Principles of contract law, Computer Engineering

Andrew, a 17 zear old university student decided to hold a post exams party for his friends.

Andrew asked Kath, a family friend and the owner of 'Kath's Katerers' to supply food and drinks to the party at a cost of 3000 AUD. Kath agreed and on the date of the party arrived at Andrew's house with the ordered food and drinks.

One hour earlier, Andrew has gone to an ice vending machine to buy several lots of ice to keep the party drinks cool. When Andrew was collecting the ice the vending machine malfunctioned and unexpectedly a block of ice fell from the machine breaking 3 of Andrew's fingers. The machine had a large notice on it stating: Persons using this machine do so at their own risk.'

Andrew had to go to the hospital. He cancelled the party and sent a message to Kath to take back the food and drinks he had ordered telling Kath party could not be held.

Kath wants payment of 3000.

Andrew refuses to pay and wants to sue the owner of the vending machine for damanges for breach of contract.

Posted Date: 2/25/2013 2:25:05 AM | Location : United States







Related Discussions:- Principles of contract law, Assignment Help, Ask Question on Principles of contract law, Get Answer, Expert's Help, Principles of contract law Discussions

Write discussion on Principles of contract law
Your posts are moderated
Related Questions
Use of instruction register and program counter: Q. What is the use of instruction register (IR) and program counter (PC)? Ans: The instruction register (IR) holds the inst

What is divide overflow?  The division operation might result in a quotient with an overflow. Overflow happens when the length of the registers is finite and will not hold a nu

Q. Define the System users? System users are defined as the people who employ information systems or who are affected by information system on a regular basis i.e. validating,

As per the JMS specification, when you are in a transaction, the acknowledge Mode is ignored. If acknowledge() is known as within a transaction, it is ignored.

PS/2 connector (PS/2 keyboards): These were introduced with IBM's PS/2 computers and therefore are known as PS/2 connectors.  They have 6-pins but actually their wiring is just

Creation Deductive Inferences : Here we have shown how knowledge can be represented in first-order logic or how rule-based expert systems expressed in logic can be constructed

The devices on the I2C bus are either masters or slaves. The master is the device that is responsible for driving the SCL clock line, while the slaves are the devices that respond

How the production of metal contributes to computer engineering designing?

Sir,wish to receive guidance from you how to join in Aeronautical Engineering after Bsc Computer Science. I am a Girl.Interested to work in AE field, it will be better to use in co

Define Micro operation. The operations implemented on data stored in the registers are called Micro operation. A microperation is an elementary operation performed on the infor