Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Valuation of Merger Target
Hastings Corporation is interested in acquiring Vandell Corporation. Vandell has 1 million shares outstanding and a target capital structure consisting of 30% debt; its beta is 1.60 (given its target capital structure). Vandell has $10.91 million in debt that trades at par and pays an 7.1% interest rate. Vandell's free cash flow (FCF0) is $1 million per year and is expected to grow at a constant rate of 6% a year. Vandell pays a 35% combined federal and state tax rate. The risk-free rate of interest is 4% and the market risk premium is 4%. Hastings' first step is to estimate the current intrinsic value of Vandell.
A) What are Vandell's cost of equity and weighted average cost of capital? Round your answer to two decimal places. Do not round intermediate calculations.
1) Cost of equity: _________ %
2) WACC: ____________ %
B) What is Vandell's intrinsic value of operations? (Hint: Use the free cash flow corporate valuation model.) Round your answer to two decimal places. Do not round intermediate calculations.
1) $ ________________ million
C) What is the current intrinsic value of Vandell's stock? Round your answer to the nearest cent. Do not round intermediate calculations.
1) $ __________________ /share
There is one RF stage, one stage of IF amplification at the first IF, and three stages of combined IF amplification and limiting at the second IF. A quadrature detector is used as the demodulator. The receiver is tuned to a signal with a carrier f..
The topic for this is best practices for creating a network diagram. Begin the brainstorming process for final project. This is not the final project just answer the following questions:
Do you ever fail to come up with videos? What do you see in terms of promoted videos in these searches?
Stack object data structures do not contain code to throw an exception when a stack.pop() function is called on an empty stack. This is due to the fact that it is easy to establish this exception handing elsewhere. Create a class named SafeStack that..
Suppose we have a forward contract with one year expiry with the additional property that either party can cancel the contract after six months. How much will this contract be worth?
Suppose you were to choose between three ARQ protocols: stop-and-wait, go-back-N and selective repeat ARQ.
This is the first of a three part assignment that I will be looking to work with the same tutor on. I would like to use Google as the company of choice.
The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication
Explain the importance of user abilities and characteristics in the usability of products.
Any method that creates a new object and returns that object can be thought of as a "factory" method. However, the use of such a method does not necessarily.
We can use the destructor to deallocate memory for an object. How would you deallocate memory in a destructor?
How important is what you say and do in relation to your work output in this process? How would you communicate these issues and the recommended solutions back to your manager?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd