Saturday, December 28, 2019

Choctaw Trail of Tears - Free Essay Example

Sample details Pages: 3 Words: 902 Downloads: 4 Date added: 2019/08/16 Category History Essay Level High school Topics: Trail Of Tears Essay Did you like this example? On the 28th of May 1830, the president at the time, Andrew Jackson, signed into effect a now controversial law. This law was the Indian Removal Act which allowed the removal of Native Americans from their homes to lands west of the Mississippi River. One tribe who was forcefully removed from their homes was the Choctaw Indian peoples of Mississippi, Texas, Louisiana, and Alabama. When the United States government made them leave their homes, they had to give up almost 11 million acres of land. It was decided that it would be easiest to move the Choctaws in groups of 3 with the first attempt starting on November 1st 1831(Greenwood, 1). The Choctaw Indians were moved from their homes to the plains of modern day Oklahoma but this trip was so harsh that it was later coined the Trail of Tears. They had two weeks to prepare for the journey to come, so many gathered their crops, gathered their belongings, and sell their property so they would be able to get to the ferry points on the 1st (Greenwood, 4). They were told not to bring their livestock because they would be provided with livestock once they got to the promised, Choctaw Nation in the West (Greenwood, 4). Don’t waste time! Our writers will create an original "Choctaw Trail of Tears" essay for you Create order One plan was if the Indians wanted, they could walk and they would be provided with ten dollars worth of gold, a brand new rifle, and three months worth of rifle ammunition and gun powder(Greenwood, 5).. Also, along the way, they would have a guide and would be provided with food (Greenwood, 5). Approximately 300 of them saw this plan as a great idea, but the weather became unbearable (Greenwood, 5). The plan for everyone else was to be moved by wagon from the Memphis area to their destination (Greenwood, 2). This didnt go as planned. A horrific rain storm came in when they planned to leave (Greenwood, 7). Instead, the people in charge of being sure everyone left decided that they should move by steamboat (Greenwood, 8). The problem with that plan became apparent; the U.S. government had cancelled their order to buy more steamboats (Greenwood, 8). After waiting for more, they were able to round up two passenger boats, and three cargo boats (Greenwood, 8). This wasnt nearly enough for the sheer amount of people they needed to move. To make matters worse, before they were able to set sail, one of the larger ships caught fire and wasnt able to leave harbor (Greenwood, 9). Another major problem was the cold. As a result of waiting until November to start the removal, and the need to wait for the boats, the crew was not able to start the journey until around middle of the month (Greenwood, 11). A blizzard struck, and froze over parts of the river and this made it impassable for the remaining large ship, and it made the journey difficult for the others (Greenwood, 12 14). A military post just outside of Mississippi only had about sixty tents to lend to the more than 2000 natives who at this point were forced to walk (Greenwood, 12). Also, many of the Indians were wearing very little clothing and most of the children were wearing none at all (Greenwood, 12). They were lacking provisions, cold, and hungry and they were only 60 miles away from where they started (Greenwood, 11). One option for the natives was to buy food from those who called the area their home, but seeing the rising demand for food, raised the prices by as much as four times as much as s tandard prices (Greenwood, 19). The freezing weather remained for six days straight and it took eight for more government provided wagons to arrive. Many of the soldiers and the Choctaws froze to death or died of Pneumonia (Greenwood, 14) The lack of transportation only allowed for the very young children and very sick to ride in the wagons, and everyone else had to walk (Greenwood, 12). Finally, after five months and over two hundred miles, everyone who survived the passage in the 1st removal was at their new home (Greenwood, 22). Only about two-thirds of them made it (Greenwood, 22). Just before the 2nd removal began, an outbreak of cholera hit Vicksburg, and the citizens of the town trying to get away from the outbreak spread the disease to the Indians waiting to leave (Greenwood, 23). No records were kept of how many of the Choctaw died in the outbreak because when they died, they were put in a pile and their bodies were burned in order to control the spreading of the disease (Greenwood, 24). Many of the same problems that the first envoy faced were faced by those in the second, and approximately 3000 of them made it to their destination (Greenwood, 28) In the 3rd removal, the crew learned from their mistakes, and didnt have to worry as much about the sheer numbers so the journey went much more smoothly than the first (Greenwood, 29). Only about 1,000 Choctaw Indians left from Vicksburg and almost all of them made it safely to their new home (Greenwood, 29). Finally, after three years of relocation, numerous deaths, and an immeasurable amount of pain and suffering, the United States got what it wanted and the entire native Choctaw Indian tribe was out of its original home and into a foreign land. Today, almost 85,000 Choctaw Indians live in Oklahoma. Works Cited Greenwood, Len. (March, 1995) Trail of Tears from Mississippi Walked by Our Ancestors. Chahta Anumpa Aiikhvna School of Choctaw Language. Retrieved from www.choctawschool.com/home-side-menu/history/trail-of-tears-from-mississippi-walked-by-our-ancestors.aspx.

Friday, December 20, 2019

The Rights Of The United States V. Miller - 1244 Words

As an American, we know, and are immune to this country starting to build on technology. Where every call or click online can be traced back, stored, searched and put together to reveal a portrait of private life. However, current law gives little privacy protection to information about these activities, overstepping the First and Fourth Amendment safeguards that are guaranteed to individual freedoms. There are two cases to be discussed, Smith v. Maryland and United States v. Miller, two of the most important Fourth Amendment decisions of the 20th century. â€Å"In these two cases, the Court held that people are not entitled to an expectation of privacy in information they voluntarily provide to third parties† (Thompson, para. 1). This proposition, know as the third-party doctrine, permits the government access to a vast amount of information about individuals, such as the websites they visit, who they have emailed, the phone numbers they call, and their utility, banking, and education records. The first case I want to discuss is Smith v. Maryland-Subpoena for Telephone Call Records. In Smith, the police were investigating the robbery of a young woman, who gave the police a description of her assailant and the vehicle seen near the scene of the crime. The police later spotted a man matching the victim’s description driving an identical vehicle in her neighborhood. They got the tag number and traced the vehicle back to a man named Michael Smith. Upon police request, the telephoneShow MoreRelatedThe Rights Of The Supreme Court1290 Words   |  6 PagesYou have the right to remain silent. Anything you say can and will be held against you in a court of law...† These famous words, so often heard in movies and television shows as a character is arrested, are well known to Americans. But why are law enforcement officials mandated to repeat this to individuals they arrest? Where did it come from? In Miranda V. Arizona, a case taken all the way to t he Supreme Court in 1966, it was decided that constitutional rights must be made clear to the defendantRead MoreMiller V. Alabama1421 Words   |  6 PagesMiller v. Alabama CJA/354 Miller v. Alabama The United States Supreme Court consists of eight associate justices and one chief justice who are petitioned more than 5,000 times a year to hear various cases (Before the Court in Miller V. Alabama, 2012). At its discretion, the Supreme Court selects which cases they choose to review. Some of the selected cases began in the state court system and others began in the federal court system. On June 25, 2012 the justices of the Supreme Court weighedRead MoreGun Control And The Second Amendment1179 Words   |  5 PagesThe United States of America is one of the very few countries in the world that allows their citizens to bear arms. The right to bear arms traces back all the way to the times of the 13 colonies. The Second Amendment has been up for many debates, especially in the recent light of mass shootings in the US. But does the entire removal and ban of firearms really work? Gun control and the second amendment has been a never ending conflict between politicians. As we look furth er into gun control thereRead MoreNative America, Discovered and Conquered: Manifest Destiny803 Words   |  4 PagesJohnson v. M’Intosh. The term â€Å"Manifest Destiny† was never actually used until 1845, but the idea was always implied from the Doctrine of Discovery. Without understanding the Doctrine, it is impossible to understand the reasons and fundamentals behind why Manifest Destiny began.This Doctrine was a set of ten steps and rules that European nations followed in order to avoid conflict over land holdings, created in the early 1400s. The first few steps give the discovering country full rights to buyRead MoreAnalysis Of Miller s Miller V Alabama 1180 Words   |  5 PagesAccording to legal petitions, in Miller v. Alabama (2012), a 14-year old young man by the name of Evan Miller entered the home of his neighbor, Cole Cannon. He is to have allegedly beat and robbed his neighbor. He exited the premises of Cannon’s home. Later in the same evening, Mr. Miller returned to his neighbor’s home, with a friend, Colby Smith searching for drugs within the trailer. They stole a stack of base ball cards and returned to Miller’s home. Miller and Smith, again returned to Cannon’sRead MoreEuropean Community Law Enacted Into Domestic Law1506 Words   |  7 Pageswas passed by parliament, this introduced the European Community law enacted into domestic law. On the 1st January 1973, the United Kingdom joined the European communities, along with other European nations, and this embarked on the nations becoming the European Union. On the 23th June 2016, the European Union Referendum Act 2015 took place questioning as to whether the United Kingdom should leave the European Union, and thus, the people voted in agreement to leave. This triggered Article 50 of theRead MoreDiscrimination And Its Effects On Today s Society1331 Words   |  6 Pagesconjecture that because slavery has been overcome, complete equality has been reached in the United States. What they fail to recognize are the hardships faced by minorities in today’s society every day, yet discrimina tion is a persistent factor. The negative stigma placed on people of color first formed by the harsh language used present during slavery in the cases of Dred Scott v. Sandford (1857) and Plessy v. Ferguson (1896) assisting in the mortality gap between â€Å"blacks† and â€Å"whites†. However, whatRead MoreThe Second Amendment Prohibited Citizens Under The Age Of Eighteen921 Words   |  4 Pagesbirthday, Henry Montgomery murdered Charles Hurt and was sentenced to life in prison without parole. Montgomery, now sixty-nine years old, is challenging the state of Louisiana’s authority to keep him behind bars. Should he, along with many others in the same situation, be given the chance to prove himself as an upstanding citizen of the United States of America? Montgomery’s and other prisoner’s freedom hangs in the balance as the nine justices of the Supreme Court debate whether or not they should beRead MoreHernandez V. Mes An Unarmed Mexican Citizen Fr om A Border Patrol Agent1634 Words   |  7 PagesHernandez v. Mesa involves the shooting of an unarmed Mexican citizen from a border patrol agent within the United States. The 5th circuit of appeals ruled in favor of the government and now the case is in the hands of the Supreme Court. The Supreme Court heard the oral arguments of both sides on February 21st, 2017. Hernandez v. Mesa can be traced to the 5th Circuit of Appeals using three articles. The first article, â€Å"Mexican politicians urge Border Patrol agent s extradition for trial in shootingRead MoreThe Fourth Amendment And The Rights Of Search Warrants1195 Words   |  5 Pagestechnology boom, over the years the courts are being bombarded with request, for upholding or appealing, in what applies and does not apply, to the Fourth Amendment. The Fourth Amendment is within the Bill of Rights in the United States Constitution. The Fourth Amendment, clearly states people have a right to be secure in their privacy, in their own persons, own homes, and their own papers and their personal effects, against unreasonable searches and seizures. However, if there is probable cause of criminal

Thursday, December 12, 2019

The Role of Technology in Our Lives

Question: Richard Restak and Alexandra Samuel both examine the role of technology in our lives. Restak argues in Attention Deficit that the pressure to quickly process information and rapidly shift our attention from one activity to another is causing a devaluation of the depth and quality of our relationships (416). However, in Plug In Better: A Manifesto, Samuel sees technology as a means of addressing the challenges of modern life, and offers strategies for using technology to achieve a more mindful and fulfilled existence. Using ideas from Restak and Samuel, consider how technology is changing our relationship to the people and places around us. Does it keep us from living in the moment, or does it change how we experience the moments and events in our lives? How does technology affect our happiness and contentment with our lives? Questions for Exploration How important is unplugging to setting boundaries between ourselves and the digital world, and are such boundaries even possible? Where do we draw the line between our online and offline lives? Can there be a middle-ground? To what extent is technology the source of our problems, and to what extent does it serve as a scapegoat? Answer: Technology is the most universally identified and favoured subject in the world. With people using technology every time everywhere, technology has become a part of our daily life. The most prominent and impactful aspect of technology is that it has gained the interest and claimed a huge part of our daily social life. Today people are always plugged into the devices that bring the world closer to us. All the barriers of physical distance and time are bypassed with the help of the gadgets and devices that has taken life to an online world. Although the online world is called virtual life, it is the place where the maximum attendance is gained. Every moment, every second thousand of people are logged into their devices and communicating in the virtual world about their real life stories. Hence, a rising concern is noticed among the conscious folks about the need to plug in. Technology has overpowered the normal real life. Time is consumed by technology at an increasing pace, and hence, people find the urge to unplug and pay attention to the little eccentricities of life. The article on unplugging defines the basics of the need and urge to unplug. After the boom of the social media, there has been an increase in the time spent in the online world. People started carrying their mobile handsets everywhere and even in a room full of people, the thumb kept busy scrolling through the latest news and gossips. A lack of intimacy, loss of real and practical life, obsession with the maintaining an online social status quo, has resulted in losing touch with oneself. Technology has thus changed the way of living and how we perceive life. Every daily process is now based on some technological application and required to update in a social media platform. From the toothbrush a person buys to the goodnight selfies. People feel the need to use technology. Thus, as life becomes a labyrinth of online social existence and practical real life, the relationship and communication changes between people. Social gatherings are preoccupied with people debating on the latest tweets, or engagement is needed to be announced in Facebook at first. Thus, although people seem to have started living in the moment, the flavour and charm is lost. It is very tedious to keep pace with the three screens and hence, the mind is jeopardised with the pressure to keep up. Technology is both a necessity and luxury in today's life. Thus, it is required that it should be used in a very harmonious way. But technology has created quite many social restrictions and an urge to achieve higher social degrees of life. Technology is increasingly being used as an opportunity to show off one's abilities, social standards and victories. For example, people post pictures and images on social media sites to showcase their happening life. If the required number of likes and interests are not maintained, the discontentment in life. Thus, it is seen that people receive pleasure by promoting their personal life through the use of technology and media. The relationships are redefined by the number of shares and like. Even social boycott or rivalry has found ways of expression through the technological aspect. Hence, technology has encouraged leading a normal life. The three screens have dominated our senses and thought the process and even influences the day to day decisi on making Samuel, Alexandra. Thus, it could be said that technology does not keep us from living in the moment but proves as a distractions or projects a glossy photocopy of life as it is. It is hence, essential that an effective balance and harmony is maintained between the urge of social degree and the urge to enjoy the experiences of real life. Samuel also describes how the people have found a new way of unplugging and eventually coming back to reality. People switch off phones and logging out of the sites and spending few days outside the scope of information and technology seemed to bring respite to the fast and tedious online life. Although it is also noticed that people cannot get rid of the online and tech-savvy life. The amount of information that is available within seconds, the viability of the excitement and opportunities at the tip of the fingers are the reason that attracts people to stay plugged in for hours. It is noticed that even after a short term of unplugging, people find a reenergized urge to log back in. Thus within a few days they will return to the same situation. Hence, it is observed by Samuel that unplugging is not possible and is not convenient at all. Thus, a few reasons have been sighted that shows why unplugging temporarily is required, to construct a well-maintained balance between the online and the offline segment of the life. Thus, the unplugging should not be done from the devices but the aspects that define constrict the balance and create a gap. First unplugging should be done from the distraction so that life is enjoyed and not even a single moment is wasted in the depths of technical existence. Information is essential for daily sustenance of life, and hence, it is important that the optimized attention is given to every aspect of life so that no crucial information is lost. Unplugging from the Fear of Missing out on a daily dose of online information or activity is necessary to decrease the fatigue of a tech-savvy life. Also, it is essential that social discontentment is regarded as a normal part of life. To connect with the people in our life and to ensure the most relationships, it is required that significant attention is provided to the people and technology is given a second priority. Again, information overload is another reason that has fatigued the people from the continuous use of technology. Finally, people find the need to unplug to avoid the shallowness of existence that the tech based life projects. But while one plugs away they are ridden with the guilt of missing out. They also seem to come back to the old regime as soon as they plug back. Also, it is noticed that daily everyday activity becomes much more complicated and time-consuming with the absence of technology. Hence, Restak and Samuel finds a need for "Better plug in Method" to bridge the gap between online and offline existence. The digital world provides us with new scope and horizon for personal and external development. It would be most foolish and useless to miss out the vast load of information and opportunities that are present in the online world. But, it is important to limit the usage and set some quality boundary between the digital world and our regular life. It is difficult to draw a line between our digital self and normal life, as it is impossible today to put a single foot forward without the help of technology. As innovation and life become faster paced, it is becoming increasingly hard to demarcate the entities of digital and the real world. At this juncture, the world will come to a standstill without the presence of technology and the three screens of television, computer and mobile. It is important that selective priority and attention is provided to each of the screen and real life. Since, living a digitally void life is impossible, it is important that a balance is maintained between the two aspects of modern life. Hence, one should segregate time for each activity of life. Attention must be paid one at a time, and both the world should be balanced according to the immediate priority to regain balance and achieve a middle ground. Although, many people are of the idea that technology is the reason for high expectancy from life, and it puts a fake coloured glass vision inform of our eyes, it can be said that technology is merely used as a scapegoat to escape our shortcomings. Every problem, is it social discontentment or fake showcase of life, have its roots in the depth of human mind. Technology is only a platform that serves a different purpose for different people. It is important that the problems that one faces must be paid significant attention so as to assess the roots of it and solve it sooner. It is often a negative publicity that has some hidden agenda theta propagates the ill effect of the online world. A person with a clear conscience would find quality time to indulge in social frivolity or get hooked into the digital escapades. Technology can never be blamed for the extensive and overuse of it by humans. As every aspect of life develops, technology will also continue to grow and encompass every direction of our life. As technology is manmade, hence man would also find a way to bring technology and life together for far greater aspects. Hence, technology is the opportunity that will help man to lead a more sustainable, exciting and efficient life, which will enhance with time. Reference Samuel, Alexandra. ''Plug In Better': A Manifesto'. The Atlantic. N.p., 2012. Web. 13 Sept. 2015. Samuel, Alexandra. ''Plug In Better': A Manifesto'. The Atlantic. N.p., 2012. Web. 13 Sept. 2015.

Wednesday, December 4, 2019

Capital Asset Pricing Model and Capital Budgeting

Question: Describe the topical issues in financial management - CAPM and Capital Budgeting? Answer: Part A CAPM Capital Asset Pricing Model Capital asset pricing model has been widely used for estimation of the cost of capital for business organizations. Additionally, this model is helpful in evaluation of the performance of managed portfolios (Fama and French, 2004). Capital asset pricing model considers the market return, risk free rate of return and systematic risk in order to estimate the cost of capital (Dempsey, 2012). In the above formula, Rf = Risk free rate of return = Systematic Risk Rm = Market return Assumptions of Capital Asset Pricing Model The assumptions of capital asset pricing model are listed below: All investors operating in the market will focus on maximizing their economic utilities when the asset quantity is constant. Investors are rational and will be risk-averse in nature (Pennacchi, 2008). The investors are largely diversified according to different type of investment. The investors are not price takers or have no influence on the prices. The investors can borrow as well as lend unlimited amount at the rate of risk free rate of interest. Trade activities take place without the cost of transaction and tax (Fama and French, 2004). Investors have equal access to the market information and they all have homogeneous expectation. It is assumed that all assets can be liquefied and divided (Bornholt, 2012). Relationship between Security Market Line and Capital Market Line Capital market line refers to the line which is used in the capital asset pricing model for illustrating the rate of return for the efficient portfolios on the basis of risk free return and the level of uncertainty or risk for that specific portfolio. Capital market line can be drawn as a tangent line from the intercept point of the efficient frontier at which point the expected rate of return is same as the risk free rate of return. Capital market line demonstrates a relationship between the return as well as risk of the efficient portfolio. The capital market line helps in combining the risk free asset and the market portfolio. It is used for representing the risk premium earned from taking additional risk. Capital market line is considered to be superior to the efficient frontier as it includes the risk free asset within the portfolio (Lee et al., 2013). Figure: Capital market line Source: Lee et al., 2013 Security market line helps in plotting the systematic risk versus the market return for a specific period of time. It has been observed that in security market line all the risky marketable securities are include. Basically, security market line helps in plotting the results obtained from the capital asset pricing model. The market risk or bet is represented along the horizontal axis and the vertical axis represents the expected market return. From this graph, market risk premium can be estimated from the slope of the security market line. According to the capital asset pricing model, the market portfolio is the efficient frontier and it can be achieved with the aid of security market line (Pennacchi, 2008). Figure: Security market line Source: Pennacchi, 2008 Capital market line considers the total risk while security market is line includes the systematic risk. The inefficient portfolios lie below the capital market line and both the efficient and inefficient portfolios lie on the security market line (Skiadas, 2009). Arguments in Favor and Against of CAPM It has been argued that capital asset pricing model is an effective tool in estimation of the expected return of a portfolio or cost of capital for business organization. The research scholars have argued that the major advantaged of CAPM is it considers systematic risk which reflects the reality and helps in providing a proper insight to the market condition which the investors must consider. It helps in deriving a relationship between the systematic or market uncertainty and the required rate of return which is very important for the investors. It is a better approach than WACC as it includes the systematic risk (Smart, Megginson and Gitman, 2004). However, some limitations of the CAPM have been identified by the research scholars. It has been observed that the CAM model is reliant upon the risk free rate of interest which refers to the government bonds. The rate of return of the government bond frequently changes depending on the economic situation of the nation. Hence, it will affect the calculation of long term investment. Additionally, it has been correctly argued that estimation of the equity risk premium becomes difficult and it is unstable. Moreover, the value of beta also varies over time (Subrahmanyam, 2012). Alternatives of CAPM Some alternative models have been proposed such as multi beta model (the multifactor model and arbitrage pricing model), market price based model and accounting information based model. Conclusion This paper has provided an insight to the concept of capital asset pricing model and its assumptions. It has been found that the model is very useful as it considers the systematic risk. However, some limitations of the model have been discussed in this paper. CAPM is dependent on the beta and risk free rate of return which frequently changes. It has been found that some alternative models are proposed which will address the shortfalls of the CAPM. Part B: Capital Budgeting Analysis Gordon Hall is considering replacement of his existing machine which has a remaining life of 5 years. The new machine will be bought from Li Ho with useful life of 5 years. In order to evaluate the replacement decision capital budgeting tool Net Present Value (NPV) analysis is an important tool (Ross, Westerfield and Jordan, 2000). It will be used in this paper for making replacement decision (Berk and DeMarzo, 2007). First of all, it is important to estimate the depreciation of the new as well as old machine. Depreciation has been calculated in straight line method in the following two tables: Calculation of the depreciation of New Machine Particulars Amount Purchasing Cost $ 280,000.00 Useful Life (years) 5 Value at the end of life $ 50,000.00 Depreciation per year $ 46,000.00 Salvage Value $ 40,000.00 Calculation of the depreciation of Old Machine Particulars Amount Purchasing Cost $ 340,000.00 Useful Life (years) 10 Value at the end of life $ - Depreciation per year $ 34,000.00 Salvage Value $ - The initial cost of replacement is important to calculate. The initial cost of replacement will include the purchasing cost of new machine, amount paid for conducting feasibility study of the machine and the amount lost by selling the old machine (Holland and Torregrosa, 2008). The loss on sale of the old machine can be calculated by deducting the selling price of the old machine from the depreciated value of the machine at the end of 5th year (Helbk, Lindest and McLellan, 2010). Calculation for Initial Cost of Replacement: Particulars Amount Cost of new machine $ 280,000.00 Present Depreciated Value of the Old Machine $ 170,000.00 Selling Price of old machine $ 86,000.00 Loss on Sale $ 84,000.00 Feasibility Study $ 20,000.00 Total Cost of Purchasing New Machine or Initial Cost $ 384,000.00 The cash flow will be changed due to installation of the new machine The following two tables will consider the elements which will influence the cash flow in the next five years (Ross, Westerfield and Jaffe, 2005). Calculation of the cash flow for the first five years: Particulars Amount (+) Reduction in cooling Cost $ 70,000.00 (-) Reduction in Sale $ 10,000.00 Cash Flow $ 60,000.00 (Moles, 2011) Additional Cash Flow on Fifth Year: (+) Requirement of cleaning supply $ 9,000.00 (+) Increase in accounts receivable $ 14,000.00 (+) Sale of New Machine $ 40,000.00 Calculation of the Total Present Value of Replacement: Total present value of the cash flow after replacement of the old machine with the new one has been calculated in the following table: Year Cash flow Depreciation PBT Tax (@30%) PAT CFAT PVF (@9%) PV 1 $ 60,000.00 $ 46,000.00 $ 14,000.00 $ 4,200.00 $ 9,800.00 $ 55,800.00 0.917431193 $ 51,192.66 2 $ 60,000.00 $ 46,000.00 $ 14,000.00 $ 4,200.00 $ 9,800.00 $ 55,800.00 0.841679993 $ 46,965.74 3 $ 60,000.00 $ 46,000.00 $ 14,000.00 $ 4,200.00 $ 9,800.00 $ 55,800.00 0.77218348 $ 43,087.84 4 $ 60,000.00 $ 46,000.00 $ 14,000.00 $ 4,200.00 $ 9,800.00 $ 55,800.00 0.708425211 $ 39,530.13 5 $ 83,000.00 $ 46,000.00 $ 37,000.00 $ 11,100.00 $ 25,900.00 $ 71,900.00 0.649931386 $ 46,730.07 5 $ 40,000.00 $ - $ 40,000.00 $ 12,000.00 $ 28,000.00 $ 28,000.00 0.596267327 $ 16,695.49 Total Present Value $ 2,44,201.92 Calculation of Net Present Value (NPV): Net present value can be calculated by subtracting the present value of cash flow over the five years from the initial cost of replacement on 0th year. Particulars Value Total Present Value of Cash Flow $ 2,44,201.92 Total Initial Cost of Replacement $ 3,84,000.00 Net Present Value of Replacement $ (1,39,798.08) From the above table it is estimated that the net present value of replacement is estimated to be negative. It implies that if Gordon Hall replaces its existing machine with the new one from Li Ho, it will encounter loss of $ 166,637.37 over the next five years. Hence, it can be stated that Henry must not purchase the new machine (Peterson Drake and Fabozzi, 2002). References Berk, J. and DeMarzo, P. (2007).Corporate finance. Boston: Pearson Addison Wesley. Bornholt, G. (2012). The Failure of the Capital Asset Pricing Model (CAPM): An Update and Discussion.Abacus, 49, pp.36-43. Dempsey, M. (2012). The Capital Asset Pricing Model (CAPM): The History of a Failed Revolutionary Idea in Finance?.Abacus, 49, pp.7-23. Fama, E. and French, K. (2004). The Capital Asset Pricing Model: Theory and Evidence.Journal of Economic Perspectives, 18(3), pp.2546. Helbk, M., Lindest, S. and McLellan, B. (2010).Corporate finance. New York: McGraw-Hill. Holland, J. and Torregrosa, D. (2008).Capital budgeting. [Washington, D.C.]: Congress of the U.S., Congressional Budget Office. Lee, C., Finnerty, J., Lee, J., Lee, A. and Wort, D. (2013).Security analysis, portfolio management, and financial derivatives. Singapore: World Scientific. Moles, P. (2011).Corporate finance. Hoboken, N.J.: Wiley. Pennacchi, G. (2008).Theory of asset pricing. Boston: Pearson/Addison-Wesley. Peterson Drake, P. and Fabozzi, F. (2002).Capital budgeting. New York, NY: Wiley. Ross, S., Westerfield, R. and Jaffe, J. (2005).Corporate finance. Boston: McGraw-Hill/Irwin. Ross, S., Westerfield, R. and Jordan, B. (2000).Fundamentals of corporate finance. Boston: Irwin/McGraw-Hill. Skiadas, C. (2009).Asset pricing theory. Princeton: Princeton University Press. Smart, S., Megginson, W. and Gitman, L. (2004).Corporate finance. Mason, Ohio: Thomson/South-Western. Subrahmanyam, A. (2012). Comments and Perspectives on The Capital Asset Pricing Model.Abacus, 49, pp.79-81.