What is the maximum return

Assignment Help Basic Computer Science
Reference no: EM131243850

An investor has $45,000 to invest in a CD and a mutual fund. The CD yields 4% and the mutual fund yields on average 5%. The mutual fund requires a minimum investment of $10,000 and the investor wants at least twice as much money invested in the CD as in the mutual fund. How much should be invested in the CD and how much in the mutual fund to maximize the return? What is the maximum return?

Reference no: EM131243850

Questions Cloud

Expresses your position on the value of wikipedia : Compose an essay, between about 1,000 and 1,500 words, that expresses your position on the value of Wikipedia for college students.
Report on physical principles of digital imaging : Prepare a report on physical principles of digital imaging fluoroscopic imaging system - Includes (any things related to the topic):introduction, Body, Conclusion and References
How is the market better today or worse : Basically everything there is to know about real estae investing, pros cons risks benifits, diffrence between land and property investing. The diffrence between the housing bubble from 2008 and now, what is forclosere on homes, how is the market b..
What do you see as your strengths regarding working on team : Based on your self-assessment, what do you see as your strengths and weaknesses regarding working on team? How does working effectively on a team give you an advantage in the workplace? How do groups normally develop?
What is the maximum return : The mutual fund requires a minimum investment of $10,000 and the investor wants at least twice as much money invested in the CD as in the mutual fund. How much should be invested in the CD and how much in the mutual fund to maximize the return? Wh..
Prepare a report on image intensifiers : Prepare a report on image intensifiers - Medical Imaging field.
Is the theory designed for short- or long-term counseling : What concepts of the theory make it the most appropriate for the client in the case study? Why did you choose this theory over the others? What will be the goals of counseling and what intervention strategies are used to accomplish those goals?
Bicycle manufacturer has two retail outlets : A bicycle manufacturer has two retail outlets and in addition sells some bikes to a large chain store. One truck makes all the deliveries and takes 3 hours to make a round trip to the first retail store, 2 hours to the second retail store and 4 ho..
How much is in the ira when bob retires : With on additional deposits, the money in the IRA continues to earn 6.9% interest compounded annually Bob retires on his 65th birthday. How much is in the IRA when Bob retires?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Memory explain the allocation of memory cells when a

explain the allocation of memory cells when a function is called. what is stored in the function data area for an input

  For my human performance improvement class

Modeling mastery performance and systematically deriving the enablers generates data for use in downstream improvement efforts, including additional analyses

  How to track down offenders of these crimes

What are some suggestions as to how to track down offenders of these crimes you've identified?

  Explain the discrepancy

Explain the discrepancy

  Work with dictionary and create relational database

In this lab, you will prepare a Data Dictionary based on the list of elements. Also, your task will be determined the tables, their relationships, primary and foreign keys. Based on this analysis, you will create Database Schema, relational tables..

  How does the mechanism work

1. What is a proxy firewall and how is it different from a network (or transparent) firewall? 2. What does NAT stand for, and how does the mechanism work? Describe what, if any, security NAT provides (or fails to provide). 3. Where would you place ..

  Describe the purpose of the working directory

In your own words, describe the purpose of the working directory and how it can speed or slow file access. In your opinion, should there be more than one working directory? Explain.

  Cloud storage carries potent security risk

See this article about "Cloud storage carries potent security risk", including reading the information and viewing the short video (on Financial Services).

  Describe four business trends and three technology trends

Name and describe four business trends and three technology trends shaping e-commerce today. What are the principal e-commerce business and revenue models? How has e-commerce transformed marketing? Explain how social networking and the "wisdom of cro..

  Identify each of the seven steps needed to perform the call

Now look at the code generated for a parameter less call by a C or C++ compiler on the machine you selected. Can you identify each of the seven steps needed to perform the call?

  Identity and access management

Analyze the identity and access management approach that organizations need to implement to effectively control access to their systems. Explain how the identity and access management approach would be influenced by the type of organization and it..

  Classes implemented without the generic syntax

The syntax of generic classes and methods was not added until version 5.0 of Java. Nonetheless, early versions of the language had collections classes such as an array list, or a linked list. How were those classes implemented without the generic sy..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd