Claybrooks Corporation has two manufacturing departments-Casting and Assembly. The company used the following data at the beginning of the year to calculate predetermined overhead rates: CastingAssemblyTotalEstimated total machine-hours (MHs) 3,000 2,000 5,000Estimated total fixed manufacturing overhead cost$17,700$5,800$23,500Estimated variable manufacturing overhead cost per MH$1.50$2.20 Assume that the company uses departmental predetermined overhead rates with machine-hours as the allocation base in both departments. The departmental predetermined overhead rate in the Assembly Department is closest to:
A. $6.48
B. $5.10
C. $2.20
D. $2.90
Answer: B
You might also like to view...
Cash paid for preferred stock dividends should be shown on the statement of cash flows under
a. investing activities b. financing activities c. noncash investing and financing activities d. operating activities
When analyzing the application for an online submission of a proposal, what should be considered?
A) The language used by the audience B) An identification of how the project meets the criteria of the audience C) An indication of the writer's credibility D) The feasibility of the project E) What information will be required on the application
Atlas Corp. is considering two mutually exclusive projects. Both require an initial investment of $11,500 at t = 0. Project S has an expected life of 2 years with after-tax cash inflows of $5,800 and $7,700 at the end of Years 1 and 2, respectively. Project L has an expected life of 4 years with after-tax cash inflows of $4,136 at the end of each of the next 4 years. Each project has a WACC of 9.25%, and Project S can be repeated with no changes in its cash flows. The controller prefers Project S, but the CFO prefers Project L. How much value will the firm gain or lose if Project L is selected over Project S, i.e., what is the value of NPVL - NPVS?
A. $1,064.93 B. $1,199.73 C. $367 D. $1,428.90 E. $1,321.06
Security measures that are concerned with whether or not users can run an application, read a file, or change data in a database, or can change who can access to data that others have created are referred to as:
A) logical access controls. B) physical access controls. C) backup procedures. D) audit trails.