On January 1, 2018, the Husky Corporation acquired 90% of the Spartan Company's voting stock for $2,700,000. Spartan's net assets had a book value of $2,450,000; the fair value of Spartan's building was $325,000 greater than its book value. The book value of Husky's net assets immediately after the acquisition of Spartan totaled $6,850,000.What is total stockholders' equity on the January 1, 2018 consolidated balance sheet?
A. $6,850,000
B. $7,120,000
C. $9,300,000
D. $7,150,000
Answer: D
You might also like to view...
Indicate whether each of the following statements about financial statement analysis is true or false.Working capital is a measure of the amount of current assets a company would have left after paying its current liabilities.If a transaction causes a company's working capital to increase, the transaction caused the company to become less liquid.Interpretation of a company's current ratio can be difficult because it is an absolute amount.The quick ratio is a more conservative variation of the current ratio.The quick ratio is usually calculated by using the following equation: cash + receivables + current marketable securities รท current liabilities.
What will be an ideal response?
The term structure of interest rates describes how interest rates move over time
Indicate whether the statement is true or false
Which of the following would be the best investment?
A. A company that pays no dividends, but has substantial net income. B. It depends on one's investment objectives. C. A company whose stock price has increased steadily, but pays no dividends. D. A company that pays substantial dividends, but whose earnings per share has been declining over the past several years.
Which of the following represents the three areas where technology can aid in the defense against information security attacks?
A. Authentication and authorization, prevention and resistance, prevention and response B. Authentication and authorization, prevention and response, detection and response C. Analyzing and authenticating, prevention and repositioning, detection and response D. Authentication and authorization, prevention and resistance, detection and response