Answer:
Before-tax cost of debt ⇒ A. The interest rate the firm must pay on new long-term borrowing.
This refers to the interest rate that a firm will pay on long term borrowing as compensation to the lenders for lending the company some funds.
Cost of preferred stock ⇒ C. rate of return investors require based on the preferred stock dividend.
The cost of the preferred stock is the rate of the preferred dividend that investors require they are paid every year if dividends can be paid and sometimes even when it cannot.
Cost of Common Stock ⇒ B. the rate of return on retained earnings, and adjusted for flotation costs .
Commons stock costs is the required return on the retained earnings of a company.
WACC ⇒ D. the average cost of raising new financing.
Weighted Average Cost of Capital (WACC) represents the total cost of raising capital for the company as it incorporates the costs of debt, preferred stock and common stock.
Answer:
earnings per share = $0.67
Explanation:
the earnings per share = stock price / multiple value = $10 / 15 = $0.67
When you read that a stock is selling at a multiple of X, it means that the stock price is currently X times the current earnings per share. In this case, since the stock price is $10, to calculate the EPS you must divide 10 by the multiple value.
Answer:
c. financial position of a business at a particular point in time
Explanation:
A balance sheet is a financial statement that shows the financial position of a business at a particular point in time. It lists the assets, liabilities, and owner's equity.
I hope my answer helps you
Answer: spoofing or phishing
Explanation: Spoofing is the act of concealing, as a known, reliable source, a communication from an anonymous source.Spoofing can be extended to emails, phone calls, and websites, or may be more sophisticated, such as an IP address spoofing device, Address Resolution Protocol (ARP) or Domain Name System (DNS) server.
Fraudulent sending of emails by reputable companies to force individuals to reveal personal information, such as passwords and credit card numbers.
Hence from the above we can conclude that the given case relates to spoofing or phishing.