Question

In: Computer Science

Web Resources

However, she wants to know which type of page Web Resources should advertise and market. Although custom pages have a higher contribution margin per service, each custom page requires 15 design hours, whereas basic pages require only 2 design hours per page. On which page type should the company focus? Explain your answer

Solutions

Expert Solution

Step 1

Computer Science homework question answer, step 1, image 1

Step 2

To calculate the present value of annual cash flow of $57,000 at 14% rate of return for 6 years,
we need the present value of annuity of $1 at 14% rate of interest discounted for 6 years.


The present value of annuity of $1 discounted at 14% interest for 6 years = 3.889.

Calculate the present value of annuity of $57,000 at 14% interest discounted for 6 years as follows:

Present Value = Annual cash inflow value ×Annuity value= $57,000×3.889=$221,673">Present Value === Annual cash inflow value ×Annuity value $57,000×3.889$221,673Present Value = Annual cash inflow value ×Annuity value= $57,000×3.889=$221,673

Calculate the net present value of the machine.

Present value of the annual cash flow = $221,673

Present value of the cash outflow(cost of the machine) = $ 218,500

hence, net present value =Present value of cash inflow-Present value of cash outflow=$221,673-$218,500=$3,173">hence, net present value ===(Present value of cash inflowPresent value of cash outflow)$221,673$218,500$3,173hence, net present value =Present value of cash inflow-Present value of cash outflow=$221,673-$218,500=$3,173

 


Since the present value of the cash inflow is greater than the present value of cash outflow by $3,173, the company should purchase the machine.

Related Solutions

Research information on how Python is used for Web applications and accessing resources on the Web?...
Research information on how Python is used for Web applications and accessing resources on the Web? Please help me for short discussion. Thanks in advance.
Operations management is an intricate web of internal and external interrelationships of people, processes, and resources....
Operations management is an intricate web of internal and external interrelationships of people, processes, and resources. Identifying and assessing these relationships can help keep operational strategies and development headed in the right direction. What is Supply Chain Management (SCM), and why is it important to business operations? In what ways is SCM for a manufacturer similar or different than that of a service provider? What is Enterprise Resource Planning (ERP), and how is it related to SCM? Does this relationship...
Use the web or other resources to research at least two criminal or civil cases in...
Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved. Need 250 words
Use the web or other resources to research at least two criminal or civil cases in...
Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved. Need 300 words Please don't write already existing chegg anw
Using the knowledge you gathered throughout this module and any web resources, describe the process of...
Using the knowledge you gathered throughout this module and any web resources, describe the process of genetic engineering. What are some advantages and disadvantages of genetic engineering? Why is there so much controversy surrounding this field? What are some ethical issues associated with the production of genetically engineered organisms? Please provide a scientific rationale for your response. (400 - 500 words; 4 points)
Using the Web Resources provided this week*, identify a current epidemiological concern either at the local,...
Using the Web Resources provided this week*, identify a current epidemiological concern either at the local, national, or global level. Address the following questions: What is the epidemiological concern? What population is it affecting? What potential population may be affected if this concern is not addressed? What are the risk factors associated with the epidemiological concern? What public health recommendation can you make to alleviate your identified epidemiological concern? Based on the reading how might you evaluate the effectiveness of...
Electronic Commerce Hardware and Software Using the Web or other resources, find an article that describes...
Electronic Commerce Hardware and Software Using the Web or other resources, find an article that describes a successful Web service(s) software and the hardware necessary to support this application. Describe how the company implemented Web service(s) software and hardware and explain why using this combination of software and hardware is better than using an alternative approach to solve the problem.

Using information from these web sites, along with other resources, prepare a report that addresses the...
Using information from these web sites, along with other resources, prepare a report that addresses the following issues for your selected country: (1) compare and contrast the corporate governance principles of your selected country with the United States, (2) identify the relevant corporate governance parties and their roles, (3) describe recent challenges related to the corporate governance for your selected country, and (4) list and describe recent corporate governance activities in your selected country.
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion...
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented. Post between 300 and 400 words.
Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in...
Subject: Introduction to Cyber Security Do not copy from internet/ web resources/. Answer should be in own opinion and minimum 250 words. Explain how that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks.. Discuss how operationally, the security engineer performs threat and vulnerability assessments to identify security risks, and then regularly updates the security controls identified through those assessments.Examine the tools needed...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT