Principles of contract law, Computer Engineering

Andrew, a 17 zear old university student decided to hold a post exams party for his friends.

Andrew asked Kath, a family friend and the owner of 'Kath's Katerers' to supply food and drinks to the party at a cost of 3000 AUD. Kath agreed and on the date of the party arrived at Andrew's house with the ordered food and drinks.

One hour earlier, Andrew has gone to an ice vending machine to buy several lots of ice to keep the party drinks cool. When Andrew was collecting the ice the vending machine malfunctioned and unexpectedly a block of ice fell from the machine breaking 3 of Andrew's fingers. The machine had a large notice on it stating: Persons using this machine do so at their own risk.'

Andrew had to go to the hospital. He cancelled the party and sent a message to Kath to take back the food and drinks he had ordered telling Kath party could not be held.

Kath wants payment of 3000.

Andrew refuses to pay and wants to sue the owner of the vending machine for damanges for breach of contract.

Posted Date: 2/25/2013 2:25:05 AM | Location : United States







Related Discussions:- Principles of contract law, Assignment Help, Ask Question on Principles of contract law, Get Answer, Expert's Help, Principles of contract law Discussions

Write discussion on Principles of contract law
Your posts are moderated
Related Questions
Describe language processing activities? There are two different kinds of language processing activities: a. Program generation activities b. Program execution activities

Which of following can not be accessed randomly DRAM, SRAM, ROM or Magnetic tape ? Ans. Magnetic tape cannot be accessed randomly; it can only be accessed sequentially.

What is Synchronous reset? Synchronous reset: Synchronous reset logic will synthesize to smaller flip-flops, mainly when the reset is gated along with the logic generating t

design a gray to bcd code converter using 16:1 de multiplexe

Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list

State about the Object oriented analysis Object oriented analysis (OOA) is concerned with developing software engineering specifications and requirements that expressed as a s

Q. Find the complement of following functions and reduce to minimum literals 1. (A+C+D) (A+C+D') (A+C'+D)(A+D') 2. ABC(ABC' + AB'C + A'BC) 3. AB + AB' + A'C +A'C'

The customers visit the website and browse through the products, looking at pictures and products details. When the customer finds his desired product, he usually adds it to his ca

Coupling and cohesion can be shown using a:- Dependence matrix

Q. Selecting integerated learning experiences? It is important that we select appropriate experiences for children, more so those that are from the child's world and emerge fro