Mancini manufactures embroidered jackets. The companyprepares flexible budgets a
ID: 371870 • Letter: M
Question
Mancini manufactures embroidered jackets. The companyprepares flexible budgets and uses a standard cost system tocontrol manufacturing costs. The standard unit cost of a jacket isbased on static budget volume of 14,000 jackets per month: Direct materials (3.0 sq. ft @$4.00 per sq.ft) $12.00 Direct labor (2 hours @ $9.40 perhour) $18.80 Manufacturing overhead: Variable (2 hours @ $0.65perhour $1.30 Fixed (2 hours@ $2.20 perhour $4.40 $5.70 Total cost perjacket $36.50 Actual cost and production information: a. Actual production was 13,600 jackets. b. Actual direct materials usage was 2.8 square feet perjacket, at an actual price of $4.10 per square feet. c. Actual direct labor usage of 25,000 hours at a total costof $237,500. d. Total actual overhead cost was $79,000.
Requirements:
1. Compute the price and efficiency variances for directmaterials and direct labor in dollars.
2. Journalize the usage of direct materials and the assignmentof direct labor, including the related variances.
3. For manufacturing overhead, compute the total variance, theflexible budget variance, and the production volume variance.(Hint: remember that the fixed overhead in the flexible budgetequals the fixed overhead in static budget.)
4. Mancini's management intentionally purchased superiormaterials for November production. How did this decision affect thecost variances? Overall, was the decision wise?
( i want to complete answer)
Explanation / Answer
Hi
There has been lots of security breach cases in past . It touched every dimension of online content on web.
I will use a case study of recently hacked dating site asleymadison. hacker breach the securty system of this sites , stolen data and then made all the data public. this caused divorce in many cases of the users. users were completely exposed.Todays world , we are into digital era where all our professional records, academic achievements, social standings and circle of friends can all be found in various social media networks. Our interpersonal communications and thoughts are within our emails and text messages.In addition to the intrigue and graphic appeal of dating websites, they all offer secrecy, privacy and confidentiality. Trusting a specific site is not based on facts, but rather on statements from the website itself. Unfortunately for many love and lust seekers, hackers are naturally attracted to dating websites for a variety of reasons and they do not stop to read about the security and privacy of a site.
Legal framework: There are multiple terms and condtions based on the type of securty breach.Security breach laws typically have provisions regarding who must comply with the law for example businesses, data/ information brokers, government entities, etc definitions of “personal information” (e.g., name combined with SSN, drivers license or state ID, account numbers, etc.); what constitutes a breach (e.g., unauthorized acquisition of data); requirements for notice (e.g., timing or method of notice, who must be notified); and exemptions (e.g., for encrypted information).A legal framework is applied based on the category and severity of breach.The framework vary from country to country.
Hope it make sense.
Thanks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.