Principles of contract law, Computer Engineering

Assignment Help:

Andrew, a 17 zear old university student decided to hold a post exams party for his friends.

Andrew asked Kath, a family friend and the owner of 'Kath's Katerers' to supply food and drinks to the party at a cost of 3000 AUD. Kath agreed and on the date of the party arrived at Andrew's house with the ordered food and drinks.

One hour earlier, Andrew has gone to an ice vending machine to buy several lots of ice to keep the party drinks cool. When Andrew was collecting the ice the vending machine malfunctioned and unexpectedly a block of ice fell from the machine breaking 3 of Andrew's fingers. The machine had a large notice on it stating: Persons using this machine do so at their own risk.'

Andrew had to go to the hospital. He cancelled the party and sent a message to Kath to take back the food and drinks he had ordered telling Kath party could not be held.

Kath wants payment of 3000.

Andrew refuses to pay and wants to sue the owner of the vending machine for damanges for breach of contract.


Related Discussions:- Principles of contract law

Two ways of converting a two input nand gate to an inverter, 1)      Short ...

1)      Short both I/Ps of NAND gate & use the gate as an inverter. 2)      Connect any one of the two I/Ps to VCC & use the remaining I/P & use the gate as an inverter.

What is c language, The C programming language is a standardized programmin...

The C programming language is a standardized programming language forrned in the early 1970s by Ken Thompson and Dennis Ritchie for use on the UNIX operating system. It has since s

Cso, why we don''t use register at the place of ram?

why we don''t use register at the place of ram?

Define the unified modelling language, Define the Unified Modelling Languag...

Define the Unified Modelling Language  (UML) is used to express construct and relationships of complex systems. This was created in response to a request for proposal (RFP) fro

Binary search, Binary Search Now that the basic framework is working, ...

Binary Search Now that the basic framework is working, it is time to begin implementing a few alternative search functions. Each of these search algorithms have strengths and

Draw a diagram to explain major components of web browser, Draw a neat diag...

Draw a neat diagram to explain major components of a web browser. The Major Component of a Web browser A browser contains a set of clients, a controller and a set o

Define polling, Define Polling. A Polling process is used to recognize...

Define Polling. A Polling process is used to recognize the highest priority source by software means. In this process there is one common branch address for all interrupts.

Discuss different routing plan adopted in telephone network, Discuss differ...

Discuss different Routing plan adopted in a Telephone network. Hierarchical networks are able of handing heavy traffic where needed, and at similar time use minimal number of t

How can we set the table spaces and extent sizes, How can we set the table ...

How can we set the table spaces and extent sizes? You can state the extent sizes and the table space (physical storage area in the database) in which a transparent table is to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd