Product Cost Method of Product Costing
Voice Com, Inc., uses the product cost concept of applying the cost-plus approach to product pricing. The costs of producing and selling 4,700 units of cell phones are as follows:
| Variable costs: | Fixed costs: | |||||||
| Direct materials | $74 | per unit | Factory overhead | $200,400 | ||||
| Direct labor | 31 | Selling and admin. exp. | 69,000 | |||||
| Factory overhead | 25 | |||||||
| Selling and admin. exp. | 21 | |||||||
| Total variable cost per unit | $151 | per unit | ||||||
Voice Com desires a profit equal to a 14% rate of return on invested assets of $599,500.
a. Determine the amount of desired profit from
the production and sale of 4,700 units of cell phones.
$
b. Determine the product cost per unit for the
production of 4,700 of cell phones. If required, round your answer
to nearest dollar.
$ per unit
c. Determine the product cost markup percentage
(rounded to two decimal places) for cell phones.
%
d. Determine the selling price of cell phones. Round to the nearest dollar.
| Cost | $per unit |
| Markup | $per unit |
| Selling price | $per unit |
In: Accounting
List 10 businesses (real business in the Philippines eg. Insular Life) subject to other percentage taxes and their percentage rates.
In: Accounting
The construction of a house is developed and in the table you will find all the activities described and the information that corresponds to predecessors and the duration of each activity. Adjust your analysis to the information in the table without modifying the baseline information. Analyze the project execution time following the PERT Diagram methodology. Establish Critical Path of the project. Set the duration of the work. Complete the table.
| ACTIVITY | DESCRIPTION | PREDECESSOR | DURATION (WEEKS) | Earliest Time | Latest Time |
| A | PRELIMINARY JOBS | - | 2 | ||
| B | STRUCTURE | A | 3 | ||
| C | FOUNDATIONS AND WALLS | B | 4 | ||
| D | SPECIAL SYSTEMS | A | 2.5 | ||
| E | ROOF AND COVERINGS | C | 2 | ||
| F | TOUCH-UPS | E | 5 | ||
| G | COATINGS | E | 3 | ||
| H | PAINTING | F,G | 2 | ||
| I | DELIVERY | H | 1 |
In: Operations Management
The construction department is planning to bid on a large project for the development of a new airport in Chicago area. The following table shows major activities, times, and sequence required:
|
Activity |
Immediate Predecessor |
Activity Duration, Months |
||
|
Optimistic |
Most Likely |
Pessimistic |
||
|
A |
- |
2 |
3 |
4 |
|
B |
A |
1 |
2 |
3 |
|
C |
A |
4 |
5 |
12 |
|
D |
A |
3 |
4 |
11 |
|
E |
B |
1 |
3 |
5 |
|
F |
C |
1 |
2 |
3 |
|
G |
D |
1 |
8 |
9 |
|
H |
E, F |
2 |
4 |
6 |
|
I |
H |
2 |
4 |
12 |
|
J |
G |
3 |
4 |
5 |
|
K |
I, J |
5 |
7 |
9 |
*For problems A and C, the textbook focused on the Critical Path Method (AON Network/PERT Chart).
In: Operations Management
Assignment #2 will be the construction of a program that reads in an unspecified number of integers from standard input, performs some calculations on the inputted numbers, and outputs the results of those calculations to standard output. The numbers could be delimited by any kind of whitespace, i.e. tabs, spaces, and lines (Note that if you use the Scanner class, you do not have to worry about these delimiters. They will be taken care of). Your program will continue to read in numbers until the number 0 is entered. At this point, the calculations will be outputted in the following format:
The maximum integer is 0
The largest even integer in the sequence is 0
The count of negative integers in the sequence is 0
The sum of even integers is 0
This means that using all numbers your program reads (including the last number 0), you need to compute the maximum, compute the largest even integer (can be divided by 2, "num%2 == 0"), count how many negative integers are in the sequence, and compute the sum of even integers.
Note that the above is an output for the first test case. For other test cases, you will have different numbers.
Do not prompt to query for the numbers. The number 0 is included in the sequence of integers and should be included in all of your calculations.
In: Computer Science
Samuelson and Messenger (SAM) began 2021 with 200 units of its
one product. These units were purchased near the end of 2020 for
$22 each. During the month of January, 100 units were purchased on
January 8 for $28 each and another 200 units were purchased on
January 19 for $30 each. Sales of 130 units and 130 units were made
on January 10 and January 25, respectively. There were 240 units on
hand at the end of the month. SAM uses a perpetual
inventory system.
Required:
1. Complete the below table to calculate ending
inventory and cost of goods sold for January using FIFO.
2. Complete the below table to calculate ending
inventory and cost of goods sold for January using average
cost.
Complete the below table to calculate ending inventory and cost of goods sold for January using FIFO.
|
Complete the below table to calculate ending inventory and cost of goods sold for January using FIFO.
Complete the below table to calculate ending inventory and cost of goods sold for January using average cost (Round cost per unit to 2 decimal places. Enter inventory reductions from sales as negative numbers.)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
In: Accounting
In: Electrical Engineering
Two construction workers pull on the control lever of a frozen valve (Figure P4.14). The lever connects to the valve’s stem through the key that fits into partial square grooves on the shaft and handle. Determine the net moment about the center of the shaft.
Figure P4.14

In: Mechanical Engineering
Problem 2. Give an example of an open set O such that the boundary of the closure of O has positive Lebesque measure. (Hint: try to play with the union of open intervals taken out of [0, 1] during the construction of Cantor set on... ODD steps.)
In: Advanced Math
Topic: Encrypt-then-authenticate scheme, Cryptography
Let ΠE = (GenE, EncE, DecE) be an encryption scheme and ΠM = (GenM, MacM, VrfyM) be a MAC scheme.
(a) Formalize the construction of the “encrypt-then-authenticate” scheme Π = (Gen, Enc, Dec) given ΠE and ΠM
In: Computer Science