Cripple Creek Distilleries Inc is an all equity company with 20M shares outstanding. It's stock last closed at $20. Cripple Creek has too much cash. The CEO, Levon Helm, wants to distribute the excess cash with an open market stock repurchase
He is contemplating buying back $5M worth of shares at a price of $20. What will the stock price be after completion of the repurchase?
A) $19.00
B) $19.25
C) $19.50
D) $19.75
E) $20.00
E
You might also like to view...
Which of the following expressions is termed the profit margin factor as used in determining the rate of return on investment?
A) Sales/Income From Operations B) Income From Operations/Sales C) Invested Assets/Sales D) Sales/Invested Assets
The foreman constantly nags the bricklayers to work faster. When the wall is finished, he stops nagging. This is an example of ________ reinforcement.
A. selective B. singular C. negative D. positive
Dirickson Inc. has provided the following data concerning one of the products in its standard cost system. Variable manufacturing overhead is applied to products on the basis of direct labor-hours.InputsStandard Quantity or Hours per Unit of OutputStandard Price or RateDirect materials 7.6ounces$9.40per ounceDirect labor 0.10hours$18.00per hourVariable manufacturing overhead 0.10hours$5.30per hour?The company has reported the following actual results for the product for July: Actual output 7,600unitsRaw materials purchased 63,000ouncesActual cost of raw materials purchased$541,880 Raw materials used in production 57,750ouncesActual direct labor-hours 820hoursActual direct labor cost$16,072 Actual variable overhead cost$4,592 ?The variable overhead efficiency variance
for the month is closest to: A. $318 F B. $336 F C. $336 U D. $318 U
Identify the letter of the choice that best matches the phrase or definition.
A. Process of gathering and analyzing information in the pursuit of business advantage B. Combination of characters known only to the user that is used for authentication C. Identifies a user to the computer system D. When members of a group have access to specific network resources E. Information that identifies a file's creator F. Business intelligence concerned with protecting your information from access by your competitors G. When system resources are available to everyone on the network H. Business intelligence concerned with information about competitors I. Access privileges afforded to each network user J. The act of subverting computer security without authorization K. Hacker who breaks the law L. Individual who subverts computer security without authorization