Carver Lumber sells lumber and general building supplies to building contractors in a medium-sized town in Montana. Data regarding the store's operations follow:•Sales are budgeted at $350,000 for November, $320,000 for December, and $300,000 for January. •Collections are expected to be 90% in the month of sale and 10% in the month following the sale. •The cost of goods sold is 75% of sales. •The company desires to have an ending merchandise inventory equal to 60% of the following month's cost of goods sold. Payment for merchandise is made in the month following the purchase. •Other monthly expenses to be paid in cash are $24,700. •Monthly depreciation is $16,000. •Ignore taxes. Balance SheetOctober 31AssetsCash$19,000Accounts
receivable 77,000Inventory 157,500Property, plant and equipment, net of $502,000 accumulated depreciation 1,002,000Total assets$ 1,255,500Liabilities and Stockholders' EquityAccounts payable$272,000Common stock 780,000Retained earnings 203,500Total liabilities and stockholders' equity$ 1,255,500Retained earnings at the end of December would be:
A. $236,400
B. $289,600
C. $296,000
D. $203,500
Answer: B
You might also like to view...
If net cash flows from operating activities total $115,000, net cash flows from financing activities total $50,000, net cash flows from investing activities total $60,000, purchases of plant assets total $30,000, dividends total $12,000, and sales of plant assets total $17,000, the free cash flow equals
A) $90,000. B) $174,000. C) $116,000. D) $56,000.
Islamic law is the principal source of law in Saudi Arabia
Indicate whether the statement is true or false
For an exchange of promises to be legally binding, parties must make sure the exchange:
a. meets the requirements of a contract b. is witnessed by a third party c. is in writing d. is unique e. takes place before a court official
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion
A) An access control system B) Business continuity planning C) An intrusion detection system D) Terminal resource security