SlideShare a Scribd company logo
1 of 5
Question 1
The board of directors is considering updating the fleet of
vehicles of the company which are used to ship goods to
markets all around the United States. They will be leasing the
vehicles as opposed to purchasing them outright. Please explain
the advantages of leasing and which lease type would be more
preferable?
Respond to this... The advantages of leasing include 100%
financing at fixed rates and often require no money down from
the lessee, protection against obsolescence to the lessee and
passing the risk of residual value to the lessor, flexibility, less
costly financing, tax advantages such as not having to report an
asset or liability for a lease agreement, and off balance sheet
financing. (Kieso, Weygandt, & Warfield, 2013).
I would say an operating lease is the more preferable lease
options because if the company used a capital lease they would
have an increase in the amount of reported debt (both short-term
and long-term), have an increase in the amount of total assets
(specifically long-lived assets). And they would have a lower
income early in the life of the lease and, therefore, lower
retained earnings.
“Many companies believe that capital leases negatively impact
their financial position: Their debt to total equity ratio
increases, and their rate of return on total assets decreases. As a
result, the business community resists capitalizing leases.
Whether this resistance is well founded is debatable. From a
cash flow point of view, the company is in the same position
whether accounting for the lease as an operating or a capital
lease. Managers often argue against capitalization for several
reasons. First, capitalization can more easily lead to violation of
loan covenants. It also can affect the amount of compensation
received by owners (for example, a stock compensation plan
tied to earnings). Finally, capitalization can lower rates of
return and increase debt to equity relationships, making the
company less attractive to present and potential investors”
(Kieso, Weygandt, & Warfield, 2013, pg. 1282).
References
Kieso, D. E., Weygandt, J. J., Warfield, T. D. (2013).
Intermediate Accounting, 15th Edition. [VitalSource Bookshelf
Online]. Retrieved from
https://ambassadored.vitalsource.com/#/books/9781118722671/
Question 2
In some cases, one of the purposes of initiating a business
combination is to control your value chain through vertical
integration.
Consider the following two independent scenarios:
1. General Motors relies on an unrelated company for a key
component
2. General Motors relies on a vertically integrated subsidiary
for a key component
Discuss the pros and cons of both scenarios. Specifically
address how a subsidiary that provides products only to the
parent can be fairly evaluated on performance. What do you
believe is the best option for General Motors? Explain.
Respond to this... The cons and pros could be pros and cons for
the other.
1. General motors relies on an unrelated company for key
components
Pros
· The business can just purchase a new product instead of
spending the money and time to create it.
· Don’t have to spend a lot of money purchasing or integrating
the affiliate.
Cons
· Don’t have control of the production.
· No control over the cost and price.
· They don’t know the quality of the product they are receiving.
2. General motors relies on a vertically integrated subsidiary for
a key component.
Pros
· Control over the production part of the distribution process
· Cost control
· Eliminate the mark ups that occur during the manufacturing
process
· Increases advantage over competition.
· Being able to adapt to their customer’s changing needs
· Know the quality of the product
Cons
· Instead of just purchasing a new product they need to design
and create it.
· It costs a lot of money to integrate; especially for a smaller
business.
I think the best decision for General motors would depend on
the parts they are purchasing. They should integrate if they are
purchasing a high quantity of one part and especially if that
company is producing other products General Motors uses. If it
is for a product they don’t use much of then they should just
keep purchasing it.
8 Advantages and Disadvantages of Vertical Integration. (2015,
July 1). Retrieved from NavajoCode:
http://navajocodetalkers.org/8-advantages-and-disadvantages-
of-vertical-integration/
Advantages and Disadvantages of Vertical Integration. (2014,
December 11). Retrieved from OccupyTheory:
http://occupytheory.org/advantages-and-disadvantages-of-
vertical-integration/
Kokemuller, N. (n.d.). The Advantage of a Vertical Integration
Strategty. Retrieved from Chron:
http://smallbusiness.chron.com/advantages-vertical-integration-
strategy-20987.html
Question 3
The growth of information technology has caused the
accounting industry to further examine control and security
issues. Do you feel it is possible to provide absolute security for
a company's information system? Why or why not? What are
some controls that can be put into place to enhance the security
of the information system? Explain.
Respond to this... It is impossible to provide absolute, 100%
information security at a company. There are so many risks,
and in this modern age, we like the convenience of our
computers, smart phones, email, and even wireless printers and
scanners, that we sacrifice some of this security. Issues in
information security continue to grow because of both how
reliant we are on our technology and how we access it.
If I have a sick child, I now can work from home. I have
remote access with my laptop, wireless network, and have a
“SecurID” by RSA that I use with my personal password and the
encryption code that changes every 30 seconds. While my
network access seems secure, my wireless connection at home
or at my hotel could be susceptible to hackers. Also, even if we
were able to fully secure our connection to the Internet and our
software products, we would still have to contend with human
nature. We might receive an email from what appears to be a
friend, and we click on a link or picture that they have sent us.
Also, we get a call from a manager or executive who is
desperate for information and cannot get into the network, so
we try to help. We can all be susceptible to these social
engineering tactics.
That being said, there are a number of controls that can be put
into place to make it more difficult and to deter fraudsters.
With proper controls making it harder for hackers, they
typically will pursue other companies and devices that are
easier to access.
First, training will be key for employees as they are the first
line of defense. They need to make sure that they follow
protocols when they receive a call requesting information or
when they receive an email from someone they do not know.
Employees also need to create strong passwords for
authentication and make sure that these are on a regular rotation
for updating.
Second, the Company’s IT team needs to make sure that the
firewall is working. It should make sure that patches are
applied as soon as they come out and that with new software,
the passwords and security are engaged by day 1 of
implementation. Many people leave the factory default
passwords as there are and do not update, which makes the
system susceptible.
Third, work with HR and management to determine who needs
what level of access. Compensation and benefit files are highly
confidential, but so are customer information files and financial
statement information. Trades can be made on insider
information, so only those that need to now the information
should have access.
Fourth, for those who travel or who have iPads and cell phones,
leaders need to make sure that the devices are password
protected and even issue devices like Jetpacks so public Wi-Fi
is not used, which would expose the devices to vulnerabilities.
There are far more controls that should be integrated and used,
but these are a few good places to start.

More Related Content

Similar to Question 1The board of directors is considering updating the fle.docx

Ppt Presentation On Management By Objective
Ppt Presentation On Management By ObjectivePpt Presentation On Management By Objective
Ppt Presentation On Management By ObjectiveChristine White
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsHappiest Minds Technologies
 
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2The Rigg Darlington Group, Inc.
 
Oracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life InsuranceOracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life Insurancepyakurelsharad
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesJan Vermeesch
 
Rental, HOA, Insurance, Consumer Loans Markets Overview
Rental, HOA, Insurance, Consumer Loans Markets OverviewRental, HOA, Insurance, Consumer Loans Markets Overview
Rental, HOA, Insurance, Consumer Loans Markets OverviewChristopher "Dain" Hall
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6Michael Punzo
 
DEFI development company in India | Hyderabad
DEFI development company in India | HyderabadDEFI development company in India | Hyderabad
DEFI development company in India | HyderabadAmniAugustine
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docxdurantheseldine
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 

Similar to Question 1The board of directors is considering updating the fle.docx (20)

Ppt Presentation On Management By Objective
Ppt Presentation On Management By ObjectivePpt Presentation On Management By Objective
Ppt Presentation On Management By Objective
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest MindsWhitepaper: Rules Harvesting from Source Code - Happiest Minds
Whitepaper: Rules Harvesting from Source Code - Happiest Minds
 
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2
The Rigg Darlington Group - B2B Newsletter, Vol. 44, Issue 2
 
B crisis
B crisisB crisis
B crisis
 
Digital Insurance
Digital InsuranceDigital Insurance
Digital Insurance
 
Oracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life InsuranceOracle Digiting Insurance specially Life Insurance
Oracle Digiting Insurance specially Life Insurance
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Mobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companiesMobile tsunami a threath to competitiveness for companies
Mobile tsunami a threath to competitiveness for companies
 
Rental, HOA, Insurance, Consumer Loans Markets Overview
Rental, HOA, Insurance, Consumer Loans Markets OverviewRental, HOA, Insurance, Consumer Loans Markets Overview
Rental, HOA, Insurance, Consumer Loans Markets Overview
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
DEFI development company in India | Hyderabad
DEFI development company in India | HyderabadDEFI development company in India | Hyderabad
DEFI development company in India | Hyderabad
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 

More from makdul

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxmakdul
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxmakdul
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docxmakdul
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxmakdul
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxmakdul
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxmakdul
 

More from makdul (20)

According to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docxAccording to Davenport (2014) social media and health care are c.docx
According to Davenport (2014) social media and health care are c.docx
 
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxAccording to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docx
 
According to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docxAccording to Libertarianism, there is no right to any social service.docx
According to Libertarianism, there is no right to any social service.docx
 
According to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docxAccording to Kirk (2016), most of your time will be spent working wi.docx
According to Kirk (2016), most of your time will be spent working wi.docx
 
According to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docxAccording to cultural deviance theorists like Cohen, deviant sub.docx
According to cultural deviance theorists like Cohen, deviant sub.docx
 
According to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docxAccording to Gray et al, (2017) critical appraisal is the proce.docx
According to Gray et al, (2017) critical appraisal is the proce.docx
 
According to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docxAccording to article Insecure Policing Under Racial Capitalism by.docx
According to article Insecure Policing Under Racial Capitalism by.docx
 
Abstract In this experiment, examining the equivalence poi.docx
Abstract  In this experiment, examining the equivalence poi.docxAbstract  In this experiment, examining the equivalence poi.docx
Abstract In this experiment, examining the equivalence poi.docx
 
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docxACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
ACC 403- ASSIGNMENT 2 RUBRIC!!!Points 280Assignment 2 Audi.docx
 
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxACC 601 Managerial Accounting Group Case 3 (160 points) .docx
ACC 601 Managerial Accounting Group Case 3 (160 points) .docx
 
Academic Integrity A Letter to My Students[1] Bill T.docx
Academic Integrity A Letter to My Students[1]  Bill T.docxAcademic Integrity A Letter to My Students[1]  Bill T.docx
Academic Integrity A Letter to My Students[1] Bill T.docx
 
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxAccess the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docx
 
According to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docxAccording to DSM 5 This patient had very many symptoms that sugg.docx
According to DSM 5 This patient had very many symptoms that sugg.docx
 
Acceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docxAcceptable concerts include professional orchestras, soloists, jazz,.docx
Acceptable concerts include professional orchestras, soloists, jazz,.docx
 
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docx
 
Access the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docxAccess the FASB website. Once you login, click the FASB Accounting S.docx
Access the FASB website. Once you login, click the FASB Accounting S.docx
 
Academic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docxAcademic Paper  Overview  This performance task was intended to asse.docx
Academic Paper  Overview  This performance task was intended to asse.docx
 
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxAcademic Research Team Project PaperCOVID-19 Open Research Datas.docx
Academic Research Team Project PaperCOVID-19 Open Research Datas.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Abstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docxAbstract                                 Structure of Abstra.docx
Abstract                                 Structure of Abstra.docx
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Question 1The board of directors is considering updating the fle.docx

  • 1. Question 1 The board of directors is considering updating the fleet of vehicles of the company which are used to ship goods to markets all around the United States. They will be leasing the vehicles as opposed to purchasing them outright. Please explain the advantages of leasing and which lease type would be more preferable? Respond to this... The advantages of leasing include 100% financing at fixed rates and often require no money down from the lessee, protection against obsolescence to the lessee and passing the risk of residual value to the lessor, flexibility, less costly financing, tax advantages such as not having to report an asset or liability for a lease agreement, and off balance sheet financing. (Kieso, Weygandt, & Warfield, 2013). I would say an operating lease is the more preferable lease options because if the company used a capital lease they would have an increase in the amount of reported debt (both short-term and long-term), have an increase in the amount of total assets (specifically long-lived assets). And they would have a lower income early in the life of the lease and, therefore, lower retained earnings. “Many companies believe that capital leases negatively impact their financial position: Their debt to total equity ratio increases, and their rate of return on total assets decreases. As a result, the business community resists capitalizing leases. Whether this resistance is well founded is debatable. From a cash flow point of view, the company is in the same position whether accounting for the lease as an operating or a capital lease. Managers often argue against capitalization for several reasons. First, capitalization can more easily lead to violation of loan covenants. It also can affect the amount of compensation received by owners (for example, a stock compensation plan tied to earnings). Finally, capitalization can lower rates of return and increase debt to equity relationships, making the
  • 2. company less attractive to present and potential investors” (Kieso, Weygandt, & Warfield, 2013, pg. 1282). References Kieso, D. E., Weygandt, J. J., Warfield, T. D. (2013). Intermediate Accounting, 15th Edition. [VitalSource Bookshelf Online]. Retrieved from https://ambassadored.vitalsource.com/#/books/9781118722671/ Question 2 In some cases, one of the purposes of initiating a business combination is to control your value chain through vertical integration. Consider the following two independent scenarios: 1. General Motors relies on an unrelated company for a key component 2. General Motors relies on a vertically integrated subsidiary for a key component Discuss the pros and cons of both scenarios. Specifically address how a subsidiary that provides products only to the parent can be fairly evaluated on performance. What do you believe is the best option for General Motors? Explain. Respond to this... The cons and pros could be pros and cons for the other. 1. General motors relies on an unrelated company for key components Pros · The business can just purchase a new product instead of spending the money and time to create it. · Don’t have to spend a lot of money purchasing or integrating the affiliate. Cons · Don’t have control of the production. · No control over the cost and price.
  • 3. · They don’t know the quality of the product they are receiving. 2. General motors relies on a vertically integrated subsidiary for a key component. Pros · Control over the production part of the distribution process · Cost control · Eliminate the mark ups that occur during the manufacturing process · Increases advantage over competition. · Being able to adapt to their customer’s changing needs · Know the quality of the product Cons · Instead of just purchasing a new product they need to design and create it. · It costs a lot of money to integrate; especially for a smaller business. I think the best decision for General motors would depend on the parts they are purchasing. They should integrate if they are purchasing a high quantity of one part and especially if that company is producing other products General Motors uses. If it is for a product they don’t use much of then they should just keep purchasing it. 8 Advantages and Disadvantages of Vertical Integration. (2015, July 1). Retrieved from NavajoCode: http://navajocodetalkers.org/8-advantages-and-disadvantages- of-vertical-integration/ Advantages and Disadvantages of Vertical Integration. (2014, December 11). Retrieved from OccupyTheory: http://occupytheory.org/advantages-and-disadvantages-of- vertical-integration/ Kokemuller, N. (n.d.). The Advantage of a Vertical Integration Strategty. Retrieved from Chron: http://smallbusiness.chron.com/advantages-vertical-integration-
  • 4. strategy-20987.html Question 3 The growth of information technology has caused the accounting industry to further examine control and security issues. Do you feel it is possible to provide absolute security for a company's information system? Why or why not? What are some controls that can be put into place to enhance the security of the information system? Explain. Respond to this... It is impossible to provide absolute, 100% information security at a company. There are so many risks, and in this modern age, we like the convenience of our computers, smart phones, email, and even wireless printers and scanners, that we sacrifice some of this security. Issues in information security continue to grow because of both how reliant we are on our technology and how we access it. If I have a sick child, I now can work from home. I have remote access with my laptop, wireless network, and have a “SecurID” by RSA that I use with my personal password and the encryption code that changes every 30 seconds. While my network access seems secure, my wireless connection at home or at my hotel could be susceptible to hackers. Also, even if we were able to fully secure our connection to the Internet and our software products, we would still have to contend with human nature. We might receive an email from what appears to be a friend, and we click on a link or picture that they have sent us. Also, we get a call from a manager or executive who is desperate for information and cannot get into the network, so we try to help. We can all be susceptible to these social engineering tactics. That being said, there are a number of controls that can be put into place to make it more difficult and to deter fraudsters. With proper controls making it harder for hackers, they typically will pursue other companies and devices that are easier to access. First, training will be key for employees as they are the first
  • 5. line of defense. They need to make sure that they follow protocols when they receive a call requesting information or when they receive an email from someone they do not know. Employees also need to create strong passwords for authentication and make sure that these are on a regular rotation for updating. Second, the Company’s IT team needs to make sure that the firewall is working. It should make sure that patches are applied as soon as they come out and that with new software, the passwords and security are engaged by day 1 of implementation. Many people leave the factory default passwords as there are and do not update, which makes the system susceptible. Third, work with HR and management to determine who needs what level of access. Compensation and benefit files are highly confidential, but so are customer information files and financial statement information. Trades can be made on insider information, so only those that need to now the information should have access. Fourth, for those who travel or who have iPads and cell phones, leaders need to make sure that the devices are password protected and even issue devices like Jetpacks so public Wi-Fi is not used, which would expose the devices to vulnerabilities. There are far more controls that should be integrated and used, but these are a few good places to start.