Questions
A government is running a balanced budget. An election is approaching and the government decides on...

A government is running a balanced budget. An election is approaching and the government decides on a one-time, temporary, massive tax cut that will cut tax revenue by $50 billion in one year; after the year is over, tax rates and tax revenue return to normal. The government decides to issue perpetual bonds of $50 billion to cover the cost of the tax cut. The interest rate on these bonds is constant at 6%. The tax to pay the interest in the future will be levied onthe private sector. Suppose that half of the population plans ahead and wants to leave enough in bequests to the next generation so that they are not harmed by future higher taxes. The other half of the population spends all they can now. a. What is the impact of the tax cut on domestic saving? b. What happens to consumption? c. Who buys the $50 billion of debt?.

In: Economics

5. Discuss the topic of the following federal tax forms: a. 990 – b. Schedule SE...

5. Discuss the topic of the following federal tax forms:

a. 990 –

b. Schedule SE –

c. Form W-2 –

6. Identify the topic of the following Treasury Regulations, Revenue Rulings or Revenue Procedures:

a. Reg. § 301.6333-1 –

b. Treas. Reg. 1.482-7(b)(1)(iii). -

c. Rev. Proc. 89–14, 1989–1 C.B. 814 -

7. Apply your knowledge of tax law, to other areas of the United States Code, given that sometimes an accountant might need to access other parts of the United States law:

   a. 15 U.S.C., chapter 2B, section 78j-1(b)(1) -

b. 31 U.S.C., subtitle B, chapter X -

c. Title 18, chapter 31, section 664 -

In: Accounting

Question 2 (b) Ebo is the owner of medium-sized company that assembles personal computers in Ghana....

Question 2 (b)
Ebo is the owner of medium-sized company that assembles personal computers in Ghana. He purchase most of the components for the company such as random access memory (RAM) on a competitive market. In order to maximise profit in the short run, he employed an economist to estimate the demand curve, which he was able to use to derive the marginal revenue (MR) from his product as: ?? = 70 − 16?. The economist also derived the marginal cost function (MC) as: ?? = 6? − 51.
(i) Find the total revenue function and deduce the corresponding demand equation.
(ii) Find the total cost function if the fixed cost is 400.
(iii) Determine the number of laptops that maximizes the company’s profit. (iv) Howmuchshouldthefirmchargeforonecomputer?
(v) Find the total profit at the profit maximizing level of output.

In: Economics

6. a. The market for coats is perfectly competitive with market supply given by QS= 2500...

6.

a. The market for coats is perfectly competitive with market supply given by QS= 2500 + 40P and market demand given by QD given by QD= 7500 – 10P. Solve for the equilibrium values of price and quantity. Calculate the values of elasticity of demand and elasticity of supply at the equilibrium.

b. With reference to question 6a, the government imposes a tax of 20% on coats. Calculate the new equilibrium prices and quantity and explain how the burden of the tax is shared between consumers and producers. How much tax revenue is collected?

c. With reference to your answer for part b, suppose that the government had imposed on the producers a license fee (a one time fixed payment) that generated the same revenue for the government as did the tax. What is the new equilibrium value of price and quantity. Explain the difference between the two answers.

In: Economics

A firm uses activity-based costing and has the following activity rates: $100 per machine hours, $500...

A firm uses activity-based costing and has the following activity rates: $100 per machine hours, $500 per batch start, $5 per order.

The firm has two several products, including the following two.

Product 1: $100,000 revenue, $50,000 direct costs, 250 machine hours, 25 batch starts, 500 orders

Product 2: $95,000 revenue, $40,000 direct costs, 40 machine hours, 16 batch starts, 400 orders

Which of the following process improvements is the MOST profitable?

a.

Reduce both product’s batch starts by 25%.

b.

Reduce Product 1’s direct costs by 12.5%.

c.

Reduce Product 2’s orders by 50%.

d.

Reduce machine hour activity rate cost by 25%.

In: Accounting

Two accountants for the firm of Elwes and Wright are arguing about the merits of presenting...

Two accountants for the firm of Elwes and Wright are arguing about the merits of presenting an income statement in a multiple-step versus a single-step format. The discussion involves the following 2017 information related to Carla Company ($000 omitted).

Administrative expense
    Officers' salaries $4,990
    Depreciation of office furniture and equipment 4,050
Cost of goods sold 60,660
Rent revenue 17,320
Selling expense
    Delivery expense 2,780
    Sales commissions 8,070
    Depreciation of sales equipment 6,570
Sales revenue 96,590
Income tax 9,160
Interest expense 1,950


Common shares outstanding for 2017 total 40,550 (000 omitted).

Prepare an income statement for the year 2017 using the multiple-step form. (Round earnings per share to 2 decimal places, e.g. 1.48.)

In: Accounting

There's a country with 1 company and 1 person. A company's total production, which is country's...

There's a country with 1 company and 1 person.

A company's total production, which is country's real GDP, is Y=B* N+b

A company's labor demand by matching MPN is w=B which is perfectly elastic

total time h=N+l N for work time and l for leisure time

C is consumption.

to maximize a person's utility, U(C,l) = C^(1-a)l^a

desired C is (1-a)(w*h+b)

desired l is (a/w)(w*h+b)

labor supply curve is (1-a)*h-(a*b)/w

labor demand curve is B

if there's a tax rate t and its tax revenue twN is a government revenue.

Show how this new tax will influence real gross domestic product and a person's desired consumption

In: Economics

1. One way of accessing financial information about a company is to look it up at...

1. One way of accessing financial information about a company is to look it up at the company's website. Access the most recent annual report of a company of your choice from the company's website and address the following points. a. Review the company's footnotes (notes accompanying the financial statements) to discover how it applies the revenue recognition principle and when it recognizes revenue. Report what you discover. b. Based on your observation of the financial statements, what amount should be credited to Income Summary to summarize its revenues earned? c. Based on your observation of the financial statements, what amount should be debited to Income Summary to summarize its expenses incurred? d. What is the balance of its Income Summary account before it's closed?

In: Accounting

On 31 December 2018, the accounting records in Ahmed’s Company showed the following information:                           &

On 31 December 2018, the accounting records in Ahmed’s Company showed the following information:

                                                                                          (in Dirhams)

Cash

          49,500

Accounts Receivable

         125,000

Supplies

             1,500

Prepaid Insurance

           12,000

Equipment

           70,000

Building

      420,000

Land

         111,500

Accounts Payable

           80,000

Notes Payable

         170,000

Common Stock

         410,000

Retained Earnings

          65,000

Dividends

           20,000

Service Revenue

         174,000

Interest Revenue

             1,000

Salaries Expense

           52,000

Advertising Expense

           17,000

Insurance Expense

             5,000

Utilities Expense

           13,750

Interest Expense

             2,750

Prepare the Income Statement AND Balance Sheet for year ended December 31, 2018

Ahmed’s Company

Income Statement For Year Ended 31 December 2018

Revenues:

            .

Total Revenues

Expenses:

Total Expenses

Net Income/Profit

In: Accounting

Case Two: Sony’s Response to North Korea’s Cyberattack On November 24, 2014, employees of Sony Pictures...

Case Two: Sony’s Response to North Korea’s Cyberattack

On November 24, 2014, employees of Sony Pictures Entertainment booted up their computers to find an image of a skull along with a message from a group calling itself the Guardians of Peace. The message read: “We’ve already warned you and this is just the beginning. We’ve obtained all your internal data including your secrets and top secrets [which will be released] if you don’t obey us.”

As Sony would eventually discover, the hackers had stolen reams of sensitive data, including the Social Security numbers of 47,000 current and former employees, system passwords, salary lists, contracts, and even copies of some Sony employees’ passports. The hackers accessed hundreds of Outlook mailboxes as well as Sony IT audit documents. They also stole media files and placed pirated copies of five of Sony’s movies on illegal file-sharing servers. Sony was forced to completely shut down its information systems in an attempt to stem the data breach. Ultimately, Sony would determine that the damage done by the hackers was far more extensive than it first believed. Not only had data been stolen, but 75 percent of the company’s servers had been destroyed and several internal data centers had been wiped clean.

Contacted within hours of the event, the FBI soon identified the culprit. In June, several months before the hack, North Korea’s Ministry of Foreign Affairs had declared that it would take “a decisive and merciless countermeasure” if the U.S. government did not prevent the planned release of Sony’s motion picture The Interview, which features two reporters who venture to North Korea to interview and assassinate the country’s dictator, Kim Jong-un. In the film, the main character, initially won over by the dictator’s apparent kindness, discovers that the tyrant is lying about the country’s prosperity and freedoms. The plot, along with the movie’s unflattering portrayal of the dictator as ruthless and childish, had caught the attention of the North Korean government.

The U.S. government disclosed that it had proof that the North Koreans had made good on their threat. The U.S. National Security Agency (NSA) had reportedly penetrated the North Korean cyberwarfare unit four years prior to the attack and had been monitoring its capabilities since then. After Sony alerted the FBI of the attack, the NSA was able to trace the attack back to North Korea, using a digital fingerprint the hackers had left in the malware. Several weeks after the attack, FBI Director James Comey, revealed in a speech that the Sony hackers had been sloppy. “We could see that the IP [Internet protocol] addresses that were being used to post and to send the emails were coming fromIPs that were exclusively used by the North Koreans.”

The hackers warned Sony not to release The Interview, and then on December 16, the group issued a message threatening large terrorist attacks on theaters that showed the film. The National Organization of Theatre Owners contacted the Department of Homeland Security for information and advice. The FBI and NSA released a bulletin explaining that they had no credible information about a plan to attack theaters, but they could neither confirm nor deny whether the hackers had the ability to launch such an attack. Shortly after the bulletin was released, the four largest U.S. theater chains withdrew their requests to show the movie—Carmike Cinemas first, followed by Regal Entertainment, AMC Entertainment, and Cinemark. Within hours, Sony announced that it had canceled the film’s release. White House officials, Hollywood personalities, and the media were aghast. Comedian Jimmy Kimmel tweeted that the decision by the major theater chains to refuse to screen The Interview was “an un-American act of cowardice that validates terrorist actions and sets a terrifying precedent.”

On December 19, President Obama addressed the issue publicly: “Sony is a corporation. It suffered significant damage. There were threats against its employees. I’m sympathetic to the concerns that they faced. Having said all that, yes, I think they made a mistake.” Obama explained, “We cannot have a society in which some dictator in some place can start imposing censorship in the United States.” The president’s remarks highlighted the seriousness of the incident to the American public, many of whom came to view the incident as an attack on the freedom of expression.

In response to Obama’s comments, Sony officials released a statement later the same day: “Let us be clear—the only decision that we have made with respect to release of the film was not to release it on Christmas Day in theaters, after the theater owners declined to show it.... After that decision, we immediately began actively surveying alternatives to enable us to release the movie on a different platform. It is still our hope that anyone who wants to see this movie will get the opportunity to do so.”

In fact, on Christmas Day, the planned release day in the theater, The Interview became available through video on- demand outlets such as Amazon.com, and within less than a month, the movie had brought in over $40 million in revenue. Approximately 6 million viewers had rented or purchased the movie in this way. Several hundred movie theaters that opted to screen the movie generated another $6 million. Over the next two months, Sony also released the movie on Netflix, on DVD and Blu-Ray, and in theaters in other countries.

Meanwhile, Sony has worked to recover from the damage done to the company itself by the hack. Sony Pictures’ parent company, which is based in Japan, asked regulators there for an extension to file its third-quarter financial results. It also fired executive Amy Pascal whose leaked emails contained derogatory remarks about Hollywood producers and the U.S. president’s movie preferences. The company also provided one year of free credit protection services to current and former employees.

In February 2015, President Obama held the first-ever White House summit on cyber security issues in Silicon Valley. The summit was billed as an attempt to deal with the increasing vulnerability of U.S. companies to cyber attacks— including those backed by foreign governments. However, the chief executives of Microsoft, Google, Facebook, and Yahoo all refused to attend the summit. Those companies have long advocated for the government to stop its practice of collecting and using private data to track terrorist and criminal activities and have worked to find better ways to encrypt the data of their customers. However, U.S. security agencies have continually pressured the IT giants to keep the data as unencrypted as possible to facilitate the government’s law enforcement work. Ultimately, both the government and private businesses will need to find a way to work together to meet two contradictory needs—the country’s need to make itself less vulnerable to cyber attacks while at the same time protecting itself from potential real-world violence.

Critical Thinking Questions:

  1. Do you think that Sony’s response to the attack was appropriate? Why or why not?
  2. What might Sony and the U.S. government done differently to discourage future such attacks on other U.S. organizations?
  3. Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyber attacks?

In: Operations Management