Answer: c. $81,202
Explanation:
The inflow will be annual and constant which makes it an annuity. Given the discount rate of 12% and a useful life of 8 years, the present value interest discount factor based on the table is = 4.968.
Option 1 present value
= 48,410 * 4.968
= $240,500.88
Option 2 present value
= 50,427 * 4.968
= $250,521.34
Option 3 present value
= 81,202 * 4.968
= $403,412
Option 3 is the closest option with the difference being down to rounding errors. The annual inflow would have to be $81,202 to make the investment in the equipment financially attractive.
A market mix is the blending of four marketing elements product, distribution price and promotion
Answer: The Southern Corporation manufactures a single product and has the following cost structure:
Explanation:
Fixed costs per year: Production$98,770 Selling and administrative$86,920 Last year, 5,810 units were produced and 5,610 units were sold. There was no beginning inventory. The carrying value on the balance sheet of the ending inventory of finished goods under variable costing would be:
Answer:
($1,575)
Explanation:
The computation of net cash flow from financing activities is shown below:-
Lexington Company
Net cash flow from financing activities
Particulars Amount
Cash received from common stock $650
Less:Cash paid for repayment of loan ($1,405)
Less: Cash paid for dividend ($820)
Net cashflow from financing activities ($1,575)
So, to reach the net cashflow from financing activities we simply added the cash received from common stock and deduct the cash paid for repayment of loan and cash paid for dividend.
Answer:
By practicing simulated cyber attacks. They help in improving the security and firewall of organization thereby enhancing their resistance to cyber infiltration.
Explanation:
Organizations may often intend to evaluate and their degree of vulnerability and test their security standard, hence, they employ the use of a simulated threat pattern whereby the red team act as a threat by using several infiltration techniques usually used by actual infiltrators, the blue team on the other hand acts to repel the advances of the red team by implementing security protocols and architecture capable of neutralizing the simulated attacks of the red team. This way organizations beef up their security in other to forestall actual potential attacks against capable of invading their information and digital systems.