SlideShare a Scribd company logo
1 of 21
Major Event
SEC420 Major Event Protection
Name
Class
Date
Professor
Major Event Protection
At a major concert being held at an outdoor venue security
vulnerabilities must be first assessed before the artist can
perform as well as to ensure the safety of concert goers and
concert staff. A major concert is a large venue that requires
adequate security be present to police the thousands of people
in an attendance but other smaller security details must also be
addressed. Before an effective security plan can be developed a
security assessment must first be conducted. The security
assessment will identify the security needs for the major
outdoor concert event and identify security weaknesses and gaps
that must be addressed.
In this case the major concert will involve a country
superstar and will be held at the local outdoor amphitheatre.
The amphitheatre is large and will hold up to 20,000 concert
goers. The outdoor amphitheatre includes a large stage with
underground offices, dressing rooms, and security stations that
hold concert staff, artists and crew, and security personnel.
There are eight different potential entry points into the venue
wit tow of these points being off limits to concert goers. These
areas are restricted and only accessible to artists, their
entourage, and security personnel as well as concert staffers.
One entrance is used for suppliers and retailers.
Preplanning Stage
At a major concert venue, that will be held outside there are
many potential security risks that will present themselves
requiring an effective assessment in order to develop a
comprehensive security plan. The security assessment of the
concert venue begins with assessment planning that involves
determining who, what, and where the assessment will be
conducted (Bickel, 2007). When an event, such as a major
concert, will be occurring planning should begin months before
the event. There are many small and large details that must first
be addressed and assessed before the concert can occur.
The planning stage also involves determining the budget
including available resources and cost of properly securing the
venue as well as the logistics of ensuring every aspect of the
security are addressed. If every detail of the security plan is not
preplanned the security plan cannot be effective. For example if
the security plan included security all gates entrances but failed
to secure the area where the artist prepare the security plan is
ineffective. The planning stage also involves conducting the
risk and threat assessments. The risk assessment provides
answers on potential security risks while the threat assessment
identifies potential security threats.
The risk and threat assessments will assist security staff in
identifying potential threats, such as the regular crimes
committed that could occur at the concert venue that include
theft, gang activity, and vandalism or potential threats due to
disasters out of the control of the security staff, such as fires or
severe and dangerous weather. Understanding the risks will
allow the security staff to budget properly by identifying
necessary resources and ensure the appropriate measures are in
place to prevent the potential threat. Threat and risk assessment
cover the categories of harm to people, harm to property, and
liability to concert venue.
Security Plan
The security plan will involve many different aspects that
will need to be addressed. First is securing the outer perimeter
of the amphitheatres. This means preventing people that have
not paid for the concert from entering the venue as well as
controlling traffic into the concert venue. With a venue that
holds well over 20,000 concert goers there will be a definite
need to ensure all parking and traffic issues have been
preplanned for and addressed. This includes employing the
services of local law enforcement to ensure that there are not
traffic issues and that concert goers can park without any
challenges or accidents. The Security chief will run security
operations from the security operations center which includes
the video surveillance center.
Security the outer perimeter means ensuring that no
unauthorized personnel enter the area. This will include placing
security gates at each entrance that contain security personnel
that are charged with providing assistance to law enforcement
directing traffic and preventing any unwanted guest from
entering the area (Shuster, 2003). Barricades will be used to
ensure traffic does not enter any unauthorized areas. Other
responding personnel that will be present at the concert venue
include medical personnel in the event there is a medical
emergency as well as the local fire department t respond to fires
or any other potential catastrophe.
The parking areas of the concert venue will also need to be
secured. The security plan will ensure that the parking areas are
well lit and that security members are present to deter any
potential theft or damage coming to the vehicles of con cert
goers. Concert goers are also required to pay for parking at the
concert venue if they want to leave their vehicle in a secured
parking lot. Security guards will be in place in order to charge
customers and to deter any potential conflicts. Separate parking
lots will be available for artist, security personnel, and concert
staff.
The next security concern that must be addressed involves
the entrance gates. Due to the large population of concert goers
there will need to be security in place to ensure concert goers
enter the building in a uniform and orderly manner. Concert
goers will also need to be checked for weapons, drugs, or
alcohol. Security will be placed at one of the five entrances that
will be used by concert goers to ensure there is no chaos or
conflict and to ensure that no one enter with contraband. Each
door will contain a security guard that will take the concert
goers ticket and scan it to authentic its genuineness before the
concert goers will stop at a station to have bags checked.
Once concert goers enter into the amphitheatre they can be
seated on the outdoor bleachers or sit on the grass down by the
stage area. Due to the large size of the venue and the large
population of concert goers’ security will be placed in strategic
points all throughout the venue. Some security officers will be
stationary while other security officers will patrol the concert
area to deter any criminal or offensive behavior. Security within
the concert venue also includes placing video cameras
strategically throughout the venue to be alerted of any
disturbances or crimes as well as having security guards to
monitor the surveillance network. Security personnel with keep
in touch using walkie-talkies
Under the concert stage is the security personnel offices,
concert staff offices, and a private area for the artists and their
entourage. An essential aspect of the security plan is securing
this area in order to ensure there are no intrusions. The country
music star playing at the concert is one of the most important
people at the concert. Their security is essential. The first steps
that will be taken to secure the artist are placing two
bodyguards with the artist at all times. The bodyguards will
meet the artist at the entrance after they reach the parking lot
and will be responsible for securing the artists the entire time
they are present in the building. The artist’s band will be
escorted by security staff to a secured area where they can
prepare for the concert.
The artist will be escorted to their dressing rooms by their
personal bodyguards while other security guards placed at the
entrances of the venue will ensure that no unauthorized
personnel enter the underground area. Door at the entrances will
only be opened through a keyless entry system. Authorized
personnel will have cards that will give them access to areas
that are secured. Once the country artist is ready to travel to the
stage they will be escorted by their bodyguards and other
security personnel to ensure they reach the stage safely and
without incident.
Once the concert begins security staff will be stationed
around the edge of the stage to prevent concert goers from
hurling their bodies onto the stage and causing harm to the
artist or their band. The security staff will also patrol the
concert venue as well as stationary security will police
entrances and exits until the concert is over. Once the concert
ends the artists and band members will be escorted to the
downstairs offices and escorted to the dressing rooms. The artist
bodyguards will remain with the artist until they leave the
venue in the transportation they arrived in. The rest of the artist
entourage will also be escorted from the building and securely
placed in leaving transportation.
Once the concert stops the concert goers will begin exiting
the concert venue. The security staff will be responsible for
policing exits to ensure concert goers leave the building in an
orderly fashion and if any conflicts security staff will be present
to address these issues. Security staff in parking lots will police
exiting concert goers while law enforcement will be responsible
for monitoring the high rate of traffic that will be occurring as
tens of thousands of concert goers exit the venue.
Security staff within the venue will be responsible for
ensuring all concert goers have left the venue and it has been
properly secured. Security staff will need to check all of the
bleacher, bathrooms, and any other possible places that
unauthorized concert goers may still be present. Security
personnel will also need to secure the perimeter of the concert
venue by ensuring all persons have left the area and all vehicles
have been removed from the concert venue parking lots.
When working with VIPs at a concert event it is essential to
ensure security is heightened. Fans can be dangerous and will
go to any length to come into contact with the country music
artist. By security the area in which the artist is contained and
placing person security guards with the country artist will
ensure their security. Once the artist is on stage they are once
again vulnerable and will need comprehensive security in place.
If the artist cannot be properly secured the concert venue would
have difficulty booking further artist and will lose money.
Security for the concert venue and the VIP artist ensure
everyone’s safety.
References
Bickel, K. (2007). Planning and Managing Security for Major
Special Events: Best Practices for
Law Enforcement Administrators. Retrieved March 10, 2013
from
http://www.policechiefmagazine.org/magazine/index.cfm?fuseac
tion=display_arch&article
Shuster, R. (2003). Security Strategies for Special Events.
Retrieved March 10, 2013 from
http://specialevents.com/mag/meetings_security_strategies_spec
ial
Assignment 2
This assignment should be completed after Chapter 7. It
contributes 5% towards your final grade. Remember to show all
your work as partial marks may be awarded.
Problem 1 (50 marks)
Balance Sheets
December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Assets:
Cash
$ 62,500
$ 25,000
Accounts receivable
187,500
200,000
Inventories
225,000
125,000
Equipment
6,250,000
3,375,000
Accumulated amortization
(2,212,500)
(1,550,000)
Investment in Aster Ltd.
1,000,000
-
Other investments
125,000
____-____
Total assets
$5,637,500
$2,175,000
Liabilities and Shareholders’ Equity
Accounts payable
$ 562,500
$ 250,000
Bonds payable
375,000
625,000
Total liabilities
937,500
875,000
Common shares
1,500,000
375,000
Retained earnings
3,200,000
925,000
Total shareholders’ equity
4,700,000
1,300,000
Total liabilities and shareholders’ equity
$5,637,500
$2,175,000
Income Statements
Year Ended December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Sales revenue
$2,500,000
$1,875,000
Royalty revenue
187,500
-
Dividend income
93,750
____-____
Total revenue
2,781,250
1,875,000
Cost of sales
1,500,000
1,125,000
Other expenses
700,000
513,750
Total expenses
2,200,000
1,638,750
Net income
$ 581,250
$ 236,250
Statements of Retained Earnings
December 31, 20X6
Peony
Ltd.
Aster
Ltd.
Retained earnings, beginning of year
$2,993,750
$ 801,250
Net income
581,250
236,250
Dividends declared
(375,000)
(112,500)
Retained earnings, end of year
$3,200,000
$ 925,000
· At January 1, 20X1, Peony Ltd. acquired 80% of the common
shares of Aster Ltd. by issuing 500,000 Peony common shares
valued at $2 per share. This resulted in Peony having 1,500,000
issued and outstanding shares.
· Peony has provided the following information about Aster at
the acquisition date:
Aster’s shareholders’ equity consisted of the following:
Common shares $375,000
Retained earnings 693,750
Fair value of Aster’s net identifiable assets equalled their
carrying value, with the exception of the following items:
Excess of fair value
over carrying value:
Inventories $ 12,500
Equipment 93,750
Investments 12,500
The accumulated amortization on the equipment was $718,750.
The equipment is amortized on a straight-line basis. At the
acquisition date, the equipment is estimated to have a remaining
life of 10 years with no residual value.
· In 20X3, Aster sold its investments to parties outside the
consolidated entity for $56,250 over carrying value.
· From the acquisition date to December 31, 20X5, Aster paid
royalties of $625,000 to Peony. During 20X6, Aster paid
$112,500 in royalties to Peony.
· At the beginning of 20X4, Peony purchased some equipment
from Aster for $113,750. Aster had originally acquired the
equipment for $125,000 and was amortizing it at a rate of
$12,500 per year. When Aster sold the equipment to Peony, it
had a carrying value of $87,500. At that time, Peony estimated
that the equipment had a remaining life of 7 years and started
amortizing the equipment in 20X4, using the straight-line
method with no residual value.
· At December 31, 20X5, Aster’s inventory included $25,000 of
goods purchased from Peony. Peony’s gross margin on the sale
was 40%. The goods were sold to third parties in 20X6.
· At December 31, 20X5, Peony’s inventory included $125,000
of goods purchased from Aster. Aster’s gross margin on the
sale was 40%. The goods were sold to third parties in 20X6.
· During 20X6, Peony sold goods to Aster for $125,000.
Peony’s gross margin on the sale was 40%. At December 31,
20X6, $50,000 of the goods are still in Aster’s inventory.
· During 20X6, Aster sold goods to Peony for $875,000.
Aster’s gross margin on the sale was 40%. At December 31,
20X6, $87,500 of the goods are still in Peony’s inventory.
· Peony uses the entity method to report business combinations.
Required:
Prepare the consolidated financial statements for Peony at
December 31, 20X6 using the direct method. Show all your
work. Ignore income taxes.
Problem 2 (35 marks)
On January 1, 20X4, Chee Co. purchased 80% of the
outstanding shares of Tyme Ltd. for $2,000,000 in cash. On the
acquisition date, Tyme’s shareholders’ equity consisted of the
following:
Common shares $1,600,000
Retained earnings 800,000
At the time of acquisition, the carrying values of Tyme’s
identifiable net assets equalled their fair market values with the
following exceptions:
· The fair value of a building with an estimated remaining life
of 10 years was $480,000 less than its carrying value.
· A long-term liability that matures in 8 years has a fair value
that is $400,000 less than its carrying value.
The condensed income statements for Chee and Tyme are
presented below:
Income Statements
Year ended December 31, 20X8
Chee Co.
Tyme Ltd.
Sales
$1,600,000
$ 720,000
Investment income
800,000
80,000
Gain on sale of land
___-___
54,400
Total revenue
2,400,000
854,400
Cost of goods sold
1,040,000
400,000
Other expenses
768,000
256,000
Total expenses
1,808,000
656,000
Net income
$ 592,000
$ 198,400
Additional information:
· At the beginning of 20X5, Chee acquired a piece of equipment
from Tyme for $168,000. Tyme had purchased the equipment 5
years ago for $320,000. When Tyme purchased the equipment,
it had expected that it would have a useful life of 20 years, with
no residual value. Chee concurred with this estimate (i.e., at
the time of purchase, Chee expected that the equipment would
have a remaining useful life of 15 years). Both Tyme and Chee
use the straight-line method of amortization.
· Sale of goods from Chee to Tyme:
Gross Unsold Goods in Tyme’s
YearSalesMarginInventory at Year-End
20X7 $400,000 30% $80,000
20X8 320,000 30% 72,000
· Sale of goods from Tyme to Chee:
Gross Unsold Goods in Chee’s
YearSalesMarginInventory at Year-End
20X7 $240,000 40% $56,000
20X8 200,000 40% 48,000
· All goods in inventory at year-end were sold to third parties in
the subsequent year.
· On August 31, 20X8, Chee purchased a tract of land from
Tyme for $106,400 in cash. Tyme had acquired the land 12
years previously for $52,000.
· During 20X8, Chee declared and paid dividends of $200,000
and Tyme declared and paid dividends of $32,000.
· There was no impairment of goodwill at the end of 20X8.
· Chee accounts for its investments using the cost method and
uses the entity theory method to report its business
combinations.
Required:
a) Prepare a consolidated income statement for Chee Co. for the
year ended December 31, 20X8. Be sure to show your
supporting calculations. (25 marks)
b) Prove that your calculation of net income attributable to the
shareholders of Chee Co. in (a) is correct by calculating Chee’s
net income using the equity method. (10 marks)
Ignore income taxes.
Problem 3 (15 marks)
At the beginning of 20X3, Jong Ltd. acquired 80% of the
outstanding shares of Nye Co. for $1,400,000. At the
acquisition date, Nye’s shareholders’ equity consisted of the
following:
Common shares $350,000
Retained earnings 875,000
At the time of acquisition, all of Nye’s net identifiable assets
had carrying values that equalled their fair values with the
exception of its patents. The fair value of the patents exceeded
their carrying values by $525,000 and had a remaining life of 8
years.
The trial balances for Jong and Nye for December 31, 20X6 are
as follows:
Jong Ltd. Nye Co.
DR
CR
DR
CR
Cash
700,000
350,000
Accounts receivable
1,400,000
249,200
Inventory
2,100,000
1,575,000
Plant and equipment
9,800,000
1,750,000
Accumulated amortization
2,800,000
700,000
Patents
280,000
Investment in Nye
1,400,000
Investment in Jong bonds
170,800
Accounts payable
1,744,400
1,734,950
Bonds payable
350,000
Premium on bonds payable
5,600
Common shares
3,150,000
350,000
Retained earnings
7,000,000
1,400,000
Dividends
420,000
175,000
Sales
3,430,000
1,400,000
Dividend revenue
140,000
Interest revenue
15,050
Cost of goods sold
1,680,000
595,000
Operating expenses
673,400
210,000
Interest expense
26,600
Income tax expense
420,000
_________
245,000
________
18,620,000
18,620,000
5,600,000
5,600,000
Additional information:
· 20X6 net income for Jong is $770,000 and for Nye, $365,050.
· At the beginning of 20X6, Jong purchased a piece of
equipment from Nye for $350,000. At the time of purchase, the
equipment had a net book value of $280,000 to Nye and an
estimated useful life of 5 years.
· At the end of 20X5, Jong’s inventory included $350,000 of
goods purchased from Nye. Nye’s had recorded a gross profit
of $140,000 on this sale.
· During 20X6, Nye sold goods to Jong for $700,000. Nye
earned a gross profit of $280,000 on this sale.
· At the end of 20X6, Jong had sold all the goods in its opening
inventory to third parties but still had $210,000 of the goods
purchased from Nye during 20X6 in its ending inventory. All of
those goods will be sold to third parties in 20X7.
· Amortization expense for the plant, equipment, and patent are
included in operating expenses.
· At the beginning of 20X4, Jong issued bonds for $359,800.
These bonds have an interest rate of 8%, mature in 7 years, and
have a face value of $350,000. Interest will be paid annually at
the end of the year. Nye purchased half of these bonds at the
beginning of 20X6 for $169,750. Any intercompany gains or
losses on these bonds are to be allocated between the two
companies.
· Both companies have an average income tax rate of 40%.
Required:
Assume that Jong used the equity method of accounting for its
investment in Nye instead of the cost method. Calculate the
balance of its “Investment in Nye” account.
ACCT451v11 Assignment 2 April 30/2014
Major Event       SEC420 Major Event Pro.docx

More Related Content

More from infantsuk

Please click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docxPlease click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docxinfantsuk
 
Please choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docxPlease choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docxinfantsuk
 
Please answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docxPlease answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docxinfantsuk
 
Please answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docxPlease answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docxinfantsuk
 
Please answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docxPlease answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docxinfantsuk
 
Please answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docxPlease answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docxinfantsuk
 
Please answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docxPlease answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docxinfantsuk
 
Please answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docxPlease answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docxinfantsuk
 
Please answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docxPlease answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docxinfantsuk
 
Please answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docxPlease answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docxinfantsuk
 
please answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docxplease answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docxinfantsuk
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxinfantsuk
 
Please answer the 10 essay questions from the list below. each q.docx
Please answer the 10 essay questions from the list below. each q.docxPlease answer the 10 essay questions from the list below. each q.docx
Please answer the 10 essay questions from the list below. each q.docxinfantsuk
 
Please answer the below questions. The format is like a question and.docx
Please answer the below questions. The format is like a question and.docxPlease answer the below questions. The format is like a question and.docx
Please answer the below questions. The format is like a question and.docxinfantsuk
 
Please answer the following with a minimum of at least 200 words. Be.docx
Please answer the following with a minimum of at least 200 words. Be.docxPlease answer the following with a minimum of at least 200 words. Be.docx
Please answer the following with a minimum of at least 200 words. Be.docxinfantsuk
 
Please answer the following subjects. Attached is the article in ord.docx
Please answer the following subjects. Attached is the article in ord.docxPlease answer the following subjects. Attached is the article in ord.docx
Please answer the following subjects. Attached is the article in ord.docxinfantsuk
 
Please answer the following questions using APA-6th-Edition-Templ.docx
Please answer the following questions using APA-6th-Edition-Templ.docxPlease answer the following questions using APA-6th-Edition-Templ.docx
Please answer the following questions using APA-6th-Edition-Templ.docxinfantsuk
 
Please answer questions very thoroughly as a graduate student. APA s.docx
Please answer questions very thoroughly as a graduate student. APA s.docxPlease answer questions very thoroughly as a graduate student. APA s.docx
Please answer questions very thoroughly as a graduate student. APA s.docxinfantsuk
 
Please answer each question separately. Each question must be .docx
Please answer each question separately. Each question must be .docxPlease answer each question separately. Each question must be .docx
Please answer each question separately. Each question must be .docxinfantsuk
 
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docx
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docxPLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docx
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docxinfantsuk
 

More from infantsuk (20)

Please click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docxPlease click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docx
 
Please choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docxPlease choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docx
 
Please answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docxPlease answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docx
 
Please answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docxPlease answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docx
 
Please answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docxPlease answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docx
 
Please answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docxPlease answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docx
 
Please answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docxPlease answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docx
 
Please answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docxPlease answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docx
 
Please answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docxPlease answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docx
 
Please answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docxPlease answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docx
 
please answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docxplease answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docx
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docx
 
Please answer the 10 essay questions from the list below. each q.docx
Please answer the 10 essay questions from the list below. each q.docxPlease answer the 10 essay questions from the list below. each q.docx
Please answer the 10 essay questions from the list below. each q.docx
 
Please answer the below questions. The format is like a question and.docx
Please answer the below questions. The format is like a question and.docxPlease answer the below questions. The format is like a question and.docx
Please answer the below questions. The format is like a question and.docx
 
Please answer the following with a minimum of at least 200 words. Be.docx
Please answer the following with a minimum of at least 200 words. Be.docxPlease answer the following with a minimum of at least 200 words. Be.docx
Please answer the following with a minimum of at least 200 words. Be.docx
 
Please answer the following subjects. Attached is the article in ord.docx
Please answer the following subjects. Attached is the article in ord.docxPlease answer the following subjects. Attached is the article in ord.docx
Please answer the following subjects. Attached is the article in ord.docx
 
Please answer the following questions using APA-6th-Edition-Templ.docx
Please answer the following questions using APA-6th-Edition-Templ.docxPlease answer the following questions using APA-6th-Edition-Templ.docx
Please answer the following questions using APA-6th-Edition-Templ.docx
 
Please answer questions very thoroughly as a graduate student. APA s.docx
Please answer questions very thoroughly as a graduate student. APA s.docxPlease answer questions very thoroughly as a graduate student. APA s.docx
Please answer questions very thoroughly as a graduate student. APA s.docx
 
Please answer each question separately. Each question must be .docx
Please answer each question separately. Each question must be .docxPlease answer each question separately. Each question must be .docx
Please answer each question separately. Each question must be .docx
 
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docx
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docxPLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docx
PLEASE ALWAYS INCLUDE CONCLUSION AT THE END OF EACH WRITTEN ASSI.docx
 

Recently uploaded

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Recently uploaded (20)

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Major Event SEC420 Major Event Pro.docx

  • 1. Major Event SEC420 Major Event Protection Name Class Date Professor Major Event Protection At a major concert being held at an outdoor venue security vulnerabilities must be first assessed before the artist can perform as well as to ensure the safety of concert goers and concert staff. A major concert is a large venue that requires adequate security be present to police the thousands of people in an attendance but other smaller security details must also be
  • 2. addressed. Before an effective security plan can be developed a security assessment must first be conducted. The security assessment will identify the security needs for the major outdoor concert event and identify security weaknesses and gaps that must be addressed. In this case the major concert will involve a country superstar and will be held at the local outdoor amphitheatre. The amphitheatre is large and will hold up to 20,000 concert goers. The outdoor amphitheatre includes a large stage with underground offices, dressing rooms, and security stations that hold concert staff, artists and crew, and security personnel. There are eight different potential entry points into the venue wit tow of these points being off limits to concert goers. These areas are restricted and only accessible to artists, their entourage, and security personnel as well as concert staffers. One entrance is used for suppliers and retailers. Preplanning Stage At a major concert venue, that will be held outside there are many potential security risks that will present themselves requiring an effective assessment in order to develop a comprehensive security plan. The security assessment of the concert venue begins with assessment planning that involves determining who, what, and where the assessment will be conducted (Bickel, 2007). When an event, such as a major concert, will be occurring planning should begin months before the event. There are many small and large details that must first be addressed and assessed before the concert can occur. The planning stage also involves determining the budget including available resources and cost of properly securing the venue as well as the logistics of ensuring every aspect of the security are addressed. If every detail of the security plan is not preplanned the security plan cannot be effective. For example if the security plan included security all gates entrances but failed to secure the area where the artist prepare the security plan is ineffective. The planning stage also involves conducting the risk and threat assessments. The risk assessment provides
  • 3. answers on potential security risks while the threat assessment identifies potential security threats. The risk and threat assessments will assist security staff in identifying potential threats, such as the regular crimes committed that could occur at the concert venue that include theft, gang activity, and vandalism or potential threats due to disasters out of the control of the security staff, such as fires or severe and dangerous weather. Understanding the risks will allow the security staff to budget properly by identifying necessary resources and ensure the appropriate measures are in place to prevent the potential threat. Threat and risk assessment cover the categories of harm to people, harm to property, and liability to concert venue. Security Plan The security plan will involve many different aspects that will need to be addressed. First is securing the outer perimeter of the amphitheatres. This means preventing people that have not paid for the concert from entering the venue as well as controlling traffic into the concert venue. With a venue that holds well over 20,000 concert goers there will be a definite need to ensure all parking and traffic issues have been preplanned for and addressed. This includes employing the services of local law enforcement to ensure that there are not traffic issues and that concert goers can park without any challenges or accidents. The Security chief will run security operations from the security operations center which includes the video surveillance center. Security the outer perimeter means ensuring that no unauthorized personnel enter the area. This will include placing security gates at each entrance that contain security personnel that are charged with providing assistance to law enforcement directing traffic and preventing any unwanted guest from entering the area (Shuster, 2003). Barricades will be used to ensure traffic does not enter any unauthorized areas. Other responding personnel that will be present at the concert venue include medical personnel in the event there is a medical
  • 4. emergency as well as the local fire department t respond to fires or any other potential catastrophe. The parking areas of the concert venue will also need to be secured. The security plan will ensure that the parking areas are well lit and that security members are present to deter any potential theft or damage coming to the vehicles of con cert goers. Concert goers are also required to pay for parking at the concert venue if they want to leave their vehicle in a secured parking lot. Security guards will be in place in order to charge customers and to deter any potential conflicts. Separate parking lots will be available for artist, security personnel, and concert staff. The next security concern that must be addressed involves the entrance gates. Due to the large population of concert goers there will need to be security in place to ensure concert goers enter the building in a uniform and orderly manner. Concert goers will also need to be checked for weapons, drugs, or alcohol. Security will be placed at one of the five entrances that will be used by concert goers to ensure there is no chaos or conflict and to ensure that no one enter with contraband. Each door will contain a security guard that will take the concert goers ticket and scan it to authentic its genuineness before the concert goers will stop at a station to have bags checked. Once concert goers enter into the amphitheatre they can be seated on the outdoor bleachers or sit on the grass down by the stage area. Due to the large size of the venue and the large population of concert goers’ security will be placed in strategic points all throughout the venue. Some security officers will be stationary while other security officers will patrol the concert area to deter any criminal or offensive behavior. Security within the concert venue also includes placing video cameras strategically throughout the venue to be alerted of any disturbances or crimes as well as having security guards to monitor the surveillance network. Security personnel with keep in touch using walkie-talkies Under the concert stage is the security personnel offices,
  • 5. concert staff offices, and a private area for the artists and their entourage. An essential aspect of the security plan is securing this area in order to ensure there are no intrusions. The country music star playing at the concert is one of the most important people at the concert. Their security is essential. The first steps that will be taken to secure the artist are placing two bodyguards with the artist at all times. The bodyguards will meet the artist at the entrance after they reach the parking lot and will be responsible for securing the artists the entire time they are present in the building. The artist’s band will be escorted by security staff to a secured area where they can prepare for the concert. The artist will be escorted to their dressing rooms by their personal bodyguards while other security guards placed at the entrances of the venue will ensure that no unauthorized personnel enter the underground area. Door at the entrances will only be opened through a keyless entry system. Authorized personnel will have cards that will give them access to areas that are secured. Once the country artist is ready to travel to the stage they will be escorted by their bodyguards and other security personnel to ensure they reach the stage safely and without incident. Once the concert begins security staff will be stationed around the edge of the stage to prevent concert goers from hurling their bodies onto the stage and causing harm to the artist or their band. The security staff will also patrol the concert venue as well as stationary security will police entrances and exits until the concert is over. Once the concert ends the artists and band members will be escorted to the downstairs offices and escorted to the dressing rooms. The artist bodyguards will remain with the artist until they leave the venue in the transportation they arrived in. The rest of the artist entourage will also be escorted from the building and securely placed in leaving transportation. Once the concert stops the concert goers will begin exiting the concert venue. The security staff will be responsible for
  • 6. policing exits to ensure concert goers leave the building in an orderly fashion and if any conflicts security staff will be present to address these issues. Security staff in parking lots will police exiting concert goers while law enforcement will be responsible for monitoring the high rate of traffic that will be occurring as tens of thousands of concert goers exit the venue. Security staff within the venue will be responsible for ensuring all concert goers have left the venue and it has been properly secured. Security staff will need to check all of the bleacher, bathrooms, and any other possible places that unauthorized concert goers may still be present. Security personnel will also need to secure the perimeter of the concert venue by ensuring all persons have left the area and all vehicles have been removed from the concert venue parking lots. When working with VIPs at a concert event it is essential to ensure security is heightened. Fans can be dangerous and will go to any length to come into contact with the country music artist. By security the area in which the artist is contained and placing person security guards with the country artist will ensure their security. Once the artist is on stage they are once again vulnerable and will need comprehensive security in place. If the artist cannot be properly secured the concert venue would have difficulty booking further artist and will lose money. Security for the concert venue and the VIP artist ensure everyone’s safety. References
  • 7. Bickel, K. (2007). Planning and Managing Security for Major Special Events: Best Practices for Law Enforcement Administrators. Retrieved March 10, 2013 from http://www.policechiefmagazine.org/magazine/index.cfm?fuseac tion=display_arch&article Shuster, R. (2003). Security Strategies for Special Events. Retrieved March 10, 2013 from http://specialevents.com/mag/meetings_security_strategies_spec ial Assignment 2 This assignment should be completed after Chapter 7. It contributes 5% towards your final grade. Remember to show all your work as partial marks may be awarded. Problem 1 (50 marks) Balance Sheets December 31, 20X6 Peony Ltd. Aster Ltd. Assets:
  • 8. Cash $ 62,500 $ 25,000 Accounts receivable 187,500 200,000 Inventories 225,000 125,000 Equipment 6,250,000 3,375,000 Accumulated amortization (2,212,500) (1,550,000) Investment in Aster Ltd. 1,000,000 - Other investments 125,000 ____-____ Total assets $5,637,500 $2,175,000 Liabilities and Shareholders’ Equity Accounts payable $ 562,500 $ 250,000 Bonds payable 375,000 625,000 Total liabilities 937,500
  • 9. 875,000 Common shares 1,500,000 375,000 Retained earnings 3,200,000 925,000 Total shareholders’ equity 4,700,000 1,300,000 Total liabilities and shareholders’ equity $5,637,500 $2,175,000 Income Statements Year Ended December 31, 20X6 Peony Ltd. Aster Ltd. Sales revenue $2,500,000 $1,875,000 Royalty revenue 187,500 - Dividend income 93,750 ____-____ Total revenue 2,781,250 1,875,000 Cost of sales
  • 10. 1,500,000 1,125,000 Other expenses 700,000 513,750 Total expenses 2,200,000 1,638,750 Net income $ 581,250 $ 236,250 Statements of Retained Earnings December 31, 20X6 Peony Ltd. Aster Ltd. Retained earnings, beginning of year $2,993,750 $ 801,250 Net income 581,250 236,250 Dividends declared (375,000) (112,500) Retained earnings, end of year $3,200,000 $ 925,000 · At January 1, 20X1, Peony Ltd. acquired 80% of the common shares of Aster Ltd. by issuing 500,000 Peony common shares valued at $2 per share. This resulted in Peony having 1,500,000
  • 11. issued and outstanding shares. · Peony has provided the following information about Aster at the acquisition date: Aster’s shareholders’ equity consisted of the following: Common shares $375,000 Retained earnings 693,750 Fair value of Aster’s net identifiable assets equalled their carrying value, with the exception of the following items: Excess of fair value over carrying value: Inventories $ 12,500 Equipment 93,750 Investments 12,500 The accumulated amortization on the equipment was $718,750. The equipment is amortized on a straight-line basis. At the acquisition date, the equipment is estimated to have a remaining life of 10 years with no residual value. · In 20X3, Aster sold its investments to parties outside the consolidated entity for $56,250 over carrying value. · From the acquisition date to December 31, 20X5, Aster paid royalties of $625,000 to Peony. During 20X6, Aster paid $112,500 in royalties to Peony.
  • 12. · At the beginning of 20X4, Peony purchased some equipment from Aster for $113,750. Aster had originally acquired the equipment for $125,000 and was amortizing it at a rate of $12,500 per year. When Aster sold the equipment to Peony, it had a carrying value of $87,500. At that time, Peony estimated that the equipment had a remaining life of 7 years and started amortizing the equipment in 20X4, using the straight-line method with no residual value. · At December 31, 20X5, Aster’s inventory included $25,000 of goods purchased from Peony. Peony’s gross margin on the sale was 40%. The goods were sold to third parties in 20X6. · At December 31, 20X5, Peony’s inventory included $125,000 of goods purchased from Aster. Aster’s gross margin on the sale was 40%. The goods were sold to third parties in 20X6. · During 20X6, Peony sold goods to Aster for $125,000. Peony’s gross margin on the sale was 40%. At December 31, 20X6, $50,000 of the goods are still in Aster’s inventory. · During 20X6, Aster sold goods to Peony for $875,000. Aster’s gross margin on the sale was 40%. At December 31, 20X6, $87,500 of the goods are still in Peony’s inventory. · Peony uses the entity method to report business combinations. Required: Prepare the consolidated financial statements for Peony at December 31, 20X6 using the direct method. Show all your work. Ignore income taxes. Problem 2 (35 marks)
  • 13. On January 1, 20X4, Chee Co. purchased 80% of the outstanding shares of Tyme Ltd. for $2,000,000 in cash. On the acquisition date, Tyme’s shareholders’ equity consisted of the following: Common shares $1,600,000 Retained earnings 800,000 At the time of acquisition, the carrying values of Tyme’s identifiable net assets equalled their fair market values with the following exceptions: · The fair value of a building with an estimated remaining life of 10 years was $480,000 less than its carrying value. · A long-term liability that matures in 8 years has a fair value that is $400,000 less than its carrying value. The condensed income statements for Chee and Tyme are presented below: Income Statements Year ended December 31, 20X8 Chee Co. Tyme Ltd. Sales $1,600,000 $ 720,000 Investment income 800,000 80,000 Gain on sale of land ___-___ 54,400 Total revenue
  • 14. 2,400,000 854,400 Cost of goods sold 1,040,000 400,000 Other expenses 768,000 256,000 Total expenses 1,808,000 656,000 Net income $ 592,000 $ 198,400 Additional information: · At the beginning of 20X5, Chee acquired a piece of equipment from Tyme for $168,000. Tyme had purchased the equipment 5 years ago for $320,000. When Tyme purchased the equipment, it had expected that it would have a useful life of 20 years, with no residual value. Chee concurred with this estimate (i.e., at the time of purchase, Chee expected that the equipment would have a remaining useful life of 15 years). Both Tyme and Chee use the straight-line method of amortization. · Sale of goods from Chee to Tyme: Gross Unsold Goods in Tyme’s YearSalesMarginInventory at Year-End 20X7 $400,000 30% $80,000 20X8 320,000 30% 72,000 · Sale of goods from Tyme to Chee: Gross Unsold Goods in Chee’s
  • 15. YearSalesMarginInventory at Year-End 20X7 $240,000 40% $56,000 20X8 200,000 40% 48,000 · All goods in inventory at year-end were sold to third parties in the subsequent year. · On August 31, 20X8, Chee purchased a tract of land from Tyme for $106,400 in cash. Tyme had acquired the land 12 years previously for $52,000. · During 20X8, Chee declared and paid dividends of $200,000 and Tyme declared and paid dividends of $32,000. · There was no impairment of goodwill at the end of 20X8. · Chee accounts for its investments using the cost method and uses the entity theory method to report its business combinations. Required: a) Prepare a consolidated income statement for Chee Co. for the year ended December 31, 20X8. Be sure to show your supporting calculations. (25 marks) b) Prove that your calculation of net income attributable to the shareholders of Chee Co. in (a) is correct by calculating Chee’s net income using the equity method. (10 marks) Ignore income taxes. Problem 3 (15 marks) At the beginning of 20X3, Jong Ltd. acquired 80% of the outstanding shares of Nye Co. for $1,400,000. At the acquisition date, Nye’s shareholders’ equity consisted of the following:
  • 16. Common shares $350,000 Retained earnings 875,000 At the time of acquisition, all of Nye’s net identifiable assets had carrying values that equalled their fair values with the exception of its patents. The fair value of the patents exceeded their carrying values by $525,000 and had a remaining life of 8 years. The trial balances for Jong and Nye for December 31, 20X6 are as follows: Jong Ltd. Nye Co. DR CR DR CR Cash 700,000 350,000 Accounts receivable 1,400,000 249,200 Inventory 2,100,000 1,575,000 Plant and equipment 9,800,000
  • 17. 1,750,000 Accumulated amortization 2,800,000 700,000 Patents 280,000 Investment in Nye 1,400,000 Investment in Jong bonds 170,800 Accounts payable 1,744,400 1,734,950 Bonds payable 350,000 Premium on bonds payable 5,600
  • 19. Operating expenses 673,400 210,000 Interest expense 26,600 Income tax expense 420,000 _________ 245,000 ________ 18,620,000 18,620,000 5,600,000 5,600,000 Additional information: · 20X6 net income for Jong is $770,000 and for Nye, $365,050. · At the beginning of 20X6, Jong purchased a piece of equipment from Nye for $350,000. At the time of purchase, the equipment had a net book value of $280,000 to Nye and an estimated useful life of 5 years. · At the end of 20X5, Jong’s inventory included $350,000 of goods purchased from Nye. Nye’s had recorded a gross profit of $140,000 on this sale.
  • 20. · During 20X6, Nye sold goods to Jong for $700,000. Nye earned a gross profit of $280,000 on this sale. · At the end of 20X6, Jong had sold all the goods in its opening inventory to third parties but still had $210,000 of the goods purchased from Nye during 20X6 in its ending inventory. All of those goods will be sold to third parties in 20X7. · Amortization expense for the plant, equipment, and patent are included in operating expenses. · At the beginning of 20X4, Jong issued bonds for $359,800. These bonds have an interest rate of 8%, mature in 7 years, and have a face value of $350,000. Interest will be paid annually at the end of the year. Nye purchased half of these bonds at the beginning of 20X6 for $169,750. Any intercompany gains or losses on these bonds are to be allocated between the two companies. · Both companies have an average income tax rate of 40%. Required: Assume that Jong used the equity method of accounting for its investment in Nye instead of the cost method. Calculate the balance of its “Investment in Nye” account. ACCT451v11 Assignment 2 April 30/2014