Wednesday, October 30, 2019

Lease vs Buy Research Paper Example | Topics and Well Written Essays - 2500 words

Lease vs Buy - Research Paper Example The acquisition or lease of the transportation equipment is critical to the nature of the company’s business of bringing its guests to different locations to areas which would further enhance the company’ s delivery of value to its customers. What should the company do? ABC Company plans to acquire transportation equipment or two buses with a five year life and a total cost of $40 million which will transport clients to different areas as a way of adding value to its services. A bank is ready and will to provide a loan for the acquisition. The company can borrow the required $40 million, using a 10 percent loan to be amortized over five years. Therefore the loan will call for payments of $10.4 million per year as can be estimated using a financial calculator. As an alternative, ABC can lease the equipment for five years at a rental charge of $11.2 million per year, payable also at the end of the year. If it is lease, the equipment will not be owned and the risk of loss will belong still to the XYZ Company as lessor. However, ABC Company will be liable pay to annual rental for five years from which tax benefits can also be derived. If it decides to buy the equipment, ABC will be able to save on tax on depreciation for the equipment and maintenance c ost. Since the lessor will own the two buses at the expiration of the lease, the company is somewhat confused on which is the better option. Relying on the comparative figures of $10.4 million payable yearly to the bank to finance acquisition and the rental payments of $11.2 million for yearly payments looks somewhat incomplete to ABC Company without including other factors which can be further quantified. The lease payment schedule is established by XYZ Company the potential lessor with the $11.2 million for five years was given to ABC Company and the latter is at present stage of

Monday, October 28, 2019

Our aim is to investigate how much quicker Essay Example for Free

Our aim is to investigate how much quicker Essay Aim:- Our aim is to investigate how much quicker a reaction happens if the acid we uses strength goes up, and also to see if there is a pattern which could be carried on to higher strength acids. Background Science:- Chemical reactions play a very important part in our life, some even keep us alive (the process of our digestion system is a series of chemical reactions which convert food into chemicals which can be more easily used by our bodies), other circumstances where chemical reactions are used in our bodies that cut down the amount of acid in your stomach, there are also chemicals in washing powder for removing stains by using chemicals called enzymes which speed up the breakdown of the chemicals in stains. All chemical reactions happen at various speeds, such as chemicals in fireworks which react very fast, within seconds of the firework being lit the reaction is over. Slow chemical reactions could be such things as the ripening of cheese so it can mature over time. Some adhesives we use require two chemicals to be mixed depending on the amounts used it could make the glue harden quickly or slowly. Some reactions happen slowly whereas some happen very fast. The name in which we measure a speed of a reaction is called a Rate Of Reaction. It can be measured in two ways, either the rate in which one of the products is produced, one of the products that is produced is gas, you can measure gas in a syringe or in a upturned burette. Another method that can be used is recording mass of the reactant, (how much the mass has added to its weight of lost). The mass could be recorded every minute and could be written like this, 1. 0g/60secs. Variables:- We had four variables to choose from, Temperature, Concentration, Surface area/Pressure and Catalyst. If we were to use temperature we would measure how much quicker the reaction would go if the acid and calcium were heated together, but we would have to keep the temperature at a constant heat as it wouldnt be a fair test if the reactants were getting hotter and colder. If we were to use a catalyst it would be used to speed up the reaction, but this would be unfair because we wouldnt be able to measure how much extra speed is being put in by the catalyst. Or we could change the surface area of the reactant, this would give the acid more of a area to act on, to measure this we would have to weigh the calcium first then expose it to the acid for a certain time and then take it out and weigh it, making sure we use the same concentration of acid each time to make it a fair test. We decided to use Concentration, for this we would change the strength of concentration each time and take a volume of gas that is given off every ten seconds. From choosing the variable Concentration we can measure the rate of gas that is being given of, this could be useful because we could work out how much gas per minute is being given off, from that we can then predict how much gas is being given off for any time you need to find. Prediction:- I think that as the strength of the acid goes up the rate of reaction will go up. Collision Theory:- I think this will happen because the higher the strength of the solution the more particles there are in the solution, which means more collisions more frequently. The acid will hit the calcium carbonate, if there is enough energy in the acid the calcium and acid will react together to give off Carbon Dioxide. The more the particles collide the faster they react. I have made a predicted graph, showing what I think the graph will look like. I have drawn in the lines of best fit showing the steepness of the line. This diagram shows how the acid particles collide with the marble chip to give off a gas. Method:- Set up apparatus as shown above. 1. Measure out desired amount of marble chips. 2. Measure out desired amount of hydrochloric acid 0. 25 mole first, then when all experiments with 1 mole have been completed go onto 0. 5 mole then 1 mole then 1. 5 and finally 2 mole. 3. Fill up the water bowl. 4. Fill measuring cylinder with water up to 100 ml. 5. Holding hand over the top of the measuring cylinder quickly turn it upside down and place it under the water (as shown above). If the water comes out refill the cylinder and try again. 6. Place tube so one end is coming up in the cylinder under water. 7. Put the marbles in the chronicle flask. 8. Pour in the hydrochloric acid and quickly affix the top with the tube coming out of it into the chronicle flask. 9. Decide at what time you will measure how much gas is given off. We decided to take a reading every 10 seconds, we also decided to start taking the readings at 30 seconds. You measure how much gas is given off by the water dropping in the measuring cylinder. E. g. 10 mls given off in the first 30 seconds. 10. Take these readings for 100 seconds using a stop watch to be precise. I am going to take 3 repeats, I am doing 3 because I can get a fair average from these 3 results. From the averages I will plot a graph to compare the different strength acids. Analysis:- (Graphs). From my graphs I clearly show the variable of different strengths of acids. As I used higher strength acids, the time in which the gas was produced got much faster. As the acids get stronger the lines become more inline. Whereas the 0. 5 points were all over the place. From my results I can see that my prediction was correct I think that as the strength of the acid goes up the rate of reaction will go up. I could see that from my results the strength of acid went up and the speed it took to make the gas went down. This links to the collision theory, that is that as the strength of the acid went up there were more particles to collide on the marble, which meant that more gas was given of due to more particles in the small mixture. The higher the strength of acid the more accurate the results became, we can see this because the range bars get smaller as the strength of the acid gets stronger. From the predicted graph I can see a difference in the results graph. The 1 mole strength acid has taken longer than the 0. 5 mole acid to produce the gas. I will explain the possible reasons for this more in my evaluation. Evaluation:- The main difficulty we faced was with the 2 mole strength acid because it reacted so fast we barely had time to read the times precisely. This may have meant we had unfair results. The main anomalous results were the 1 mole results, because from the information we have (collision theory) it tells us that it is stronger than the 0. 5 mole which means it should be lower than on the graph than 0. 5. But it isnt. This may have been because the results were read wrong, the acid we used may have been slightly too strong or the marble chips we used may have been smaller which means it is easier for the acids to break down. To improve the accuracy we could use a burette, which are far more accurate than a measuring cylinder or a gas cylinder. Gas Syringe Burette Computer data collectors are a very accurate way of registering the time, also if you were to use a camera recorder so you could look back at it and pause it when it got to the times when you needed to record a time. The results would never be the same because sometimes the measurement of marble chips maybe slightly more or less, or the accuracy of reading the time would be slightly out etc. As I said earlier in my investigation the results seemed to become more reliable as the strength of acid went up. Although it should be less accurate to measure the time as the acid strength went up it seemed to be more accurate. James Lane 11N Rates Of Reaction Investigation.

Saturday, October 26, 2019

Lorraine Hansberrys A Raisin In The Sun Essay -- Lorraine Hansberry

Lorraine Hansberry's A Raisin In The Sun A Raisin in the Sun is one of the best works of Lorraine Vivian Hansberry, in which, through a black family, the Youngers, she talks about vital issues such as poverty, gender and racial discrimination. Hansberry's play focuses mainly on the dreams of the main characters, which motivates them. The title 'A Raisin in the Sun' has been taken from the poem "Montage of a Dream Deferred" written by Langston Hughes in which he talks about the consequences when dreams are put off for later. The title is appropriate for Hansberry?s play since it shows how ?deferred dreams? of the Younger family shrivel up like ?a raisin in the sun? leading to disillusionment and leaving very little hope for the future. The Younger family includes Lena Younger, who is the head of the family; Beneatha, Lena?s daughter; Walter, Lena?s son; Ruth, wife of Walter; Travis, Walter and Ruth?s son. Other than the Younger family, Joseph Asagai shown as Beneatha?s Nigerian friend also has an important role in the play. Each of the members in Younger family has their own individual dreams. Throughout the play, their happiness and sadness depends on how successful they are in attaining their respective dreams. Walter Lee is shown as a typical African-American man who struggles and works hard to support his family and often comes up with different ideas and schemes, which would make him rich in no time and will improve the life of his family. One such scheme was to invest money, from the deceased Mr. Younger's life insurance policy, in a liquor store with his friends. When he tells Ruth about his plans over breakfast, Ruth completely ignores and tells him ?eat your eggs? over and over again. This annoys Walter and he tells her how everytime a man dreams to achieve something in life & a woman shuns him by telling him to eat his eggs. Being quiet and eating one's eggs represents an acceptance of the adversity that Walter and the rest of the Youngers face in life. He believes that it is the black women who keep the black men from achieving their dreams and he argues that Ruth should be more supportive of him. Walter believes that ?money is life? and that it will bring an end to all the misery his family is suffering from. He measures the success of a man by the amount of money and possessions he has. Walter has worked as a chauffeur most o... ...-assimilationist beliefs as well as her desire to shape her identity by looking back to her roots in Africa. Asagai is proud to belong to the African heritage and wishes to bring about modern advancement in Nigeria to improve the life of his people. He influences Beneatha greatly in a positive way, teaching her about her heritage. He tells her that she is not as independent as she thinks she is since she has to rely on the insurance money for paying the fees of her medical school. He proposes Beneatha and asks her to get a medical degree and move to Africa with him. He will teach and lead the people, and she can practice medicine and help take care of people. Asagai and his dream enable Beneatha to discover a new energy and to reshape a new dream for herself. Throughout the play, each member of the Younger family concentrates only on their respective dreams. But by the end of the play they put the family dreams and wishes before their own. Now they have one common dream ? that of owning a house, which will be important for the family?s welfare and will keep them united. They eventually move out of their small over-crowded apartment, fulfilling the family's long-held dream.

Thursday, October 24, 2019

Best Buy Market Segmentation

Best Buy Canada Ltd is a fully owned subsidiary of Best Buy Co. Inc with its headquarter in Burnaby, BC. Best Buy Co. Inc acquired the Canada-based electronics-chain Future Shop Inc in 2001. The company opened its first Canadian Best Buy store in Mississauga, Ontario the following year. 1 Today, with more than 51 stores across Canada, Best Buy Canada has become the fastest growing and the largest retailers and e-tailers of consumer electronics, entertainment products, accessories and services in Canada. 2 There are many reasons to which we chose Best Buy Canada as our research subject. First of all, it is a very well known retailer and can be easily related to. Secondly, the company fits well in our research structure and many of the concepts in marketing applies to Best Buy Canada as well. Lastly, we believe Best Buy Canada is largely an ethical and socially responsible company that has brought positive impact throughout our community. Best Buy Canada’s mission statement and objective is â€Å"To improve people's lives by making technology and entertainment products affordable and easy to use†. The four core values of the company are â€Å"Having fun while being the best†, â€Å"Learning from challenge and change†, â€Å"Showing respect, humility and integrity† and â€Å"Unleashing the power of our people† 4 In addition to being the biggest retailer of consumer electronics like big screen TVs, computers, cameras and entertainment products i n Canada, Best Buy Canada also has many exclusive brands such as Insignia, Dynex and RocketFish etc . covering a wide range of electronic products and accessories. Geek Squad – a 24 hour computer repair and tech support taskforce, enables Best Buy to offer its customers convenient installation and repair services. Since Best Buy Canada itself does not produce any real products, we are interested in the way Best Buy runs its retail business in the consumer electronics market. We are also interest in how Best Buy Canada attracts different groups of people with different needs and analyze its marketing strategy for staying competitive in the market.

Wednesday, October 23, 2019

Types of spoofing

Chapter 2: Types of Spoofing2.1 Distributed Denial of Service AttackThe IP spoofing is largely used in Distributed denial of service onslaughts ( DDoS ) , in which hackers are concerned with devouring bandwidth and resources by deluging the mark host machine with as many packages as possible in a short span of clip. To efficaciously carry oning the onslaught, hackers spoof beginning IP addresses to do tracing and halting the DDoS every bit hard as possible. Here the aggressor scans internet and identifies the hosts with known exposures and compromise them to put in onslaught plan and so exploits the exposures to derive the root entree. [ 6 ]2.2 Non-blind spoofingThis type of onslaught takes topographic point when the hacker is on the same subnet as the mark that can see sequence and recognition of every package. This type of spoofing is session commandeering and an aggressor can short-circuit any hallmark steps taken topographic point to construct the connexion. This is achieved by p erverting the DataStream of an established connexion, so re-establishing it based on right sequence and acknowledgement Numberss with the onslaught host machine.2.2 Blind spoofingThis type of onslaughts may take topographic point from outside where sequence and acknowledgement Numberss are non approachable. Hackers normally send several packages to the mark host machine in order to try sequence Numberss, which is suited in old yearss. Now a yearss, about every OSs implement random sequence figure coevals for the packages, doing it hard to foretell the sequence figure of packages accurately. If, nevertheless, the sequence figure was compromised, information can be sent to the mark host machine.2.4 Man in the Middle AttackThis onslaught is besides known as connexion oriented highjacking. In this onslaught chiefly the aggressor or the interrupter will assail the legal communicating between two parties and eliminates or modifies the information shared between the two hosts without their cognition. This is how the aggressor will gull a mark host and steal the informations by hammering the original host ‘s individuality. In the TCP communicating desynchronized province is given by connexion oriented highjacking. Desynchronized connexion is that when the package sequence figure varies for the standard package and the expected packet.TCP bed will make up one's mind whether to buffer the package or fling it depending on the existent value of the standard sequence figure. Packages will be discarded or ignored when the two machines are desynchronized. Attacker may shoot spoofed packages with the exact sequence Numberss and alteration or insert messages to the communicating. By remaining on the communicating way between two hosts attacker can modify or alter packages. Making the desynchronized province in the web is the cardinal construct of this onslaught. [ 12 ]2.5 DecisionAssorted types of IP spoofing and its onslaughts are explained in this chapter. Here we have discussed about four types of burlesquing onslaughts like Distributed Denial of Service Attack, Non-blind spoofing, blind burlesquing and Man-in-the-middle onslaught, and besides how these onslaughts can make jobs to destination machines. Various Security demands are discussed in the following chapter.Chapter 3: Security Requirements3.1 Network security demandsThe Internet became the largest public information web, enabling both personal and concern communications worldwide. Day to twenty-four hours the information trafficking is increasing exponentially over the internet universe and besides in the corporate webs. As the engineering is developing the velocity of communicating is increasing via electronic mail ; nomadic workers, telecommuters. Internet is besides used chiefly to link corporate webs to the subdivision offices. As the technolgy developed the use of cyberspace has became more and besides use of different engineerings became more at the same clip security menace besides became more and gave opportunity to more faulties to make at that place things.so the corporations utilizing them should protect and increase the security.The web onslaughts became really serious as they are more effectual for the concerns because they store the of import and sensitive informations, as the personal banking records or the concern and medical studies. If the onslaught is done on such sort of corporates it is really hard to retrieve the doomed informations which besides leads to free the privateness and takes batch of clip to retrieve.The cyberspace would besides be the safest manner to make the concern Despite the dearly-won hazards.For illustration, It is non safe to give the recognition card inside informations to the telemarketer through the phone or even a server in the restaurent this is more hazardous than give the inside informations in the web because security engineering will protect electronic commercialism minutess. The telemarketers and servers may non be that safer or trustworthy because we can non supervise them all the clip. The fright of security jobs could be harmful to concerns as existent security voilates. Due to the misgiving on the cyberspace the fright and the intuition of computing machines still exists.For the administrations that depends on the web will diminish there oppurtunities due to this misgiving. To avoid this security constabularies should be purely taken by the companies and besides instate the precautions that are effective.To protect their clients Organizations should adequately pass on. Companies should take the security stairss to non merely protect there clients from security breaches but besides there employers and the spouses information which are of import for them. Internet, intranet and extranet are used by the employers and the spouses for the efficient and the fast communication.These communicating and the efficiency should be looked after because they are more effectd by the web onslaughts. Attackers do the onslaught straight because this takes the tonss of clip for the employers to retrieve and reconstruct the lost informations and takes much clip even in the web harm control. loss of clip and valuble informations could greatly impact employee effectivity and assurance. The other chief ground for the demand of web security is the Legislation. harmonizing to the serveys conducted by the authorities they came to cognize about the importance of cyberspace for the universes economic position, they besides recognize that the aggressors consequence on the cyber space could besides do the economic harm to the universe. National authoritiess are mounting Torahs to modulate the huge watercourse of electronic information. Companies developed the schemes to procure the day of the month in the safe manner in conformity to set up the ordinances given by government.The companies which does non take security constabularies to protect the information conformity will be voilated and penalized.3.2 System security demandsIn these yearss supplying security had became a tough undertaking for all the bisiness and the different administrations. Security must be provided to the clients and the of import informations to safeguard them from the malicious and nonvoluntary leaks.Information is really of import for every endeavor, it may be the usage records or rational belongings. By the CIOs it became possible to clients, employees and spouses to acquire the informations in fraction of seconds.The cost of money besides became more to make all these things.Ther e are three grounds for which this information may fall in hazard they are ( I ) when the concern procedure interruptions down ( two ) employee mistake ( three ) spreads in security. Hazard is so from client and competitory force per unit areas, regulative and corporate conformity, and the lifting cost promotion of informations leaks Information one of the of import resources of fiscal establishment ‘s. To maintain the trust between the spouses or develop the assurance in the clients it is more of import to supply the good security which will be helpful for the good traveling and the repute of the company. At the same clip reliable information is necessary to treat minutess and comfirm client determinations. A fiscal establishment ‘s net income and capital can be affected if the information leaks to unauthorised companies. Information security is one of of import procedure by which an organisation protects and secures its systems, media, and maintain information of import to its operations. The fiscal establishments have a great duties to protect the states fiscal service infrastucture On a wide criterion. The fiscal security of the client will beside s depends on the security provided to the industry systems and its informations.effective security programs should be taken by the Individual fiscal establishments and their service providersfor their operational complexness.there should be a strong and effectual board to keep and take attention of these security policies in order to protect the company from the security menaces or any other malicious attacks.there should be a regular guidance to the administrations on the security precations they take to supply the companies, so that we can acquire the more effectual consequences and can better the administrations security degree aswell. organisations frequently inaccurately recognize information security as status of controls. As the Security is an on-going procedure in overall security stance the status of a fiscal establishment depends on the index. Other indexs include the power of the establishment to continually measure its stance and react appropriately in the face of quickl y changing menaces, engineerings, and concern conditions. A fiscal establishment establishes and maintains truly effectual information security when it continuously integrates procedures, people, and engineering to palliate hazard in conformity with hazard appraisal and acceptable hazard tolerance degrees. By establishing a security procedure fiscal establishments secure there risks they recognizes hazards, forms a strategy to pull off the hazards, implements the strategy, tests the executing, and proctors the ambiance to pull off the hazards. A fiscal establishment outsources all of their information processing. Examiners use this brochure while measuring the fiscal establishment ‘s hazard direction procedure, including the duties, responsibilities, and occupation of the service beginning for information security and the oversight exercised by the fiscal establishment. [ 3 ]3.3 Information security demandsAn information security scheme is a program to palliate hazards while s taying by with legal, Statutory, internally and contractual developed demands. Typical stairss to constructing a scheme include the definition of control aims, the appraisal and designation of attacks to run into the aims, the choice of controls, prosodies, the constitution of benchmarks and the readying of execution and proving programs. The pick of controls is typically depends on cost comparing of different strategic attacks to minimise the hazard.The cost comparing typically contrasts the costs of different attacks with the possible additions a fiscal establishment could recognize in footings of increased handiness, confidentality or unity of systems and informations. These additions may include reduced fiscal losingss, improved client assurance, regulative conformity and positive audit findings. Any peculiar attack should see the followersPolicies, processs and criterionsTechnology designResource dedicationTesting andTraining.For illustration, an establishment ‘s directio n may be measuring the right strategic attack to the security supervision of activities for an Internet environment. There are two possible attacks identified for rating. The first attack utilizes a combination of web and host detectors with a staffed supervision centre. The 2nd attack consists of every twenty-four hours entree log scrutiny. The first option is judged much more capable of observing an onslaught in clip to cut down any harm to the establishment and its informations, even though at a much more cost. The added cost is wholly appropriate when establishment processing capablenesss and the client informations are exposed to an onslaught, such as in an Internet banking sphere. The 2nd attack may be suited when the primary hazard is reputational harm, such as when the Web site is non connected to other fiscal establishment systems and if the lone information is protected is an information-only Web site.

Tuesday, October 22, 2019

Improving Mobile Access to Government Websites

Improving Mobile Access to Government Websites The U.S. federal government is working to improve access to the wealth of information and services available on its more than 11,000 websites from mobile devices like tablets and cellphones, according to an interesting new report from the Government Accountability Office (GAO). While most people still use desktop and laptop computers, consumers are increasingly using mobile devices to access websites with government information and services. As the GAO noted, millions of Americans use mobile devices every day to get information from websites. In addition, mobile users can now do many things on websites that previously required a desktop or laptop computer, like shopping, banking, and accessing government services. For example, the number of individual visitors using cellphones and tablets to access the Department of the Interiors information and services increased significantly from 57,428 visitors in 2011 to 1,206,959 in 2013, according to agency records provided to the GAO. Given this trend, the GAO pointed that the government needs to make its wealth of information and services available â€Å"anytime, anywhere, and on any device.†    However, as the GAO points out, mobile Internet users face a range of challenges accessing government services online. â€Å"For example, viewing any website that has not been â€Å"optimized† for mobile access- in other words, redesigned for smaller screens- can be challenging,† notes the GAO report. Trying to Meet the Mobile Challenge On May 23, 2012, President Obama issued an executive order entitled â€Å"Building a 21st Century Digital Government,† directing the federal agencies to deliver better digital services to the American people. â€Å"As a Government, and as a trusted provider of services, we must never forget who our customers are – the American people,† the President told the agencies. In response to that order, the White House’s Office of Management and Budget created a Digital Government Strategy to be implemented by the Digital Services Advisory Group. The Advisory Group provides the agencies with help and resources needed to improve access to their websites via mobile devices. At the request of the U.S. General Services Administration (GSA), the government’s purchasing agent and property manager, the GAO investigated the progress and success of the agencies in meeting the goals of the Digital Government Strategy. What the GAO Found In all, 24 agencies are required to comply with provisions of the Digital Government Strategy, and according to the GAO, all 24 have made efforts to improve their digital services for those who use mobile devices. In its investigation the GAO specifically reviewed six randomly selected agencies: the Department of the Interior (DOI), the Department of Transportation (DOT), the Federal Emergency Management Agency (FEMA) within the Department of Homeland Security, the National Weather Service (NWS) within the Department of Commerce, the Federal Maritime Commission (FMC), and the National Endowment for the Arts (NEA). The GAO reviewed 5 years (2009 through 2013) of online visitor data as recorded by Google Analytics from each agency. The data included the type of device (smartphone, tablet, or desktop computer) consumers used to access the agencies’ main website. In addition, the GAO interviewed officials from the six agencies to gather insights about the challenges consumers might face when accessing government services using their mobile devices. The GAO found that five of the six agencies have taken substantive steps to improve access to their websites via mobile devices. For example in 2012, the DOT fully redesigned its main website to provide a separate platform for mobile users. Three of the other agencies GAO interviewed have also redesigned their websites to better accommodate mobile devices and the other two agencies have plans to do so. Of the 6 agencies reviewed by the GAO, only the Federal Maritime Commission had yet to take steps to enhance access to their websites via mobile devices, but plans to enhance access to its website in 2015. Who Uses Mobile Devices? Perhaps the most interesting part of the GAO’s report is an accounting of who most often use mobile devices to access websites. The GAO cites a Pew Research Center report from 2013 showing that certain groups relied on cellphones to access websites than others. In general, PEW found that people who are young, have more income, have graduate degrees, or are African American have the highest rate of mobile access. In contrast, PEW found that people less likely to use mobile devices to access websites in 2013 included seniors, the less educated, or rural populations. Of course, there are still many rural areas that lack cellphone service, let alone wireless Internet access. Only 22% of people 65 and older used mobile devices to access the Internet, compared to 85% of younger people. â€Å"GAO also found that access to the Internet using cellphones has increased, primarily due to lower cost, convenience, and technical advances,† stated the GAO report. Specifically, the Pew survey found that: 74% of African Americans use cellphones to access the Internet.85% of people ages 18 to 29 used cellphones to access the Internet, compared to only 22% of seniors age 65 and older.79% of those using cellphones to access the Internet have incomes of at least $75,000.Only 50% of people living in rural areas use cellphones to access the Internet.74% have college degrees or higher, compared to 53% with a high school diploma and 51% without a high school education. The GAO made no recommendations in relationship to its findings, and issued its report for informational purposes only.

Monday, October 21, 2019

T4A(OAS) Tax Slips for Canadian Income Tax Returns

T4A(OAS) Tax Slips for Canadian Income Tax Returns A Canadian T4A(OAS) tax slip, or Statement of Old Age Security, is issued by Service Canada to tell you and the Canada Revenue Agency (CRA) how much old age security income you received during a tax year and the amount of income tax that was deducted. Deadline for T4A(OAS) Tax Slips T4A(OAS) tax slips must be issued by the last day of February the year after the calendar year to which the T4A(OAS) tax slips apply. Sample T4A(OAS) Tax Slip This sample T4A(OAS) tax slip from the CRA site shows what a T4A(OAS) tax slip looks like. For more information on what is included in each box on the T4A(OAS) tax slip and how to deal with it when filing your income tax return, click on the box number in the pull-down menu  above the sample T4A(OAS) tax slip. Filing T4A(OAS) Tax Slips With Your Income Tax Return When you file a paper income tax return, include copies of each of the T4A(OAS) tax slips you receive. If you file your income tax return using NETFILE or EFILE, keep copies of your T4A(OAS) tax slips with your records for six years in case the CRA asks to see them. Missing T4A(OAS) Tax Slips If you do not receive your T4A(OAS) tax slip, contact Service Canada at 1-800-277-9914 during regular business hours. You will be asked for your Social Insurance Number. Even if you havent received your T4A(OAS) tax slip, file your income tax return by the deadline anyway to avoid penalties for filing your income taxes late. Calculate your OAS income and any related deductions and credits you can claim as closely as you can using any information you have. Include a note saying what you have done to get a copy of the missing T4A(OAS) tax slip. Include copies of any statements and information you used in calculating the income and deductions for the missing T4A(OAS) tax slip. Viewing and Printing T4(OAS) Tax Slips Online If you wish to view and print your T4(OAS) tax slips online, you can make arrangements through the My Service Canada Account. For detailed information, see the following Service Canada pages: Get Your Tax Information Slips Online, andTax Information Slips in My Service Canada Account. Other T4 Tax Information Slips Other T4 tax information slips include: T4- Statement of Remuneration PaidT4A- Statement of Pension, Retirement, Annuity, and Other IncomeT4A(P)- Statement of Canada Pension Plan BenefitsT4E- Statement of Employment Insurance and Other BenefitsT4RIF- Statement of Income From a Registered Retirement Income FundT4RSP- Statement of RRSP Income