000
$90
$103
$108
Automobile Insurance Multiples of Base Annual Premium
  Pleasure; Less Than 3 Miles to in Work Each Way
Drives to Work 3 to 9 Miles Each Way
Drives to Work 10 Miles or More Each Way
Used in Business
Mature drivers
All others
1.00
1.10
1.40
1.50
Young females
Age 16Age 20
1.401.05
1.501.15
1.801.45
1.901.55
Young males (married)
Age 16Age 20Age 21Age 24
1.601.451.401.10
1.701.551.501.20
2.001.851.801.50
2.101.951.901.60
Young males (unmarried not principal operator/owner)
Age 16Age 20Age 21Age 24
2.051.601.551.10
2.151.701.651.20
2.452.001.951.50
2.552.102.051.60
Young males (unmarried and owner)
Age 16Age 20Age 21Age 24Age 26Age 29
2.702.552.501.901.501.10
2.802.652.602.001.601.20
3.102.952.902.301.901.50
3.203.053.002.402.001.60
Driver classification: Female, 30, drives 12 miles to workLiability coverage: 50/50/25Territory: 3The answer is $__________.

Fill in the blank(s) with the appropriate word(s).


320.60

Computer Science & Information Technology

You might also like to view...

Large organizations were the first to take on the challenge of implementing enterprise resource planning (ERP).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

With C++11 and higher what data type can you use to guarantee that 32 bits will be used to store a signed integer?

What will be an ideal response?

Computer Science & Information Technology

A ________ helps create objects using a step-by-step process

A) file extension B) wizard C) shortcut D) template

Computer Science & Information Technology

Which of the following is NOT a potential security issue with archiving systems?

A. Inadequate logging by the archiving software B. Weak access controls on the archive servers leading to stolen data C. Over reliance on a single form of media D. Inability to retain inactive data for regulatory or organizational requirements

Computer Science & Information Technology