The $300,000 is treated as business income. After deducting all of the business expenses, the…
Teddy's Supplies' CEO has asked you to advise him on the facts of the case and your opinion of their potential liability. Write a memo to him that states your view of whether the company is exposed to liability on all issues you feel are in play. Include in your memo any laws that apply and any precedent cases either for or against Teddy's case that impact liability. Include your opinion of the "worst case" of damages the company may have to pay to Virginia.…
In the case of Smackey’s, the audit firm would do well to enlist the help of those who have taken part in an audit in the dog food business. They could lend insight into the intricacies of the business without the need to do extensive research.…
John Smith is an attorney who received $300,000 for winning a personal injury court case for a client. The $300,000 should be reported as gross income when he files his tax return for the year that the $300,000 was received.…
Based on the given facts, she was the subject of jokes in her work place as she was being picked on based on her gender. Since she was the only woman in her department, the male employees subject her to cruel and mean jokes on several occasion when other workers placed a sign on a truck that stated "Hardhat Required/Bra Optional”. This is clearly an illustration that she is working in a hostile environment since the repeated jokes made on her gender has created an intimidating place of work. The case of Meritor Savings Bank v. Vinson is applicable to Pollard where the Supreme Court ruled that hostile work environment sex discrimination is an actionable wrong under Title VII. The fact that the Vice President of the bank made sexual advances against complainant created a hostile work environment and is a form of a sexual harassment covered by Title VII of the Civil Rights Act of 1964. The severe and pervasive conduct of the vice president who repeated sexually abused on the victim in exchange for sexual favors at the office qualify the acts as punishable under Title VII. Here, the acts of the Teddy’s workers against Pollard constitute Hostile Work Environment (HWE) sexual harassment through the vulgar sexual jokes and…
f(x2-3)( F IS NOW WORKING ON THE RULE OF G) = 2(x2-3)+5 (THE RULE OF F IS APPLIED TO G) = 2x2-6+5 (SIMPIFIED) =2x2-1 (FINAL ANSWER)…
You have been asked by the engagement partner to review the client’s accounting for the asbestos litigation liability and determine the appropriate accounting literature for Rossi’s recognition and measurement of the asbestos litigation liability.…
Part I: Discuss the various forms of organization that are available to Penelope, Mark, and John.…
Is Software Inc. liable for the cost of the ring Coleman stole? I would say no. Even though Coleman was on a business trip acting as an agent of the company, going to the jewelry store was not part of his job. “A person dealing with an agent cannot hold the principal liable for any act or transaction of the agent not within the scope of his/her actual or apparent authority” (USLEGAL, Inc., 2012). If Coleman had been in the jewelry store doing business, then Software Inc. could be held liable.…
Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…
When you are in a relationship, arguments or disagreements can arise. They can often trigger strong emotions that lead to hurtful words and uneasiness. If these conflicts are not resolved in a healthy way, resentment and a dissolved relationship could follow. However, when they are resolved in a proper manner, it could promote growth between the couple and fortify the bonds of their relationship (Conflict Resolution Skills).…
The article from Product News Network (2007) introduces 4TOPS, a mail merger that can be embedded within Microsoft® Access®.…
There are five steps that you use when using the hypothesis texting. The five steps are step 1: State the hypothesis, and what we are trying to prove. Step 2: Describe the size of the sample and the population from which data is being gathered. Where and how are we going to produce evidence to support our hypothesis? Step 3: Identify the statistics being tested and the data that will be used to support the hypothesis. Step 4: Find the critical value and determine what evidence will directly support a hypothesis. Step 5: Calculate the value of the test statistic, using the sample data.…
Raymond Burke’s idea is great. It gives us the safest hit in the new market and keeps our risk low. The con is that we might lose our technological advantage in 2 years. Another con is that we lose most of our control and money if we partner with an existing company.…
Appendix C Collaborative Troubleshooting Operating Systems Paper Work collaboratively with another student in your class. You will both read the following scenarios, and discuss how each of you would handle the problems. Be aware that sometimes, there is more than one right answer when troubleshooting an operating system. You will individually prepare a 1,400- to 1,750-word paper that addresses each scenario. The paper may contain additional diagrams and pictures if they help support your arguments. In the paper, consider troubleshooting theory, methods of troubleshooting diagnosis, utilization of Help files, Internet research, and your experiences. All references, citations, and quotations must be documented in APA format, and a full reference list must be included. Scenarios Scenario 1 You have begun a new technical support role in the IT department of a major manufacturing organization. Your first support call is from a client who is using Windows 7 and has encountered stability problems. Discuss the process you would undertake to identify his or her problem and the operating system tools you would use to do so. Scenario 2 Your next call is from a user whose Windows 7 machine will not boot. Outline the steps you would complete to identify the source of the users problem and list the tools provided in Windows 7 that might be useful in your analysis. Scenario 3 The organization has clearly not adopted an operating system standard as a result, numerous products and versions are in use throughout the company. Consider the operating systems, and discuss which of these you would recommend and why. Which of them would you recommend replacing if they were in use in your organization Appendix C IT/286 Version 3 PAGE MERGEFORMAT 1 Y, dXiJ(x(I_TS1EZBmU/xYy5g/GMGeD3Vqq8K)fw9…