Premium Essay

Unit 3 Ip for Financial Management

In:

Submitted By suburbanmomma
Words 444
Pages 2
American InterContinental University
FINA310-1301A-02: Professor Michael James
March 5, 2013

Abstract
This assignment will use the CGM and the CAPM to calculate some information regarding the XYZ stock market.

XYZ Stock Market Information
Krf=2%
XYZ’s beta =1.64
XYZ’s current annual dividend = $.80
XYZ’s 3-year dividend growth rate (g) = 8.2%
Industry P/E = $4.87
KS= (Risk Free Rate) + Beta (Market Premium)
KS= (0.2) + 1.64 (.075)
KS= (0.2) + 0.123
KS= 0.143 or 14.3%
Stock Price= Estimated dividend/ (Cost of Equity-Growth)
.80/(14.3%-8.2%)
.80/6.1%
$13.11
The current stock price is $76.28, which depicts a difference of $63.17 between the stock price above and the current stock price. Such a large difference might be from all of these factors:
1. When figuring the rate of return, we assumed a market risk premium of 7.5%. This type of assumption is not correct because the market risk premium changes every day, and when this happens, XYZ’s required rate of return would be affected; thus affecting the stock price as well.
2. The growth rate used to do the math was 8.2%. The present XYZ growth rate might be higher than this rate, thus a difference with the growth rate could possibly result in a different price per share.
3. The XYZ price per share had been going up over the past month. This particular raise in the share price could have caused non-experienced shareholders to spend lots on the XYZ stock, thus causing the share price to increase.
KS= (0.2) + 1.64 (.10)
KS= (0.2) + 0.164
KS= 0.184 or 18.4%
Po= .80/(18.4%-8.2%)
Po= .80/(10.2%)
Po= $8.16
Because the rise in the risk premium depicts an increase in risk, shareholders would be hoping for a larger return on his/her investment to make up for this rise in risk, thus, an increase in the rate of return would cause a decrease in the share price.

Similar Documents

Premium Essay

Growth of Grass

...FUNDING A BUSINESS VENTURE Unit 2-IP 1 THE FUNDING OF A BUSINESS RUDOLPH LUCIEN Introduction to Business BUSN105-1203B AIU July 29, 2012 FUNDING OF A BUSINESS VENTURE Unit 2-IP 2 ABSTRACT This essay will cover a list of issues facing the start of a new business and the funding of one. I will talk about the 4 terms investment banker, the stock market, financial management, risk financing, and how each one of them works. I will also discuss 1 of 3 ways that you can use when funding your business. Finally I will identify, describe, and explain everything else that deals with making a funding decision. FUNDING A BUSINESS VENTURE Unit 2-IP 3 Investment Banker Investment bankers are: They are critical figures in financial markets. They are involved in virtually all large financial transactions including mergers and acquisitions, initial public offering, and other securities offerings. An investment banker is someone who also helps companies raise capital by trading in securities and other investments. They function as: Investigation, Analysis and Research (Origination), Underwriting (Public cash offering) and Distribution. Most of the time a single investor banker performs all...

Words: 1284 - Pages: 6

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning to get it right. Retail product and service businesses operate in a crowded market. There is intense competition for customers. Today's businesses have found that the pursuit and retention of customers is the primary goal and Johnson is concerned that their methods are too antiquated to keep them competitive. Currently, Johnson used analog phone lines and takes all customer orders by...

Words: 3601 - Pages: 15

Premium Essay

Vulnerability Mangement

........................................................ Your Home Page................................................................................................... View Host Assets .................................................................................................. Add Hosts .............................................................................................................. Remove IPs from the Subscription..................................................................... Add Virtual Hosts ................................................................................................ Check Network Access to Scanners ................................................................... Review Password Security Settings ................................................................... Adding User Accounts ................................................................................................... User Roles and Privileges .................................................................................... Asset Groups and Business Units...

Words: 38236 - Pages: 153

Premium Essay

Business Law.Types of Companies

...for a business enterprise.  Support of its business processes and operations.  Support of decision making by its employees and managers.  Support of its strategies for competitive advantage. Trends in IS: The business applications of information systems have expanded significantly over the years.  Data Processing (1950s – 1960s): Electronic data processing systems which includes transaction processing, record keeping, and traditional accounting applications.  Management Reporting (1960s – 1970s): Management information systems that include preparation of management reports of pre specified information to support decision making.  Decision Support (1970s – 1980s): Decision support systems include interactive ad hoc support of managerial decision making process.  Strategic and End User Support (1980s – 1990s): o End user computing systems: Direct computing support for end user productivity and work group collaboration. o Executive information systems: Critical information for top management. o Expert Systems: Knowledge based expert advice for end users. o Strategic Information Systems: Strategic products and services for competitive advantage.  Electronic Business and Commerce (1990s – 2000s): o Internet based e-business and e-commerce systems: Web enabled enterprise and global e-business operations and electronic commerce on the internet, intranets, extranets, and other networks. What is MIS?  Right Information  To the...

Words: 13881 - Pages: 56

Premium Essay

1102

... cT  I P  G  X ]  c(1  t )Y 2 Recap Week 6: Short Run Equilibrium Equilibrium condition Y  PAE Y  [C  cT  I  G  X ]  c(1  t )Y P Solve for equilibrium GDP Y [1  c(1  t )]  [C  cT  I P  G  X ] Ye  1 [C  cT  I P  G  X ] [1  c(1  t )] 3 Recap Week 6: Keynesian model – recessionary gap . PAE (planned aggregate expenditure) PAE = Cd + IP + G + X 0 IP+ G + X IP + G IP Y* Y (= GDP) Starting at potential output (Y*), a fall in exogenous C, I, G, NX will lead to a recessionary gap 4 Recap Week 6: If we assume that the planned aggregate expenditure is given by the equation PAE = 960 + 0.8Y a 10-unit drop in exogenous expenditure would result in a _____________ in short-run equilibrium output. A. 50-unit decline B. 40-unit decline C. 950-unit decline D. 4-unit decline 5 Recap Week 6: Keynesian model – recessionary gap . PAE (planned aggregate expenditure) PAE = C + IP + G + NX 0 Ye Y* I P + G + NX IP + G IP Y (= GDP) Recessionary gap 6 Recap Week 6: Keynesian model – expansionary gap . PAE (planned aggregate expenditure) PAE = C + IP + G + NX I P + G + NX IP + G 0 IP Y* Ye Expansionary gap Y (= GDP) 7 Recap Week 6: Multipliers  The government expenditure multiplier is greater than the tax/transfers multiplier  Withdrawals – higher income taxes and imports – reduce the impact of the multipliers 8 Recap Week 6: The short-run...

Words: 3681 - Pages: 15

Premium Essay

Pcm Guideline

...Project Management in the OSCE A Manual for Programme and Project Managers Organization for Security and Co-operation in Europe Development, Coordination and Design This manual is designed and developed by the OSCE Secretariat’s Conflict Prevention Centre, Programming and Evaluation Support Unit (CPC/PESU). Main Author: Sebnem Lust, Programme and Project Evaluation Officer Co-Authors: Laura Vai, Head of Programming and Evaluation Support Unit Sean McGreevy, Project Co-ordination Officer Editor: Keith Jinks Designer: Nona Reuter Published by the Organization for Security and Co-operation in Europe OSCE Secretariat CPC/PESU Wallnerstrasse 6 1010 Vienna Austria Telephone: +43 1 514 36 6122 Fax: +43 1 514 36 6996 www.osce.org Email: pcc-at@osce.org © 2010 OSCE ISBN: 978-92-9234-301-9 Rights and Permissions: All rights reserved. The contents of this publication may be freely used and copied for educational and other non-commercial purposes, provided that any such reproduction is accompanied by an acknowledgement of the OSCE as the source. ii Acknowledgements This manual contains comprehensive guidance on how the Organization for Security and Co-operation in Europe applies the Project Cycle Management method and the Logical Framework Approach to its project work, as well as essential information on the political, programmatic, regulatory and information technology aspects of project management. The manual’s purpose is to ensure coherence, consistency and transparency...

Words: 66299 - Pages: 266

Premium Essay

It530

...CONTINUOUS CASE STUDY This case study can be used as a progressive platform for building and applying data communications and computer networking concepts as students progress through the book. Company Background The company is a division of a Fortune 500 manufacturer of packaging material. This packaging material is used in cookie bags, cigarette cartons, cereal boxes, ice cream containers, and just about every conceivable food-product package. Customers purchase product based on weight (cents per pound or dollars and cents per pound). Additional charges that might be billed to the customer include special packaging charges, storage charges (if the customer requests that product be stored at a public storage facility), and shipping charges (if a contract carrier is utilized to deliver product to the customer). The product is marketed to an existing customer base through an internal sales force that reports directly to the Field Sales Force Manager. The Field Sales Force Manager in turn reports to the Vice President of Marketing and Sales. The combined charter of the marketing department and the sales force team is to maintain and expand product sales to existing customers and develop new sales with existing customers and prospect and develop new customers. The Vice President of Marketing reports to the General Manager of the division, who is an executive VP reporting to the parent company’s chief operations officer or president. Product delivery is supported by the distribution...

Words: 3799 - Pages: 16

Premium Essay

Tinab Ennett

... | Table of Contents Information Technology Statement of Intent 5 Policy Statement 5 Objectives 5 Key Personnel Contact Info 6 Notification Calling Tree 7 External Contacts 8 External Contacts Calling Tree 10 1 Plan Overview 11 1.1 Plan Updating 11 1.2 Plan Documentation Storage 11 1.3 Backup Strategy 11 1.4 Risk Management 11 2 Emergency Response 12 2.1 Alert, escalation and plan invocation 12 2.1.1 Plan Triggering Events 12 2.1.2 Assembly Points 12 2.1.3 Activation of Emergency Response Team 12 2.2 Disaster Recovery Team 13 2.3 Emergency Alert, Escalation and DRP Activation 13 2.3.1 Emergency Alert 13 2.3.2 DR Procedures for Management 14 2.3.3 Contact with Employees 14 2.3.4 Backup Staff 14 2.3.5 Recorded Messages / Updates 14 2.3.7 Alternate Recovery Facilities / Hot Site 14 2.3.8 Personnel and Family Notification 14 3 Media 15 3.1 Media Contact 15 3.2 Media Strategies 15 3.3 Media Team 15 3.4 Rules for Dealing with Media 15 4 Insurance 15 5 Financial and Legal Issues 16 5.1 Financial Assessment 16 5.2 Financial Requirements 16 5.3 Legal Actions 16 6 DRP Exercising 16 Appendix A – Technology Disaster Recovery Plan Templates 17...

Words: 4679 - Pages: 19

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Premium Essay

Business Plan

...KEY NOTES: 1. Instructions are included throughout this document in red italics. Please delete all instructions before printing out your final plan. 2. This document includes the textual portion of your business plan. Many of you will also want to create your financial projections (created with the Microsoft Excel file we gave you) and integrate them into this document. Directions to do this are included throughout this document. To update this document at any time to reflect changes made to your Microsoft Excel file, simply save and close both files. When you reopen this file (after you create the links per the instructions in this document), you will see a prompt asking if you want to update this document with the data from the linked files. Simply select “Yes” to this question. [Company Logo] (if applicable) [Company Name] BUSINESS PLAN [Current Month], [Year] [Name] [Title] [Company Name] [Address 1] [Address 2] [City, State Zip] Tel: [ ] Fax: [ ] Email: [ ] CONFIDENTIAL No offering is made or intended by this document. Any offering of interests in [Company Name] will be made only in compliance with Federal and State securities laws. This document includes confidential and proprietary information of and regarding [Company Name]. This document is provided for informational purposes only. You may not use this document except for informational purposes, and you may not reproduce this document in whole or in part...

Words: 3859 - Pages: 16

Free Essay

Internship Report at Ministry of Local Government, Uganda

...through the Local Government Act (LGA) cap 243 Laws of Uganda 2000. Local Government Financial and Accounting Regulations, issued under the LGA, prescribe the accountability measures for compliance by LGs. The goal of the decentralization policy is to facilitate economic growth and development by devolving powers, functions, responsibilities and resources to Local Governments (LGs) in order to promote high quality and reliable basic public services on a sustainable basis. The decentralization policy aims to: • Transfer power, functions, responsibilities and resources to LGs to ease the work load of the officers at the center • Bring political and administrative decision making and control over resources allocation and service provision to the point of delivery to enhance effectiveness, promote a sense of ownership and improve accountability; • Enable Local Government officers develop the prerequisite capacity to develop organizational structures tailored to local circumstance; • Enhance financial accountability by establishing a clear linkage between the provision of services; and • Improve the LG’s capacity to plan, finance and deliver public services to its residents.  To guide LG’s in fulfilling the mandate , Government has enacted laws and developed regulations, operations, operational manual, guidelines and policy papers all aimed at establishing sound administrative and financial practices and decision-making process that promote efficiency, effectiveness and...

Words: 3387 - Pages: 14

Premium Essay

Entreprenuership

...given a 12-month period to complete the development of their prototypes or proofs-of-concept. b) Allowable Funding: * Prototype development * Proof-of-concept development * Business plans development * Purchase of market feasibility research * Search and registration of Intellectual Property (IP) * Surveys on concrete statistical data * Product sampling expenses * Industry Focus ICT * Mobile/wireless tech * Creative multimedia & content development * Shared services outsourcing * Hardware design * Software development (Bio-informatics, consumer productivity applications, data mining & business intelligence, electronic design automation, enterprise & business services, gaming & interactive entertainment, Internet & e-Commerce, networking, communications & connectivity, open source, operating systems, security) * Internet-based businesses Non-ICT * Biotechnology (Bio-informatics, Bio-chemicals, Bio-diagnostics tools, agriculture and food tech) * Advanced materials * Advanced manufacturing-related tech * Renewable energy / waste management / recycling tech * High-technology consumer & business products Others * Semi-conductors (manufacturing of integrated circuits, microprocessors, logic devices, chipsets, memory chips) * Life sciences (neuroscience, organic chemistry, potential drug target & method of treatment inventions...

Words: 721 - Pages: 3

Premium Essay

Director

...Subject: Strategic paper - Cisco Category: Business and Money > Economics Asked by: k9queen-ga List Price: $60.00 |Posted: 02 Dec 2003 08:37 PST Expires: 01 Jan 2004 08:37 PST Question ID: 282626 | | |For the company CISCO, PLease give a SWOT analysis. Explain what | |their core competency is, do they have any forward/backward | |integration? What do they or are they trying to do to be competitive | |in the market? Etc. | |[pic] | |Request for Question Clarification by politicalguru-ga on 02 Dec 2003 08:52 PST | |Dear Queen, | | | |I found several ready-made SWOT analyses online. Would you like me to | |refer you to the sites where you could find them? ...

Words: 2725 - Pages: 11

Premium Essay

Acct Unit 3 Ip

...Unit 3 IP Shante Patterson ACCT205 AIU Online December 1, 2013 The internal control system should be intended to distinguish and prevent deception, mistakes and oversights, and material misstatements; then again it can only provide sensible assurance that the financial statements are at liberty from material misstatements. The best designed internal control system will not avert management override or collusion. The internal controls system is only as good as the management backing behind the system; this comprises training employees and dynamically observing the controls. The cost of applying a specific control should not surpass the probable benefit of the control. On occasion there are no out-of-pocket costs to institute an acceptable control. Internal control procedures are the duty of the management. Every single control must be assessed based on risk and a cost/benefit inquiry. Several operational low cost procedures can be applied. These control procedures, when in service effectively, will arrange for a sensible assurance that mistakes will be either prohibited or identified. Instances of controls that would have make sure that the prepaid tunings were made would be to gather a check-list of cyclical monthly journal records, than as a part of the financial report evaluation procedure, this check-list ought to be looked over by the management. At each financial statement date, each balance sheet account is resolved; this will guarantee that every single balance...

Words: 532 - Pages: 3

Free Essay

Foreign Debt Crisis Amangement of Rcom

...International Financial Management (IFM) Individual Project Report Title of the project- Foreign Debt crisis management of RCOM Batch–PGCBM -21 Centre –DAKC, Mumbai Name- Rajesh Kumar Verma Email- rkv3466@gmail.com, rajesh.kr.verma@relianceada.com SMS No- 110387 SID- RB12044 Table of Contents 1. Introduction 2. Purpose of the assignment 3. Gratitude to Professor and support staff 4. Introduction of IFM Assignment topic- Foreign Debt Crisis Management of RCom 5. Company Profile 6. Assignment analysis and study A. Reliance Communications has secured loans from a host of Chinese banks to refinance $1.18 billion B. RCom has filed a prospectus with the Singapore Stock Exchange and plans to divest as much as 75% stake in Flag Telecom to raise about $1 Billion i) Background of Reliance Globalcom (Flag Telecom) ii) Cable network of Flag Telecom iii) Solutions offered by Reliance iv) Strategic Move by Reliance to fight with debt crisis C. Reliance Communications has put on hold the initial public offering of its undersea cable unit Flag Telecom in Singapore D. Impact of heavy debt on company's financial credit worthiness and impact of rupee devaluation on overseas loan E. The impact of the high-debt levels has been further compounded because of the steep depreciation of the rupee 7. Impact of Un-hedged foreign currency debts due to rupee devaluation 8. Conclusion INTRODUCTION As a student of International Finance Management (IFM)...

Words: 3768 - Pages: 16