What is payback period of project

Assignment Help Basic Computer Science
Reference no: EM133295456

Consider the salary of IT positions as follows: Software Project Manager ($7,000 per month) Senior Programmer ($5,000 per month) Junior Programmer ($2,000 per month). A start-up plans to develop a mobile app that will allow users to see themselves in clothes found in ecommerce sites by the use of Augmented Reality (AR) technology. The start-up's founder has decided to manage the End of Semester 2, 2020 ISAD6000 Software Engineering Requirements and Specification Page 3 of 4 team himself and has hired one senior programmer and one junior programmer. He has laid out the financial projections as below: Year 0 Year 1 Year 2 Year 3 Year 4 Team salary costs $84,000 $84,000 0 0 0 Development costs $20,000 $10,000 0 0 0 Operation costs 0 0 $1,000 $1,000 $1,000 Maintenance costs 0 0 $1,000 $1,000 $1,000 Number of downloads 0 0 8,000 12,000 20,000 The app is a paid app and will cost $5 for a download. The founder estimates that after three years of operation, he will sell the business for $250,000.

(a) What is the payback period (to one decimal place) of the project? Show your working.

(b) What is the Net Present Value (NPV) of the project? Use a discount rate of 5%. Show your working.

Reference no: EM133295456

Questions Cloud

Network connectivity policy stipulate : Why do you think we recommend that the network connectivity policy stipulate the various forms of third party connectivity that are supported?
What should you tell him about the location : What should you tell him? There is nothing different about the location except it is 3 feet closer to the property line which is still aways off.
What are proactive agents : What are the proactive agents and how they are distinguished with reactive agents?
Describe what you learned, what you thought was interesting : ISM 3007 Florida Atlantic University describe what you learned, what you thought was interesting and grabbed your attention
What is payback period of project : Consider the salary of IT positions as follows. What is the payback period (to one decimal place) of the project? Show your working.
Where petitioners entitled to intervene in this litigation : Where Petitioners entitled to intervene as of right in this litigation? Do the two North Carolina legislators have a right to intervene in this case to defend
Did you find any other information on website interesting : Did you find any other information on the website interesting? Do you consider this to be an accurate reflection of how you view privacy?
Parts of spreadsheet with little of no formatting : When might you want to format each worksheet in a workbook with different formatting or parts of a spreadsheet with little of no formatting?
Apply key concepts to real world phenomena and experiences : FY008 Ways of Learning About the Social World - Buckinghamshire New University Demonstrate understanding disciplinary language, vocabulary and investigation

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Issues related to the researched technologies

From the e-Activity, discuss two security issues related to the researched technologies. Select a Wi-Fi device you are familiar with and analyze the security protection currently implemented on the device. Speculate whether the protection on the se..

  Process in designing and organizing tables

Database normalization is a very important process in designing and organizing tables (relations) and their columns (attributes or fields)

  Overview of information security

A brief overview of information security and how it can impact the company. Potential threats and business impacts. Benefits of a strong company security posture

  Focusing on host intrusion detection system

Focusing on Host Intrusion Detection System, Intrusion Prevention Systems (HIDS) or AntiVirus Systems.

  What is the pmf of b

What is the PMF of B?

  Create national security culture

What would you do to help create a national "security culture," in which everyone is more knowledgeable and proactive about threats to information security?

  Client to view the documents

Based on the security methods covered in this unit (attributes, permissions, etc.), describe in detail the process you would use to allowing an individual.

  Manipulating computers instead of manually

Sergons use which technology to perform delicate operations on patients by manipulating computers instead of manually?

  Implementation of security and authentication mechanisms

In a managers' meeting between the information technology administrator, the lead for the consultant group, and the dean of information technology

  Discuss how net neutrality will affect data networks

Read four academically reviewed articles on Net Neutrality and complete the activities. discuss how net neutrality will affect data networks.

  Security breach evaluationh.

Describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach

  An appeal to venture capitalist for funding for project

An Appeal to a Venture Capitalist for Funding for this project. Make the whole thing readable and logical from start-to-finish.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd