Value the non-controlling interest

Assignment Help Basic Computer Science
Reference no: EM131177377

The following information is relevant:

(i) At the date of acquisition, Zanda Co conducted a fair value exercise on Medda Co's net assets which were equalto their carrying amounts (including Medda Co's financial asset equity investments) with the exception of an itemof plant which had a fair value of $2·5 million below its carrying amount. The plant had a remaining useful lifeof 30 months at 1 October 2015.The directors of Zanda Co are of the opinion that an unrecorded deferred tax asset of $1·2 million at 1 October2015, relating to Medda Co's losses, can be relieved in the near future as a result of the acquisition. At 31 March2016, the directors' opinion has not changed, nor has the value of the deferred tax asset.

(ii) Zanda Co's policy is to value the non-controlling interest at fair value at the date of acquisition. For this purpose,a share price for Medda Co of $1·50 each is representative of the fair value of the shares held by the noncontrollinginterest.

(iii) At 31 March 2016, Medda Co held goods in inventory which had been supplied by Zanda Co at a mark-up oncost of 35%. These goods had cost Medda Co $2·43 million.

Reference no: EM131177377

Questions Cloud

Calculate the peak manning : A software project is planned to cost 95PY in a period of 1 year and 9 months. Calculate the peak manning.
Create an application for kochs cottages : Create an application for Koch's Cottages, a weekend getaway resort that rents Cottages and boats to use on the local lake.
Effective methods of software development : Explain how standards may be used to capture organisational wisdom about effective methods of software development. Suggest four types of knowledge that might be captured in organisational standards.
Find the first four terms of the output sequence : Derive the transfer function for the system.-  Find the first three terms of the output sequence in response to the finite input sequence of 2, 2, 1.
Value the non-controlling interest : Zanda Co's policy is to value the non-controlling interest at fair value at the date of acquisition. For this purpose,a share price for Medda Co of $1·50 each is representative of the fair value of the shares held by the noncontrollinginterest.
How corporate culture of enron contribute to its bankruptcy : How did the corporate culture of Enron contribute to its bankruptcy? In what ways did Enron's bankers, auditors, and attorneys contribute to Enron's demise?
What the clustering coefficient measures in each of graph : the graph representing the routers and communications links that make up the worldwide Internet
Summarize the process for gathering the evidence : From your selected devices, explain how the tools could be used in a corporate setting and what IT policies they can help enforce. Summarize the process for gathering the evidence with each tool.
Literature review on emotional intelligence : Write a 15- to 20-page literature review that captures relevant theories and empirical research leading to a significant research topic, problem and research question(s). Approach your topic as though you were arguing for funding that might suppor..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide the sql statement below

Create a new query to display all authors with last name of "Smith" and all books by this author. Show author id, author first name, author last name, title id, and title. Group data by title id. Provide the SQL statement below:

  What state does the counter go on the next clock pulse

A 4-bit ripple counter consists of flip-flops, which each have a propagation delay from clock to Q output of 15 ns. For the counter to recycle from 1111 to 0000, it takes a total of ________.

  Fill in the missing cells of the table

Test that there is no association between gender and the likelihood of trying a low-fat diet. Summarize the results.

  Explain caesar cipher and write down caesar cipher algo

Explain "Caesar Cipher". and Write down Caesar Cipher algorithm in C code.

  Calculate access time when there is cache miss

Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  Why are computer systems so vulnerable

Is security a technical issue? A business issue? Both? Support your answer. (Hint: Read Kim Nash, "Why Technology Isn't the Answer to Better Security,"CIO www cio com October 15, 2008.

  Describe how to change the typeface for each

Describe how to change the typeface for each of the following: text in an Alice dialog balloon or thought bubble, Alice 3D text, and text displayed by the Alice print instruction.: text in an Alice dialog balloon or thought bubble, Alice 3D text, ..

  Find the transmission rate in bits per second

Suppose all headers (including RTP, UDP and IP) have a total length of h and an IP datagram is emitted every 40 msecs.

  Define a new font for each of the characters

Define a new font for each of the characters shown in Figure E10.12 and write a program to display these four characters on the four matrix displays driven by one MAX6952. The PM5 signal drives the signal.

  How does camera placement and shot selection

In particular, how does camera placement and shot selection seem to be different from that used in making modern movies?

  Implement the eval segment () function described above

Implement the eval Segment () function described above

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd