Principles of contract law, Computer Engineering

Assignment Help:

Andrew, a 17 zear old university student decided to hold a post exams party for his friends.

Andrew asked Kath, a family friend and the owner of 'Kath's Katerers' to supply food and drinks to the party at a cost of 3000 AUD. Kath agreed and on the date of the party arrived at Andrew's house with the ordered food and drinks.

One hour earlier, Andrew has gone to an ice vending machine to buy several lots of ice to keep the party drinks cool. When Andrew was collecting the ice the vending machine malfunctioned and unexpectedly a block of ice fell from the machine breaking 3 of Andrew's fingers. The machine had a large notice on it stating: Persons using this machine do so at their own risk.'

Andrew had to go to the hospital. He cancelled the party and sent a message to Kath to take back the food and drinks he had ordered telling Kath party could not be held.

Kath wants payment of 3000.

Andrew refuses to pay and wants to sue the owner of the vending machine for damanges for breach of contract.


Related Discussions:- Principles of contract law

Explain single instruction and multiple data stream (simd), Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE Figure: SIMD Organisation

Subprogram, create a stored procedure to debit a bank account user must ent...

create a stored procedure to debit a bank account user must enter account no. and amount to debited from account .the minimum balance in account should be 500. if the debited amoun

Compare hypertext versus hypermedia, Compare hypertext versus hypermedia.  ...

Compare hypertext versus hypermedia.  Hypertext is basically similar as regular text - it can be stored, read, searched, or edited - with a significant except ion: hyper text h

Explain vector-scalar instructions, Vector-Scalar Instructions In this ...

Vector-Scalar Instructions In this category, when combination of vector and scalar are fetched and stored in vector register. These instructions are referred with the subsequen

What are the steps involved in authentication, What are the steps involved ...

What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Important steps of the boot process, Question: Computer forensic examin...

Question: Computer forensic examiners should be concerned with at least two important settings stored in RTC/NVRAM, which is accessed by the BIOS software most often called Set

Argument be passed to a subroutine in programming, How many ways can an arg...

How many ways can an argument be passed to a subroutine in programming? Ans)  An argument can be passed in two way in a programming language. They are Pass by Value and Passi

Computer networks, distributed & centralized system in computer network

distributed & centralized system in computer network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd