Price of the company stock

Assignment Help Basic Computer Science
Reference no: EM131696442

Assume today is December 31, 2013. Imagine Works Inc. just paid a dividend of $1.20 per share at the end of 2013. The dividend is expected to grow at 15% per year for 3 years, after which time it is expected to grow at a constant rate of 6% annually. The company's cost of equity (rs) is 9%. Using the dividend growth model (allowing for nonconstant growth), what should be the price of the company's stock today (December 31, 2013)? Round your answer to the nearest cent. Do not round intermediate calculations.

$ per share

Reference no: EM131696442

Questions Cloud

How does religion appear in the yacoubian building : How does religion appear in The Yacoubian Building? How does the film improve your understanding of Arabic culture and society?
Account with an annual interest rate : What will $200,000 grow to be in 15 years if it is invested today in an account with an annual interest rate of 8%?
Examine the main motivation of school violence : Examine the main motivation(s) of school violence and give your opinion as to what the schools should do to prevent school violence.
Specific format of a viable statement for a company : Is there a specific format of a viable statement for a company? If so, what are the elements that should be included in the viable statement?
Price of the company stock : What should be the price of the company's stock today (December 31, 2013)? Round your answer to the nearest cent. Do not round intermediate calculations.
How is the word myth used popularly : How is the word myth used popularly? For example, what does the statement, "It's a myth" mean? In contrast, how is the word myth used in the academic context?
Examine the courts decision : Compare and contrast vehicle searches and inventories and indicate the most important differences between the two (2) as they relate to law enforcement officers
What made native american peoples vulnerable to conquest : What made Native American peoples vulnerable to conquest by European adventurers? Why was the Constitution controversial document even as it was being written?
Discuss the pros and cons of freuds theory : Analyze Freud's theory and discuss the impact that it has on the development of criminal behavior.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the interest rate

What is the interest rate of a 7-year, annual $4,100 annuity with present value of $20,000?

  What would be the decomposition of this relation

What would be the decomposition of this relation based on the above MVD? Evaluate each resulting relation for the highest normal form it possesses.

  Listing the threat of new entrants

Analyze the competitive environment by listing the threat of new entrants, the bargaining power of buyers, the bargaining power of suppliers, the threat of substitute products and services, and the intensity of rivalry among competitors in the ind..

  What should be the role of marketing

To whom in the organization should the program manager, project manager, and project engineering report? Does your answer depend on the life-cycle phase?

  Major components of any information system

What are the major components of any information system? Give a brief explanation for each.

  Process of managing system projects

For this unit, you will be analyzing the business case and learning about the process of managing system projects. You will become familiar with the SCR case study involving the new TIMS system and your very important role! Be sure to read through..

  Outgoing traffic to the same address

A device that can look at all protocol headers up to the transport layer is called layer-4 firewall. Which one of the following statement is true layer-4 firewall?

  Online ebanking account

How is probability to find errors in the balance of your online eBanking account following an unlikely system failure at the bank?

  Second cyclist started biking

Two cyclists start biking from a trail's start 3 hours apart. The second cyclist travels at 10 miles per hour and starts 3 hours after the first cyclist who is traveling at 6 miles per hour.

  Important aspect of information systems security

Identity and access management is an important aspect of information systems security. One of its crucial functions is to help determine who should get access to the system and who should not.

  Steps to follow to get evidence in investigating files

Drive that you are investigating comprises several password-protected files and other files with headers which do not match extension. What procedures would you require to follow to retrieve evidence?

  Social media site users

What motivations might an attacker have in attacker a social media site's users?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd