Cost of Capital on Trans Pacific Industry and Technology

Cost of Capital on Trans Pacific Industry and Technology
Paper , Order, or Assignment Requirements

Trans-Pacific Industry & Technology (TPIT), Inc. is a diversified industrial company. The Company owns businesses providing products & services to the energy, transportation, chemical, and construction sectors.

The energy segment operates as an oil and natural gas contract drilling company the United States. The energy segment acquires, explores, develops, and produces oil and natural gas properties primarily located in Oklahoma and Texas, as well as in Arkansas, Colorado, Kansas, Louisiana, Mississippi, Montana, New Mexico, North Dakota, Utah, and Wyoming. This segment generated over $10 billion of revenue in 2016.
The transportation segment is among the largest public railroad in North America. Operating on 12,000 miles of track in the western one thirds of the U.S., This segment generated over $20 billion of revenue in 2016 by hauling coal, industrial products, intermodal containers, agriculture goods, chemicals, and automotive goods.

The chemical segment sells value-added chemicals, thermoplastic polymers, and other chemical-based products worldwide. This segment develops, produces, and supplies specialty polymers for automotive and medical applications, as well as for use in industrial products and consumer electronics. This segment generated over $5 billion of revenue in 2016.
The Construction segment produces and sells specialty construction chemicals, specialty building materials, and packaging sealants and coatings. The Company operates through two segments: Specialty Construction Chemicals and Specialty Building Materials. The Specialty Construction Chemicals segment manufactures and markets products to manage performance of Portland cement, and materials based on Portland cement, such as concrete admixtures and cement additives, as well as concrete production management systems. The Specialty Building Materials segment manufactures and markets building envelope products, residential building products and specialty construction products. This segment generated over $5 billion of revenue in 2016.
During the last few years, Trans-Pacific Industry has been too constrained by the high cost of capital to make many capital investments. Recently, though, capital costs have been declining, and the company has decided to look seriously at a major expansion program that has been proposed by the marketing department. The expansion requires investment in eight projects from the four segments. Table-1 provides information about the projects.
Assume that you are an assistant to Jim Jones, the financial vice president. Your first task is to estimate TPIT’s cost of capital.
As a part of your analysis you have collected the following data:
(1) The firm’s tax rate is 40%.
(2) The current price of TPIT 12% coupon, semiannual payment, non-callable bonds with 15 years remaining to maturity is $1,153.72. TPIT does not use short-term interest-bearing debt on a permanent basis. New bonds would be privately placed with no flotation cost.
(3) The current price of the firm’s 10%, $100 par value, quarterly dividend, perpetual preferred stock is $116.95. TPIT would incur flotation costs equal to 5% of the proceeds on a new issue.
(4) TPIT’s common stock is currently selling at $50 per share. Its last dividend was $3.12, and dividends are expected to grow at a constant rate of 5.8% in the foreseeable future. TPIT’s beta is 1.2, the yield on T-bonds is 5.6%, and the market risk premium is estimated to be 6%.
(5) Suppose the firm has historically earned 15% on equity (ROE) and retained 35% of earnings, and investors expect this situation to continue in the future. How could you use this information to estimate the future dividend growth rate, and what growth rate would you get? Is this consistent with the 5.8% growth rate given earlier?
(6) TPIT’s target capital structure is 30% long-term debt, 10% preferred stock, and 60% common equity.
Suggested questions
a. What sources of capital should be included when you estimate TPIT’s weighted average cost of capital (WACC)?
b. Should the component costs be figured on a before-tax or an after-tax basis?
c. Should the costs be historical (embedded) costs or new (marginal) costs? Explain?
d. TPIT’ preferred stock is riskier to investors than its debt, yet the preferred yield to investors is lower than the yield to maturity on the debt. Does this suggest that you have made a mistake? (Hint: Think about taxes.)
e. What is the market interest rate on TPIT’s debt and what is the component cost of this debt for WACC purposes?
f. What is the corporate cost of capital?

Part 2
Jim Jones was worried that whether the corporate cost of capital would be appropriate to evaluate the four segments’ project. His concern centered onwhether the risk of the projects is reflected on the corporate cost of capital? What is the logical method of adjusting the cost of capital for risk? Is it wise to use the corporate cost of capital to evaluate the four segments’ projects?

1. Discuss the quantitative methods that are useful to evaluate the projects?
2. Discuss the strengths and weakness of each quantitative method you have selected to evaluate the projects?
3. Will all of the quantitative methods rank the projects identically? Why or why not?
4. Rank the projects on the basis of the measurements discussed above

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Construct a presentation on a specific buffer overflow attack

Construct a presentation on a specific buffer overflow attack
Paper , Order, or Assignment Requirements

Research a specific buffer overflow attack technique of your choice. This should be a technique that has been actively exploited in the past five years or is still a current threat. Prepare a presentation on the attack. The intended audience is a Bachelor’s level Cybersecurity course where you are to deliver a guest lecture. Your presentation should include at least the following information: • Explain the conditions that make systems vulnerable to this particular attack. • Indicate how the attack works and how it is executed. • Provide a graphical depiction (e.g., flowchart, diagram, video) of the attack in action and how it works. • Identify examples of how the attack has been exploited in the past (e.g., news stories, software security vulnerability alerts). • Recommend techniques for shielding against the attack or mitigating its effects.
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each slide. The speaker notes may be comprised of brief paragraphs or bulleted lists. Support your presentation with at least three (3) scholarly resources. Industry literature should also be used as appropriate. Length: 12-15 slides (with a separate reference slide) Notes Length: 100-150 words for each slide Additional submission requirement (choose one): • Record narrations over your presentation and submit the PowerPoint presentation with narrations. • Deliver the presentation via screen capture, upload the video to a sharing site (e.g., Jing or Microsoft Mix, etc.), and submit the PowerPoint presentation and a link to where your delivery video can be viewed. • Deliver the presentation in person and record a video of yourself (e.g., camera with tripod), upload the video to a sharing site (e.g., Jing, Microsoft Mix, etc.), and submit the PowerPoint presentation and a link to where your delivery video can be viewed.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

components of the Biopsychosocial Assessment found in the Case Study Treatment Plan

Homework Question
Paper , Order, or Assignment Requirements

Biopsychosocial Assessment
For this assignment, complete all components of the Biopsychosocial Assessment found in the Case Study Treatment Plan for the client you picked. When details from the case are vague or missing, you are free to elaborate in the specific area. You will also complete the following specific sections of the Case Study Treatment Plan for the unit 4 assignment: Client Name: Describe any cultural norms specific to the chosen client (for example, sexual orientation, religion, or race). •Cultural background. Describe the importance of family, social networks, and community systems in the treatment of mental and emotional disorders related to issues of human sexuality. •Family background. •Social and community systems. Describe the client’s behavior, including any developmental crises, disability, psychopathology, and situational and environmental factors that affect both normal and abnormal sexual behavior. •Personal background. •Medical background. •Substance abuse background. •Emotional/psychiatric background. Identify ethical and legal considerations relevant to the client’s identified sexual issues. •Ethical/Legal Issues Relevant to Sexual Issue: Identify other professionals that you anticipate will be involved in the care for this client as the treatment continues. Explain how you will arrange for communication with them and what you are likely to communicate to each of them. Identify the kind of information you will need from each source. •Consultations or referrals needed. Describe strategies for working with client to address their identified issue. •Strategies to address identified issues. Apply relevant human sexuality research findings support the identified strategies. •Sexuality research to support strategies. In addition, place an “NA” in the following sections that are not required for the Unit 4 assignment: •DSM-5 diagnosis. •Differential diagnosis. •Ethical and legal considerations of diagnosis. •Short-term goals •Long-term goals. •Strategies to promote optimal sexual functioning. •Evidence-based treatment interventions. •Relevant research to support diagnosis and treatment plan.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Create a data dictionary

Assignment 6: SQL Concepts and Database Design
Paper , Order, or Assignment Requirements

Assignment 6: SQL Concepts and Database Design
Due Week 7 and worth 120 points
The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
Imagine that you work for a finance industry-based organization. Your organization is looking to submit its database design documentation to an evaluation team in order to meet Sarbanes-Oxley (SOX) compliance. You have been assigned to assist in preparing the documentation of the organization’s sales database. You are asked to propose a data dictionary that can be used to document the following:
• Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)
• Invoice (InvNumber, InvDate, EmpNumber, InvAmount, CustomerID)
• InvoiceLine (InvLineNumber, InvNumber, ProductNumber, Quantity)
• Product (ProductNumber, ProductDescription, ProductCost)
• Department (DepartmentID, DepartmentDescription)
• Job (JobID, JobDescription)
• Customer (CustomerID, CustomerName, CustomerAddress, CustomerPhone)
Write a three to four (3-4) page paper in which you:
1. Create a data dictionary that includes the following:
1. A description of the content for each field
2. The data type of each field
3. The format the data will be stored as in the field
4. The range of value for the field
5. A label, as required, if the attribute is a primary key or foreign key
Note: An example is shown in Table 7.3 in chapter 7 of the textbook.
1. Imagine that you are asked to identify the number of days that exist between the first invoice and last invoice for each month and complete the following:
1. Construct a query that will show the number of days that exist between the first invoice and last invoice, for each month, for each employee, using the DATEDIFF function. Be sure to provide the SQL script that will carry out this function.
2. Construct a query to show the expected payment date if invoices are due within 30 days of transaction.
3. Construct a query that will show distinct area codes of the customers.
2. Create a plan of the necessary activities that would be required to implement a valid database design process by including the following:
1. Steps in the conceptual design stage
2. Steps in DBMS selection stage
3. Steps in logical design stage
4. Steps in physical design stage
5. Task details of each activity within each stage
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Design a relational database so that it is at least in 3NF.
• Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.
• Explain the key principles of data security and identify data security risk and violations in data management system design.
• Use technology and information resources to research issues in the strategic implications and management of database systems.
• Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Success with Agile Project Management in General Dynamics

CIS 525 Case Study 1: Success with Agile Project Management in General Dynamics
Paper , Order, or Assignment Requirements

Due Week 6 and worth 110 points
Read the case study on General Dynamics, located here.
The Combat Identification Server (CIdS) Technology Demonstrator Project (TDP) has been delivered on time, with quality and budget parameters using the Dynamic Systems Development Method (DSDM). CIdS is a complex system and software project. The objective is to help clear “the fog of war” by providing a picture in the cockpit of an aircraft of the position of nearby friendly forces on the ground. The selection of DSDM for the CIdS TDP was motivated by the Tactical Datalinks Delivery Team’s (TDL DT) objective to demonstrate that complex military technologies could be delivered without delay or cost overrun. The use of DSDM was a bold move, but the CIdS project delivered successful outcomes for all involved. In the current economic environment, delivering acceptable solutions on time and at a fixed cost is surely a priority for the Ministry of Defense (MoD). The success of the CIdS project has provided a good example for the project management in the defense sector.
Write a five to six (5-6) page paper in which you:
1. Speculate on the prominent reasons General Dynamics selected the agile framework they did to use in this project.
2. Identify the major business problems the project team tried to solve. Analyze the manner in which the project team applied the agile project management techniques to ensure they delivered the project on time, on budget with good quality.
3. Give your opinion if you agree with the approach(es) identified in Question 2. Justify your response.
4. Analyze the manner in which the project teams and coaches master the agile methodology to solve business problems. Determine the approach that you believe is the most effective. Provide a rationale for your response.
5. Determine whether or not the agile approach produced more business benefits than a traditional project management approach. Justify your response.
6. Provide your opinion on the agile coach’s role in this case and determine if the coach is critical to the success of the project. Support your answer.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Analyze and differentiate among the different agile project delivery frameworks.
• Develop agile project management solutions to solve a business problem.
• Describe the role of agile coaches and required leadership attributes.
• Explain how agile teams and coaches master agile project management.
• Use technology and information resources to research issues in advanced agile project management topics.
• Write clearly and concisely about advanced agile project management topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Asset Misappropriation and Corporate Governance

ACC 571 Asset Misappropriation and Corporate Governance
Paper , Order, or Assignment Requirements

Assignment 4: Asset Misappropriation and Corporate Governance

For this assignment, use the Internet or Strayer databases to research and identify an organization that was a victim of asset misappropriation.
Write a five to six (5-6) page paper in which you:
1. Based on your research, evaluate the type of asset misappropriations that occurred at the organization, and assess the factors that contributed to the misappropriation. Give your opinion on whether poor management or lack of management played a role in the asset misappropriation. Provide support for your rationale.
2. Evaluate the legal mechanisms that could have been used to recover assets through the civil and criminal justice systems. Assess whether the civil and criminal justice systems did an effective job in recovering the organization’s assets. Provide support for your rationale.
3. Assess management’s responsibility to share information related to the breach with various stakeholder groups, indicating what should be shared and how. Provide support for your rationale.
4. Review AICPA Statements on Auditing Standard (SAS) No. 99, “ Risk Factors Relating to Misstatements Arising from Misappropriation of Assets”, found within the text. Assess SAS 99 risk factors and discuss if the risk factors were prevalent in the organization you researched. Give your opinion on whether or not organizations should implement a plan that reviews risk factors on a regular basis to determine if fraud has occurred. Explain why or why not.
5. Review the corporate governance plan of the organization you researched, evaluate the effectiveness of the plan, and make suggestions for improvements to protect the stakeholders. Provide support for your rationale.
6. Recommend a fraud prevention plan for this organization. Determine what positive or negative consequences this fraud prevention plan might have on employees’ morale and the public perception of the organization.
7. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

building a payroll program for a large organization with offices spread across the United States.

Case Study 2: Application Architecture
Paper , Order, or Assignment Requirements

Due Week 8 and worth 50 points You have been tasked with building a payroll program for a large organization with offices spread across the United States. The company has one larger data center that each office connects to via a wide area network (WAN). Write a 3-4 page paper in which you:
• Explain what type of architecture the new payroll application should use and why.
• Identify what types of technology will be involved in the architecture and explain the purpose of each technology.
• Create a graphical representation of your recommended architecture.
• Identify and describe any potential ethical issues that could arise in connection with the new architecture.
Your assignment must:
• Analyze and articulate ethical, cultural, and legal issues and their feasibilities among alternative solutions.
• Use contemporary CASE tools in process and data modeling.
• Use technology and information resources to research issues in systems analysis and development.
• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Describe three (3) principal challenges faced by the EU and NAFTA.

Globalization
Paper , Order, or Assignment Requirements

Globalization deals with the interaction and integration of people, companies, and governments of different nations. This process is driven by international trade and investment and aided by information technology. Globalization is an important concept, as it affects the environment, culture, political systems, economic development and prosperity, and the physical well-being of societies around the world.
Describe three (3) principal challenges faced by the EU and NAFTA. Next, speculate on why a BRIC alliance may be returning and whether you agree with this alliance. Justify your response. Compare and contrast the pros and cons of a strong EU and its impact on how international relations are shaped. Next, propose two (2) changes you would like to see the EU make to improve international relations. Justify your responses

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Describe three (3) reasons users are still frustrated with modern applications.

Week 9 Assignment 4 Submission
Paper , Order, or Assignment Requirements

The quality of the user experience is very important to the success of an application. In the early days of computing, users often experienced long delays since computing power was poor and networks had comparatively slow throughput. Modern systems have largely eliminated these delays due to increased network and computing power, yet users still report a high level of frustration. Write a four to five (4-5) page paper in which you:
1. Describe three (3) reasons users are still frustrated with modern applications.
2. Suggest one (1) method for reducing the frustrations for each of the reasons you supplied in Question one (1).
3. Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product.
4. Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
• Describe the inherent design issues across HCI environments.
• Explain the use of interaction devices.
• Use technology and information resources to research issues in human-computer interaction.
• Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"