Free Essay

Mt217 Unit 4 Assignment

In: Business and Management

Submitted By salvimom
Words 405
Pages 2
John buys a house and pays it back in 5 years. The house is worth $150,000. The current rate is 6% and he expects rates to go up 1% every year. What does his amortization table look like?
Year 1 payment Year 2 payment Year 3 payment Year 4 payment Year 5 payment
N 5 N 4 N 3 N 2 N
I 6.0% I 7.0% I 8.0% I 9.0% I
PV -$150,000 PV -$123,391 PV -$95,600 PV -$66,152 PV
FV $0 FV $0 FV $0 FV $0 FV PMT $35,609.46 PMT $36,428.36 PMT $37,095.82 PMT $37,605.16 PMT Loan Amortization Schedule, $100,000 with variable rates
Amount borrowed: $150,000 The calculations for payment were done through excel calculations Beginning Amount (1) Payment (2) Interest (3) Repayment of Principal (4) Ending Balance (5) 150000 * 6% = 9000 interest on year 1 payment
Year 35609.46 - 9000 = 26609.46 Repayment of principal for year 1
0 $150,000.00 150000 - 26609.46 = 123390.54 Ending balance for year 1
1 $150,000.00 $35,609.46 $9,000.00 $26,609.46 $123,390.54 123390.54 * 7% = 8637.34 interest on year 2 payment
2 $123,390.54 $36,428.36 $8,637.34 $27,791.02 $95,599.52 36428.36 - 8637.34 = 27791.02 Repayment of principal for year 2
3 $95,599.52 $37,095.82 $7,647.96 $29,447.86 $66,151.66 123390.54 - 27791.02 = 95599.52 Ending balance for year 2
4 $66,151.66 $37,605.16 $5,953.65 $31,651.51 $34,500.15 95599.52 * 8% = 7647.96 interest on year 3 payment
5 $34,500.15 $37,950.17 $3,450.02 $34,500.15 $0.00 37095.82 - 7647.96 = 29447.86 Repayment of principal for year 3 95599.52 - 29447.86 = 66151.66 Ending balance for year 3 66151.66 * 9% = 5953.65 interest on year 4 payment Total payments: $184,688.96 37605.16 - 5953.65 = 31651.51 Repayment of principal for year 4 Total interest paid: $34,688.96 66151.66 - 31651.51 = 34500.15 Ending balance for year 4 34500.15 * 10% = 3450.02 interest on year 5 payment 37950.17 - 3450.02 = 34500.15 Repayment of principal for year 5 34500.15 - 34500.15 = 0 Ending balance for year 5…...

Similar Documents

Premium Essay

Gb550 Unit 4 Assignment

...Tamisha McQuilkin Unit 4 Assignment GB550 Financial Management Dr. Prondzinski May 17, 2011 24-2 Security A has an expected rate of return of 6%, a standard deviation of returns of 30%, a correlation coefficient with the market of -0.25, and a beta coefficient of -0.5. Security B has an expected return of 11%, a standard deviation of returns of 10%, a correlation with the market of .75, and a beta coefficient of 0.5. Which security is more risky? Why? Using SML: rA= rrf + (rm – rrf)bi Security A is riskier because of its negative correlation to the market. Also its beta is negative causing to believe its risk will increase over time. 24-8 You are given the following set of data: Historical Rates of Return | | | Year | NYSE | Stock Y | 1 | 4.0% | 3.0% | 2 | 14.3 | 18.2 | 3 | 19 | 9.1 | 4 | -14.7 | -6.0 | 5 | -26.5 | -15.3 | 6 | 37.2 | 33.1 | 7 | 23.8 | 6.1 | 8 | -7.2 | 3.2 | 9 | 6.6 | 14.8 | 10 | 20.5 | 24.1 | 11 | 30.6 | 18.0 | | Mean = 9.8% | 9.8% | | σ = 19.6% | 13.8% |   a. Construct a scatter diagram showing the relationship between returns on Stock Y and the market. Use a spreadsheet or a calculator with a linear regression function to estimate beta. β = 0.62   b. Give a verbal interpretation of what the regression line and the beta coefficient show about stock Y’s volatility and relative risk as compared with those of other stocks. This graph shows that stock Y’s volatility follows the basic trend of the market (NYSE). The......

Words: 362 - Pages: 2

Free Essay

Unit 4 Assignment 1

...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency......

Words: 396 - Pages: 2

Premium Essay

Unit 4 Assignment

...Assignment Unit 4 Candace House CJ140 March 26, 2013 Assignment Unit 4 There are two legal terms “search” and “seizure”. The legal term search means to examine another's premises to look for evidence of criminal activity. Under the 4th and 14th Amendments it is unconstitutional for law enforcement officers to conduct a search without a "search warrant" issued by a judge or without facts which give the officer "probable cause" to believe evidence of a specific crime is on the premises if there is not enough time to obtain a search warrant. The legal term seizure means the taking by law enforcement officers of potential evidence in a criminal case. The constitutional limitations on seizure are the same as for search. Thus, evidence seized without a search warrant or without "probable cause" to believe a crime has been committed and without time to get a search warrant, cannot be admitted in court, nor can evidence traced through the illegal seizure. Basically what all this means is that when evidence is being collected in a search and seizure it has to be done by protocol otherwise the criminal may walk free. An element that is needed with both the terms search and seizure is probable cause. Without the probable cause then we cannot legally search a person or their property and take any evidence. Search warrants may also be needed, provided that there is enough time to obtain a search warrant. A third element between the two terms is where there is the ability of......

Words: 622 - Pages: 3

Premium Essay

Unit 4 Assignment

...William Clark January 8, 2013 Unit 4 Assignment GB519 Measurement and Decision Making Prof. Stanley Self Special Order Earth Baby Inc. (EBI) recently celebrated its tenth anniversary. The company produces organic baby products for health-conscious parents. These products include food, clothing, and toys. Earth Baby has recently introduced a new line of premium organic baby foods. Extensive research and scientific testing indicate that babies raised on the new line of foods will have substantial health benefits. EBI is able to sell its products at prices higher than competitors’ because of its excellent reputation for superior products. EBI distributes its products through high-end grocery stores, pharmacies, and specialty retail baby stores. Joan Alvarez, the founder and CEO of EBI recently received a proposal from an old business school classmate, Robert Bradley, the vice president of Great Deal Inc (GDI), a large discount retailer. Mr. Bradley proposes a joint venture between his company and EBI, citing the growing demand for organic products and the superior distribution channels of his organization. Under this venture EBI would make some minor modifications to the manufacturing process of some of its best-selling baby foods and the foods would then be packaged and sold by GDI. Under the agreement, EBI would receive $3.10 per jar of baby food and would provide GDI a limited right to advertise......

Words: 792 - Pages: 4

Free Essay

Ls308 Unit 4 Assignment

...LS308 -Unit 4: - Assignment Nyree Griffith Kaplan University – July 23, 2013 According to anthropologists Lauren Nader and Harry F. Todd, disputes are described as “a problem that escalates beyond an initial disagreement” (Steven Barkan, Law and Society: An Introduction, 2009). There are three stages to the dispute process that Nader and Todd talk about. The first stage is called grievance, the second conflict, and the final dispute. Every stage has its own description and characteristics In the first stage, grievance, there is a situation or disagreement that one part has found has unfair or unjust. Nader and Todd make sure to point out that this grievance can be real or just imagined by the individual, but that it still gives the party the feeling that they were wronged in one way or another. Once the one party feels this grievance they may just let it go or hide it under the surface, but once the grievance is brought to the attention of the other party is moves on the next stage. At this moment that the other party is aware of the grievance the dispute is now in the second stage of the process. In the second stage we now officially have a conflict. In this stage the parties’ can either not bother to resolve the conflict or they can attempt to come to a resolution through one or more ways. The third stage is now the dispute. The only way the conflict stage can go on to the dispute stage is when one or more third parties become knowledgeable about the......

Words: 1197 - Pages: 5

Premium Essay

Written Assignment Unit 4

...Running Head: WRITTEN ASSIGNMENT Writing Assignment/ Unit#4 Shannon Brown Kaplan University PA 328 Professor Mighdoll April 16, 2013 The United States of America has an extensive history when dealing with the issues of copyright and what regulations or laws should protect the author. America has been deliberating the issue as early as 1787 when James Madison requested that a provision be added to the constitution that would provide protection to literary authors for a determined time (U.S. Copyright Office). Many individuals and organizations have made a mark in the history of copyright laws and regulations but research proves that the Berne Convention is responsible for setting a standard for international copyright laws. The Berne Convention enjoyed much success by signing over a 160 participating member nations. The United States became a member of this international community in 1989 (U.S. Copyright Office). The Berne Convention is an international agreement intended to protect its member’s against copyright infringement and also to allow protections for as long as 70 years after the death of the author, provided the works have been viewed (U.S. Copyright Office). The Berne Convention is a treaty whose members believe that intellectual property is important and should be held to some degree of copyright protection (eBook Chp.16 2012). The Universal Copyright Convention (UCC) was another organization that worked to protect the......

Words: 483 - Pages: 2

Premium Essay

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Premium Essay

Unit 4 Assignment 2

...Unit 4 Assignment 2: Acceptable Use Policy Definition NT2580 The following acceptable use policy has been designed for Richman Investments and grants the right for users to gain access to the network of Richman Investments and also requires the user to follow the terms of use set forth for network access. Policy Guidelines * The use of peer to peer file sharing is strictly prohibited. This includes FTP. * Downloading executable programs or software from any websites, known or unknown, is forbidden. * Users are not allowed to redistribute licensed or copyrighted material without receiving consent from the company. * Introduction of malicious programs into networks or onto systems will not be tolerated. * Attempts to gain access to unauthorized company resources or information from internal or external sources will not be tolerated. * Port scanning and data interception on the network is strictly forbidden. * Authorized users shall not have a denial of service or authentication. * Using programs, scripts, commands, or anything else that could interfere with other network users is prohibited. * Sending junk mail to company recipients is prohibited. * Accessing adult content from company resources is forbidden. * Remote connections from systems failing to meet minimum security requirements will not be allowed. * Social media will not be accessible on company resources. *......

Words: 263 - Pages: 2

Premium Essay

Pt1420 Unit 4 Assignment

...Unit 4 Assignment Short Answers 1. Modules allow the programmer to write an operation once, and then be able to execute it any time needed later in the code. 2. Header – The starting point of the module Body- The list of statements that belong to the module 3. The program returns to the memory address just after from where the module was called, and continues to execute 4. A local variable is a variable that is declared from within the module. Only statements in that module can access it. 5. A local variable’s scope begins at the variable’s declaration and ends at the end of the module in which it is declared. 6. Passing an argument by value is a one-way communication from the main program to the module. Changes to the parameter variable inside the module do not affect the argument in the calling part of the program. Passing an argument by reference is a two-way communication from the main program to the module and it allows modification of the variable in the calling program 7. Global variables make a program difficult to debug because any statement in a program file can change the value of a global variable. If you find that the wrong value is being stored in the global variable, you have to track down every statement that accesses it to determine where the bad value is coming from. 1. Module timesTen (integer originalNumber by value) Set a = originalNumber * 10 Input a Display “The answer is “, a 5. Module getNumber (integer......

Words: 483 - Pages: 2

Premium Essay

It 590 Unit 4 Assignment

...Veronica McNutt IT590 Unit 4 Assignment Professor DePriest September 2, 2014 Unit 4 Assignment Essay Questions Scenario 1: You are working as a designer for a university that offers a program in Computer Science. One of the tracts is computer security. One of your colleagues has recommended adding a course addressing network security. In this course, students learn about the history of networks and study network attacks that have caused significant damage to the network that was the subject of the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level course instead of an undergraduate level course? Explain. Disadvantages According to research, there are many concerns for offering hands-on training to students in a computer network class. According to Trabelsi & Ibrahim (2013), UAE conducted a survey of the students who used the skills learned in the hands-on DOS attack class. Eighty five percent of students used the skills learned outside the isolated network university lab. These concerns would be the following: that......

Words: 1270 - Pages: 6

Free Essay

Unit 4 Assignment

...Java Unit 4 Assignment This is the class needed for questions 1-11. import java.awt.geom.Rectangle2D; public class MyRectangleContainer { private Rectangle2D.Double containedRectangle; private String nameOfRectangle; public MyRectangleContainer() { containedRectangle = null; } public MyRectangleContainer(Rectangle2D.Double rectanglein, String namein) { containedRectangle = rectanglein; nameOfRectangle = namein; } public void setName(String namein) { nameOfRectangle = namein; } public void setRectangle(Rectangle2D.Double rectanglein) { containedRectangle = rectanglein; } public String getName() { return nameOfRectangle; } public Rectangle2D.Double getRectangle() { return containedRectangle; } } This is the beginning of the program needed for questions 1-11. import java.awt.geom.Rectangle2D; public class Assignment4RectangleProg { public static void main(String[] args) { MyTerminalIO myterminal = new MyTerminalIO(); int x, y, w, h; myterminal.print("Enter an x value: "); x = myterminal.getInt(); myterminal.print("Enter a y value: "); y = myterminal.getInt(); myterminal.print("Enter a w value: "); w = myterminal.getInt(); myterminal.print("Enter an h value: "); h = myterminal.getInt(); /* Your code would go here. */ } } The first 11 questions refer to the code for the MyRectangleContainer class, which......

Words: 1345 - Pages: 6

Free Essay

Unit 4 Assignment Brief

...Assignment Title | Unit 4: Communication in Business | Assessor | Peter Green | Date Issued | 13th January 2015 | Hand in Date | 20th March 2015 | Duration (approx.) | 11 weeks | Qualification suite covered | Level 3: BTEC Diploma in Business | Units covered | Unit 4 | Learning aims and objectives | The aim of this unit is to inform you that the collection and management of business information, and the successful communication of that information throughout a business, is critical for the future prosperity of the organisation.Learning outcomes:1. Understand different types of business information2. Be able to present business information effectively3. Understand the issues and constraints in relation to the use of business information in organisations4. Know how to communicate business information using appropriate methods | Durations (approx) | 60 hours | BackgroundCase studiesScenario | Proper collection of data creates an environment where informed decisions can be taken for the benefit of the business. In order to manage information effectively, there must be good communication systems within the organisation, and staff must possess good verbal and written skills in order to communicate and share information. Throughout this unit, you will be researching how one organisation obtains and provides information verbally, via written context, and with the use of multi-media.You have been given the choice of the following organisations to research in......

Words: 1171 - Pages: 5

Premium Essay

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016,......

Words: 1067 - Pages: 5

Premium Essay

Unit 4 Assignment 4

...Unit 4 Assignment 4 Non- electronic communication involves the distribution of a message usually in the form of: Reports, Letters, Flow Charts, Invoices and even Verbal Communication amongst employees. This form of communicating is not as popular as it once was, but it provides businesses with other avenues to communicate instead of electronic communication. Furthermore, different types of communication suit contrasting businesses in addition to, the preference of people involved within a business. What Is Non- Electronic Communication? Electronic and Non- Electronic Sources of Business Information Sources of business information can come in a variety of different forms which include: Newspapers, Websites, Books, Posters, Directories, Databases, Government Statistics and so forth. Business information is basically information gathered of relevance to a business and its environment. Businesses use different sources of information as a way of understanding the markets they entering into, their competitors and how the company can grow. Moreover, different sources of business information serve contrasting purposes. Firstly, electronic communication involves the use of technology to distribute a particular message across. Examples of electronic communication include: the use of Mobile Devices, Video conferencing, Twitter, Facebook and other Social Media Websites, as well as, Electronic Mail. This is an effective way of communicating in a business environment as it is cost......

Words: 665 - Pages: 3

Premium Essay

Sc300 Unit 4 Assignment

...Tammy Kelly Kaplan University SC300: Big Ideas in Science: From Methods to Mutation Unit 4 Assignment Professor Joshua Ford May 22, 2012 Unit 4 Assignment: Dangerous and Natural Energy 1) What patterns do you see in the distribution of earthquakes across the continental United States? The west coast of the US consists of the highest levels of risk by a wide margin, particularly in the south-west (on the pacific tectonic plate fault line). Central Eastern regions bear areas of moderate risk. Northern and South/south-easterly regions bear no significant risk. 2) Locate your home on this map and make a note of the relative risk to you by indicating the color where you live. The USGS also reports on earthquakes around the world. Visit this interactive map to find the latest global earthquake data from the past seven days: http://earthquake.usgs.gov/eqcenter/recenteqsww/ Bridgeport Connecticut - very low probability of occurrence here. This region bears no significant risk to such an event over the next 50 years. 3) What patterns do you see in the distribution of earthquakes around the world? The majority of earthquakes occur on the left hand side of the pacific plate (the fault line between the pacific/Eurasian and pacific/Australasian plates) the right hand side of this plate relates to the fault line where the majority of earthquakes in the US occur. The westerly coast of the South America also has an abundance of earthquakes on the right hand side of the Nazca......

Words: 888 - Pages: 4

Tenma no Ketsuzoku | Movies Torrents | Game Of Thrones S06E04 FRENCH HDTV XviD-ZT avi