Sunday, January 26, 2020
Bluetooth Remote Access to PC Using Mobile Devices
Bluetooth Remote Access to PC Using Mobile Devices CHAPTER 1 INTRODUCTION TO RESEARCH 1.1 INTRODUCTION: Bluetooth is a wireless technology of the last decade, there has been a lot of research going on this technology all over the world. The Bluetooth was named after the 10th century Danish King Harald Blatand or Harold Bluetooth. King Blatand was influential in uniting militaristic factions in parts of what are now Norway, Sweden and Denmark just as Bluetooth technology is designed to allow collaboration between differing industries such as computing, mobile phone and automotive markets. Bluetooth technology was the internal project of Ericssion, which was intended for providing short distance multiple links. Then it was collaborate with Intel in 1997, later the association with Nokia, IBM, Toshiba, Microsoft, Motorola, 3com etc to form a non profitable trade association Bluetooth Special Interest Group (SIG). The formed consortium adopted common code name to Bluetooth for their open source specification. Bluetooth uses 2.4 GHz frequency for transmitting the data at band rate of 1Mbps . In taking account of users point of view, there are three important features to Bluetooth. (Ali M Aljuaied 2001) It is wireless. When you got to client place, you need not have to worry about keeping track of cables to attach all of your components and you can design your application without wondering where all the wires will go. It is economical. You do not have to think about it. Bluetooth does not require any extraordinary skills to make it work. The devices find one way or another and pairs up a conversation without any user input at all. Bluetooth technology is a standard and communications protocol which is designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost transceiver microchips in each device. Bluetooth enabled devices tend to communicate with each other when they are in range. These devices use radio wave communications system, so that they do not have to be in line of sight with other and can even be in other rooms, as long as the received transmission is powerful enough. During the discovery process Bluetooth device transmits class type of device and the supported services of that class Class Max permitted power Range(approx) Class1 100mW 100meters Class2 2.5mW 10meters Class3 1Mw 1 meter Table reference [www.bluetooth.com] The popular Bluetooth applications are: Mobile phone and hands free headset. File transfer between Bluetooth enable devices using Obex application The places where traditionally used by IrDA in control equipment. In gaming equipments like play station. Used to connect the Dial up internet for PC. 1.2 AIMS AND OBJECTIVES OF RESEARCH: The main research aim of the project is to develop Remote PC manager from mobile through Bluetooth and make it more efficient and reliable for future applications. The following are the research objectives: Developing user friendly software for remote management of PC through mobile using Bluetooth. Improvement of response time in the existing application. To solve the problem occurred in application during the connection and disconnection Process. 1.3 PAST WORKS: There has been a vast amount of research carried out in Bluetooth related applications all over world of which is this PC remote mobile phone using Bluetooth application, but most of the applications that are made have been having problems related to response time, compatibility with specific mobile such as Nokia and Sony Ericsson, connection and disconnection. Hence, the next few lines will discuss about the background for developing PC remote. Based on Blueshareware.com Development done Deployment year The first beta type control 1.0 version using Nokia 6600 23 Feb. 2005 Then added applications related to audio and video player 7 march 2005 Then started to test the code on Sony Ericsson 6 Nov 2005 New GUI for phone has been developed with special soft keys 29 Jan 2006 After then they started to have better GUI by correct early problems and adding new applications releasing higher version Bluetooth remote control 2.0 The Open java script that allowed others to be modified They have added new PowerPoint application. It had some drawback such as application could not run in some mobiles and screen turn blank some times. There has been a lot of modification and re-releases by solving problems like increasing the range of compactable mobile and correcting minor problems. Bluetooth remote control 3.0 Win AMP player has been added Till this version the power point and any applications was not given importance. The development of latest version of the GUI was available in J2me, which decreased the application size. Bluetooth remote control 4.0 Though they added, Win AMP could not be launched from it. The phone could not be compactable with other stacks. Response was improved for some functions. The application had problems with the connection and disconnection. Less application size than compare to the above version was achieved by better versions of MIDP and CLDC. Some individuals have been working on this software like Jerome Laban. The project related to two PC remotes, the software developer who is working on compatibility for different types of mobiles such as Orange E200/QTEK 8080 and some are Motorola based mobiles with Blue Soleil third party stack in .NET FRAMEWORK 2.0 where he using different programming languages and client softwares. There has been lot of development going on PC remote using Mobile phone Bluetooth many of them are developing many applications based on different softwares .The improvement in MIDP, CLDC in the new mobile have increased the applications, and the application code size started to decrease with improvements in them. 1.4 RATIONALE FOR RESEARCH: After my under graduation I started working in an embedded system based company in India. Lampex electronics Ltd which deals with providing embedded solution to local firm, we had an Electrical billing handheld machine, which we supplied to state of Andhra Pradesh (India) Electricity board, they requested for a short distance wireless technology to upload the data from handheld machine to PC. We have selected IrDA as wireless technology because of low power consumption and less memory application .We have done the work successfully but as a developer, I was not convinced for two reasons: The handheld machine and PC transceivers have to be placed face to face. We had problem with time slots management, went slaves (handheld machine) are more than two at the same time. This made me to select Bluetooth technology as my research topic, and then I came across different research topics on Bluetooth related to security, pairing, remote PC manager etc. Then I started working on a Remote PC manager. Remote PC manager is an application developed using Bluetooth available in your mobile phone to manage a PC. The application had problem related to response time in certain areas of application. The response time is the time an application takes to react to a give input. In this application, we define response time as the time taken to respond when an instruction have been sent from mobile phone to remote pc manager. CHAPTER 2 LITERATURE REVIEW AND RESEARCH METHODOLOGY 2.1 RESEARCH APPROACHES: The following are the approaches towards my research, which have eventually done in stages: To study about Bluetooth behaviour and comments related to the application from the users. In the course of research, reading has been done from books, journals and websites regarding Bluetooth and related software is used in the project. Developing Program and data flow diagrams An IT related program was developed which had all the modern approaches to the project development and deployment and as well as the data flow diagrams were drawn for the clear view of the data in the program Implementation After the development of the programs, implementation has carried out to check its success and working Testing The programmable code is tested, verified and made sure that its bug free. 2.2 Justification of Research Approaches: Mixed research methods have been used for projects as it deals with collecting information about the product and implementation to the product. Using Qualitative research, more data is gathered from journals and textbooks, which showed about the Bluetooth applications. There was also chance to know, to what are hurdles in the existing Bluetooth technology. I have registered in Bluetooth groups and started to ask experts in this field about their feedback regarding the application. I went through some of the existing technologies available in the market and where I could study the functioning of the Bluetooth PC remote. Knowing about the application, I could estimate that projects with modern approach will be needed, in enhancing the application throughput. Online journals also helped me out a lot. Research books also helped me in how to carry out my research and which method would more suit my needs. Quantitative research is also a very important criterion in my research .I could plan my whole project on Gantt chart and proceed further. So, I had opted with mixed approach, i.e. qualitative and quantitative which made my research easier. 2.3 LITERATURE REVIEW: A lot of research is done on Bluetooth related application by Special Interest Groups (SIG) and developer all over the world because of its futuristic nature. From the past most of the developers have been developing applications on Bluetooth and WLAN. We can see degradation on Wi-Fi when a Bluetooth is close to the Wi-Fi station; the impact of interference is significant. However, the relocation of Bluetooth from the Wi-Fi by 10m will not have great impact on the throughput. So both can coexist but we should be sensible in our expectations and attempts to combine these technologies. [Brent A. Miller, Chatschik Bisdikian 2000]. We present an AFH that modifies it in order to mitigate interference. Frequency hopping in Bluetooth is achieved as follows. Frequencies are listed as even and odd frequencies in the range of 2.402-2.480 GHz. The main idea in BIAS is to wait for association of slot with a ââ¬Å"goodâ⬠frequency in order to transmit a packet. The basic idea of response times has been about the same for thirty years [Brent A. Miller, Chatschik Bisdikian 2000]: If the response time is about 0.1 second user feels that the system is reacting instantaneously, means that no feedback is necessary except to display the result. If the response time is about 1.0 second user feels to stay uninterrupted, even though the user will notice the delay. Normally, no feedback is necessary during delays of more than 0.1 but less than 1.0 second, but if its 1 second the user feels that he can directly on the data. If the response time is about 10 seconds users attention is focused on the dialogue. For longer delay such as scanning whole system by anti virus will take long time and user knows about it. Feedback is required especially important if the response time is likely to be highly variable, since users will not know what to expect. Normally, response time of an application should be as fast as possible [Myers, B., H. Stiel R. Gargiulo (1998)], but it is also possible for the computer to react so fast that the user cannot keep up with the feedback. For example, a scrolling down in word document application move so fast that the user cannot stop it in time for the desired pages or section within the available window. The fact is that computers with modern processor can go work in few milliseconds can be too fast for the user which indicates the need for user-interface changes, user interface is set according to real-time clock rather than being set to indirect effect of the computers execution speed. These applications take advantage in varying degree of Bluetooth capabilities such as to be always on, always connected, mobile and easy to use. Throughout all of this, of course it is important not to lose sight of the requirements to get basic application to operate properly. However most of developers have found the specification of 1.1 to be stable, so future Bluetooth enabled products for general consumer would confine to this specification [Robert Morrow, 2002]. In an indoor environment, multipath is almost present because of furniture and other equipment in building along with the building material themselves, are prone to reflections when they are illuminated from radio source. Unlike the large fading which is seen in radio frequency where distance travel by the wave is in terms of 10 times the wavelength. According to Morrow the Bluetooth, channel fading could be analysed based on Doppler spread, delay spread and out probability. If a Bluetooth Piconet is an indoor environment where an object can move at speed up to a fast walk, then minimum Doppler shift will be about 10 Hz and coherence time is about 40 ms. So, the coherence time will be 1 microsecond smaller than coherence time which leads to slow fading and this could really slow down when 40000 bytes transfer is done. Suppose if we take a large room where the delay speed is 50ns and gives coherence bandwidth of 2 MHz, but maximum bandwidth between each hop is only 1MHz, so this leads to flat fading. As the Bluetooth channel is flat fading this will effect the Bit Error Rate BER (Rayliegh equation). According to Morrow the enhancement has done related to lower level protocol. Bluetooth data rate should be increased at the rate of 10 to the present specification. Proper implementation of Adaptive frequency hopping should be done. The range of Bluetooth has to be increase by Store and forward capability. Use of Smart antenna. The ACL link is based on polling scheme mechanism between master and up to seven active slaves in a Pico net. It can provide both symmetric and asymmetric bandwidth, which is determine by the packet type and frequency with which the device is polled. The ACL payload is protected by CRC check, which is used for retransmission scheme, the value seems to be small about 1.25ms [David, 2002], but it is important when we are dealing with IP streaming because it may lead to retransmission delay. This could be limited by setting the flush timeout setting. If Bluetooth transmit constantly on same frequency, the maximum raw date rate would be 1 mbps. However [David, 2002], this is not the data rate we will obtain over air interface. Bandwidth required for a 72 bit access code to identify the piconet and 54 bit header to indentify the slave will be about 405microseconds and guard time of 220 microseconds for next frequency hop. So, one slot packet requires a bandwidth of about 1/3 for pay load data and 7/9 and 13/15 for 3 and 5 slots of data respectively. So these counts have at least guard time of 1250 micro second as slot size increases. User friendly can be defined as easy to learn, easy to use, easy to remember and they increase the user ability to perform the desired task. According to Barrie Shermann, 1985 User friendly means adapting parts of the system to the operator rather than the operator having to adjust to the system. Donald Norman explains user friendly software design with respect to relationship between visibility, mapping and feedback to the design of usable objects. [The Design of Every day Things,1990] Visibility means how easy user can find the function in the software. Poor visibility can cause too many problems to the users. Mapping means the relationship between controls, the thing it affects, outcome. Good mapping is one which has buttons which is clearly marked and simply indicates their function. Feedback to the design of usable objects means every function on operation must give feedback to the user. When passenger press train door button he gets feedback in terms of voice message saying that ââ¬Å"door openingâ⬠.Such feedback makes user feel good. The creation of user friendly software is equal to part of science and art .The science is referred to as usability. The International Organisation for standardization (ISO) defines usability as the effectiveness, efficiency and satisfaction with which the user achieve specified targets. Effectiveness is the accuracy and completeness with which specified user can achieve goal in an environment. Efficiency is the resource expended in relation to the accuracy and completeness of goal achieved. Satisfaction is the comfort and acceptability of work system to its users and other people affected by its use. The second part is the Art of design, which inspires and often take long time .We are not speaking about art in terms of graphic art, although it plays an important role in development of user friendly software. We are speaking of the designer ability to create a vision of how software can and should be. 2.4 CRITICAL ANALYSIS: Since this Bluetooth application is an indoor application, its associated with reflection, diffraction, scattering, and refraction of radio waves. Quality of service means predefined and negotiated data rate, delay and error rate. Since the delay and the error rate are strongly related to the data rate, we focus our present investigations on the data rate. A signal passed over a wireless channel is affected by path loss, narrow, wideband fading and co-channel interference. In the present application the response time is dependent on, the performance metrics include the path loss, the mean access delay and the channel response time. When a receiver is placed some distance from the transmitter antenna it is logical to say that there will be some loss in signal. As we know that there is high probability of multipath effects in this application, as it plays a significant role in path loss values, thus high path loss of signal will lead to retransmission of signal. So we need to perform multipath mitigation, so we have selected compensate for multipath through diversity combinations. So normal Bluetooth antenna will be replaced by smarter antenna with diversity combinations .The packets that are transferred consecutive to time do not use the same frequency, which in turn avoids the drawbacks of the narrowband transmission. As we know that the link performance obeys the rules for narrow band systems and additionally depends on fading of the individual channels occupied. Therefore, all these methods of improving the physical layer have to be frequency agile. The access delay measures the time taken to transmit a packet from the time it is passed to the MAC layer until it is successfully received at the destination. The delay is measured at the L2CAP layer. The access layer delays which are caused due to improper management of the Bluetooth instruction. Management of ACL links can decrease this and by keeping slot numbers at a low value as possible, but as file length increases the number of slot tends to increase so we cannot do much to that, but by decreasing the path loss we can definitely resend ACL link commands. The channel estimation response time measures the time to track changes in the channel state. It is the time to avoid using a bad frequency to the time to start reusing a frequency that is good. The channel response time depends upon the bit error rate (BER), which depends on the frequency hopping rate (good frequency and bad frequency), since the methods used to perform the classification depend on BER measurements per frequency visited. So, proper implementation of adaptive frequency hopping must be done to improve response time. User friendliness is a thin gap between failure and success of the end product. According to usability studies done by Andy Smith Overall it would seem that roughly only 30 percent of IT systems are fully successful and that too 70 percent either fail or some marginal gain even after providing same function. These successful one have marginal difference with the other such as easy to handle, light weight, high visibility of screen, little more advance feature in hardware and software, robust etc. Natural and efficient products can make users task seem a lot easier. CHAPTER 3 BLUETOOTH PC REMOTE TECHNICAL CONCEPTS 3.1 INTRODUCTION: Bluetooth was projected to allow low bandwidth wireless connections to become so simple to use such that they flawlessly work into your daily life. A simple example of a Bluetooth application is to update the phone directory of your mobile phone. You would either normally enter the names and phone numbers of all your contacts or use a cable or IR link between your phone and your PC and start an application to synchronize the contact information. With Bluetooth, this can be done automatically and without any user involvement as soon as the phone comes within range of the PC. You can easily see this is expanded to include your calendar, to do list, memos, email, etc. This is just one of many exciting applications for this new technology! The Bluetooth PC remote using Mobile phone also comes into these list of applications that is been developed in using Bluetooth 3.2 SYSTEM ARCHITECTURE: Bluetooth communications occur in the unlicensed ISM band at 2.4GHz. The transceivers utilize frequency hopping to reduce interference and fading. A classic Bluetooth device has a range of about 10 meters, with a total bandwidth of 1 Mb/sec. This technology supports two types of communication modes [Robert Morrow, 2002]. Synchronous communication (voice traffic): The synchronous voice communication is provided using circuit switching with a slot reservation at fixed intervals. A synchronous link in Bluetooth technology is referred to as an SCO (synchronous connection-oriented) link. Asynchronous communications (data traffic): The asynchronous data communication is provided using packet switching, utilizing a polling access scheme. An asynchronous link in Bluetooth technology referred to as an ACL (asynchronous connection-less) link. Configuration Max. Data Rate Upstream Max. Data Rate Downstream 3 Simultaneous Voice Channels 64 kb/sec X 3 channels 64 kb/sec X 3 channels Symmetric Data 433.9 kb/sec 433.9 kb/sec Asymmetric Data 723.2 kb/sec or 57.6 kb/sec 57.6 kb/sec or 723.2 kb/sec Reference [www.bluetooth.com ] A combined data-voice SCO packet is defined, which can give 64 kb/sec voice and 64 kb/sec data in each direction. 3.3 THE PICONET: Bluetooth devices can pair up with one or more other Bluetooth devices in several different ways. The simplest way of connecting two Bluetooth devices, is by connecting point-to-point when there are two Bluetooth devices is known as Pico net. One of the devices acts as the salve and the other as a master. This ad-hoc network is a good example for a Pico net. A simple Pico net network needs to have one master and one or more slave, the Bluetooth can have maximum of seven slaves in a Pico net network. In the case of multiple slaves, the communication topology is known as point-to-multipoint. In this case, the bandwidth is shared among all the devices in the Pico net. They can communicate up to seven active slaves in a Pico net. In the case of multiple slaves concept the slaves need to have specific address. So each of the active slaves has been assigned 3-bit Active Member address (AM_ADDR). There can be extra slaves who remain synchronized to the master, but these will not have an Active Member address. The slaves are not active and are referred to as parked. In case of both active and parked units, the complete bandwidth is synchronized by the master. A parked device will have an 8-bit Parked Member Address (PM_ADDR), thus we can have maximum number of parked members to 256. A parked device remains synchronized to the master clock and can vary quickly, become active and communicate with other devices in the Pico net. 3.4 THE SCATTERNET: The process in which two adjacent Pico nets have an overlapping of coverage area is known as scatter net. Slaves in one Pico net can take part in another Pico net as either a master or slave; it can be done through time division multiplexing. In a scatter net, the two (or more) Pico nets are not synchronized in either time or frequency. Each of the Pico nets operates in its own frequency hopping channel while other devices in multiple Pico nets participate at the appropriate time via time division multiplexing. Let us assume two different Pico nets one consisting of mobile phone and PC, while the adjacent Pico net person consisting of a cell phone, headset and business card scanner. Dig Ref : www.wirelessadvent .com/channel/blutooth/feartutre/bluetooth .html The cubicle 1 may set up cubicle 2 business card scanner also transmit the information that is scanned to your PC so that you will have access to his business contacts information. 3.5 AUTHENTICATION AND PRIVACY: Authentication and privacy are handled at the software protocol layer and it is also provided in the Bluetooth physical layer. A particular connection can be specific to need either one-way, two-way, or no authentication. The authentication is generally done using a challenge or response to the system. The system supports both 40 and 64 bit keys. The authentication of the user is done at application layers. This security mechanism and the related software allow the user to set up his or her devices only to communicate with each other. All Bluetooth devices employ this physical layer security in the same way. Of course, for highly aware applications, it is also recommended that you use more advanced algorithms in the network transport or application layer. 3.6 HARDWARE FOR BLUETOOTH: Bluetooth hardware can be divided into two modules, they are. Radio Module Link Module. The Radio Module: Bluetooth devices operate in 2.4GHz Industrial Scientific Medicine (ISM) band. The frequency is an unlicensed one because of international standards and a few exceptions in certain countries like France (2446.5 to 2483.5 MHz) and Spain (2445 to 2475 MHz .So range of frequency is defined with unlicensed version from 2400 to 2483.5 MHz. These local versions have a reduced frequency band and a different hopping algorithm, the Bluetooth SIG is working with authorities in different countries to open compact ability. The RF channels used in Bluetooth technology are from 2402 to 2480 MHz with a channel spacing of one MHz. Frequency hopping has been implemented in order to reduce interference and fading effects. So we have 625 microseconds the channel will hop to another frequency within the 2402 to 2480 MHz range, so we get 1600 hops every second. Every Pico net has a unique hopping sequence which is determined by using an algorithm; the uses of Bluetooth device address the master device. All Bluetooth units in the Pico net are then synchronized to this hopping sequence. All packets are transmitted at the beginning in one of the 625 microsecond time slots, a packet may take 5 time slots. A time division duplex method is used to facilitate full duplex transmission. It is normally done this way, during even numbered slots the master transmits data and odd numbered slots are for a slave to transmits data. In voice data, these time slots can be reserved for synchronous applications. Bluetooth technology use Gaussian Frequency Shift Keying (GFSK) for modulation. A binary system is used where logical one is represented by a positive frequency deviation and a logical zero is represented by a negative frequency deviation. The data is transmitted at a sign rate of 1 Ms/sec. The Link Module The Link Module and Link Manager Software are responsible for the baseband protocols and some other low level link functions. This are related to sending/receiving data, setting up connections, error detection and correction, data whitening, power management and authentication. The link module in the Bluetooth is responsible for deriving the hop sequence. This can be done by using the BD_ADDR (Bluetooth Device Address) of the master device. All Bluetooth devices are assigned with a 48-bit IEEE 802 address. This 48-bit master device address is used by all other devices in the Pico net to derive the hop sequence. The Link Module is also responsible for performing three error correction schemes that are defined for Bluetooth: 1/3 rate FEC 2/3 rate FEC ARQ scheme for the data The purpose of having two FEC (forward error correction) schemes is to reduce the number of retransmissions. The ARQ scheme (automatic retransmission request) is responsible for the data to be retransmitted until an acknowledgement is received indicating a successful transmission (or until a pre-defined time-out occurs). A CRC (cyclic redundancy check) code of 2 bytes is added to each packet and used by the receiver to decide whether the packet arrived is error free or not. Note that the ARQ scheme is only used for data packets, but not for synchronous payloads such as voice. Bluetooth provides necessities for three low power saving modes to conserve battery life. These states in decreasing order of power are Sniff Mode, Hold Mode, and Park Mode. While in the Sniff mode, a device listens to the Pico net at a reduced rate. The Sniff intervals provide flexibility for different applications and are programmable. The Hold mode is same as the Park mode, except that the AM_ADDR (Active Member address) is retained. In Park mode, the slave clock continues to run and remains synchronized to the master, but whereas the device does not participate at all in the Pico net. CHAPTER 4 SYSTEM DESIGN 4.1 INTRODUCTION TO SYSTEM DESIGN: The Basic structure of software has been developed as an application based on Bluetooth technology, using the host controller interface concept. This is one of the most common physical implementation in which external cards are plugged into the host computer .when cond in this manner we need to have some ways to send the data and commands to module to obtain the results. The Bluetooth specification has such provision to have host controller interface. The Bluetooth protocol stack consists of the radio, link controller, link manager and the rest of the protocol stack from the L2CAP and above resides on the Host controller interface (HCI) .Hence the HCI provides the communication between the application at the top layer to the link manager, two ways audio packet transportation and transfer the data packet between module (USB dongle) and host computer. HCI interface does not require great knowledge or certification, but it is a good idea when you want to implement any software so that it has wide range of compatibility and also provides us in operating the third party protocol also. The Host cont
Saturday, January 18, 2020
Net Present Value and Correct Answer
Question 1 2 out of 2 points | | | Assume that the economy is in a mild recession, and as a result interest rates and money costs generally are relatively low. The WACC for two mutually exclusive projects that are being considered is 8%. Project S has an IRR of 20% while Project L's IRR is 15%. The projects have the same NPV at the 8% current WACC. However, you believe that the economy is about to recover, and money costs and thus your WACC will also increase. You also think that the projects will not be funded until the WACC has increased, and their cash flows will not be affected by the change in economic conditions.Under these conditions, which of the following statements is CORRECT? Answer | | | | | Selected Answer:| You should recommend Project S, because at the new WACC it will have the higher NPV. | Correct Answer:| You should recommend Project S, because at the new WACC it will have the higher NPV. | | | | | Question 2 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| Multiple IRRs can occur only if the signs of the cash flows change more than once. | Correct Answer:| Multiple IRRs can occur only if the signs of the cash flows change more than once. | | | | Question 3 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| One advantage of the NPV over the IRR is that NPV assumes that cash flows will be reinvested at the WACC, whereas IRR assumes that cash flows are reinvested at the IRR. The NPV assumption is generally more appropriate. | Correct Answer:| One advantage of the NPV over the IRR is that NPV assumes that cash flows will be reinvested at the WACC, whereas IRR assumes that cash flows are reinvested at the IRR. The NPV assumption is generally more appropriate. | | | | Question 4 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| One defect of the IRR method is that it assumes that the ca sh flows to be received from a project can be reinvested at the IRR itself, and that assumption is often not valid. | Correct Answer:| One defect of the IRR method is that it assumes that the cash flows to be received from a project can be reinvested at the IRR itself, and that assumption is often not valid. | | | | | Question 5 2 out of 2 points | | | Which of the following statements is CORRECT?Assume that the project being considered has normal cash flows, with one outflow followed by a series of inflows. Answer | | | | | Selected Answer:| If a project has normal cash flows and its IRR exceeds its WACC, then the projectââ¬â¢s NPV must be positive. | Correct Answer:| If a project has normal cash flows and its IRR exceeds its WACC, then the projectââ¬â¢s NPV must be positive. | | | | | Question 6 2 out of 2 points | | | Assume that the economy is enjoying a strong boom, and as a result interest rates and money costs generally are relatively high.The WACC for two mutually excl usive projects that are being considered is 12%. Project S has an IRR of 20% while Project L's IRR is 15%. The projects have the same NPV at the 12% current WACC. However, you believe that the economy will soon fall into a mild recession, and money costs and thus your WACC will soon decline. You also think that the projects will not be funded until the WACC has decreased, and their cash flows will not be affected by the change in economic conditions. Under these conditions, which of the following statements is CORRECT?Answer | | | | | Selected Answer:| You should recommend Project L, because at the new WACC it will have the higher NPV. | Correct Answer:| You should recommend Project L, because at the new WACC it will have the higher NPV. | | | | | Question 7 2 out of 2 points | | | Which of the following statements is CORRECT? Assume that the project being considered has normal cash flows, with one outflow followed by a series of inflows. Answer | | | | | Selected Answer:| The highe r the WACC used to calculate the NPV, the lower the calculated NPV will be. Correct Answer:| The higher the WACC used to calculate the NPV, the lower the calculated NPV will be. | | | | | Question 8 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| An NPV profile graph is designed to give decision makers an idea about how a projectââ¬â¢s contribution to the firmââ¬â¢s value varies with the cost of capital. | Correct Answer:| An NPV profile graph is designed to give decision makers an idea about how a projectââ¬â¢s contribution to the firmââ¬â¢s value varies with the cost of capital. | | | | Question 9 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| If two projects have the same cost, and if their NPV profiles cross in the upper right quadrant, then the project with the lower IRR probably has more of its cash flows coming in the later years. | Correct Answer:| I f two projects have the same cost, and if their NPV profiles cross in the upper right quadrant, then the project with the lower IRR probably has more of its cash flows coming in the later years. | | | | Question 10 2 out of 2 points | | | Which of the following statements is CORRECT? Assume that the project being considered has normal cash flows, with one outflow followed by a series of inflows. Answer | | | | | Selected Answer:| If a projectââ¬â¢s NPV is less than zero, then its IRR must be less than the WACC. | Correct Answer:| If a projectââ¬â¢s NPV is less than zero, then its IRR must be less than the WACC. | | | | | Question 11 2 out of 2 points | | | Which of the following statements is CORRECT?Answer | | | | | Selected Answer:| The NPV method assumes that cash flows will be reinvested at the WACC, while the IRR method assumes reinvestment at the IRR. | Correct Answer:| The NPV method assumes that cash flows will be reinvested at the WACC, while the IRR method assumes re investment at the IRR. | | | | | Question 12 0 out of 2 points | | | Which of the following statements is CORRECT? Assume that the project being considered has normal cash flows, with one outflow followed by a series of inflows.Answer | | | | | Selected Answer:| If a company uses the same payback requirement to evaluate all projects, say it requires a payback of 4 years or less, then the company will tend to reject projects with relatively short lives and accept long-lived projects, and this will cause its risk to increase over time. | Correct Answer:| One drawback of the regular payback for evaluating projects is that this method does not properly account for the time value of money. | | | | | Question 13 2 out of 2 points | | | Which of the following statements is CORRECT?Assume that the project being considered has normal cash flows, with one outflow followed by a series of inflows. Answer | | | | | Selected Answer:| A projectââ¬â¢s IRR is the discount rate that causes the PV of the inflows to equal the projectââ¬â¢s cost. | Correct Answer:| A projectââ¬â¢s IRR is the discount rate that causes the PV of the inflows to equal the projectââ¬â¢s cost. | | | | | Question 14 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| Projects with ââ¬Å"normalâ⬠cash flows can have only one real IRR. Correct Answer:| Projects with ââ¬Å"normalâ⬠cash flows can have only one real IRR. | | | | | Question 15 0 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| If a firm uses the discounted payback method with a required payback of 4 years, then it will accept more projects than if it used a regular payback of 4 years. | Correct Answer:| Multiple IRRs can exist, but not multiple MIRRs. This is one reason some people favor the MIRR over the regular IRR. | | | | | Question 16 0 out of 2 points | | When evaluating a new project, firms should include i n the projected cash flows all of the following EXCEPT:Answer | | | | | Selected Answer:| The salvage value of assets used for the project that will be recovered at the end of the projectââ¬â¢s life. | Correct Answer:| Previous expenditures associated with a market test to determine the feasibility of the project, provided those costs have been expensed for tax purposes. | | | | | Question 17 2 out of 2 points | | | A firm is considering a new project whose risk is greater than the risk of the firmââ¬â¢s average project, based on all methods for assessing risk.In evaluating this project, it would be reasonable for management to do which of the following? Answer | | | | | Selected Answer:| Increase the cost of capital used to evaluate the project to reflect its higher-than-average risk. | Correct Answer:| Increase the cost of capital used to evaluate the project to reflect its higher-than-average risk. | | | | | Question 18 2 out of 2 points | | | Which of the following stateme nts is CORRECT? Answer | | | | | Selected Answer:| A sunk cost is a cost that was incurred and expensed in the past and cannot be recovered if the firm decides not to go forward with the project. Correct Answer:| A sunk cost is a cost that was incurred and expensed in the past and cannot be recovered if the firm decides not to go forward with the project. | | | | | Question 19 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| An example of an externality is a situation where a bank opens a new office, and that new office causes deposits in the bankââ¬â¢s other offices to increase. | Correct Answer:| An example of an externality is a situation where a bank opens a new office, and that new office causes deposits in the bankââ¬â¢s other offices to increase. | | | | Question 20 2 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| Simulation analysis is a computerized version of scenario analysis where input variables are selected randomly on the basis of their probability distributions. | Correct Answer:| Simulation analysis is a computerized version of scenario analysis where input variables are selected randomly on the basis of their probability distributions. | | | | | Question 21 0 out of 2 points | | | Which of the following statements is CORRECT?Answer | | | | | Selected Answer:| The existence of any type of ââ¬Å"externalityâ⬠will reduce the calculated NPV versus the NPV that would exist without the externality. | Correct Answer:| If one of the assets to be used by a potential project is already owned by the firm, and if that asset could be sold or leased to another firm if the new project were not undertaken, then the net after-tax proceeds that could be obtained should be charged as a cost to the project under consideration. | | | | | Question 22 2 out of 2 points | | | A company is considering a new project.The CFO plans to calculate th e projectââ¬â¢s NPV by estimating the relevant cash flows for each year of the projectââ¬â¢s life (i. e. , the initial investment cost, the annual operating cash flows, and the terminal cash flow), then discounting those cash flows at the companyââ¬â¢s overall WACC. Which one of the following factors should the CFO be sure to INCLUDE in the cash flows when estimating the relevant cash flows? Answer | | | | | Selected Answer:| The investment in working capital required to operate the project, even if that investment will be recovered at the end of the projectââ¬â¢s life. Correct Answer:| The investment in working capital required to operate the project, even if that investment will be recovered at the end of the projectââ¬â¢s life. | | | | | Question 23 0 out of 2 points | | | Which of the following statements is CORRECT? Answer | | | | | Selected Answer:| Using accelerated depreciation rather than straight line normally has no effect on a projectââ¬â¢s total projec ted cash flows nor would it affect the timing of those cash flows or the resulting NPV of the project. Correct Answer:| Using accelerated depreciation rather than straight line normally has the effect of speeding up cash flows and thus increasing a projectââ¬â¢s forecasted NPV. | | | | | Question 24 0 out of 2 points | | | Which of the following rules is CORRECT for capital budgeting analysis? Answer | | | | | Selected Answer:| If a product is competitive with some of the firmââ¬â¢s other products, this fact should be incorporated into the estimate of the relevant cash flows. However, if the new product is complementary to some of the firmââ¬â¢s other products, this fact need not be reflected in the analysis. Correct Answer:| Only incremental cash flows, which are the cash flows that would result if a project is accepted, are relevant when making accept/reject decisions. | | | | | Question 25 0 out of 2 points | | | Which one of the following would NOT result in incremental cash flows and thus should NOT be included in the capital budgeting analysis for a new product? Answer | | | | | Selected Answer:| Using some of the firmââ¬â¢s high-quality factory floor space that is currently unused to produce the proposed new product.This space could be used for other products if it is not used for the project under consideration. | Correct Answer:| The cost of a study relating to the market for the new product that was completed last year. The results of this research were positive, and they led to the tentative decision to go ahead with the new product. The cost of the research was incurred and expensed for tax purposes last year. | | | | | Question 26 2 out of 2 points | | | The relative risk of a proposed project is best accounted for by which of the following procedures?Answer | | | | | Selected Answer:| Adjusting the discount rate upward if the project is judged to have above-average risk. | Correct Answer:| Adjusting the discount rate upward if the pro ject is judged to have above-average risk. | | | | | Question 27 2 out of 2 points | | | Dalrymple Inc. is considering production of a new product. In evaluating whether to go ahead with the project, which of the following items should NOT be explicitly considered when cash flows are estimated?Answer | | | | | Selected Answer:| The company has spent and expensed for tax purposes $3 million on research related to the new detergent. These funds cannot be recovered, but the research may benefit other projects that might be proposed in the future. | Correct Answer:| The company has spent and expensed for tax purposes $3 million on research related to the new detergent. These funds cannot be recovered, but the research may benefit other projects that might be proposed in the future. | | | | | Question 28 2 out of 2 points | | Which of the following should be considered when a company estimates the cash flows used to analyze a proposed project? Answer | | | | | Selected Answer:| The new p roject is expected to reduce sales of one of the companyââ¬â¢s existing products by 5%. | Correct Answer:| The new project is expected to reduce sales of one of the companyââ¬â¢s existing products by 5%. | | | | | Question 29 2 out of 2 points | | | Langston Labs has an overall (composite) WACC of 10%, which reflects the cost of capital for its average asset.Its assets vary widely in risk, and Langston evaluates low-risk projects with a WACC of 8%, average-risk projects at 10%, and high-risk projects at 12%. The company is considering the following projects: Project Risk Expected Return A High 15% B Average 12% C High 11% D Low 9% E Low 6% Which set of projects would maximize shareholder wealth? Answer | | | | | Selected Answer:| A, B, and D. | Correct Answer:| A, B, and D. | | | | | Question 30 2 out of 2 points | | | Which one of the following would NOT result in incremental cash flows and thus should NOT be included in the capital budgeting analysis for a new product?Answer | | | | | Selected Answer:| A firm has spent $2 million on R&D associated with a new product. These costs have been expensed for tax purposes, and they cannot be recovered regardless of whether the new project is accepted or rejected. | Correct Answer:| A firm has spent $2 million on R&D associated with a new product. These costs have been expensed for tax purposes, and they cannot be recovered regardless of whether the new project is accepted or rejected. | | | | | Thursday, November 17, 2011 11:33:19 PM EST OK
Friday, January 10, 2020
Soap Lab
The goal of this laboratory project was to test which ingredient (fat oil) makes for the best soap using the properties of fats/ oils. Another goal was to test the soap, detergents, and their waste water to decide which is the most effect eve and environmentally friendly. The group was also to determine what was causing t he scum after washing and figure out a solution to stop it. Experimental Design To achieve the above goals, four different types of soaps and two detergents were made with certain ingredients and the desirable properties were taken onto account.The waste water of each soap and detergent was titrated to determine en how the waste water would affect the environment. To make four different types o pop, we used ;o oils, vegetable oil and olive oil, and two fats, shortening an d lard. 10 ml of the oils and log of the fat were obtained in a mill beaker. 15 ml of 6 M sodium hydroxide and about 1 ml of glycerol were added to each ingredient drop by drop then mixed thoroughl y with a glass rod. The solution was then heated with a heating plate to boiling until it became pasty.After the pas tee cooled, 50 ml of saturated sodium chloride solution and ice was mixed into t he solution. The soap was then filtered using suction filtration and washed with t ml portions of cold water. Each filtrate was saved separately. Two methods ere used for making detergents. The first method required 4 ml of laurel alcohol t o be placed in a mill beaker. While stirring, 2 ml of concentrated sulfuric acid w added to the beaker. While to mixture sat for 10 minutes another mill BEA Kerr was filled with ice, log of sodium chloride, and water until the total volume w as 75 ml.Then, in a ml beaker, 5 ml of 6 M sodium hydroxide and 10 ml of watt were mixed. Four to five drops of phenolphthalein to the sodium hydroxide solution. After the 10 minutes, the sodium hydroxide solution was added to t he sulfuric caudally alcohol mixture until the pink color produced by the honorableness faded. The solution was poured into the saltwater bath an stirred until the clumps were broken up. The second detergent was made AC Roding to method II. 5 ml of laurel alcohol was carefully added to 5 ml of concentrate sulfuric acid.In another beaker, 3 drops Of phenolphthalein was added to 10 ml of 6 M Noah. Then, the acidic solution of laurel alcohol was added to the Noah solution with constant stirring until the pink color faded. Both detergents were e filtered using vacuum filtration and saved for the following weeks tests. The following week, solubility, cleaning, and lathering tests were performed o determine which soap and detergent cleaned the best. The wastewater WA s also analyzed from the processes of making the soaps and detergents.In addition, the contaminants and the environmental impact of the wastewater were identified deed. After these tests were conducted, the group had to decide which soap or detergent would be best for the environmental group to use. To test the solubility of each soap and detergent, appeased clumps of each were added to ml of water, acetone, an ethyl acetate. To test the cleaning abilities of each soap and detergent, a wet paper towel was used with samples of each soap and detergent to clean a dirty spot he lab counter. Cleaning abilities were measured by the amount of residue a ND dirt left behind.Lathering of the soap and detergents were tested by adding Pease zed clumps of each to water and determining how many bubbles were produced. The more bubbles that were produced, the better the lathering was. To test the contaminants and environmental impact of the wastewater we used titration. Sing 5 ml filtrate of our vacuumed filtering and 45 ml of H2O the group first tested t pH of each filtrate. If a pH over 7 was found the group slowly added HCI and t drops were counted by a sensor and the initial and final volumes were also re order from the burette. If a pH under 7 was found, then Noah was added to the filter ate.The mos t environmentally friendly wastewater was determined based on the volume of iterant added. A lower volume of iterant was more desirable because it me ant that the wastewater could be more easily neutralized. The final week, the best soap's and detergent's solubility was tested in different types of water. Well water, pond water, and tap water are the waters that were used. Then, the pond water and well water were tested for contaminant s. If the water contained calcium ions, DEED was added to the water to get rid of them he water was acidic, the base Noah was added to neutralize the water.
Thursday, January 2, 2020
Caso Marriot Chile - 1570 Words
[pic] Universidad de Chile. Facultad de Ciencias Econà ³micas y Administrativas. Finanzas III Caso No1 Marriott Corporation: The Cost of Capital. [pic] Integrantes: Rodrigo Olivares Sebastià ¡n Bastierre 26 de Abril, 2005. Jorge Toro El problema al que se ve enfrentado Marriott como empresa, si bien puede verse desde variados puntos de vista, se puede resumir en un aspecto principal y relevante. Y esto es calcular cual es el costo de capital de la empresa como un todo; ademà ¡s de calcularlo de manera individual para cada una de sus divisiones, ya que la Marriott las trata en sus anà ¡lisis como si fuesen empresas independientes. Para esto se debe hacer unosâ⬠¦show more contentâ⬠¦|1.36 |44.1% |65% |185.7% |0.67 |22.39% | | | | | | | |100% | |à ²s/dPromedio |0.55 | | | | | | Ahora; con esta informacià ³n mà ¡s la que ya està ¡ disponible, se puede calcular el costo de la deuda, el à ² del patrimonio con deuda, el costo de patrimonio, y finalmente el costo de capital de la divisià ³n Lodging. Kd = rf + à ²d x PRM 1,1% = 8,95% + à ²d x 6,77% ââ â
Wednesday, December 25, 2019
The Nuclear Family Replaced the Extended Family After...
The Nuclear Family Replaced the Extended Family After Industrialisation Talcott Parsons believed that the nuclear family developed mainly as a result of industrialisation. He thought that before the industry took over the functions of the family, the families were extended units of production. This means that the work and home lives were combined and so each family member taught another one skill for life such as education. Parsons says that the extended family stayed together so they could provide health care for one another and look after the old people whilst the old people looked after the young children whilst the parents were out working. They also pursued justice on behalf of one another; ifâ⬠¦show more contentâ⬠¦In the first stage, the Pre-Industrial family was extended and they all lived and worked together. In the second stage, the Early Industrial family were extended families beginning to become geographically mobile, dying out and becoming less common. In the third stage, the Symmetrical family was the beginning of the nuclear fam ily, where they had split up from extended family into father, mother, and two children. However, there are criticisms to the functionalist view that the industrial revolution brought about the nuclear family. Peter Laslett was a social historian who believed that pre and post industrial families were mostly nuclear. He studied Northern Europe and found that families were not likely to consist of a nuclear family structure, but he also found that the average size of families in Western Europe stayed constant at 4.75 persons, which gives us reason to believe that nuclear families were around before the industrial revolution. Laslett therefore does not agree with Parsons or Willmott and Young, as he believes families were already nuclear pre-industry and still are today. ===================================================================== Michael Anderson was also a social historian who agreed with Parsons because he believed that the pre industrial families were mainly extended. He argued that the extended family was aShow MoreRelatedGlobalization or Glocalisation? Networks, Territories and Rescaling12782 Words à |à 52 Pagespath that will lead regional and national economies to the desired heaven of global competitiveness and sustained growth. This is quite an impressive discursive shift from the 1960s/1970s mindset, whose broadly leftist internationalist rhetoric was replaced, in the 1980s/1990s, by a neoliberal discourse of market-led internationalism and globalisation. This discursive shift deserves close scrutiny in terms of its ideological content and its relationship to the ââ¬Ërealââ¬â¢ economy. The discourse of neoliberalRead MoreMarketing Management130471 Words à |à 522 PagesMarketing is thus the process of planning and executing the conception, pricing, promotion, and distribution of ideas, go ods and services to create exchanges (with customers) that satisfy individual and organizational objectives. 2. LEARNING OBJECTIVES: After reading the unit, you will understand how: â⬠¢ â⬠¢ â⬠¢ To learn the evolution of marketing as a discipline To understand the reasons why marketing is considered important in this era To assess the various marketing approaches and principles 3. MARKETINGRead MoreGsk Annual Report 2010135604 Words à |à 543 Pagesoverall litigation exposure. These legal cases underline just how important it is for us to be led by our values in everything we do. Changes to the Board In September we announced that Julian Heslop will retire as CFO at the end of March and be replaced by Simon Dingemans, who joined the company as CFO-designate in January 2011. We would like to thank Julian for his dedicated service to GSK as CFO and a member of the Board over the last six years ââ¬â his integrity, diligence and outstanding technical
Monday, December 16, 2019
Communist Economy - 1045 Words
Communism is considered to be a further step beyond Marxism. It is considered to be a society which is classless. The wealth is redistributed so that the control of the wealth does not lie only in the hands of the rich people. The privately owned businesses are converted into state property which then functions for the benefit of all the people of the state rather than an elite group of people. As the name implies, it is a form of government for the entire community. Communism upholds the idea that the basic needs of society should be provided to all, irrespective of any class differences. It also promotes the fact that every worker should be rewarded for all his work and hold a share in the profits. Communism is broadly defined as aâ⬠¦show more contentâ⬠¦The other matters that are highly criticized within a communist economy are the facts that these economies face several issues such as shortage of goods such as products of basic necessities, other class/creed issues, etc. A ll these problems and issues lead to an increase in the economic problems of the communist country. The economic problems of the country can be increased because of the short comings related to communism. In communism the governments try to create a classless society regardless of the special talents that people are provided with. It is because of this reason that a communist government faces problems when appointing officers to specific positions. Moreover if these positions are not held by people who have the right talent then the government can fail and this can create problems for the whole country. Moreover, the wages that workers have to be paid depend on the government itself and this creates a problem again. The people are only paid at a subsistence level and hence they can only fulfill their basic needs such as food and shelter. When the question of personal interest comes, the governments cannot fulfill these interests of people. It is because of this very reasonShow More RelatedMarx, Mill And Freud s Critique Of Political Economy And The Communist Manifesto Essay1133 Words à |à 5 Pagestackle the topic of freedom in unique ways, but their messages are fundamentally the same and continue the ideas that we encountered in the esoteric texts as well as in The Matrix: . First, we have Karl Marxââ¬â¢s Capital: Critique of Political Economy and The Communist Manifesto, where we encounter the proletariat, or the working-class people regarded collectively. In these two texts, the latter of which was co-authored by Frederick Engels, we learn that the proletariat is enslaved just like the peopleRead MorePost-Communist Transition Economies Touched by the Euro Zone Crisis1360 Words à |à 6 PagesThe focus of this paper is on post communist transition economies touched by the Euro Zone crisis. The negative influence it has made to economic dynamics was felt by everyone living in Central and Eastern Europe. Despite the actual collapse of some economies in Central and Eastern Europe, lower standards of living in parts of the region, protests and social anxiety, little attention was paid to the crisis and the recession in the post-communist countries that joined the European Union in 2004 andRead MoreGovernment Driven Economics And Its Effect On National Economy1149 Words à |à 5 PagesAuthoritarianism can coexist with liberal markets, and is in fact the best way to ensure the well being of the people of a country. In Iran, state driven economics have had a negative effect on our national economy, and a transition to a more market based economy is essential. This is evident from both culturalist and structuralist viewpoints. Culturalist theory assumes that the culture of a society holds the most power, and the societyââ¬â¢s structure is critical. Ideology and ideas are most influentialRead MoreThe Perestroika Reform And Glasnost Policy Programs1716 Words à |à 7 PagesUnder Mikhail Gorbachev the Soviet Union underwent massive social, political and economic reform that drifted away from communist ideology and this ultimately lead to the collapse of the Soviet Union and failure of communism in Eastern Europe. This essay will focus on how the Perestroika reform and Glasnost policy programs as well as other external and internal pressures contributed to the failure of communism under Gorbachev. The aim of the Perestroika and Glasnost reforms was to restructure andRead MoreThe Mystery Of Capital By Richard Mcgregor1605 Words à |à 7 Pageswith a government that keeps ââ¬Å"their peoples and nations in hopeless povertyâ⬠and nothing can help unless they change the way the run the country. Richar d McGregor author of The Party: the Secret World of Chinas Communist Rulers speaks more in depth of what DeSoto stated that if a communist party is in control the market prosperity will be dimmer than other nations in which the government implements the idea of The Do Nothing Policy produce prosperity and freedom. Therefore does what DeSoto speak haveRead MoreFinancial Globalization : The International Economic System979 Words à |à 4 Pagesthey influence the worldââ¬â¢s economics or one of the separate countries. The main area of globalization is the international economic system (economics), i.e. global industry; the exchange and consumption done by the enterprises in their national economies and in the world market. As a result of the globalization, the financial capital gained the considerable mobility, seeking for the most attractive and profitable opportunities. Financial globalization has increased the influence of internationalRead MoreEssay on The Decline of American Economics795 Words à |à 4 Pagessystem prevailing is the free economy system which generated fast economic growth and prosperity albeit often ignoring social injustices along the way. This capitalistic system was born in Europe in the middle ages replacing feudalism when private concerns were generating surpluses and were ready to re-invest same thus spurring economic growth, albeit erratically. In the 18th century a Scottish moral philosopher, Adam Smith became the pioneer of political economy and advocated for the ââ¬Å"free marketâ⬠Read MoreSoviet Union Experienced A Sudden And Unexpected Collapse1582 Words à |à 7 Pageslittle bit more about the nature of political power, governance, and the factors that lead to perceptions of legitimacy within a government. Responding to fears that the Soviet Union was disintegrating, Gorbachev increased the number of conservative Communists in his inner circle and reduced the number of departments and personnel in the Secretariat (Suny 505, 506). Unfortunately, he was not able to replace these positions; instead, Gorbachev formed the Council of the Federation and a Cabinet of MinistersRead MoreMarx And Engels s Theory Of Human Alienation Essay1455 Words à |à 6 Pagesderails from Marx and Engels in the sense that Plato never believed in an ââ¬Å"inevitableâ⬠Communist Revolution, but in a possible political revolution, needed in order to maintain moderation and avoid the clash of ideas in society. Where Marx and Engels believe in communism for the good of economy, Socrates believed in communism for the good of the government and his Republic. Marx and Engels believed that the economy during the Industrial Revolution created a mechanical system in which people came toRead MoreThe Importance Of Nation-State Policy881 Words à |à 4 Pagesinterconnected and globalized world, consociated by instantaneous worldwide communication and the free dissemination of information. With this new era of technology, economic policies of nation-states have become so interdependent that most nation-state economies would be crippled without their respective international trading partners. As such, one may wonder if an introspective national policy is appropriate, as argued for by the source. For example, one may contend that international cooperation inevitably
Sunday, December 8, 2019
Performance Measurement and Control Systems
Question: Discuss about the Performance Measurement and Control Systems. Answer: Introduction In the modern world, the companies that operate in the economy try to increase their profit by undertaking various strategies. The management of accounting is an important function of an organization as maintenance of accounts is useful for the recording of the transaction and understanding the profit that is gained by the organizations. The process of accounting consists of two methods namely Traditional Accounting, which is even known as the Conventional Method and Activity Based Accounting. In the process of conventional method all the expenses gets assigned equally irrespective of the department contribution in that particular department. On the other hand incase of ABC costing all the expenses get allocated in the ratio in which a particular department has contributed. The paper tries to analyze the accounting and the production process of Bakverk Company who manufactures a variety of pastries. Initially the company had only three lines of products and it is seen that the company produced huge volume of each product by making use of hard work by the labor and the easy and simple machines. It is seen that the company primarily sells their original line of products and it is seen that the current scenario, the company even manufactures low variety of pastries and it is seen that the production of these pastries become costly as it requires to the use of additional machineries and handling of materials. The company has undergone a huge change in the business strategies and it is seen that the performance of the organization has increased as stress has been given on the quality and the delivery of the performance. However, the profit of the company has been decreasing at a fast rate and therefore, it is seen that the management are under the consideration of transforming their conventional method and adopting ABC costing method so that profit of the organization can increase. Therefore, in this paper the use and advantages of ABC Costing will be analyzed and then the analysis of the income and expenses of the firm will be discussed. ABC Costing Method and its advantages The ABC Costing method is used because of its rational process to apply within the industry. The use of ABC Costing is significant as the traditional method assigns the costs equally regardless of the contribution of each department whereas ABC method does not do the same. ABC method is more precise because this process does not allocate the overheads equally but assigns the cost to the department who contributes to the product line. Therefore, it is seen that this process helps in proper allocation of the costs and thereby reduces the challenges of the firm. It is seen that Balverk Company makes use of simple machineries for the production of three product lines of pastries. The use of ABC method will help the management to understand the departments that contribute to the manufacturing of the product and therefore, the operational cost of the organization can be managed properly. ABC method will even minimize the struggle of the firm and it will be seen that organizational changes and the profit of the firm wil go hand in hand. Steps required for using ABC Method The process of ABC utilizes the base of cost allocation to assign the overheads. The various steps undertaken for the usage of ABC is discussed below: Initially the product is selected on which the overhead cost requires to be assigned. The next step involves the recognition of the direct costs that requires to be assigned on the product that has been chosen earlier. It is seen that this is one of the complex steps that is to be implemented while making use of ABC method as it is necessary to recognize the direct costs that are associated with the production of a commodity. In this step, the selection of the actions are chosen over which the overhead costs are assigned evenly. This is step is even a difficult one as the firm requires to construct the cost pools based on the direct cost that are related to the services and the products. In this step, the computation of the rate per unit of the cost allocation base is exploited to assign the indirect costs that are related to the product. In this step, it is essential to compute the rate per unit. It is seen that in this step it is essential to segment the cost allocation base with the recognized drivers of cost. The use of this step is helpful for the calculation of the per unit rate that will be used to understand the percentage of cost that is allocated to every step of the manufacturing process. The last step involves the formulation of the report. The results that are gained from the process of ABC is converted into several reports and statements as wished by the management. For instance, if the management wants to have knowledge about the cost of a machine with respect to a specific product or the total cost that is suffered in a specific commodity so that various types of reports can be constructed. Analysis of the data The case study of Balverk Company reveals that there are 6 schedules that are related to the performance of the data and every schedule will be discussed separately. Activity Centers Wages Building Costs Depreciation Consumables Energy Other Total New Product Development 96,000.0000 14,200.0000 - 959.4595 1,000.0000 112,159.4595 Sales Dispatch 336,000.0000 35,500.0000 - 959.4595 3,500.0000 375,959.4595 Inspecting 48,000.0000 35,500.0000 - - 500.0000 84,000.0000 Mixing 816,000.0000 71,000.0000 284,000.0000 10,554.0541 42,600.0000 8,500.0000 1,232,654.0541 Filling 816,000.0000 71,000.0000 355,000.0000 6,716.2162 63,900.0000 8,500.0000 1,321,116.2162 Baking packing 672,000.0000 71,000.0000 71,000.0000 10,554.0541 42,600.0000 7,000.0000 874,154.0541 Administration 336,000.0000 35,500.0000 - 3,837.8378 - 3,500.0000 378,837.8378 Corporate management 288,000.0000 21,300.0000 - 1,918.9189 - 3,000.0000 314,218.9189 3,408,000.0000 355,000.0000 710,000.0000 35,500.0000 149,100.0000 35,500.0000 The analysis of schedule 1 reveals that there are 8 activity centers and everyone of them has costs related to them. The use of ABC method allocates the cost individually in all the activity centers with respect to the building cost, wages, depreciation, consumables, energy and other. The total value that is seen with respect to the new product development accounts to $112, 159.4595. The next activity center is the sales dispatch and the total amount of cost allocated to it is $375,959.4595. The inspecting center of the firm is an important department and the value comes to $ 84,000. The mixing and the filling of the raw materials for the production of pastries associate to $, 232,654.0541 and $1,321,116.2162. The baking and packing of the pastries involve an amount accounting to $874,154.0541 and $378,837.8373 respectively. The administration and the corporate management has a total amount of $ 314,218.9189 and $ 0 respectively. Activity % of Labour time Amount of labour % of floor space Amt of floor space Setup mixer 10% 81,600.0000 5% 3,550.0000 Load Mixer 10% 81,600.0000 5% 3,550.0000 Operate Mixer 40% 326,400.0000 70% 49,700.0000 Unload Mixer 20% 163,200.0000 5% 3,550.0000 Clean Mixer 10% 81,600.0000 5% 3,550.0000 Mover to filling room 10% 81,600.0000 10% 7,100.0000 100% 816,000.0000 100% 71,000.0000 The space and the labor associated with the function of mixing involves set-up mixer that occupies 5% of the space and 10% of labor. The load mixes involves 10% of labor time and 5% of the floor space. The operate mixer 40% of the labor time and 70% of the floor space revealing that this process is a crucial process and involves extensive labor time and machinery. The unload mixer takes 20% of the labor time and 5% of the floor space. The clean mixer takes 10% of the labor time and 5% of the floor space. The filling room mover takes 10% of the labor time and 10% of the floor space. Therefore it can be said that the activities that are crucial takes more labor time and floor space of the firm. Total of Mixing room 8,400.0000 Set up mixer 10% 840.0000 Load Mixer 10% 840.0000 Operate mixer 40% 3,360.0000 Unload mixer 20% 1,680.0000 Clean mixer 10% 840.0000 Filling room 10% 840.0000 This schedule reveals the total number of labor used in each activity of mixing and the total number of labors associated with this activity is 8400. It is seen that 10% of the labor is used by the set up mixer, the load mixer uses 10% while the operate mixer utilizes 40% of the labor. 20% of the labor is taken by the unload mixer and 10% each is taken by the clean mixer and the filling room. Activities consumed Annual quantity of activity driver Drivers Cost assigned to Custard tart Corporate management 63,065.0000 Directly to products 63,065.0000 Process receivables 400.0000 Invoices 16,442.7778 Process payables 100.0000 Purchase orders 4,603.7778 Production planning 60.0000 Production schedule 12,505.7746 Reports to health department 6.0000 Reports 709.8592 Process sales order 360.0000 Sales orer 29,494.1408 Disptach sales order 300.0000 Dispatches 23,880.6667 New product development - Directly to new product Inspect filling ingredients 60.0000 batches 2,729.5775 Disposal of substandard filling 60.0000 batches 709.8592 Move to mixing room 60.0000 batches 709.8592 Set up mixer 60.0000 batches 70.9859 Load mixer 60.0000 batches 70.9859 Operate mixer 28,500.0000 Litres 674.3662 Unload mixer 60.0000 batches 141.9718 Clean mixer 60.0000 batches 70.9859 Mover to filling room 60.0000 batches 0.0085 Set up pastry cases 60.0000 batches 3,783.8028 Weigh ingredients 60.0000 batches 7,267.6056 Load hopper 60.0000 batches 14,535.2113 Fill pastry cases 28,500.0000 Litres 176,713.2465 Clean hopper 60.0000 batches 7,567.6056 Move to baking 28,500.0000 Litres 9,699.0317 Stack cases on baking trays 113,600.0000 Prodcucts 37,500.0000 setup ovens 1,140.0000 trays 7,170.1585 Move to ovens 1,140.0000 trays 3,763.2042 bake products 1,140.0000 trays 50,091.1585 Unload oven 1,140.0000 trays 3,763.2042 Inspect finished products - trays Disposal of substandard product - trays Move to truck 1,140.0000 finished trays 4,337.0714 Direct materials 6.0000 Current market selling price 14.0000 batch size 2,000.0000 Annual Volume 114,000.0000 This schedule reveals that the use of ABC method has been influential for the proper allocation of the quantity that has been consumed by the driver and the activities with respect to Custard Tart. It is seen that the annual volume amounts to 14000. The proper distribution of the cost and the quantity on each activity is helpful for the management to understand the activities with ease so that the performance of the organization gets improved. Activities consumed Annual quantity of activity driver Drivers Cost assigned Corporate management 7,745.0000 Directly to products 7,745.0000 Process receivables 100.0000 Invoices 4,110.6944 Process payables 100.0000 Purchase orders 4,603.7778 Production planning 40.0000 Production schedule 8,337.1831 Reports to health department 4.0000 Reports 473.2394 Process sales order 110.0000 Sales orer 9,012.0986 Disptach sales order 100.0000 Dispatches 7,960.2222 New product development 37,013.0000 Directly to new product 37,013.0000 Inspect filling ingredients 40.0000 batches 1,819.7183 Disposal of substandard filling 40.0000 batches 473.2394 Move to mixing room 40.0000 batches 473.2394 Set up mixer 40.0000 batches 47.3239 Load mixer 40.0000 batches 47.3239 Operate mixer 7,000.0000 Litres 33,126.7606 Unload mixer 40.0000 batches 94.6479 Clean mixer 40.0000 batches 47.3239 Mover to filling room 40.0000 batches 112.6761 Set up pastry cases 40.0000 batches 2,522.5352 Weigh ingredients 40.0000 batches 4,845.0704 Load hopper 40.0000 batches 9,690.1408 Fill pastry cases 7,000.0000 Litres 43,403.2535 Clean hopper 40.0000 batches 5,045.0704 Move to baking 7,000.0000 Litres 2,382.2183 Stack cases on baking trays 14,200.0000 Prodcucts 4,687.5000 setup ovens 290.0000 trays 1,823.9877 Move to ovens 290.0000 trays 957.3063 bake products 290.0000 trays 12,742.4877 Unload oven 290.0000 trays 957.3063 Inspect finished products 290.0000 trays 462.0599 Disposal of substandard product 290.0000 trays 214.4366 Move to truck 290.0000 finished trays 1,103.2901 Direct materials 8.0000 Current market selling price 18.0000 batch size 400.0000 Annual Volume 14,000.0000 This schedule reveals the distribution of quantity and the cost assigned to various drivers regarding the production of apple tart and it is seen that the company concentrates on the custard tart more than the apple pies. Therefore, it is seen that there might a need for the firm to balance their production process so that the operations of the firm improve thereby increasing the profit of the firm. Conclusion The analysis of the paper and the data that have been gathered for Bakvert Company reveals that it is necessary to make use of ABC method so that the management gains knowledge about the percentage of contribution by each department and the cost associated to it so that they can stabilize their operation and improve their profit and market share. Bibliography Dong, J., Liu, C. and Lin, Z., 2014. Charging infrastructure planning for promoting battery electric vehicles: An activity-based approach using multiday travel data.Transportation Research Part C: Emerging Technologies,38, pp.44-55. Frazier, W.E., 2014. Metal additive manufacturing: a review.Journal of Materials Engineering and Performance,23(6), pp.1917-1928. Kaplan, R. and Anderson, S.R., 2013.Time-driven activity-based costing: a simpler and more powerful path to higher profits. Harvard business press. Simons, R., 2013.Performance Measurement and Control Systems for Implementing Strategy Text and Cases: Pearson New International Edition. Pearson Higher Ed.
Subscribe to:
Posts (Atom)