Answer:
$464
Explanation:
Periodic Inventory method is being used. That means valuation of inventory is done at the end of a specific period.
LIFO method is also used for determining the cost of inventory sold. FIFO stands for Last In First Out.
<u>Calculation of Cost of Goods Sold :</u>
41 unit × $10 = $440
3 units × $8 = $24
Total = $464
The cost of goods sold for the month is: $464
Answer and Explanation:
a. The computation of the wacc is as followS;
= cost of common stock × weight of common stock + cost of debt × weight of debt × (1 - tax rate)
= 0.16 × 0.70 + 0.08 × 0.30 × (1 - 0.30)
= 0.112 + 0.0168
= 0.1288
= 12.88%
b. The after tax cost of debt is
= 0.08 × (1- 0.30)
= 0.056
So the capital should use the cost of debt
Answer:
Annual deposit (PMT) = $1,567,060.39
Explanation:
Given:
Future value of annuity due = $8,000,000
Rate of interest(r) = 10% = 0.1
Number of year (n) = 4 year
Annual deposit (PMT) = ?
Computation of annual deposit :
\\\\8,000,000 = PMT [\frac{(1+0.1)^4-1}{0.1} ](1+0.1)\\\\8,000,000 = PMT [\frac{(1.1)^4-1}{0.1} ](1.1)\\\\8,000,000 = PMT [\frac{(0.4641}{0.1} ](1.1)\\\\8,000,000 = PMT [5.1051]\\PMT = 1,567,060.39](https://tex.z-dn.net/?f=Future%5C%20value%5C%20of%5C%20annuity%5C%20due%20%3D%20PMT%20%5B%5Cfrac%7B%281%2Br%29%5En-1%7D%7Br%7D%20%5D%281%2Br%29%5C%5C%5C%5C8%2C000%2C000%20%3D%20PMT%20%5B%5Cfrac%7B%281%2B0.1%29%5E4-1%7D%7B0.1%7D%20%5D%281%2B0.1%29%5C%5C%5C%5C8%2C000%2C000%20%3D%20PMT%20%5B%5Cfrac%7B%281.1%29%5E4-1%7D%7B0.1%7D%20%5D%281.1%29%5C%5C%5C%5C8%2C000%2C000%20%3D%20PMT%20%5B%5Cfrac%7B%280.4641%7D%7B0.1%7D%20%5D%281.1%29%5C%5C%5C%5C8%2C000%2C000%20%3D%20PMT%20%5B5.1051%5D%5C%5CPMT%20%3D%201%2C567%2C060.39)
Annual deposit (PMT) = $1,567,060.39
Answer:
$14,76
Explanation:
Using a single plantwide factory overhead rate based on direct labor hours, the factory overhead rate for the year is $14,76.
Answer:
c. Computer Fraud and Abuse Act.
Explanation:
Computer Fraud and Abuse Act (CFAA) is a cyber security bill that was enacted in 1986 and is an amendment of of Comprehensive Crime Control Act of 1984.
The acts forbids a person to access a computer without proper authorisation or an excess of required authority.
Before this time cybercrime was prosecuted as mail and wire fraud. This was often inadequate.
Other provisions the act addresses are distribution of malicious code, denial of service attacks, and trafficking in passwords