MF week 5

Cost of Capital

In the links below, you will explore how companies compute their cost of capital by computing a weighted average of the three major components of capital: debt, preferred stock, and common equity. The firm’s cost of capital is a key element in capital budgeting decisions and must be understood in order to justify capital projects. 

Cost of Capital:

For this Discussion, imagine the following scenario:

You are the director of operations for your company, and your vice president wants to expand production by adding new and more expensive fabrication machines. You are directed to build a business case for implementing this program of capacity expansion. Assume the company’s weighted average cost of capital is 13%, the after-tax cost of debt is 7%, preferred stock is 10.5%, and common equity is 15%. As you work with your staff on the first cut of the business case, you surmise that this is a fairly risky project due to a recent slowing in product sales. As a matter of fact, when using the 13% weighted average cost of capital, you discover that the project is estimated to return about 10%, which is quite a bit less than the company’s weighted average cost of capital. An enterprising young analyst in your department, Harriet, suggests that the project is financed from retained earnings (50%) and bonds (50%). She reasons that using retained earnings does not cost the firm anything since it is cash you already have in the bank and the after-tax cost of debt is only 7%. That would lower your weighted average cost of capital to 3.5% and make your 10% projected return look great.

Based on the scenario above, post your reactions to the following questions and concerns:

What is your reaction to Harriet’s suggestion of using the cost of debt only? Is it a good idea or a bad idea? Why? Do you think capital projects should have their own unique cost of capital rates for budgeting purposes, as opposed to using the weighted average cost of capital (WACC) or the cost of equity capital as computed by CAPM? What about the relatively high risk inherent in this project? How can you factor into the analysis of the notion of risk so that all competing projects that have relatively lower or higher risks can be evaluated on a level playing field?

B) 3 replies each 150 words

PhD Interview Questions INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY – PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

project isol

 

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability.  Your residency project will include research & analysis on the below: 

Write a five – seven (5 – 7) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. 
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Your assignment must follow these formatting requirements:

  • Use at least eight – ten (8 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are NOT included in the required assignm

Cryptocurrency

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

500 words.

At least two scholarly source should be used. Use proper citations and references(APA).

Week 2

 

Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.  

Write a 2- to 4-page executive brief that details the following:

  • How the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance
  • How IT policies, standards, and procedures can be used to determine if the enterprise is in compliance and support the IT strategy
  • How Quality Management Systems (QMS) are important in assuring quality processes are in place
  • How IT management and monitoring of controls can be used to asses IT performance

Format your document according to APA guidelines.

PLW5

In 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted or left alone. Justify your choice.  

Professionalism assignment help -PLease use attached template

 

You will complete the Portfolio template, which will cover the areas listed below. Your information should be supported with research throughout the portfolio (minimally 3 sources to support work throughout the assignment). Be sure to explain each area below in detail:

  1. Title page that includes assignment title, your name, course, section number, and date
  2. Introduction: In this section, in 2–3 paragraphs, you will explain who you are and your chosen professional field as well as a brief overview of how you perceive yourself professionally.
  3. Lifelong professionalism and how you will maintain your image: You will give an overview in 2–3 paragraphs of how you will focus on continuing to maintain your professional image in the future of the career you have chosen to pursue.
  4. Short-term goals: 2–3 short-term professional goals (written as SMART statement). Explanation of a plan to meet each goal (1 paragraph per goal) and rationale for why the goal will support your professionalism (1 paragraph per goal).
  5. Long-term goals: 2–3 long-term professional goals (written as SMART statement). Explanation of a plan to meet each goal (1 paragraph per goal) and rationale for why the goal will support your professionalism (1 paragraph per goal).
  6. Education Plan: At least 3 ways that you can maintain your knowledge throughout your degree. Explain why each way would be important to your career (minimum of 3 paragraphs).
  7. Budgeting Plan: Explanation as to how you will budget to ensure all future education (should connect to the education plan) as well as future career marketability needs are met. (minimum of 3 paragraphs).
  8. Reference Page: Sources should follow APA formatting guidelines with corresponding in-text citations within the body of the portfolio.

Assignment Format

  • Detailed explanations for each part should be included.
  • Information should be organized clearly throughout the presentation
  • Support from outside source material should be included in the presentation
  • Template must be used for assignment

Essay

 Examine the effectiveness of vulnerability management programs of organizations when utilizing third party vendors for threat intel or vulnerability scanning and/or device patching.  Breach or incident reports are useful for this exercise.  500 words, APA required