Required rate of return for the project

Assignment Help Basic Computer Science
Reference no: EM131106545

Piedmont Hotels is an all-equity firm with 60,000 shares of stock outstanding. The stock has a beta of 1.27 and a standard deviation of 13.8 percent. The market risk premium is 9.1 percent and the risk-free rate of return is 4.5 percent. The company is considering a project that it considers riskier than its current operations so it wants to apply an adjustment of 1 percent to the project's discount rate. What should the firm set as the required rate of return for the project?

Reference no: EM131106545

Questions Cloud

Prepare all journal entries necessary on those three dates : Wool ford Inc. declared a cash dividend of $1.00 per share on its 2 million outstanding shares.
What is the length of the string : Calculate the average speed of the cart as it coasts from 0 cm to 20 cm. Answer in meters per second. Calculate the kinetic energy of the system as the cart coasts from 0 cm to 20 cm.
Determining the capital gains yield : What would your capital gains yield have been if you had purchased this stock one year ago and then sold the stock today?
The critical fractile method for a newsvendor model : A department store is trying to decide how many JP Desksquirt II printers to order. Because JP is about to come out with a new model in a few months, the store will order only a limited number of model IIs.
Required rate of return for the project : The company is considering a project that it considers riskier than its current operations so it wants to apply an adjustment of 1 percent to the project's discount rate. What should the firm set as the required rate of return for the project?
A firm experiences demand with a mean : A firm experiences demand with a mean of 100 units per day. Lead time demand is normally distributed with mean 1000 units and standard deviation 200 units. It costs $6 to hold one unit for one year.
Show that it is the transpose of one of identities : The identities of Eqs.(14.47) through (14.49) follow from equating corresponding terms in the two sides of Eq. (14.46).There is actually a fourth identity to be considered. Find this identity and show that it is the transpose of one of the identit..
Prepare hingess journal entry : Hinges Corporation issued 500 shares of $100 par value preferred stock for $61,500. Prepare Hinges’s journal entry.
Draw context-level data flow diagram for course registration : Draw a context-level data flow diagram for the "Courses Registration" system using the following items. Explode the above context-level diagram by drawing the logical data flow diagram level 0 showing all the major processes using the following ite..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find total average time to satisfy request of platter disk

Determine the average seek time? Determine the average rotational latency? Determine the transfer time for a sector? Determine the total average time to satisfy a request?

  Calculate and display running total of yesterday receipts

calculate and display the running total of yesterday's receipts. The program should use the method calculate-Charges to determine the charge for each customer.

  Important task for a systems administrator

An important task for a systems administrator is explaining how to troubleshoot common computer issues new employees encounter.

  Current standards sufficient to protect privacy

What is the right of privacy, and what is the basis for protecting personal privacy under the law and are current standards sufficient to protect privacy?

  How is the principle of inclusion and exclusion related

How is the principle of inclusion and exclusion related to the rules for manipulation and simplification of logic predicates you learned in Ch. 2

  Write a subroutine to configure the can1 module

Write a subroutine to configure the CAN1 module of the HCS12DP256 with the bit timing parameters computed in E13.2.

  Use appropriate classes, fields, methods, objects

The summary information required by the University is the number of students and guests at each ceremony the total number of students and guests at all three ceremonies the ratio of students to guests at each of the three ceremonies.

  Implementation of security mechanisms

A security designer is planning the implementation of security mechanisms in a RBAC (Role Based Access Control) compliant system. The designer has determined that there are three types of resources in the system including files, printers, and mail..

  Structure of typical sql environment

1. Describe the components and structure of a typical SQL environment? 2. Explain the use of derived tables.

  What is returned by function two defined below for the call

What is returned by function two defined below for the call two(13)? Show your trace for full marks.

  Justify five reasons not consider smartphone to computer

justify at least five reasons why you would or would not consider a smartphone and other cell phones to be computer systems

  Write code to de-vowel an input string

Write code to "de-vowel" an input string. Assume that the user provides input containing only the characters a through z (and all lowercase). Your code should create an output string that deletes all vowels from the input string, pushing the lette..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd