What is the irr for aol associated

Assignment Help Basic Computer Science
Reference no: EM131158588

AOL is considering two proposals to overhaul its network infrastructure. They have received two bids. The first bid from Huawei will require a $25 million upfront investment and will generate $20 million in savings for AOL each year for the next 33 years. The second bid from Cisco requires a $85 million upfront investment and will generate $60 million in savings each year for the next 33 years.

a. What is the IRR for AOL associated with each bid?

b. If the cost of capital for each investment is 14%, what is the net present value (NPV) of each bid? Suppose Cisco modifies its bid by offering a lease contract instead. Under the terms of the lease, AOL will pay $23 million upfront, and $35 million per year for the next 33 years. AOL's savings will be the same as with Cisco's original bid.

c. What is the IRR of the Cisco bid now?

d. What is the new NPV?

e. What should AOL do?

Reference no: EM131158588

Questions Cloud

What is anticipated dividend payout : They expect sales to increase by10% with interest and depreciation expense the only expenses staying the same. What is their anticipated dividend payout?
Compare failure mode and effect and fault tree analysis : Compare and contrast failure mode and effect analysis (FMEA), fault tree analysis (FTA), and management oversight and risk tree (MORT). Which technique do you believe would be most effective for hazard analysis in a facility that primarily perform..
External funds requirement : List two ways how they might go about obtaining those funds needed. If they are at 80% capacity, do they have an external funds requirement now? Yes or no.
What kind of leader do you think that you would be : What kind of leader do you think that you would be? Why? Do you have any information to support your self-perceived leadership style? If so, what is this information
What is the irr for aol associated : The second bid from Cisco requires a $85 million upfront investment and will generate $60 million in savings each year for the next 33 years. a. What is the IRR for AOL associated with each bid?
Should osha continue to regulate ergonomic hazards : Do you think Congress was correct in repealing the comprehensive ergonomics standard? Should OSHA continue to regulate ergonomic hazards through the General Duty clause and issue guidelines for specific industries? If not, what approach would you ..
What is the expected return for option : What is the expected return for each option? Just using information given, which has the highest risk? List 2 other factors other than expected return you might use in considering which is the best choice for the company?
Outline a range of strategic actions for the company : Evaluate four current strategies. Consider all relevant strategies and select four. This could include all or many of the following: business level strategy, diversification, acquisitions/mergers, international strategy and/or co-operative strateg..
What is the effect of information technology on management : Conversely, what is the effect of information technology on management? Why is this important to discuss? In what way does information technology and management impact what you do at your job on a day-to-day basis? Why do you think this is importa..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is structured query language

What is structured Query Language? Write the SQL command for deleting tuple(row) from the database?

  Is imageholder and picturebox are similar controls

ImageHolder and PictureBox are similar controls. Do you agree? Why or why not?

  Provide the ability to disable secure boot

As explained in the third e-Activity, Microsoft has provided the ability to disable Secure Boot on its x86 platform but not on its Windows 8 ARM-based systems (Windows RT).

  Write java method takes integer array and fills the array

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000.

  Distinguish among vulnerability-threat and control

Distinguish among vulnerability, threat, and control. Describe two examples of vulnerabilities in automobiles for which auto manufacturers have instituted controls. Tell why you think these controls are effective, somewhat effective, or ineffective..

  Explain adaptive method of compression

Explain Adaptive method of compression.

  Control flow and memory management

An exception aborts part of a computation and transfers control to a handler that was established at some earlier point in the computation.

  Identify storage usage to appropriately distribute storage

identify storage usage to appropriately distribute storage costs.

  Businesses rely heavily on knowledge

Businesses rely heavily on knowledge about Human Computer Interaction

  Give the datagram forwarding table for each node

For the network given in Figure 3.34, give the datagram forwarding table for each node. The links are labelled with relative costs; your tables should forward each packet via the lowest-cost path to its destination.

  The current environment

The current environment doesn't have wireless interface, and the management would like to procure a cutting edge wireless technology infrastructure for the organisation.

  Which structure best for the storyboard created

Case 2-3 Michael wants to create a Website based on his famous cooking show. He would like to provide instructions on how to create some of his favorite dishes. He would like his recipes to be displayed in very simple, step by step pages. Which st..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd