What is the npv of each investments

Assignment Help Basic Computer Science
Reference no: EM131554549

Davis Corporation is faced with two independent investment opportunities. The corporation has an investment policy which requires acceptable projects to recover all costs within 3 years. The cost of capital is 10 percent. The cash flows for the two projects are:

     Project A     Project B 

 Year Cash Flow   Cash Flow  

 0    -$120,000   -$90,000 

 1      42,000    30,000 

 2      43,000    30,000 

 3      44,000    30,000 

 4      45,000    30,000

 5    46,000    30,000

What is the NPV of each investments?

Reference no: EM131554549

Questions Cloud

Examine the fi nancial ratios : Ratio Analysis You want to examine the fi nancial ratios for Dell Inc. Go to www.reuters.com and type in the ticker symbol for the company (DELL).
How do you think trafficking is being combated : What is "human trafficking" Can you give an example? If so then please provide that example.
What kinds of people are vulnerable to trafficking : Where does human trafficking take place?What kinds of people are vulnerable to trafficking?
Describe connection between given poem and short story : Describe Connection between given poem and short story. Connection between langston hughes Harlem a Dream Deffered and the short story A Raisin in the Sun.
What is the npv of each investments : The corporation has an investment policy which requires acceptable projects to recover all costs within 3 years. The cost of capital is 10 percent.
Watch the movie titled - not my life : According to the film as many as 800,000 women, men, and children are trafficked across international borders every year (U.S. State Department).
Last year levi luxury shop had sales : Find FV. Last year Levi's Luxury Shop had sales of $220.5 million. If sales grow at 6.5% per year, what sales volume (in millions) can be expected 4 years later
Changing the company organization from a sole proprietorship : What are the advantages and disadvantages of changing the company organization from a sole proprietorship to an LLC?
Create an ethics policy for the media in handling the report : Create an ethics policy for the media in handling the reporting of criminal justice issues and news;

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What value is returned by the following function

What value is returned by the following function? Express your answer as a function of n. Give the worst-case running time using the Big Oh notation.

  Explain findings-conducting internet search for for cde file

Network asminisrator mentions that other "CDE" files have been sent through the FTP server to another site. Explain your findings after conducting the internet search for "CDE" files.

  Visit the websites of several social media sites

1) Visit the websites of several social media sites (MySpace, Facebook, LinkedIn, Twitter). What differences do you notice between these various sites? Are you a member of any of these services? Why or why not?

  What percent of total applicants were admitted

Graduate admissions. A 1975 article in the magazine Science examined the graduate admissions process at Berkeley for evidence of sex discrimination.

  Explain the concept of hop count in rip

Explain the concept of hop count in RIP. Can you explain why no hop is counted between N1 and R1 in Figure 20.15?

  Linear expressions for the height and the length

The volume in cubic feet of a box can be expressed as (x) = x^3 - 6x^2 +8x, or as the product of three linear factors with integer coefficients. The width of the box is x-2. Factor the polynomial to find linear expressions for the height and the len..

  Compute the supremum distance between the two objects

Compute the Minkowski distance between the two objects, using q = 3.

  Write client and server programs that implement framework

The server needs some way of knowing which two sockets belong to the same client. One way to do this is to have the client first create a listening socket using an ephemeral port (i.e., binding to port 0).

  How do we implement this

How do we implement this?

  Describe the w''s for these data

Write a few sentences comparing the performances of the three groups.

  Compute the global boolean or of all input values on ring

Consider an anonymous ring of size n. Each node v stores an input boolean value i(v). When the algorithm terminates, then every node is to store the output in its private variable. Every node knows n, in that n can be a part of code.

  Write a c++ program that accepts a component’s tolerance

Using this information, write a C++ program that accepts a component's tolerance reading and determines the specification that should be assigned to it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd