Hat Co. is considering the replacement of its old, fully depreciated hat press. Two new presses are available. A steam press costs $200,000, has a five-year expected life, and will be able to make twice as many hats as the old machine, yielding an additional $60,000 in after-tax cash flows. A dry press costs $300,000, has a 7-year expected life, and will generate after-tax cash flows of $63,400 per year. Currently, Hat Co. is valued at $5,000,000 and has $600,000 in debt at 6%. Its tax rate is 20%. The cost of equity for similar companies is 15%.
Calculate Hat Co.'s after-tax weighted average cost of
capital.
What is the NPV (after-tax) and discounted breakeven for the steam
and dry presses?
Which press should Hat Co. select?
In: Accounting
Part two! the needed one....
Assume that Chapman machine shop is expected to grow at a rate of 3% after year 4. If the value of debt is $150,000, and there are 50,000 shares outstanding, what is the price per share of Chapman’s common stock?
In: Finance
|
Husband |
62 |
67 |
51 |
62 |
73 |
47 |
55 |
60 |
80 |
76 |
42 |
|
Wife |
55 |
68 |
56 |
54 |
60 |
50 |
49 |
58 |
75 |
74 |
49 |
At the .05 level of significance, is there evidence that there is a difference in the ages when husbands and wives get their Hollywood Walk of Fame star?
In: Statistics and Probability
You discovered a novel antibiotic-resistant gene in a bacteria and would like to introduce the gene into a plant. Describe how you would clone and introduce the gene, and how you would determine whether each step was successful.
In: Biology
1) Why is design so important to a good business document?
2) Name, describe, and discuss three or four major factors of design that can contribute to a better design.
3) In terms of these three or four same factors, what could go wrong?
4) What are the major considerations for creating text in a document? Do you ever think about these considerations?
5) Which graphic elements seem most relevant to your own current job or career plan?
6) Were you surprised by any of the questions the book listed to consider when adding a graphic element? Which ones and why? Do certain questions seem more useful to you?
7) I would argue there is a thin line between good design and overkill. What do you think I mean? What do you think the best way to learn that line would be?
In: Operations Management
CASE STUDY –MedQuipMedQuip, a company that specialises in the production of personalised medical equipment,was recently accused of failing to reasonably secure the Protected Health Information (PHI) and Personally Identifiable Information (PII) of its customers. Between June19 and July 12 2019, MedQuip’s network was breached, with the attacker stealing over a million PHI and PII records. A law enforcement investigation and forensic analysis of MedQuip’s network found that the attacker first penetrated the network through a third-party user’s computer. Due to weak segmentation between non-sensitive and sensitive parts of MedQuip network, the attacker was able to access and modifysensitive PHI and PII datafor the purpose of selling the data to MedQuip’s competitor. MedQuip’s InternalIT staff had stored sensitive data in an unencrypted format on unencryptedhard drives, making it easy for the attacker to access and steal sensitive data.This highlights a gap in knowledge with respect toappropriateITsecurity practicesand reveals MedQuip’s lack of understanding regarding the consequences of poor information security.It is estimated that the billing information of 9,000 customerswas compromised.While it is understood that MedQuip has a robust IT security policy based on industry regulations, it appears the policy hasn’t been enforced, making it possible for the breach to be successful. In a press conference discussing the incident, the IT director commented that while the company had an IT security policy in place to prevent such breaches, security controls defined inthe policy relating to data handlingand storagehadnot been implemented. Following furtherinternalinvestigations, the concerned employees could not be penalised asthe IT security policy didnotmeet certain criteria.
(a) According to the Australian Cybercrime Act, briefly discuss, with evidence from the MedQuip case study, the level of crime that was committed in this case.
(b) Which Information Privacy Principle was breached in this case
In: Computer Science
The subject is public health
1. Discuss how the strategies implemented in the management of the
novel coronavirus at both the global and local levels is
consolidated by the Public Health Act 851, Act 2012 of Ghana.
Provide relevant examples where necessary.
In: Nursing
In: Biology
The Life of Pi
1. What does the author tell us in the introduction? What expectations does it set?
2. What religions does Pi practice? How does he find each? How does he describe each? What are some reactions to his multi-religious practices?
3. Explain how Pi’s twin concerns of theology and zoology are illustrated by Mr. Kumar and Mr. Kumar or the sloth.
4. Reflect on what story means to you. What is “the better story” according to Pi? How does this relate to religion, to Pi’s life in general, and to truth?
5. The “official report” gathered by the Japanese investigators is supposed to be the “truth” but is filled with doubt.What does this suggest? ****Please keep in mind that these questions are to be based on the novel NOT the movie. The movie is very different from the novel. Thank you. : ) ****
In: Psychology
AFR Manufacturing Company’s senior management asked the internal audit function to conduct an operational safety audit of the production facility’s metal drill press unit. More specifically, the internal audit function was asked to determine how well the metal drill press equipment and equipment operators comply with company safety policies. Five downtime injuries of drill press operators occurred in the last six months. The total downtime for the five injuries was 37 hours. Management estimated that the drill press downtime, and the resultant decrease in overall productivity, reduced revenue by approximately $265,000. In addition to the downtime injuries, two drill press operators experienced detectible hearing loss during the six-month period. The internal auditors learned that the company’s safety policies include the following: ■ Operators are required to wear safety glasses, ear plugs, and protective gloves. ■ The drill presses are required to have a clear, plastic safety shield and a protected channel to safely feed the metal through the press. ■ The drill is operated by a knee switch. The operator engages and disengages the drill by shifting his or her right knee. The internal auditors found the equipment to be in relatively poor condition with little evidence of any regular maintenance. Drill bits were not replaced as they became dull, and broken bits often were used because new bits were not kept in supply. Two of the 10 drill press machines were missing safety shields. Five of the 10 machine operators were using the protective ear plugs at the time the auditors visited the plant and six were wearing safety glasses. Four of the knee switches were found to be sticking occasionally in both the off and on positions. The auditors perceived a general sense of negligence—negligence by production management, drill press equipment operators, and maintenance employees. 1.State the internal audit engagement purpose and objective. 2. Documents 2 internal audit observations that include all 4 attributes - condition, criteria, consequence(s) and cause(s). 3.Indicates 2 areas where internal audit might provide consulting assistance in response to the audit findings.
In: Accounting