Q1 In England, the tax on soft drinks was recently introduced. Australians buy 1.30 billion litres of sugar-sweetened drinks per annum (2012 figures). Currently, the average price of these drinks is $1.6/litre. Assuming a sales tax (hypothetical scenario) of 25% on soft drinks the price will be increased to $2/litre. The price elasticity of demand for soft drinks is -0.95.
a) How will the increase in the price of soft drinks affect the demand for soft drinks? How much additional revenue will be raised by this tax?
b) Do you agree with above strategy to reduce consumption of soft drinks? Discuss Why? (Maximum 250 words)
Q2 The private competitive market is used to finance and provide most goods and services in Australia. Health care is an exception to this. Why should health care be an exception? Explain your answer. (Maximum 500 words)
Jackalynn E. Venders Dynamic Digital related violations are expanding at a fast rate over the world. Hacking and infections are utilized to take imperative individual data. Understanding digital wrongdoing is fundamental to see how lawbreakers are utilizing the Internet to carry out different violations and what should be possible to keep these violations from happening. This paper will cover distinctive digital violations and data on what the normal Internet client can do to shield themselves from succumbing to digital wrongdoings. Watchwords: Cyber Security, Cyber Crime The Internet is a place immersed with data and throughout the years, data has turned out to be more effectively available than any time in recent memory. How much data that is been shared on the Internet ought to be deliberately considered. A straightforward post to any web-based social networking webpage could give out more individual data than initially planned. Digital security is a need with the developing use and straightforward entry of the Internet. In the event that a web client isn't cautious about the data offered over to the internet, the client's character could without much of a stretch be stolen or their funds depleted. Digital security is imperative to the administration as well as to the normal client. Digital Crime To comprehend why digital security is required and essential, a comprehension of cybercrime is required. Cybercrime is any illegal action that is performed on the Internet or any system based gadget. These wrongdoings incorporate wholesale fraud, infections, digital stalking, and phishing. Data fraud Data fraud happens when a programmer takes data from individual records, for example, keeping money data, standardized savings numbers, and addresses. The programmer will then utilize this data to make accounts in the casualty's name. Monitoring encoded sites and having satisfactory measures of insurance while attributing this data into sites is basic to even the not as much as normal client of web. Infections PC infections are bits of code that are typically joined to downloadable records. At the point when the document is running the code of the infection initiates and continues to spread all through PC records. These infections taint imperative data and can prompt erasure or defilement of vital framework documents. Some infections will likewise enable individual data and records to be gotten to by another client. Digital Stalking Digital stalking is a wrongdoing that happens when a man is being hassled by someone else in a web based setting. The casualty is regularly besieged with messages to themselves, as well as to relatives or companions. Dangers are frequently gotten by the casualty as a strategy to get the casualty to answer. Regularly the casualty will experience the ill effects of tension and dread. Phishing Phishing is where electronic mail is sent to the casualty that copies keeping money organizations or other budgetary or individual data accounts. The casualty, if not cautious, will enter their own data on a webpage that copies nearly the site utilized for individual data. It is essential for a potential casualty to know about email addresses related with ledgers and different destinations that may contain individual data. Conclusion The expansion on digital assaults everywhere throughout the world is squeezing the requirement for refreshed digital security. The United States made the Computer Emergency Response Team (CERT) in 1988 after a boundless break in of the Internet. The CERT has no specialist to capture or arraign programmers yet it provides consistent security of global data on the Internet. Interpol has additionally set up the "I-day in and day out" correspondence framework for web based policing to report any wrongdoings found. Inside and out, the normal client of the Internet can shield themselves from digital violations by monitoring what data is being put on the Internet and staying alert that the data can be seen whenever by any individual on the planet. There are bureaus of security set up for the more genuine digital violations and reports can be made to these divisions of any digital assaults. Advances are continually being made to police the Internet and the internet. References Goutam, R. K. (2015). Significance of Cyber Security. Worldwide Journal of Computer Applications, 111(7) doi:10.5120/19550-1250 Williams, B. K. Sawyer, S. C. (2015) Using Information Technology. New York, New York: McGraw-Hill Education>GET ANSWER