Reference no: EM131300483
Create an outline for the essay.
Develop a 700-word annotated bibliography using at least 3 resources.
Review the "Precision Machines" document and spreadsheet.
Prepare a cash budget for Precision Machines in Microsoft Excel.
Create a 1,225-word strategic analysis and include the following:
- Recommend a cash management strategy for the company that will minimize the financing cost and increase the cash flows for the company.
- Explain two economic and market forces that will impact the financial plan of this company.
Read the following case study:
Precision Machines is preparing a financial plan for the next six months to determine the financial needs of the company. The historical analysis of the company's sales shows that the company's total sales are 30% cash sales and 70% credit sales. Further analysis of credit sales shows that the company receives 50% of the credit sales one month after the sale and the remaining 50% in the second month after the sale. This means the cash collections from sales are 30% in the first month of the sale, 35% in the second month, and 35% in the third month.
The materials purchased by the company amounts to 50% of the sales for the month. The company pays for the purchases one month after the initial purchase. The company likes to maintain a cash balance of $5,000. The cost of borrowing is 10%. The company plans to pay off the loan whenever there is a surplus and borrow when there is a deficit.
The attached spreadsheet shows revenues (sales), expenses, capital expenditures, and other expenses for Precision Machines' next six months. Using the information given on the spreadsheet, prepare a cash budget for January through June and determine the cash surplus, deficit, and the financing needs of the company.
Attachment:- Assignment.rar
Supply chain for a middle eastern company
: Write a paper, not including the cover and reference pages, describe some of the considerations in creating an effective supply chain for a Middle Eastern company.
|
The right to purchase shares of wan stock
: George owns an option which gives him the right to purchase shares of WAN stock at a price of $22 a share. Currently, WAN stock is selling for $25. He would like to profit on this option but is not permitted to exercise it for another two weeks.
|
Should china continue to ignore the criticism from abroad
: Should China continue to ignore the criticism from abroad? Or, should China make changes to its authoritarian rule and human rights policies? which includes brutal crackdowns on dissent?
|
Representative investors average degree of risk aversion
: The expected rate of return on the market portfolio is 9.25% and the risk–free rate of return is 0.75%. The standard deviation of the market portfolio is 18.50%. What is the representative investor’s average degree of risk aversion?
|
Prepare a cash budget for precision machines
: Develop a 700-word annotated bibliography using at least 3 resources. Review the "Precision Machines" document and spreadsheet. Prepare a cash budget for Precision Machines in Microsoft Excel
|
Were the futures priced fairly
: In May of 201X, six-month futures on the Imaginary Country stock index traded at 15,330. Spot was 13,743. The interest rate was 15 percent and the dividend yield was 7 percent. Were the futures priced fairly?
|
How many common shares are currently outstanding
: Henderson Industries has $100 million of common equity; its stock price is $40 per share; and its Market Value Added (MVA) is $120 million. How many common shares are currently outstanding? Write out your answer completely. For example, 5 million sha..
|
What rms current is delivered by the source
: An 80.0-O resistor, a 200-mH inductor, and a 0.150-µF capacitor are connected in parallel across a 120-V (rms) source operating at 374 rad/s.
|
Examine role of technology in the evolution of cryptography
: Examine role of technology in evolution of cryptography. Evaluate symmetric key cryptography, including implementation of at least one symmetrical algorithm.Explain role symmetric algorithms play in securing network protocols.
|