This website uses cookies to ensure you have the best experience. Learn more

Unit 3 Ip For Financial Management

444 words - 2 pages

American InterContinental University
FINA310-1301A-02: Professor Michael James
March 5, 2013

This assignment will use the CGM and the CAPM to calculate some information regarding the XYZ stock market.

XYZ Stock Market Information
XYZ’s beta =1.64
XYZ’s current annual dividend = $.80
XYZ’s 3-year dividend growth rate (g) = 8.2%
Industry P/E = $4.87
KS= (Risk Free Rate) + Beta (Market Premium)
KS= (0.2) + 1.64 (.075)
KS= (0.2) + 0.123
KS= 0.143 or 14.3%
Stock Price= Estimated dividend/ (Cost of Equity-Growth)
...view middle of the document...

2. The growth rate used to do the math was 8.2%. The present XYZ growth rate might be higher than this rate, thus a difference with the growth rate could possibly result in a different price per share.
3. The XYZ price per share had been going up over the past month. This particular raise in the share price could have caused non-experienced shareholders to spend lots on the XYZ stock, thus causing the share price to increase.
KS= (0.2) + 1.64 (.10)
KS= (0.2) + 0.164
KS= 0.184 or 18.4%
Po= .80/(18.4%-8.2%)
Po= .80/(10.2%)
Po= $8.16
Because the rise in the risk premium depicts an increase in risk, shareholders would be hoping for a larger return on his/her investment to make up for this rise in risk, thus, an increase in the rate of return would cause a decrease in the share price.
XYZ EPS = $4.87
Industry P/E Ratio = 23.2
Stock Price= (EPS) (P/E RATIO)
The P/E Ratio Model is based on future expectations. The P/E ratio depicts shareholders’ expectations regarding the business, its ability to grow, and expectations for future returns. From looking at this, one is able to see that the Price Earnings Ratio Model is based on future expectations, and the CGM is based on past performance; thus, a difference in these two models is almost positive to show a difference in the price per share.

Other assignments on Unit 3 Ip For Financial Management

Unit 1 Assignment 1 Windows 2008 Network

461 words - 2 pages loss of millions of dollars. A home user that uses their computer to watch YouTube videos and surf the web probably wouldn’t be too concerned with this. 3. Should servers use DHCP? This depends on the requirements, needs, or desires of the individual. There may be instances were using static IP addresses only will suffice. But for the most part, particularly when talking on an enterprise level it’s best to let DCHP issue IP addresses to hosts.

Research Essay

499 words - 2 pages > Marketing and Communications Strategy > 5. Research and Development Technology Roadmap > Research and Development > Technical Partners > IP, Patents, Copyrights, Brands > 6. Staffing and Operations > Management (including Board) Organisation Chart > Staffing > Training Plans > Operations > 7. Financial Projections I Key Assumptions p II Profit and Loss Accounts p

Subnet And Router Configuration

423 words - 2 pages configuration mode | 3 | Router# show ip interface brief | brief status of the interfaces that are configured for IP | 4 | Router(config)# interface fastethernet Router(config)# interface gigabitethernet | Specifies the Ethernet interface and enters interface configuration mode.(for interface numbering it will be in router guide that was shipped with your router) | 5 | Router(config-if)# ip address154.78.00 - | Sets a primary IP address

Nt1230 Week #3 Connecting To A Network

898 words - 4 pages NT1230 – 01/17/2013 Week #3 Week #3-Problem Set #1-Unit #3 Problems 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall. 2. The: Network Sharing Center tool provides a certain access point for all of the network controls and connections on a computer running Windows 7. 3. A device that connects one network to another is called a router

Lab 1 Assesment Question

428 words - 2 pages Lab 1 Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. 1. FileZilla Server Y 2. Internet Explorer N 3. Mozilla Firefox N 4. Nessus Client N 5. Wire Shark Y 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server

E-Business - Voice Over Ip

5944 words - 24 pages ): o internet shop o supply chain management o online marketing o offline marketing 1. Introduction to Voice over IP Voice over IP (VoIP) is a family of technologies, methodologies, communication protocols, and transmission techniques for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used

It Infrastructure

310 words - 2 pages is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon.3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for this operation. While you can find network vulnerabilities with Nmap, it is not used as such.4. How many total scripts (i.e., test

The Internet Protocol Suite And The Osi Reference Model

906 words - 4 pages to a solution, investigate Layer ½ problems with the LAN, as covered in Chapter 3. For example, look for an undefined VLAN. Step 2 Verify the default gateway setting on the host by pinging one of the default router’s other interface IP addresses. Or, from the default router, use an extended ping of the host’s IP address with a source address from another of the router’s interfaces. Step 3 Test connectivity to the destination host by using the

Cis 333 Lab 1

342 words - 2 pages 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N 1. No nessus client 2. No Nmap 3. No helix 4. No openoffice 5. No izarc 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default

Information Technology

3433 words - 14 pages , interpreted and carried out one at a time (stored program concept). –Cache memory: high speed, high cost storage, used as intermediary between control unit and main memory, compensates for speed mismatches built into the comp system. –Multiple processor configurations: a comp system usually contains more than one processor, dual processor contain two physical separate processors as two separate chips, dual core contain two complete processors


5258 words - 22 pages : ©Shakirov/SIS WINTER 2002 MIT SLOAN MANAGEMENT REVIEW 51 The Internet alone has created numerous opportunities to reengineer processes, introduce online products and services, approach new customer segments and redo business models.3 But although the opportunities seem limitless, the resources required (capital, IT expertise, management focus and capacity for change) are not. Traditional approaches to IT investment attempt to identify

Similar Documents

Financial Management Brigham Chapter 3 Answers

6114 words - 25 pages certain times of the year a firm may have excessive inventories in preparation of a “season” of high demand. Therefore an inventory turnover ratio taken at this time as opposed to after the season will be radically distorted. 3-2 The emphasis of the various types of analysts is by no means uniform nor should it be. Management is interested in all types of ratios for two reasons. First, the ratios point out weaknesses that should be

Unit 1 Assignment 1: Effects Of Routing On Current Communication Methods Used By Organizations

3601 words - 15 pages capacity. * I have described the minimum standard required for the media image repository scenario and explained my reasoning for this selection. * I have followed the submission requirements. Unit 3 Assignment 3: Convergence of IP-Based Networks Learning Objectives and Outcomes * Understand the convergence of today’s IP-based networks. Assignment Requirements In this assignment, you will write a report detailing your

Network Infrastructure Essay

5792 words - 24 pages access and branch to head office link. To configure an IPsec Policy for data encryption, the following steps could be taken:- 1. IN mmc, Click add/remove snap-in, then select IP security policy management then click add 2. Select the computer for which you want to manage IPsec policies for (Domain computers) 3. Right click on IP security policies then select create IP security policy 4. Name the policy and add

Organizational Behaviours Essay

1020 words - 5 pages Management Process and  Organization Behavior  MB0022/ PB 001/MH0026  Contents  Unit 1  Management Process  Unit 2  Organizational Behavior  Unit 3  Foundation of Organization behavior  Unit 4  Learning  Unit 5  Value, Ethics and Job satifaction  Unit 6  Personality  Unit 7  Emotions  Unit 8  Perception  96  83  69  52  41  33  17  1  Edition: Fall 2008 Contents  Unit 9  Motivation  Unit 10  Group Behavior  Unit 11  Power and Politics