Question

In: Accounting

Identify three ways that governments can alter their tax system to increase revenues.

Identify three ways that governments can alter their tax system to increase revenues.

Solutions

Expert Solution

Answer :

Taxation is the main source of revenue for government. following are three ways that government can alter their tax systems to increase its revenues.

1. Increasing the tax rate:

  • the first way to increase revenue through alteration in tax system, is that the government should increase the tax rate on individual incomes , corporate business income etc.
  • Tax on commodities and services can also be increased, such as increase in tax percentage of GST and VAT.
  • indirect taxes on import, export such as excise and custom duties , etc can be increased .
  • Tax rate can be increased on consumption of luxury goods .

2. Reducing or eliminating the allowed deductions from taxable income :

  • there are various kind of deductions allowed from individual and business taxable income .
  • such as standard deductions and deductions for various kind of investments in insurance policies such as life insurance, medical insurance etc .
  • revenue through taxes can be increased by elimination of such allowed deductions.

3. Introducing and imposing new taxes :

  • government can also boost revenues by introducing new taxes.
  • for example : VAT or GST can be introduced on commodities where it has not been introduced.
  • or these taxes can be made applicable for the commodities , which are presently outside from the scope of these taxes.
  • Tax coverage can be enhanced to more goods and services.

~~~~~~Dear student, please upvote if it helps. Thanx.


Related Solutions

There are three specific ways available to the Federal Reserve to alter the money supply? Identify...
There are three specific ways available to the Federal Reserve to alter the money supply? Identify each method and explain each one works. Which one is applied most often and why is this the case?
Identify three ways users can be authenticated and give an example of each.
Identify three ways users can be authenticated and give an example of each.
Predict three ways that the normal defense system in the body can fail.
Predict three ways that the normal defense system in the body can fail.
An offer is terminated by acceptance. Identify three other ways in which an offer can be...
An offer is terminated by acceptance. Identify three other ways in which an offer can be terminated.
Identify at least three ways you can improve your own writing.
Identify at least three ways you can improve your own writing.
1) What are all of the ways the African trypanosome can alter the host’s immune response...
1) What are all of the ways the African trypanosome can alter the host’s immune response in favor of itself? 2) 1. Matching a) Glycosome --> T. cruzi b) Mitochondri Trypomastigote c) TCA present d) Intercellular -->T. cruzi e) Stage that divides                                                                       Amastigote f) Intracellula --> T. rhodesiense   g) VSG present Long slender    h) Pathology stage Trypomastigote i) Undulating membrane j) Mott cells in brain                
Identify and describe at least three ways the criminal justice system operates which allows for overrepresentation...
Identify and describe at least three ways the criminal justice system operates which allows for overrepresentation of African Americans and Latinos in the prisons
Identify and discuss at least three (3) ways how email can be used to commit and/or...
Identify and discuss at least three (3) ways how email can be used to commit and/or cover up a crime. Include how forensics analysis can be used to uncover this evidence. 150 words or more.
List and describe three ways that increasing N can increase power in any t test.
List and describe three ways that increasing N can increase power in any t test.
There are three ways to provide mutual exclusion in a system. Explain how mutual exclusion can...
There are three ways to provide mutual exclusion in a system. Explain how mutual exclusion can be guaranteed using hardware approach and software approach.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT