Personal Response on ‘Consider the Lobster’

Personal Response on ‘Consider the Lobster’

The article by Wallace clearly outlines the concern in the swift change in the interest of lobster, once considered food for the poor and institutionalized. However, the contemporary world has witnessed drastic interest in lobster, underlined by the famous Lobster Festival in Maine (Wallace 50). The article uses a clear outline to describe the current concerns: Notably, people fail to consider the impact of the lobster festival on the creatures while the rising interest in their consumption can prove threatening to this species. Wallace (56) offers crucial insight on his thoughts about lobsters acknowledging that they are considered as summer foods. However, the concern arises from various issues such as the fact that lobsters should be alive when being put in the kettle. Therefore, the article uses a unique and yet clear approach in outlining the main issue.

The author slowly creates a path before getting to the central theme of the article. The author starts by describing lobsters and what they entail before asking whether it is okay to boil a sentient creature alive to offer people the gustatory pleasure (Wallace 60). Importantly, the author comes up with a practical approach to keep the readers entertained and offers them crucial information about what he intends to talk about before eventually pointing out the main issue. Conclusively, the article manages to remain on topic while relating to realistic things such as outlining the process of watching the lobsters being piled over each other before they are inhumanly boiled. All in all, the author presents an engaging piece on an issue that will have diverse thoughts as numerous people appreciate the festivals.

Work Cited

Wallace, David. Consider the Lobster. Gourmet, 2004, pp. 50-64.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Response to the Article on Healthcare as a Right

Response to the Article on Healthcare as a Right

Gawande looks at one issue that is very hard to group without having opposing factors limiting the argument. A look at healthcare simply outlines the quality of life and access to healthcare services. Conversely, a person would blankly answer that healthcare is a right without paying a lot of attention to some specific conditions. However, Gawande looks at healthcare from a general perspective requiring the readers to have an open mind when deciding whether to group it as a right or not. Importantly, a right fails to distinguish between the deserving and the undeserving, while focusing on healthcare highly insists on looking at people who lack proper healthcare facilities (Gawande). Imperatively, the author offers diverse information on the concept to open people up to extensive ideas.

The author reflects on a visit to Athens, Ohio recalling issues of the Affordable Care Act when the government was still fighting on whether to repeal, replace, or repair it. Ultimately, the author argues that a lot of people still fail to understand whether to define health care as a right or not. Notably, the failure to define it as a right means that it can be withheld while defining it as a right means it will be open to all people and thus there is no special attention paid to the less fortunate or the people who may deserve it more. Notably, the argument by Gawande outlines the essence of health care, making it hard to define it comprehensively. Conclusively, the article recounts diverse thoughts which all point out to the importance of health care whether it is defined as a right or not.

Work Cited

Gawande, Atul, and Atul Gawande. “Is Health Care a Right?” The New Yorker, The New Yorker, 31 May 2018,

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Response to the Spectacular Personal Mythology of Rammellzee

Response to the Spectacular Personal Mythology of Rammellzee

The article on the personal mythology of Rammellzee enacts a unique hook recalling people’s thoughts on graffiti’s ideology. Notably, the author paints a clear image on diverse thoughts of graffiti ranging from its expressive aspect to its destructive one. Importantly, different people always viewed the concept differently, thus outlining how the enactment of art or controlling language ultimately led to the development of the personal mythology of Rammellzee. The article picks off slowly outlining important aspect essential for a clear and concise understanding of the legacy of Rammellzee.

The article points out that Ramm believed that the person who controlled language could steer the thoughts and imaginations of people (Hsu). Importantly, the unique approach in the article keeps the readers interested and attentive to the details that lead to the development of the personal mythology of Rammellzee. Importantly, the article informs that Ramm attained his understanding and perceived legacy by feeding on astrophysics, philology, and medieval history. The article imperatively combines diverse information on the 20th century and comprehensively manages to outline a collaboration between them and the role they played in the life of Ramm. The author insists that a lot of the life story of Ramm from his childhood is unknown and thus insisting that the important aspects of his life were driven from his adulthood. Therefore, the article serves to tell the story of an essential legacy and also helps people reflect on their lives. Conclusively, Hsu tells the story of Ramm and concludes it with intriguing information about the choices he made pertaining his everyday way of life.

Works Cited

Hsu, Hua. “The Spectacular Personal Mythology of Rammellzee.” The New Yorker, The New Yorker, 31 May 2018,

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Disaster Response and Recovery

Disaster Response and Recovery

The policy that will be addressed is the disaster preparedness and recovery policy in Louisiana, Florida and North Carolina. Up to 1950, the law on disaster management has been dependent on natural events. Therefore, it could be tweaked to fit the situation. But there has been no law, and this impeded the planning, financing and execution process. The first law was formed in 1950, making the disaster management response official. After that, the Disaster Relief Act was established in 1966 and added recovery as part of the official US disaster law. FEMA was then formed via executive order in 1979 and was later integrated with Homeland Security in 2002. FEMA is now in charge of disaster preparedness and response in the country, with states left to adopt laws that handle the different disasters in their localities. In 2018, president Trump passed the Disaster Recovery Reform Act to make FEMA processes more manageable, and to increase collaboration between federal, State and local bodies in the disaster preparedness and response program (FEMA, 2018). Louisiana, Florida and North Carolina face many disasters. Thus, they have better disaster preparedness and response programs compared to other states. Specifically, hurricanes have plagued these states, and most of their funding goes into the program.  

In the state of Louisiana, the Robert T. Stafford Disaster Relief and Emergency Assistance Act are primarily followed (GOHSEP, 2018). Once a disaster is declared, it opens doors for federal financial and technical assistance. The local office mostly funds the recovery process, which involves support. Assistance has three steps which are an assessment of the damage done by the disaster, an application for a presidential declaration and a bid for help (GOHSEP, 2018). The damage assessment is essential, because it determines the areas most affected, and the people liable for assistance. The presidential declaration opens doors for aid from the federal government. The state applies a community approach strategy, whereby everyone is brought on board for the recovery and mitigation process. Planning before the disaster, the response process and recovery is dependent on the community, and the state of Louisiana has mastered this process. Specifically, the whole city is involved when the disaster is catastrophic. People are needed to spread the word, help in evacuation and volunteer to help the affected during the recovery process. In Louisiana, the FDRC and the SDRC are responsible for the recovery process. The pre and post planning is done by the two bodies. The NDFR designates community members their roles before and after a disaster.

North Carolina has the North Carolina Emergency Operations Plan (NCEOP) and works along with The National Incident Management System. Here, collaboration is paramount, and the state government works hand in hand with county governments to ensure preparedness and recovery. Local governments have their checklists, but they have to be spearheaded by NCEOP. Counties most affected by hurricanes such as New Hanover have Hurricane Mitigation and Reconstruction Plan. Ideally, each county is supposed to formulate one, but most use the state provided guidelines.  Recovery is a community effort, which involves both government and private support. Private organizations give money to rebuild the states affected by hurricanes, clean up the mess and give out jobs to people who had been displaced from their homes. Similar to Louisiana, this state accepts assistance from the federal government. Federal aid is given to people who deserve after a disaster. The state and local governments help local businesses affected. However, private organizations are not required to help during an emergency. It is the responsibility of the local and national government. If these organizations want to help, they can during the recovery process, but they are not involved in the preparedness process.

Florida has the most massive budget for disaster preparedness and recovery due to the high number of catastrophic events that occur in the state. The state government mostly does funding, and the federal government accepts additional funds. Collaboration is critical, as everyone is involved in the preparedness and recovery process. After a disaster has passed, the Division of Emergency Management does a study, and the findings are used to advise the governor whether to ask for funds. There is a well-coordinated reporting system on disasters in Tallahassee (Florida Disaster Division of Emergency Management, 2018). At this location, coordination is also done on statewide emergency activities. Thus, unlike Louisiana and North Carolina, Florida’s preparedness and recovery process are centralized, and all counties follow one guideline.


Disaster preparedness and recovery were dependent on events before the 1950s. However, the passage of disaster management laws in the 1950s, and 1970s made it possible for specific bodies to take over the overall responsibility of managing disasters. Louisiana, Florida and North Carolina are the most plagued with disasters, which is why they have made the best choice for the analysis. Leadership is under the governor in all states, and they follow federal guidelines. There are localized laws in the counties except for Florida, which has a centralized coordination and communication system. All counties accept federal assistance regarding finances and human resources.


FEMA. (2018). Disaster Recovery Reform Act of 2018. Retrieved Jan 21, 2019, from

Florida Disaster Division of Emergency Management. (2018). Florida Division of Emergency Management. Retrieved Jan 21, 2019, from

GOHSEP. (2018). Governor’s Office of Homeland Security and Emergency Preparedness. Retrieved Jan 21, 2019, from GOHSEP.LA:

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Principles of incident response and disaster recovery

Principles of incident response and disaster recovery


Other means of dealing with security threats and incident response existed long before the introduction of computer technology. People used to respond to unexpected incidents that could affect organizations or a nation at large. Irrespective of the nature of the event, it is always advisable to prepare and respond to an incident that has a negative effect to people. The use of disaster recovery and incident response technologies assists organizations in preparing for unexpected events. Most organizations fail in preparing for incident respond and disaster recovery while conducting their daily businesses. These organizations are not well prepared to offer significance respond to disasters and security incidences. Information security principal takes control of the security information available in a nation or an organization (Federal Information Processing Standard 199; Denning 3-4). Threats to information security are of many forms. Some common these threats found in day-to-day life include: the act of human error, intellectual property, deliberate acts of trespass, software/cyber attacks, forces of nature, technological obsolescence, technical hardware/software failure, and theft (Lewis 2002)

Using incident response and disaster recovery has various steps that should be followed in an effort to address security issues in a country. Understanding the key components in the information technology topic assists in reducing the complexity of the subject for easier elaboration, even by the illiterate people. Information security technology uses of security protection elements that include systems and hardware. The elements use, store, and transmit information necessary for responding to different security threats. (Whitman & Mattord 150-157). The following diagram shows a presentation for the incident response and disaster discovery plan.

Figure 1: incident response and disaster recovery planning diagram

A contingency plan to disaster recovery and incident response

The incident planning and preparation phase is the most critical stage in creating a security response program. This stage combines all the elements in order to prevent any possible instance of an incident occurring, and makes the system ready to respond to any threat. If proper planning of an incident and a disaster recovery method fails, the contingency approaches to disaster controls and response might be ineffective. The disaster recovery and incident response technologies contingency plan makes use of 7 steps. These are:

  1. Developing a contingency plan policy statement
  2. Conducting the Business Impact Analysis
  3. Identifying preventive controls measures for reducing the effects of system disruptions.
  4. Developing recovery strategies
  5. Developing an Information Technology (IT) plan
  6. Conducting plan testing and training.
  7. Maintaining the plan.

The contingency planning policy is established by the executive management that defines the scope of security operations at hand. The planning and preparation phase brings together all the elements aimed at preventing an incident. On the other hand, the planning phase makes the system ready in responding to any event that is likely to occur (ITS Policy Library 1-5; Wright 2001). Form figures 1, several blocks are included in the planning phase. The incident response and disaster recovery plan should consist of responsible teams made of experts in the fields of technology, security, and human psychology. The team number differs with the size of the organization, or the value of assets protected. The team responsibilities include: preventing cyber threats and vulnerabilities; incident prevention, information gathering and analysis; and developing the organizational security policies and procedures in regard to disaster recovery.

Setting policies and procedures is an essential aspect in every organization or government. The responsible teams discuss and weigh different options, while at the same time testing the appropriate approach towards incident response and prevention. The policies should be clearly written and detailed, and tested before implementation. These incident response policies should establish a direct incident response and disaster recovery system capable of responding to all possible threats. In addition, the incident response plan should contain the following key sections. The overview, goals and objectives section defines the expected results, and aims for developing the system. The incident description section classifies the different types of IT incidences likely to bring threats. Other sections include incident notification, incident analysis, communications, and forensics (Nelson, Amelia & Christopher 54-61).

            After the planning and preparation phase, the incident response and planning phase follows. This phase brings together all elements for the prevention of any unseen incident, or preparing the system for any future threats that might occur. On this stage, several building blocks are included. These are the organization of the response team, defining communications between the internal and external parties, and reporting the necessary findings to the top security personnel.  Developing a perfect technical and managerial personnel respond to an incident in an organization takes a lot of resources. A lot of training is required for the response team in order to equip them with the necessary mitigation measures. It is recommended that, the response team be trained in advance to avoid time wastage in case an incident occurs as the team looks for the best prevention measures. In addition, it minimizes the number of decisions made while the attack is in progress because this might accelerate the amount of damage made (Byres, Leversage & Kube 5-8).

In the present, various computer networking systems are used capable of connecting more than two computers. These are LANs, MANs, and WANs. LANs stands for Local Area Networking and connects computers in a single building. LANs enables security personnel to monitor any threats occurring in a specific part of the building and respond accordingly. In addition, the person at the control room can monitor different users in regard to the login details, areas accessed. The system uses high speed networks making it more efficient making use of typical buses or rings (Mitchel 2012).  

MANs stand for Metropolitan Area networks, and generally cover towns and cities. Police use this technology in towns and cities severances. Different cameras are connected to computers where an individual could monitor the operations taking place around the town. This system prevents crimes related to ATM thefts, pick pocketing, shoplifting, and car-jacking. This technology was developed in 1980s and uses optical fibers, and cables to transfer information. The messages delivered through this system are fast and efficient. The system would have been most appropriate in determining the main cause of September 11 plane crash (Mitchel 2012). 

The WANs, Wide Area Networks, cover extremely large areas like states, countries, and continents. Google Earth employs this system since it covers the whole earth giving information from different regions. The circuits are connected by routers capable of gathering information from all round the universe and delivering it to a central location. These systems are very useful in preventing disasters and incidences. Satellites are another example of WANs that gives information regarding the weather (Mitchel 2012). 

The use of disaster recovery and incident response technologies today

            Patch management is a very effective program in incident response and prevention. First, patch management prevents incidents from occurring. Second patch management responds to vulnerabilities and prevents incidences from reoccurring in the future. All incident response and disaster recovery systems should contain patch management program. While selecting the patch management program, the following factors should be considered. The computer operating system should be compatible with the software. The patch should be original and contain the security mark. Moreover, the patches should be tested before installed to check their efficiency and operational values. Testing should occur in a realistic situation to determine any missing element, incomplete or inaccurate systems (Verma, Huang, and Sood 2010).


            Before developing a full incident response and disaster recovery system, there should be efforts made to fix the source of the threat. This includes getting rid of any suspected object, or individual capable of causing a threat, or replacement of vulnerable materials to threats. The use of incident response and disaster recovery technologies has assisted many people. Moreover, organizations safe millions of money from potential threats associated with Information Technology insecurity. The steps provided in table one provides an overview of how an organization should go about responding and preventing disasters and incidences. From the discussion, the following actions are emphasized (Bogart and Guenther 12). First, people should learn from experience in preventing incidences occurring in an organization. Second, an effective response plan should be devised for preparation for any potential incident, made of well described policies and procedures. Thirdly, in case of an incident, a clear assessment of the necessary technological mitigation measures should be used and necessary protective measures used in safeguarding the attacked system. The use of incident response and disaster recovery methods is an essential aspect that every government or sate should incorporate in order to safeguard their properties from potential threats (Denning 12).

Works cited

Byres, E., Leversage, D. & Kube, N. Technical Article: Security incidences and trends in

            SCADA and process industries, 2007.

Bogart, K. and Guenther, M. Risk Assessment, Disaster Recovery, Data Backups, Data

Classification and Incident Reporting. The University of Arizona: Information Security Office, 2002.

Denning, E. D. Information Technology and Security. Georgetown University Press, 2003.

Denning, E. D. Information Welfare and Security, Addisson-Wesley, 1999

ITS Policy Library. Information technology Disaster Recovery Policy. Weill Cornell Medical

            College, n.d. Retrieved from:


Federal Information Processing Standard. Standards for security categorization of federal

            Information and information systems, 2004. Retrieved from:


Lewis, A. J. Assessing the Risks of Cyberterrorism, Cyber War and other cyber

            Threats. Center for Strategic and International Studies, 2002. Retrieved from;


Mitchell, B. Introduction to Network Types (LAN, WAN and Other Area Networks), 2012.

            Retrieved from:


Nelson, B., Amelia P., & Christopher S. Guide to computer forensics and\investigations. 4th ed.

            Boston, MA: Course Technology Cengage Learning, 2010. Print.

Verma, N. Huang, Y and Sood, A. Proactively Managing Security Risk, 2010. Retrieved from:


WCC. IFIP World Computer Congress Workshop. IFIP World Computer Congress.

            Montreal, Quebec, Canada, 2002.

Whiteman, E. M. & Mattord, J. H. Principles of incident response and disaster recovery.

            Boston, Mass.: Thomson Course Technology, 2007. Print

Wright, E. Timothy. How to design a useful incident response policy, 2001. Retrieved from:


Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

In a brief but comprehensive response, define the role of accounting

1 In a brief but comprehensive response, define the role of accounting. (You are required, amongst others, to address accounting information, users of financial information, the accounting process and the role of financial accounting vs. management accounting.) 


Accounting is one of the fastest growing fields in the UAE.  In today’s society, the demand for good accountants for exceeds the supply.  As our country has expanded, business and industry have become more and more complex, so control here is very important.  And control depends on a great deal of the bookkeepers and accountants who can analyze figues and advise management on what should be done.  They are using more scientific ways changing money, figuring change, and collecting sales taxes.  Moreover, department stores and other companies now have plants and offices widely scattered throughout the country.  A new set of bookkeepers and accountants, is needed at each branch.  I know there are many managements supervisory, and junior or senior executive positions are bing filled by people who started as accountants because accountants have the knowledge of methods and finance and comprehension of the fundamentals of business, and accounting is the foundation of sound business.

           The two kinds of accountants, public accountants and private accountants serve different important functions in business organization.  Business enterprises, government agencies, and nonprofit institutions, such as universities and churches more are more likely use public accountant.  They offer their services to the general public on a fee basis in much the same way as do lawyers, doctors, and dentists.  In addition, the larger firms have professional accountants on their staff who work for a salary, but are also considered public accountants.  The two important areas, auditing and tax services are also the job for public accountants.

           In a single business enterprise or nonprofit organization, the main job for private accounts in to handle the finanacial records.  Manufacturing or other concerns are also need accountants, in that situation, they are often called industrial accountants.  In addition, accountants are employeed by all branches of federal state, and local government, including government-owned corporations.  Accountants in private and government work customarily specialize in the performance of a single type of accounting service, they may do any of the types of accounting service just described above.  They also tend to become specialists in a narrow field of employment such as a particular branch of manufacturing, public utilities, or transportation.

2. In general, explain what the statement of comprehensive income (income statement) and statement of financial position (balance sheet) portray about a business entity and briefly discuss what is contained in each statement. 


The balance sheet and income statements are used in financial accounting because they are regarded as the most important financial statements. The Balance sheet lists assets and liabilities of the organization in a given financial period or fiscal year. An income statement was also known as Profit and loss statement and it’s a report for income and expenses over a specific period of time maybe quartile year.

In regard to performance an income statement shows how a company has performed by listing sales and expenses and the resulting profit or loss. A balance sheet summarizes the company’s assets liabilities and shareholders’ equity at a specific point in time to analyze how a company pays for things (Weygandt, Kieso, 2008). Income statements report operating results such as, sales and expenses. This allows investors to evaluate company’s performance and gives a prospect on the way forward. The balance sheet on the other hand presents the strengths of a company which enables investors to factually calculate days of working capital. Balance sheets can also identify trends of how net profit is used, receivables and the payables.

Balance sheets

Balance sheet in organizations helps the managers to know what is in the business (assets) also to know what is not in the business (liabilities). The balance sheet, on the other hand, provides information to the managers on how debts should be paid, and to assess the operations to finance the business.

The balance sheet assists many managers of the business how to make right decisions in the business regarding equipment purchasing in the organization. Business managers also need the balance sheet for deciding on the best credit sources for business by showing accounting equations representations in a physical way.

For the investors, balance sheet is a document which is necessary for review learning to the company to know the total cash amount in hand, and how much does the company owes plus when the payments are to be done. Many investors tends to compare the company’s present balance sheet to find out whether that it has any increased debts, by building up the inventory, and depleting cash which might raise concern. Balance sheets helps government agencies in making sure that businesses are complying to the set laws. It provides information for all the potential lenders in businesses on credit worthiness in the business.


3. Briefly discuss the difference between the cash basis and accrual basis of accounting using the example of rent of 24000AED being paid in advance by Company A for 12 months from 1 September 2014. Company A has a December year end. 


The major variance between cash and accrual basis accounting is the timing when revenue and expenses are to be recognized. The cash method of accounting is used revenue only when the money is received and for expenses only when money is paid out. The accrual method records the revenue when it is earned and expenses goods and services when they are incurred. The revenue is recorded even if money has not been received or if expenses have been incurred but no cash has been paid. 

For the accrual method 24000AED is recorded even if it has not been paid while for the cash method, 24000AED will not be recorded till the amount is paid. 

4.The CEO has described an item in the financial statements of Brave Brands Marketing as “…a present obligation, arising from a past event, the settlement of which is expected to result in an outflow from the enterprise of resources embodying economic benefits.” Describe using accounting terms the above statements.

In finance, a liability can be explained as an obligation of an entity coming from past events or transactions, the settlement of which may come from transfer or use of assets, service provision or other economic future yielding. 

A liability has the following characteristics;

A liability is any borrowing type that a person takes from another person or bank for the aim of bettering his project and is always payable within a set period of time. It is also the responsibility to other people that comprise settlement by future transfer or assets use, service provision, and other transaction yielding an economic advantage. Assets = Liabilities + Owner’s Equity. 

5. You received the following chart:

You need to: 

  1. Arrange these costs in a table that lists factory overhead costs for the year. 



Advertising expense85000
Amortization expense16000
Bad debt expense28000
Depreciation expense-office equipment37000
Depreciation expense-factory building133000
Depreciation expense-factory equipment78000
Factory insurance expired62000
Factory supplies used21000
Factory utilities115000
Income taxes53400
Property taxes on factory equipment14000
Finished goods inventory Dec 3115000
Finished goods inventory, Dec 31 201112500
Goods in progress inventory Dec 31, 20108000
Goods in progress inventory Dec 31, 20119000
Repair expense- Factory equipment31000


2- Analyze the remaining costs and select those related to production activity for the year; selected costs should include the materials and goods in process inventories and direct labour 


Factory supervision74000
Factory supplies used21000
Interest expense25000
Miscellaneous expense55000
Raw material inventory, Dec 31, 201060000
Raw material inventory, Dec 31, 201178000
Raw material purchases313000
Salaries expense150,000


Part 2: 


This is a group assignments. Students should form groups of 2- 4 members 

Please note that groups of more than 4 people can’t be accepted and their work will not be graded 

All students in a group can produce the same answers 

Each student should provide a reflective paragraph on the challenges and problems they faced in the report and how they overcame it. (This shouldn’t be more than 100 words per student) 

Answer the following three cases: 


Case 1: 

A Dubai factory manufactures garden huts. The production process is classified into two production departments, Assembly and Joinery. There is one service department, the canteen. The relevant forecast information for the year ahead is as follows: 

Indirect costs for all three departments in total as well as the apportionment methods are as follows:


The following information is available for each department: REQUIRED




1. Allocate production overhead costs to the Assembly, Joinery and Canteen departments using the apportionment methods provided. Use the format below to answer the question. 


 Total (R)Assembly (R)Joinery (R)Canteen (R)
Indirect labor90 00048000360006000
Indirect material81 0004374037260 
Heating and lightening25 00010000120003000
Rent and rates30 00012000144003600
Depreciation56 00030000240002000
Supervision45 00024000180003000
Power36 00018000160002000
total363 00018574015766019600


2. For each production department, calculate an overhead cost rate, based on labour hours, which may be used to absorb production overhead cost to jobs (correct to two decimal places). 


 Total (R)Assembly (R)Joinery (R)Canteen (R)
Indirect labor90 00048000360006000
Cost rates 53.33%40%6.67%



3. Find the overhead cost of a job which spends three labour hours in the Assembly department and four labour hours in the Joinery department (correct to two decimal places). 


 Total (R)Assembly (R)Joinery (R)Canteen (R)
Per hour 4800036000 
3 hours   144000108000252000




Case 2: 

The following planned results are available for ABC Company with a single product:


1 Calculate the break-even point in units. 


Break-even Sales Units =FC
p − v

p is the price per unit,
v is variable cost per unit and
FC is total fixed cost.




Break-even Sales Units =7200


Break-even point = 0.803



2 Calculate the margin of safety in units. 


MOS = 72000 – 0.8*224000


Margin of safety is 2.49


3 What would be the required sales volume to earn a profit of 10 000? 


Profit = total sales – variable costs

10,000 = Sales – 120960

Sales = 130,960



Case 3: 

XYZ Company has a single product and the following information for the period has been provided:

1 – What sales revenue is required to break even (rounded to the nearest whole cent) using the contribution margin %?


Breakeven is at this stage 0. 


Break-even =FC
p − v


0 =FC
p − v



600 00*S – 442,500*60000 = 262,500*600000

S – 442,500 = 262, 500

S = 180000



  1. Briefly explain what happens to the breakeven point and the margin of safety in the following circumstances: 
  2. An increase in the selling price of a product 

An increase in sales increases the break-even point and increases margin of safety 



  1. A decrease in variable costs per unit 


A decrease in variable costs decreases the break-even point and decreases margin of safety 

  1. An increase in fixed costs

Increases break-even point and decreases margin of safety. 


Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Research the juvenile justice laws or policies in your community or state and write a 500 -1050 word response to Peter’s parents.

Research the juvenile justice laws or policies in your community or state and write a 500 -1050 word response to Peter’s parents.

Read the scenario below and complete the assignment that follows.


17-year-old Peter broke into a home, stole approximately $10,000 worth of jewelry and electronics, and consumed a bottle of wine before he fled the scene in a stolen car. The police stopped Peter after noticing him swerving, speeding, and then slowing down on the interstate highway. During the stop, police saw the “loot” stashed in the back seat of Peter’s car and suspected he was involved in more than driving while intoxicated. Peter was properly arrested and booked on the charge of driving while intoxicated.

Research the juvenile justice laws or policies in your community or state and write a 500 -1050 word response to Peter’s parents.

The police believe Peter’s fingerprints will match those discovered at the burglary scene and are likely to charge him with burglary and larceny, as well as grand theft auto. Peter’s parents have been contacted and are debating whether he should retain counsel because they are struggling financially. To complicate matters, Peter fully admitted to the charges before his parents were contacted.

Since it is Peter’s first time in the juvenile justice system, neither he nor his parents know what to expect. What is likely to happen? Will Peter have to go to court or trial? If so, what can he expect in the court process?

Scenario adapted with permission from McGraw-Hill Instructor Resources for Bohm, R., & Haley, N. K. (2021). Introduction to criminal justice (10th ed.). McGraw-Hill Education.


Research the juvenile justice laws or policies in your community or state and write a 500 -1050 word response to Peter’s parents. Explain Peter’s process in applying criminal justice in your community or state.

Note: You may wish to use Figure 13.1, “The Formal Juvenile Justice Process,” on p. 542 of your textbook to guide your research.

Address the following in your paper:

Identify the city or state laws you are researching.

Describe one or more procedures police may use in processing Peter’s case and explain why you selected these procedures. Consider the following questions in your response:

What steps might the police take in their investigation?

Will Peter be charged with a crime(s)? If so, what crime(s) could Peter be charged with?

What options do all parties (Peter, his parents, and the police) have for intake, processing, and custody or release?

Identify one or more potential court proceedings Peter may face and explain why you selected these proceedings. Consider the following questions in your response:

What legal and financial rights can Peter and his family pursue?

Is Peter likely to go through informal or formal court proceedings? Explain your reasoning.

Describe court procedures if Peter’s case goes to trial. Include any details related to these procedures.

If Peter goes through a disposition hearing, what will that entail? Describe the type of justice the judge may administer.

Predict one potential post-court outcome. Explain the rationale for your prediction with relevant details. Address the following question in your response:

What would Peter be like after he exited the court system?

Cite 1 or 2 sources to support your assignment.

Format your assignment according to APA guidelines.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Alain Univesity Sources of Finance Business Scenarios Questions Response

You will be given a variety of different business scenarios below. You must decide what type of finance the business in question should go for and why. Of course, there could be more than one appropriate source of finance – you could decide on a combination but again, ensure that you explain why you have decided on this route.


Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Alain Univesity Sources of Finance Business Scenarios Questions Response appeared first on Top Premier Essays.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Franklin Career Institute Strategic Messaging and Communication Response

Assume People’s Plumbing owns a national chain of licensed,

local plumbers who fix all residential plumbing issues. Pricing is based

on an hourly fee plus parts, but the customer is given a cost estimate

after the initial $25 inspection. The company has been successful over

the last 30 years by advertising primarily on television and radio. They

stress their key message which is their plumbers are qualified, clean,

and take care of the problem quickly. Discuss messaging approaches that

would be appropriate for the company and any media consideration.


Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Franklin Career Institute Strategic Messaging and Communication Response appeared first on Top Premier Essays.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

  first read the U.S. Department of Justice document: “Identifying and Preventing Gender Bias in Law Enforcement Response to Sexual Assault and Domestic Violence (2015)” (in Blackboard) and complete t

first read the U.S. Department of Justice document: “Identifying and Preventing Gender Bias in Law Enforcement Response to Sexual Assault and Domestic Violence (2015)” (in Blackboard) and complete the following:1.      In the first paragraph briefly summarize the reading. In your summary define implicit and explicit bias.2.      According the authors, “Eliminating gender bias in policing practices is an integral component of combating sexual assault and domestic violence (p. 7).”  Briefly describe the reasons for addressing implicit and explicit bias in policing.3.      The authors list eight principles for effective policing practices.  Select one principle and a) summarize the principal b) give your own example (not an example listed in the reading) on how law enforcement could implement the principle c) Describe any barriers/obstacles to implementing the principal.4.      Finally, offer at least one additional recommendation for reducing gender bias in policing.Your paper should be at least 3 pages in length, 1” margins, double spaced.   “Are you looking for this answer? We can Help click Order Now”

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now