Reference no: EM13997268
On March 31, 2011, the Herzog Company purchased a factory complete with machinery and equipment. The allocation of the total purchase price of $1,000,000 to the various types of assets along with estimated useful lives and residual values are as follows:
On June 29, 2012, machinery included in the March 31, 2011, purchase that cost $100,000 was sold for $80,000. Herzog uses the straight-line depreciation method for buildings and machinery and the sum-of-the-years'-digits method for equipment. Partial-year depreciation is calculated based on the number of months an asset is in service.
Required:
1. Compute depreciation expense on the building, machinery, and equipment for 2011.
2. Prepare the journal entries to record
(1) Depreciation on the machinery sold on June 29, 2012, and
(2) The sale of machinery.
3. Compute depreciation expense on the building, remaining machinery, and equipment for 2012.
Supply the correct amount for each numbered item
: On October 1, 2010, Machine B was acquired with a down payment of $4,000 and the remaining payments to be made in 10 annual installments of $4,000 each beginning October 1, 2011. The prevailing interest rate was 8%.
|
Malware must first be detected
: Malware must first be detected before it can be removed. How can malware detection best be handled in a large corporate setting?
|
A computer network
: Least three methods by which you can monitor threats to a computer network. Describe and provide background information each method. Your paper should be between 800 and 1,000 words and should include citations.
|
The information assurance
: I have worked in the information assurance (IA) arena for well over a decade. But as happens to many professionals, I worked in one sector only. I became used to the specialized controls that only affected a small segment of the IA population in term..
|
Compute depreciation expense on the building
: Compute depreciation expense on the building, remaining machinery, and equipment for 2012.
|
Different sources can be usefully aggregated
: What are the different ways in which data from different sources can be usefully aggregated?
|
Conduct a vulnerability
: You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.
|
The information technology senior analyst
: You are the information technology senior analyst at your company. Your company can be a real business where you work or a virtual business that you would like to start. In either case, you should be familiar with the business environment and the nat..
|
Compute the book value of the mineral mine structures
: Compute depletion and depreciation of the mine and the mining facilities and equipment for 2011 and 2012. Marion uses the units-of-production method to determine depreciation on mining facilities and equipment.
|