subject
Business, 08.07.2019 14:00 Dragonskeld

Which technology will a business use to identify unauthorized access to intranet sites or files by its employees? a: augmented realityb: automationc: computer forensicsd: real-time analytics

ansver
Answers: 1

Another question on Business

question
Business, 21.06.2019 21:00
Jameson manages a well-known cell phone company. this company has been voted as having the best cell-phone service. consumers appreciate the fact that they can call from almost anywhere in the world and the service still gets through. jameson knows that the company's product far surpasses that of the competition. one thing has been bothering him, though. in order to put so many resources into ensuring the best service, jameson has cut back on employees at the firm's customer call center. recently, consumers have begun complaining about long wait times when they call in with a problem or concern. although its cell phone service is still considered one of the best, customer satisfaction with the firm's customer service has plummeted. jameson does not understand why consumers are getting so upset. he believes the exceptional cell phone service more than makes up for long waiting periods and other issues with its customer service. "after all," he says, "they can't have it all. if i invest more in customer service, that means less investment on ensuring the quality of our product offering."refer to scenario. jameson has asked you, a marketing consultant, to give him advice. he cannot understand how a cell-phone company with the best product offering in the cell-phone service industry could get such low satisfaction ratings simply because the customer service is not up to par. you suggest that jameson has a narrowly defined view of the company's product offering. you tell jameson that successful marketers should define their products as what they
Answers: 2
question
Business, 22.06.2019 11:40
Zachary company produces commercial gardening equipment. since production is highly automated, the company allocates its overhead costs to product lines using activity-based costing. the costs and cost drivers associated with the four overhead activity cost pools follow: activities unit level batch level product level facility level cost $ 64,800 $ 27,730 $ 15,000 $ 154,000 cost driver 2,400 labor hrs. 47 setups percentage of use 11,000 units production of 780 sets of cutting shears, one of the company’s 20 products, took 240 labor hours and 7 setups and consumed 15 percent of the product-sustaining activities. required: (a) had the company used labor hours as a company wide allocation base, how much overhead would it have allocated to the cutting shears? (b) how much overhead is allocated to the cutting shears using activity-based costing? (c) compute the overhead cost per unit for cutting shears first using activity-based costing and then using direct labor hours for allocation if 780 units are produced. if direct product costs are $150 and the product is priced at 30 percent above cost for what price would the product sell under each allocation system? (d) assuming that activity-based costing provides a more accurate estimate of cost, indicate whether the cutting shears would be over- or underpriced if direct labor hours are used as an allocation base. explain how over-or undercosting can affect vaulker's profitability. (e) comment on the validity of using the allocated facility-level cost in the pricing decision. should other costs be considered in a cost- plus pricing decision? if so, which ones? what costs would you include if you were trying to decide whether to accept a special order?
Answers: 1
question
Business, 22.06.2019 11:40
Vendors provide restaurants with what? o a. cooked items ob. raw materials oc. furniture od. menu recipes
Answers: 1
question
Business, 22.06.2019 13:30
The purpose of safety stock is to: a. eliminate the possibility of a stockout. b. control the likelihood of a stockout due to variable demand and/or lead time. c. eliminate the likelihood of a stockout due to erroneous inventory tally. d. protect the firm from a sudden decrease in demand. e. replace failed units with good ones.
Answers: 1
You know the right answer?
Which technology will a business use to identify unauthorized access to intranet sites or files by i...
Questions
Questions on the website: 13722367