Is john''s price setting approach ethical. is it legal.

Assignment Help Computer Network Security
Reference no: EM13952761

John Wenman, merchandising manager at Goodmark's stationery store, is setting the price for Craft fountain pens. The pens cost him $5 each. The store's usual markup is 50 percent over cost, which suggests that John should set the price at $7.50. However, to make this price seem like an unusually good bargain, John begins by offering the pen at $10. He realizes that he won't sell many pens at this inflated price, but he doesn't care. John holds the price at $10 for only a few days, and then cuts it to the usual level-$7.50-and advertises: "Terrific Bargain on Craft Pens. Were $10, Now Only $7.50!"

1. If consumers perceive Craft pens to be a good value at $10, is it fair for Good mark's to sell the pen at that price?

2. Is John's price setting approach ethical? Is it legal? Explain.

3. How would you have set and advertised the Craft pen's price? Would you have used a cost-plus approach or some other method? Explain

Reference no: EM13952761

Questions Cloud

Determine degree of inequality aversion of social-welfare : Show that if people did not know which one of the identities {a, b, c} they were to have before they vote, if they regard any one of these three identities as equally likely and if they are concerned to maximise expected utility, then majority vot..
How about in an activity based management organization : How about in an Activity Based Management organization - how does the Theory of Constraints relate to continuous improvement?
Where did the interaction take place : Where did the interaction take place? How old did the child appear to be? Was it a mom or dad with the child?What did you observe
Prepare the cost-to-equity conversion entry : Prepare the cost-to-equity conversion entry, as required by APB Opinion No. 18, on January 1, 20X8, when Hanson's investment in Novic Company ?rst exceeds 20%.
Is john''s price setting approach ethical. is it legal. : How would you have set and advertised the Craft pen's price? Would you have used a cost-plus approach or some other method? Explain
Examine the way in which a small increase in t will affect : If he invests an amount (3 in bonds (o (3 K) and is taxed at rate t on his income, write down the expression for his disposable final wealth y, assuming full loss offset of the tax. Find the first-order condition which determines his optimal bo..
Break even point and business card : Use of Lean and ABC in the Cookie Company. Provide you will the Power point, break even point and business card for you to see where were are at with the business.
How has technology affected your life : How has technology affected your life? Be specific as to what changes, and in what ways
What is the impact of not having diagrams that describe the : What is the impact of not having diagrams that describe the program?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  What paperwork will be needed to reach eal7 certification

Essay Question:Secure software certification. Your present company (assignment#2) is at EAL4. You are the new program manager on this effort and your job is to bring your present software secure package to EAL7.

  Use javascript to implement rsa including encryption

Use JavaScript to implement RSA including Encryption.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Single selector signal

The 2 to 1 multiplexer has two inputs (X1 and X2), and a single selector signal (S). All three switches (S1, S2, and S3) are set as toggle switches.

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  Present a short summary of the arguments for and against

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd