Two mutually exclusive design alternatives are being considered. The estimated cash flows for each alternative are given below. The MARR is 12% per year. The decision-maker can select one of these alternatives or decide to select none of them. Make a recommendation based on the following methods.
Design Y Design Z
Investment cost $140,000 $275,000
Annual revenue $56,233 $94,624
Annual cost $10,140 $23,478 Useful Me 15 years 15 years
Salvage value $14,700 $33,000
Net PW $176,619 $215,595
a. Based on PW method, Design is more economical.
b. The modified B/C ratio of Design Y is (Round to two decimal places)
The modified B/C ration of Design Z is (Round to two decimal places)
o. The incremental B/C ratio is (Round to two decimal places) Therefore, based on the BC ratio method, Design is more economical
d. The discounted payback period of Design Y is The discounted payback period of Design 2 is years (Round to one decimal place) years (Round to one decimal place)
Therefore, based on the payback period method, Design would be preferred
(e) Why could the recommendations based on the payback period method be different from the other two methods?
OA because the payback period gives more weight to the cash flows after the payback period
OB because the payback period method ignores the cash flows after the payback period

Answers

Answer 1

Based on the Net Present Worth (PW) method, Design Z is more economical

The modified B/C ratio of Design Z is 1.25. Therefore, based on the BC ratio method, Design Y is more economical.o. The incremental B/C ratio is 1.07. Therefore, based on the BC ratio method, Design Z is more economicald. The discounted payback period of Design Y is 8.7 years. The discounted payback period of Design Z is 10.2 years. Therefore, based on the payback period method, Design Y would be preferredOB because the payback period method ignores the cash flows after the payback period.Payback period is the time required to recover the initial investment amount through the net cash inflows that a project generates.

The discounted payback period is the time required for the present value of cash inflows generated by a project to equal its initial investment.Discounted payback period and net present value methods of capital budgeting are two of the most widely used methods. These two methods are different in many ways. The discounted payback period method differs from the net present value method in that it considers the time it takes to recover the initial investment as the sole criteria for selection, and hence it ignores the cash flows beyond the payback period. This makes recommendations based on the payback period method different from the other two methods, which take all cash flows into account.

To know  more about design visit:

https://brainly.com/question/33690426

#SPJ11


Related Questions

In windows 10, what command will redirect the output of dir command to a local printer?

Answers

In Windows 10, you can use the following command to redirect the output of the dir command to a local printer:

The Command Line to use

dir > LPT1

This command redirects the output of the dir command to the printer connected to the LPT1 parallel port.

You can replace LPT1 with the appropriate port if your printer is connected to a different parallel port, such as LPT2 or LPT3. Keep in mind that this command assumes your printer is set up and configured correctly, and it may require administrative privileges to access the printer port.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ4

Write an interface and two classes which will implements the interface. 1. interface - stringverification - will have the abstract method defined - boolean verifyinput(string input );

Answers

By following these steps and customizing the implementation as needed, you can create an interface and two classes that implement it to verify input strings based on different criteria.

To create an interface and two classes that implement the interface, follow these steps:

1. Define the interface called "String Verification" with the abstract method "boolean verifyInput(String input)".

This interface will serve as a blueprint for the classes that implement it.

The method "verifyInput" takes a String parameter and returns a boolean value, indicating whether the input is valid or not.

2. Implement the interface by creating two classes, let's call them "AlphaStringVerification" and "NumericStringVerification".

Both classes will implement the "StringVerification" interface.

3. In the "AlphaStringVerification" class, implement the "verifyInput" method.

This method should check if the input contains only alphabetic characters (a-z, A-Z).

If the input meets this condition, return true; otherwise, return false.

4. In the "NumericStringVerification" class, implement the "verifyInput" method.

This method should check if the input contains only numeric characters (0-9).

If the input meets this condition, return true; otherwise, return false.

Now, you can use these classes to verify the input strings according to their respective criteria. For example:

```java
String input1 = "abc";
String input2 = "123";

StringVerification alphaVerifier = new AlphaStringVerification();
StringVerification numericVerifier = new NumericStringVerification();

boolean isAlphaValid = alphaVerifier.verifyInput(input1); // returns true
boolean isNumericValid = numericVerifier.verifyInput(input2); // returns true
```
In this example, the "isAlphaValid" variable will be true because the input string "abc" contains only alphabetic characters. Similarly, the "isNumericValid" variable will be true because the input string "123" contains only numeric characters.

It's important to note that the implementation of the "verifyInput" method can be customized according to the specific requirements of your application.

This allows you to create different classes that implement the same interface but have different verification criteria.
To know more about String verification, visit:

https://brainly.com/question/13259857

#SPJ11

N processes are running concurrently in a virtual memory system. A dedicated disk is used for paging.
Explain whether N should be increased, decreased, or left unchanged, if it is observed that the CPU utilization is very low and disk utilization is very high.

Answers

To address the observed low CPU utilization and high disk utilization in a virtual memory system with dedicated disk paging, it is recommended to decrease the number of processes (N) to better balance the resource utilization and improve system performance.

If it is observed that the CPU utilization is very low and disk utilization is very high in a virtual memory system with dedicated disk paging, N (the number of processes) should be decreased.

Explanation: In this scenario, the low CPU utilization indicates that the CPU is not being fully utilized, while the high disk utilization suggests that the disk is under heavy load due to excessive paging. This imbalance between CPU and disk utilization indicates that there are too many processes running concurrently, leading to a high demand for memory and excessive paging.

By decreasing the number of processes (N), the overall memory demand and subsequent paging activity can be reduced. This allows for a more efficient utilization of system resources, including the CPU and disk, and can help alleviate the high disk utilization issue.

To know more about memory system visit :

https://brainly.com/question/32124561

#SPJ11

The -9 option to the gzip utility results in a higher compression ratio. true or false

Answers

The statement is false.

The -9 option in the g zip utility does not result in a higher compression ratio. The -9 option actually specifies the highest compression level, which means that it will use more computational resources and take longer to compress the file. However, this higher compression level does not necessarily result in a higher compression ratio. The compression ratio is determined by the content of the file being compressed, not the compression level chosen. In some cases, a lower compression level may actually result in a higher compression ratio if the file contains a lot of redundant or compressible data. Therefore, it is not accurate to say that the -9 option always leads to a higher compression ratio.

To know more about statement visit:

https://brainly.com/question/17238106

#SPJ11

typically, users or user groups are given account numbers protected by passwords, which they can use to gain access to the database. a dbms should provide a

Answers

A DBMS (Database Management System) should provide a secure and controlled access mechanism for users or user groups. This is typically done by assigning account numbers and protecting them with passwords.

Explanation:
1. The first step in providing secure access to a database is to assign each user or user group a unique account number. This helps in identifying and tracking the actions of individual users.
2. The account numbers are then protected by passwords. Passwords serve as a means of authentication, ensuring that only authorized users can gain access to the database.
3. When a user wants to access the database, they need to provide their account number and password. The DBMS verifies the authenticity of the user by comparing the provided password with the one stored in its system.
4. If the password matches, the user is granted access to the database. They can then perform the necessary operations on the data, such as querying, inserting, updating, or deleting records.
5. It is essential for a DBMS to provide a secure access mechanism to prevent unauthorized access to the database, protect the integrity of the data, and ensure the confidentiality of sensitive information.

Conclusion:
In conclusion, a DBMS should provide a secure and controlled access mechanism for users or user groups. This involves assigning account numbers protected by passwords, which users can use to gain access to the database. By implementing these measures, the DBMS ensures the security and integrity of the database.

To know more about Database visit

https://brainly.com/question/30163202

#SPJ11

In a computer with base and limit registers for address space protection the address generated by an instruction is 329048. At that time the base register value is 256400 and the limit register value is 128680. What is the address used by the memory subsystem to fetch the data

Answers

To summarize, the address used by the memory subsystem to fetch the data is 329048.

The base and limit registers in a computer are used for address space protection.

In this case, the instruction generates an address of 329048, while the base register value is 256400 and the limit register value is 128680.

To determine the address used by the memory subsystem to fetch the data, we need to check if the generated address falls within the range specified by the base and limit registers.

The address is within the range if:
(base register value) ≤ (generated address) ≤ (base register value + limit register value)

In this case:
256400 ≤ 329048 ≤ 256400 + 128680

Simplifying:
256400 ≤ 329048 ≤ 385080

Since 329048 satisfies this condition, the memory subsystem will use this address to fetch the data.

To know more about memory subsystem, visit:

https://brainly.com/question/32353027

#SPJ11



Other Questions
The process of identifying the specific effects of economic events on the accounting equation is referred to as? You are a school psychologist at a large urban high school. You have noticed that students of color consistently score lower in standard IQ tests and are then often referred for special education programs. Cite some of the reasons for this tendency and share some ways in which you mightrespond that reflect cultural competence. Given the function f(x) = 4 2x, find f(3r 1). Use the universal property of the tensor product to show that: given linear maps T: V W and T: V W we get a well defined linear map T T: V V with the property that (T T) (v V) = T (v) W 0 W T (v) for all v V, V V Technology has changed the traditional way of doing retail business. Identify some of the technologies are in use in seven-eleven store. What are the impacts of technology on the supply chain and retail operations employed by the Seven-Eleven Japan case? Question 1 of 10What is the slope of the line plotted below?B. 2510C. 1O A. 0.59OD. -0.55 The antidepressant drugs Prozac, Zoloft, and Paxil are all examples of which of the following? O tricyclics OSSRIs O MAO inhibitors O benzodiazepines A village P is 12 km from village Q. It takes 3 hours 20 minutes to travel from Q to P and back to Q by a boat. If the boat travels at a speed of 6 km/h from P to Q and (6 + x) km/h back to P, find the value of x. List three things you could do or suggest to a friend to end an unhealthy relationship. solve the Propagation of Error problemshave to report the volume as V = (7.50.2) x 102 c error/uncertainty was rounded to one digit and the mean/best-value was rou (the tens place).I Now that you have had a brief refresher and some examples, it is your turn to1. Show that for f(x,y)=x+y, or = o+of2. Show that for f(x,y)=x-y, or =o+a3. Show that for f(x,y)=y-x, or = +034. Show that for f(x,y,z)=xyz,-+*+5. Show that for f(x, y) =6. Show that for f(x,y) = ?, (x+(73)*+7. Use the h's given in the first example to compute the mean, standard de error. Do this by making a table:h(cm)h-h(cm) Hoover Dam on the Colorado River is the highest dam in the United States at 221 m, with an output of 1300MW. The dam generates electricity with water taken from a depth of 151 m and an average flow rate of 620 m 3/s. (a) Calculate the power in this flow. Report your answer in Megawatts 1,000,000 W =1MW 25. Hoover Dam on the Colorado River is the highest dam in the United States at 221 m, with an output of 1300MW. The dam generates electricity with water taken from a depth of 150 m and an average flow rate of 650 m 3/s. (a) Calculate the power in this flow. (b) What is the ratio of this power to the facility's average of 680 MW? (These are the same values as the regular homework assignment) The ratio is 2.12 The ratio is 1.41 The ratio is 0.71 The ratio is 0.47 According to the framework presented, which of the following is FALSE about culture's role in personality?a. culture shapes the nature of characteristic adaptationsb. culture influences the way personal narratives are constructedc. culture changes dispositionsd. culture changes the way dispositions are expressed behaviorally Question 1-110 A control mass of 0.4kmol of an ideal gas is at an initial pressure of 2 bar and a temperature of 140 C. The system undergoes two sequential processes, firstly an isobaric expansion from the initial State-1 to State-2, in which the volume is increased by a factor of 3.6. This is then followed by an isothermal expansion from State-2 to the final condition, State-3, in which the volume is increased by a further factor of 2 . Universal gas constant, R u =8.314 kJ/(kmol K) Determine the pressure at state point 3.{0 dp\} [Units: kPa] How might Freudian theorists use the psychosexual stages to explain obsessive-compulsive- disorder? An object of mass 0.2 kg is hung from a spring whose spring constant is 80 N/m. The object is subject to a resistive force given by - b, where is its velocity in meters per second and b = 4 Nm-sec. (a) Set up differnetial equation of motion for free oscillations of the system and find the period of such oscillations. (b)The object is subjected to a sinusoidal driving force given by F(t) = Fosin(wt), where Fo = 2 N and w = 30 sec-1. In the steady state, what is the amplitude of the forced oscillation? (c) Find Q for the system - is the system underdamped, overdamped or critically damped? (d) What is the mean power input? (e) What is the energy An initially-stationary electric dipole of dipole moment=(5.001010Cm)1placed in an electric field=(2.00106N/C)I+(2.00106N/C)j. What is the magnitude of the maximum torque that the electric field exerts on the dipole in units of103Nnm?1.402.800.001.00 What is the expected return on a portfolio that will decline in value by 10% in a recession, will increase by 15% in normal times, and will increase by 20% during boom times? Each scenario has an equal likelihood of occurrence. 8.33% 3.38% 11.00% 18.33% A golf ball with mass 5.0 x 10^-2 kg is struck with a cluband leaves the club face with a velocity of +44m/s. find themagnitude of the impulse due to Collison How do the vibrational and rotational levels of heavy hydrogen (D) molecules compare with those of H molecules? A login password consists of 4 letters followed by 2 numbers.Assume that the password is not case-sensitive. (a) How manydifferent passwords are there that end with 2? (b) How manydifferent passwor