Answer: 10 years to call
Explanation:
Maturity period = 25 years
Coupon rate = 7%
6.25% basis is,
- Callable in 10 years at 103
- Callable in 15 years at 102
- Callable in 20 years at par
This bond is considered as premium bond. Therefore, in case of premium bonds, Yield to call will be lower than the yield to maturity. Here, the question is which call date should be utilized. According to the rule of thumb, it states that always use the term that is nearest to the whole call date.
Hence, on the customer's confirmation, the dollar price quoted must be based on 10 years to call.
Answer: b. Dow Jones Industrial Average
Explanation: The Dow Jones Industrial Average index futures has a multiplier of $10 times the index value which is used to calculate contract settlements and helps determine the dollar value of each point of price movement. For example, Dow multiplier is 10, meaning each Dow point is worth $10 per contract.
An$8,000
swer:
Explanation:
Non-cash contributions of capital gain property are subject to limit of 30% of AGI = 30% * 160000 = $48,000
$40,000 in property to public charity is allowable deduction (Contribution to private non-operating foundation is further subject to a 30% limit)
Hence, allowable deduction of contribution to private non-operating foundation = 30% * AGI (Contribution subject to 30% limit) = $48,000 - $40,000 = $8,000
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.

Answer:
P=$40
Explanation:
We will apply constant dividend growth model that is =P = D1 / ( k-g )
P is the price of share ?
D1 is the current divided $2
k is the rate of return 9%
G is the constant growth 4%
P=2/(9%-4%)
P=$40