Answer:
Free cash flow for year 1 = -$1m
Explanation:
Lets first understand what free cash flow is. Free cash flow is the cash generated by a business that is freely available for distribution to all investors after having met all the immediate obligations, investment in non-current assets and investment in working capital. Since it's cash flows we have to add back non-cash items such as depreciation and amortization.
The question is asking for free cash flow for year 1 therefore we take data for the year 1 as follows:
Free cash flow for year 1 = $5m + $2m - $6m - $2m
Free cash flow for year 1 = -$1m
Seems entity has net cash outflows that's why the cash flows are negative.
Answer and Explanation:
Clude had purchased the raw land three years ago for $150000 and treated it like a inventory. she constributed the property to south peak investments LLC in exchange for 10% profit interest. but south peak will hold it for investment purpose.
a) after 4 years from Cludes contribution south peak sells the land for $3000000 the gain would be $3000000 - 1500000 = 1500000. the character is of long term capital gains since ths LLC held ot as investment asset
b) if south peak sells the asset after 5 years six months then also the gain would be sa,e and character would be same since LLC has held the asset fore investments purpose and at the same time its holding period is above one year.
Answer:
cost reduction and standardizing its products globally.
Explanation:
- Lenovo needs to capitalize on the consumer trends and the universal needs of the products globally and seek to reduce the costs in increasing flexibility, acquire knowledge, scale economies, and improve on the quality of the product and the process that creates them.
Answer:
detective control.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.
Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;
1. Statistical anomaly-based detection.
2. Stateful protocol analysis detection.
3. Signature-based detection.
Hence, the operations in this scenario is an example of a detective control which avails a business firm information about vulnerabilities that exist in its network system.