Juvenile Court vs Adult Case Business Finance Assignment Help. Juvenile Court vs Adult Case Business Finance Assignment Help.
(/0x4*br />
Write a 1,050- to 1,400-word paper comparing juvenile courts with adult courts. Include the following in your paper:
- Select a U.S. Supreme Court case from Ch. 4 of The Juvenile Justice System, or another relevant juvenile court case.
- Describe your case and the legal issues facing the juvenile and the court.
- Analyze the possible outcome of the case if the juvenile were an adult and tried in adult court.
- Include an overview of the juvenile justice system, with a comparison of the key differences between juvenile and adult courts, including roles and language differences.
- Describe the adjudication process by which a juvenile is transferred to the adult court system, and why the transfer did not occur in your chosen case.
- Include a summary of the analysis discussion you had with your collaborative group.
Format your paper consistent with APA guideline
Juvenile Court vs Adult Case Business Finance Assignment Help[supanova_question]
Civil Rights Movement from the Brown v. Board decision into and including the Black Power Movement Writing Assignment Help
Using the textbook and the following resources, trace the development of the Civil Rights Movement from the Brown v. Board decision into and including the Black Power Movement. Make sure to present a thesis at the beginning of your essay:
http://www.watson.org/~lisa/blackhistory/civilrights-55-65/index.html
http://en.wikipedia.org/wiki/African-American_Civil_Rights_Movement_(19551968)
http://en.wikipedia.org/wiki/Black_Power
Address the following questions in your essay:
· What various strategies were adopted by civil rights leaders?
· How did civil rights activists bring the movement to national attention?
· Why was the federal government reluctant to fully support the movement?
· What role did the federal government eventually play in the movement?
· What successes were achieved?
· Why did the movement eventually lose momentum?
Essay should be minimum of 700 words. Use MLA style for use of sources and citations.
https://owl.english.purdue.edu/owl/resource/747/01/
https://owl.english.purdue.edu/owl/resource/589/1/
Grade Criteria:
FOCUS: The essay makes a clear and effective statement (the thesis) about the Civil Rights Movement. /10
DEVELOPMENT: The essay fully discusses all questions about the Civil Rights Movement. /40
HISTORICAL ANALYSIS: Points of are placed in historical context of the time specific time they occurred. /30
COHERENCE: The essay is organized logically. points are clear and uses quotes, paraphrases and citations appropriately. /10
CORRECTNESS AND STYLE: The essay has few errors and is written in a readable style. /10
TOTAL: /100
[supanova_question]
project manager leading a major human resource system implementation Business Finance Assignment Help
Imagine you are the project manager leading a major human resource system implementation. The project is now well underway, and it is about 50% done. Project progress has been largely smooth, even though there were issues and risks that materialized. But you are concerned as you heard that some rough days are ahead.
1. You just came out of a meeting with the project’s sponsor, VP of HR, and he asked you to consider a significant change to the deployment plan. The original project plan, which was agreed by everyone involved, was to maintain both the new and the old system and concurrently operate it for a short period. This way, should there be problems with the new system, the legacy system is still operating. By having both systems running, it can also help with reconciliation of data. While it was painful and expensive to run both systems, it was less risky. However, the economy is trending downward, and the company wanted to save money. The CEO of the company just asked the VP of HR to consider running a single system without any overlap.
Your brain is racing… What are some pros and cons of concurrent operation (running both systems simultaneously) versus launching the new system without the backup of the legacy system. Identify three ideas and provide explanation.
2. From a project management process perspective, what should you do next?
3. Amy, who is quality assurance lead, heard the news and had an urgent meeting with you. Based on her latest analysis, she believes the quality assurance activities, specifically testing, is far more intense if the decision is to shutdown the legacy system immediately. Her original quality assurance plan permitted some level of errors. But given the single system, many of those errors can no longer be tolerated. How would you manage this situation? Provide sufficient details.
4. You recommended to the VP of HR to continue the current plan of concurrent operations, and your justifications are thorough. The VP is not happy with the recommendation because he agreed that the concurrent operations are expensive, plus, he thought there could be other ways to balance risks. Thus, the VP pushed back and asked you to think out of the box and come up with a recommendation that at least meet the executive requests half way. Now back to the drawing board. What are some ways you should consider that can save money and balance risks?
5. The project has been challenging, but you are glad that you have taken the MGMT565 and MGMT576 courses. Discuss two of the best practices in project management?
[supanova_question]
ISSC431 Database Security Research Paper. Assignment Computer Science Assignment Help
This is where you will submit the final version of your research paper. Research Paper Criteria:You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. A draft version of the research paper should have been submitted by the end of Week 5. The research paper specifications are as follows:
- 8-10 pages (double-spaced) Times New Roman 12 pt font.
- Must have Abstract, Table of Contents, Introduction, Conclusion and section headings
- Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
- In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!
- You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.
- Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
- Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
Please No Plagiarism.
Please use
[supanova_question]
Question About S corporation Business Finance Assignment Help
Which of the following statement is correct?
a. A shareholder’s basis in S corporation stock can be reduced below zero only by losses from the corporation and not distribution
b. The basis of an S corporation shareholder stock is increased by cash and property distributions from the corporation that are not included in the shareholder income
c. The basis of an S corporation shareholder’s stock is increased by cash and property distributions from the corporation that are not included in the shareholder income
d. Non of the above
Which of the following statement is correct regarding years n S corporation has overall losses and distribution cash to its shareholders?
a. Item of loss are deducted from shareholders bases before distribution
b. Shareholders’ bases are reduced for noncapital, nondeductible, expenses before they are reduced for deductible expenses
c. Any items of income or gain are not taken into account when adjusting shareholders bases
d. All of the above
Which of the following statements is not correct?
a. The accumulated adjustments account is a shareholder level account
b. The accumulated adjustments account is essentially the undistributed earnings and profits of the S corporation while the S election is in effect
c. Increases to the accumulated adjustments account are applied before decreases
d. The accumulated adjustment account can be negative
An S corporation makes distributions to its shareholders. The S corporation does not have any accumulated earnings and profits from operation as a C corporation, The distributions are first allocated to:
a. The AAA account and treated as taxable dividends
b. Shareholders” bases in stock and are treated as a nontaxable return of capital
c. Shareholder’s bases inn stock and treated as a capital gain or loss
d. Shareholder’s bases in debt in debt and treated as a nontaxable repayment of the debt
Which of the following statement is correct?
a. The accumulated adjustments account is essentially the accumulated, undistributed earnings and profits an an S corporation
b. Reduction in the accumulated adjustments account follow more stringent ordering rules than increases in the accumulated adjustments account
c. If there is an overall net decrease in the accumulated adjustments account, then any distribution deduction is applied before any net negative adjustment
d. All of the above
What is the primary reason for treating distributions differently depending on if the S corporation has earnings and profits or not?
a. To increase tax revenues
b. To prevent a corporation from avoiding the double taxation applicable to earning from C corporation activity.
c. To discourage C corporations from electing S corporation status.
d. To make the tax code more difficult thereby providing job stability to tax professionals
An S corporation that is involved in a merger or acquisition should be concerned about:
a. Limiting the number of shareholders to the allowed maximum number
b. The eligibility of the shareholders to be S corporation shareholders
c. The desire of new shareholders to discontinue the S election
d. All of the above
[supanova_question]
[supanova_question]
Community Corrections Week 5 Individual Project Business Finance Assignment Help
1,750–2,000 words
- Consider the feedback from your instructor and peers on your Evaluative Needs Summary, and make changes to your Evaluative Needs Summary.
- This week, you will provide an additional detail to your Evaluative Needs Summary by recommending a specificstate program (within your state of residence) that you feel would be best for the defendant.
- It is critical that you support your rationale for your recommendations, and all work is APA-formatted.
This will be your final Evaluative Needs Summary.
Instructor Feedback for Week 4 Individual Project:
Hi Veronica.
The instructions required 14 slides w/notes – you did not meet this requirement. As noted in chat, APA does not count title or reference slides towards the length – just like with an APA paper not including in the word count the title page or the reference page.
Good job offering a profile of your defendant and the recommendation to help – some more on how the chosen probation program as it relates to recidivism and public safety could have been offered – slide 10 really gives concrete steps on how to try to do this.
Make sure to specifically name and cite the exact program(s) you want to use with the offender to make your unit 5 IP impressive.
Week 4 Individual Assignment
(See file below)
Community Corrections Week 5 Individual Project Business Finance Assignment Help[supanova_question]
Write a 5 page report ASAP Computer Science Assignment Help
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks, and recommend mitigation strategies. A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions Vulnerability reports are written for a diverse audience within an organization.
Therefore, they include an executive summary for managers and decision-makers as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule. Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt below, you will play the role of an information security consultant as you complete this final project. Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain critical feedback that will inform your final draft of this project that you will submit in Module Seven. Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts, received your instructor feedback, and are ready to finalize your final project draft in Module Seven. In this assignment, you will demonstrate your mastery of the following course outcomes: IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of Standards and Technology (NIST) standards IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures 2 IT-320-04: Interpret data from networking and system logs for building security assurance Prompt ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes. Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should be allowed from outside of the network. Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions (your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02] b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques that you used to find the vulnerabilities. [IT-320-01] c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01] II. Network Assessment – Gathering Evidence of the Vulnerabilities: In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that environment. Be sure your responses and supporting evidence address the following questions: a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with evidence. [IT-320-01] b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or unused? Support your response with evidence. [IT-320-01] c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]: i. What kinds of antivirus software, malware protection, or other security software is in place? ii. What are the risks associated with the gaps in malicious software prevention? iii. What are the risks associated with leaving the malicious software prevention strategies as they are now? d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with evidence from your Wireshark and NetworkMiner tools. [IT-320-01] 3 III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities: In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the output from these tools. Be sure your responses and supporting evidence address the following questions: a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04] b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04] c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose. For example, what did you find when you used the OpenVAS tool? [IT-320-04] d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04] IV. Network Security Posture Recommendations: In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for organizational purposes. A sample is provided for you in the Supporting Information section. a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have been included: [IT-320-03] i. At least one issue associated with the firewall ii. At last one issue associated with one or more client machines iii. At least one issue associated with one or more server machines iv. At least one issue associated with a Windows host b) Indicate the impact of the vulnerability. [IT-320-03] c) Indicate the likelihood of the vulnerability. [IT-320-03] d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment above? Support your response with evidence from your lab work and coursework. [IT-320-02] e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT320-02] f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02] V. Implementation Solutions: In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that demonstrates you have executed your proposed recommendations. a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with evidence. [IT-320-03] b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03] 4 Supporting Information Matrix (for Section IV, Parts e and f) Likelihood (5) Medium (3) High (4) High (4) Very High (5) Very High (5) (4) Medium (3) Medium (3) Medium (3) High (4) Very High (5) (3) Low (2) Medium (3) Medium (3) Medium (3) High (4) (2) Very Low (1) Low (2) Medium (3) Medium (3) Medium (3) (1) Very Low (1) Very Low (1) Low (2) Low (2) Medium (3) (1) (2) (3) (4) (5) Impact Figure 3: Risk Rating Matrix. Reprinted from “Cyber Security Assessment Sample Report,” by Honeywell International Inc., retrieved from https://www.honeywellprocess.com/library/marketing… Copyright 2012 by Honeywell International Inc. Table Sample (for Section IV, Parts e and f) Description of Vulnerability Impact (1–5) Likelihood (1–5) Priority (1–5) Recommendations Example: Switches do not have spanning tree feature enabled. This feature prevents communication loops from crashing the network. 2 3 3 Example: Enable spanning tree feature. Table 6: CSVA Findings. Reprinted from “Cyber Security Assessment Sample Report,” by Honeywell International Inc., retrieved from https://www.honeywellprocess.com/library/marketing… Copyright 2012 by Honeywell International Inc. 5 Matrix Key Very High (5) – The results of this finding can cause total loss of the generating asset to support reliable operation, and are almost certain to result in human death or serious injury and to significantly violate, harm, or impede the organization’s mission, reputation, or interest. High (4) – The results of this finding can cause impairment of the generating asset to support reliable operation of the bulk electric system. They may also result in human death or serious injury, and may significantly violate, harm, or impede the organization’s mission, reputation, or interest. Medium (3) – The results of this finding can cause partial or short-term (<7 days) impairment of generating asset to support reliable operation of the bulk electric system. They may result in human injury and may violate, harm, or impede the organization’s mission, reputation, or interest. Low (2) – The results of this finding can cause short-term impairment (<24 days) of the generating asset to support reliable operation of the bulk electric system and may noticeably affect the organization’s mission, reputation, or interest. Very Low (1) – The results of this finding will NOT cause impairment of the generating asset to support reliable operation of the bulk electric system and are unlikely to noticeably affect the organization’s mission, reputation, or interest. Figure 3: Risk Rating Matrix. Adapted from “Cyber Security Assessment Sample Report,” by Honeywell International Inc., retrieved from https://www.honeywellprocess.com/library/marketing…Copyright 2012 by Honeywell International Inc. Final Project Rubric Guidelines for Submission: The written portion of your submission should be 5 to 6 pages in length (in addition to small screenshots, the title page, and references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style.
[supanova_question]
Community Corrections Week 5 1st Response to Jennifer Business Finance Assignment Help
Using 100 words or more, please respond to the following post about the most compelling subject in Community Corrections:
One of the most compelling topics I learned in this class was specialty programs. There are so many helpful programs out there that people can utilize. There is the Felony Alcohol Intervention Program and the First Offender Drug Program for persons with alcohol or drug problems. There are the Mental Health Diversion Program and the Other Behavioral Intervention with Assault Non-family (OBI WAN) Programs for persons with mental illness and behavioral issues.
Also, there is the Youthful Offender Diversion Alternative (YODA) for adolescent offenders. The Domestic Violence Diversion Program and the Reaching Independence through Self-Empowerment (RISE) Program are good programs to help people get their lives back after a crime. There is even a Veterans Court Diversion Program that helps with Veterans affairs.
I enjoyed participating in the discussions because it helped me understand the subject matter better and I liked learning how other people felt towards the topics at hand. Nothing in this course was unclear. Everything was explained in detail. Nothing needed further clarification.
I do not think that anything could have yielded additional valuable information. The PowerPoint presentation was a bit of a struggle for me. I do not have a lot of experience with them and I always wonder if I am doing them correctly.
References:
(n.d.). Retrieved December 16, 2017, from http://access.tarrantcounty.com/en/criminal-courts…
[supanova_question]
Sociolinguistics Annotated Bibliography Writing Assignment Help
Annotated Bibliography Project:
– writing a 250 word (maximum) annotation for each entry. This is one typed page, double-spaced.
– The final product includes:
10 pages of annotations – no more, no less.
– The format of the entries:
a) Begin each entry with an APA (most recent edition) or other style citation.
b) No more than one half of the entry should consist of a summary of the article.
c) One half to three quarters of the page is to be commentary on the entry (e.g., what makes the article interesting, worthy of inclusion, important, provocative, reservations you have about it)
d) All entries are to be double-spaced with 1″ margins on all sides and no larger than 12 pt. font.
Entries are listed below:
Baker, P. (2010). Sociolinguistics and corpus linguistics. Edinburgh University Press.
Baker, P. (2012). Acceptable bias? Using corpus linguistics methods with critical discourse analysis. Critical Discourse Studies,9(3), 247-256.
Biber, Douglas. (2012). Sociolinguistics and Corpus Linguistics by Paul Baker Corpus and Sociolinguistics: Investigating Age and Gender in Female Talk by Bróna Murphy. Journal of Sociolinguistics,16(2), 301-308.
De Beaugrande, Robert. (1999). Linguistics, sociolinguistics, and corpus linguistics: Ideal language versus real language. Journal of Sociolinguistics,3(1), 128-140.
Gabrielatos, C. N., Torgersen, E., Hoffmann, S., & Fox, S. (2010). A corpus-based sociolinguistic study of indefinite article forms in london english. Journal of English Linguistics,38(4), 297-334.
Kendall, T. (2011). Corpora from a sociolinguistic perspective. Revista Brasileira De Linguistica Aplicada,11(2), 361-389.
Mair, Christian. (2009). Corpus linguistics meets sociolinguistics: The role of corpus evidence in the study of sociolinguistic variation and change. Language & Computers,69(1), 7-33.
Nguyen, Dong. (2016). Computational Sociolinguistics: A Survey. Computational Linguistics,42(3), 537-594.
Szmrecsanyi, B. (2017). Variationist sociolinguistics and corpus-based variationist linguistics: Overlap and cross-pollination potential. The Canadian Journal of Linguistics / La Revue Canadienne De Linguistique,62(4), 685-701.
Themistocleous, Christiana. (2015). Digital code-switching between Cypriot and Standard Greek: Performance and identity play online. International Journal of Bilingualism,19(3), 282-298.
[supanova_question]
Investment Analysis Team Project Business Finance Assignment Help
Investment Analysis Team Project
INSTRUCTIONS: This assignment is to be completed by the same teams that worked on the case study project. You should answer each question completely and provide the Excel files, tables, calculations, plots, etc. that you assembled to answer the questions.
1. Use either finance.yahoo.com or Bloomberg and download five years of monthly closing prices for five stocks and the S&P 500 Index (ticker symbol “GSPC”). Do not use Apple or Monsanto. Download the data into an Excel file and use the Adjusted-Close prices, which adjust for dividend payments, to calculate the monthly rate of return for each price series. Use an XY Scatter Plot chart with no line joining the points to plot each stock’s returns against the S&P 500. Now for each scatter plot chart, select one of the data points, and right-click to obtain a shortcut menu allowing you to enter a trend line. This is the company’s characteristic line, and the slope of the line is the company’s beta. You can use the slope function In Excel to compute the slope of the line, which is beta. Compile the betas of each company in a table and provide copies of each company’s characteristic line (scatter plot). Based on your results, how are your companies similar and different? Which companies are aggressive, and which are defensive?
2. Use the monthly returns data for the eight stocks and the S&P 500 Composite Index in Question 1. a. Using the Excel functions for average (AVERAGE) and sample standard deviation (STDEV), calculate the average and the standard deviation of the returns for each of the firms and the S&P 500 Composite Index. Prepare a table showing the results of your calculations
b. Using Excel’s correlation function (CORREL), construct the correlation matrix for the five stocks based on their monthly returns for the entire period. What are the lowest and the highest individual pairs of correlation coefficients? (Alternative: You may use Excel’s Data Analysis Tool to generate the correlation matrix.)
3. Go to the site https://www.portfoliovisualizer.com/efficient-fron… and enter ticker symbols (you can locate ticker symbols at finance.yahoo.com) for eight securities and select 2011 to 2016 as your time period. Do not use the securities used to answer Questions 1 and 2. What is expected return for the minimum variance portfolio on the efficient frontier?
4. Download daily adjusted closing prices for one of the stocks in Problem 1 and the S&P 500 Composite Index for 2015 and 2016. In an Excel spreadsheet, calculated the daily returns of the stock and the S&P 500 Composite Index for the full two years. Go to https://www.federalreserve.gov/datadownload/Choose…
to download daily observations for the secondary market four-week Treasury bill rates, which will be your measure of the risk-free rate.
2
a. For each day use returns for the stock and the returns for the S&P 500 Composite Index, along with the Treasury bill rates to calculate excess returns for your stock and the S&P 500 Composite. Note that excess return for an asset is equal to the daily return less the risk-free rate.
b. Use the excess return data in part a. to produce an x-y plot with y as the excess return on the stock and x as the excess return on the market. Make sure your data is sorted by date from earliest to latest when you do this. Use the Data Analysis tools in Excel to calculate a regression of the stock’s excess return on the excess return of the composite index. The intercept of the regression equation is alpha and the slope is beta.
c. Repeat the procedures in part b separately on data from 2015 and on data from 2016. Are your alphas and beta different for each year?
5. For the firm that you used in Question 4, use Bloomberg to obtain the following: a. Return on equity (ROE), the number of shares outstanding, the dividends per share, and the net income. Record them in a spreadsheet.
b. Calculate the total amount of dividends paid (dividends per share x number of shares outstanding), the dividend payout ratio (total dividends paid/net income), and the plowback ratio (1 – dividend payout ratio).
c. Compute the sustainable growth rate, g = b X ROE, where b equals the plowback ratio.
d. Find the price-to-book, price-to-sales, and price-to-cash-flow ratios
e. Compare the three-year growth rate of earnings per share with the sustainable growth rate calculated above.
f. Use Bloomberg to obtain price-to-book, price-to-sales and price-to-cash flows for the industry in which your firm operates. Based on comparing the industry ratios with the firm ratios calculated in part d, does your firm appear to be overvalued or undervalued?
6. Go to the website of Moody’s at www.moodys.com.register Register at the site so that you can get free data. Find the ratings on bonds of at least 5 companies. Then access Bloomberg to get the most recent annual data for the following financial ratios of the five companies: EBIT interest coverage (earnings before interest and taxes divided by interest expense), Total debt/(total debt + equity), and return on assets. What is the relationship between bond rating and these ratios?
[supanova_question]
Juvenile Court vs Adult Case Business Finance Assignment Help
Juvenile Court vs Adult Case Business Finance Assignment Help