Exp19 Excel Ch11 ML1 Internships Assignment Help

Exp19 Excel Ch11 ML1 Internships Assignment Help

Project Description:

As the Internship Director for a regional university, you created a list of students who are currently in this semester’s internship program. You have some final touches to complete the worksheet, particularly in formatting text. In addition, you want to create an advanced filter to copy a list of senior accounting students. Finally, you want to insert summary statistics and create an input area to look up a student by ID to display his or her name and major.

 

You want to extract the last four digits of the student’s ID.
#In cell B2 on the Students sheet, extract the last four digits of the first student’s ID using the RIGHT function. Copy the function from cell B2 to the range B3:B42.
Hint: Formula is =RIGHT(Student ID, 4)

 

#After extracting the last four digits of the ID, you want to align the data.
#Apply center horizontal alignment to the range B2:B42.
Hint: The Home tab contains alignment options.

 

#The first and last names are combined in column C. You want to separate the names into two columns.
Convert the text in the range C2:C42 into two columns using a space as the delimiter.
Hint: Text to Columns is located on the Data tab.

 

#You want to convert the text in column F to upper and lowercase letters.
#Use a text function in cell G2 to convert the text in cell F2 into upper and lowercase letters. Copy the function to the range G3:G42.
Hint: Formula is =PROPER(Major)

 

#Now that you have converted text from uppercase to upper and lowercase, you will hide the column containing the majors in all capital letters.
Hide column F.
Hint: The Home tab contains an option to hide a column.

 

You want to create a criteria range for the dataset.
#Create a criteria range by copying the range A1:I1 and pasting it in cell   A44. Create conditions
for   Senior Accounting   majors on row 45 and an OR condition for Junior Accounting majors in the respective cells   on row 46

 

You are ready to perform the advanced filter.
#Create an output range by copying the range A44:I44 to cell A48. Perform the   advanced filter by copying data to the output range. Use the appropriate   ranges for list range, criteria range, and output range
Hint: The Data tab contains the option to perform an advanced filter.

 

On the Info worksheet, you want   to insert a database function based on conditions.
#Display the Info worksheet and insert the DSUM function in cell B2 to   calculate the total tuition for junior and senior accounting students. Use   the range A1:I42 for the database, Tuition for the field, and the criteria range.
 

You want to insert database   functions to perform calculations.
In cell B3, insert the DAVERAGE function to calculate the average GPA for junior and senior   accounting students on the Students worksheet. Use mixed references in the   ranges.

 

You want to identify the highest   GPAs for junior and senior accounting majors.
In cell B4, insert the DMAX function to identify the highest GPA for junior and senior   accounting students on the Students worksheet. Use mixed references in the   ranges.
 

In cell B5, insert the DMIN function   to identify the lowest GPA for junior and senior accounting students on the Students   worksheet. Use mixed references in the ranges.
In cell B6, insert the DCOUNT   function to count the number of junior and senior accounting
students on the Students worksheet. Use mixed references in the ranges.
In cell B9, insert the DGET   function to retrieve the last name of the student who has the ID listed in   cell A9. Use the column number representing the Last Name column for the   field argument and use the criteria range A8:A9. Edit the function to make the column letters absolute. Copy the DGET function from cell B9 to cell C9.   Edit the field number to represent the GPA column.

 

You want to format the results of the database functions.
Format the range B3:B6 with Comma Style. Decrease the number of decimal   places to zero
for cell B6.

 

You want to identify the location of a particular ID.
Insert the MATCH function in cell B13 to identify the position of the ID   stored in cell B12. Use
the range A2:A42 in the Student’s worksheet as the lookup_array argument and   look for exact
matches only.
 

Insert the INDEX function in cell B14 with Students!A$2:I$42 as the array, B$13 that contains the MATCH function as the row number, and 4 as the column number. Copy the function from cell   B14 to cell B15. Edit the function to change the column number to 7.

 

Change the ID in cell B12 to 11282378. The results of the MATCH and   INDEX functions
should change.

 

You want to insert a function to display other functions as text.
Insert the FORMULATEXT function in cell D2 to display the formula that is   stored in cell B2.
Copy the function to the range D3:D6 and to the range D13:D15. In cell D8,   insert the
FORMULATEXT function to display the function that is stored in cell B9, and   in cell D9, insert
the FORMULATEXT function to display the function that is stored in cell C9.

 

Increase the width of column D   to 50.

 

Create a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side on all sheets.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Managerial Challenge Assignment

Managerial Challenge Assignment

MANAGERIAL ECONOMICS

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

MANAGERIAL ECONOMICS APPLICATIONS, STRATEGY, and TACTICS

13e

JAMES R. McGUIGAN JRM Investments

R. CHARLES MOYER University of Louisville

FREDERICK H. deB. HARRIS School of Business Wake Forest University

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest.

(Managerial Challenge Assignment)

 

Managerial Economics: Applications, Strategy, and Tactics, 13th Edition James R. McGuigan, R. Charles Moyer, and Frederick H. deB. Harris

Senior Vice President, LRS/Acquisitions & Solutions Planning: Jack W. Calhoun

Editorial Director, Business & Economics: Erin Joyner

Editor-in-Chief: Joe Sabatino

Senior Acquisition Editor: Steven Scoble

Developmental Editor: Ted Knight

Editorial Assistant: Elizabeth Beiting-Lipps

Brand Manager: Robin Lefevre

Brand Management Director: Jason Sakos

Marketing Development Manager: John Carey

Marketing Development Director: Lisa Lysne

Art and Cover Direction, Production Management, and Composition: PreMediaGlobal

Media Editor: Anita Verma

Rights Acquisition Director: Audrey Pettengill

Rights Acquisition Specialist, Text and Image: John Hill

Senior Manufacturing Planner: Kevin Kluck

Cover Image(s):

Airplane: © iStockphoto/Maciej Noskowski

GEnx Jet Engine (Turbofan): © Olga Besnard/Shutterstock.com

Equipment, Cables and Piping as Found Inside of Industrial Power Plant: © nostal6ie/Shutterstock

New Gas Pipelines: © CDuschinger/Shutterstock

Three Legged Oil and Gas Production Platform: © James Jones Jr/Shutterstock.com

Oil Rig: © Dariush M./Shutterstock.com

Car Production Line: © iStockphoto/Rainer Plendl

Lexus ES300h Hybrid: © Ritu Manoj Jethani/Shutterstock.com

Internal Image(s):

Part Opener: © Nostal6ie/Shutterstock.com

Chapter Opener: © CDuschinger/Shutterstock.com

2 Abstract Backgrounds with Arrows: © Anastasiya Zalevska/Shutterstock.com

Cover Design with Copy Space: © Vladfoto/Shutterstock.com

Recycled and Reflective Icon: © Russelltatedotcom/iStockphotos.com

© 2014, 2011 Cengage Learning

ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.

For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706.

For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions

Further permissions questions can be emailed to permissionrequest@cengage.com

Library of Congress Control Number: 2013935706

ISBN-13: 978-1-285-42092-9

ISBN-10: 1-285-42092-6

Cengage Learning 200 First Stamford Place, 4th Floor Stamford, CT 06902 USA

Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: www.cengage.com/global

Cengage Learning products are represented in Canada by Nelson Education, Ltd.

To learn more about Cengage Learning Solutions, visit www.cengage.com

Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com

Printed in the United States of America 1 2 3 4 5 6 7 17 16 15 14 13

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

To my family J.R.M.

To Sally, Laura, and Craig R.C.M.

To my family and Ken Elzinga F.H.B.H.

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

(Managerial Challenge Assignment)

Brief Table of Contents

Preface xix About the Authors xxiii

PART I

INTRODUCTION 1 1 Introduction and Goals of the Firm 2 2 Fundamental Economic Concepts 28

PART II

DEMAND AND FORECASTING 63 3 Demand Analysis 64 4 Estimating Demand 99

4A Problems in Applying the Linear Regression Model 127

5 Business and Economic Forecasting 139 6 Managing in the Global Economy 176

6A Foreign Exchange Risk Management 230

PART III

PRODUCTION AND COST 233 7 Production Economics 234

7A Production Economics of Renewable and Exhaustible Natural Resources, Advanced Material 270

8 Cost Analysis 280 9 Applications of Cost Theory 305

PART IV

PRICING AND OUTPUT DECISIONS: STRATEGY AND TACTICS 331

10 Prices, Output, and Strategy: Pure and Monopolistic Competition 332

11 Price and Output Determination: Monopoly and Dominant Firms 382

12 Price and Output Determination: Oligopoly 409

13 Best-Practice Tactics: Game Theory 444 13A Entry Deterrence and Accommodation

Games 489 14 Pricing Techniques and Analysis 500

14A The Practice of Revenue Management 535

PART V

ORGANIZATIONAL ARCHITECTURE AND REGULATION 547

15 Contracting, Governance, and Organizational Form 548

15A Auction Design and Information Economics 583

16 Government Regulation 611 17 Long-Term Investment Analysis 648

APPENDICES A The Time Value of Money A-1 B Differential Calculus Techniques

in Management B-1 C Tables C-1 D Check Answers to Selected

End-of-Chapter Exercises D-1 Glossary G-1 Index I-1 Notes

WEB APPENDICES A Consumer Choice Using Indifference

Curve Analysis B International Parity Conditions C Linear-Programming Applications D Capacity Planning and Pricing against a

Low-Cost Competitor: A Case Study of Piedmont Airlines and People Express

E Pricing of Joint Products and Transfer Pricing F Decisions under Risk and Uncertainty G Maximization of Production Output Subject

to a Cost Constraint, Advanced Material H Long-Run Costs with a Cobb-Douglas

Production Function, Advanced Material

v i i Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Contents

Preface xix About the Authors xxiii

PART I

INTRODUCTION 1

1 Introduction and Goals of the Firm 2 Chapter Preview 2

Managerial Challenge: How to Achieve Sustainability: Southern Company Electric Power Generation 2

What Is Managerial Economics? 4 The Decision-Making Model 5

The Responsibilities of Management 5

What Went Right/What Went Wrong: Saturn Corporation 6 Moral Hazard in Teams 6

The Role of Profits 8 Risk-Bearing Theory of Profit 8 Temporary Disequilibrium Theory of Profit 9 Monopoly Theory of Profit 9 Innovation Theory of Profit 9 Managerial Efficiency Theory of Profit 9

Objective of the Firm 9 The Shareholder Wealth-Maximization

Model of the Firm 10 Separation of Ownership and Control:

The Principal-Agent Problem 11 Divergent Objectives and Agency Conflict 11 Agency Problem 13

Implications of Shareholder Wealth Maximization 15

What Went Right/What Went Wrong: Eli Lilly Depressed by Loss of Prozac Patent 15 Caveats to Maximizing Shareholder Value 17 Residual Claimants 19 Goals in the Public Sector and Not-for-Profit

Enterprises 19 Not-for-Profit Objectives 20 The Efficiency Objective in Not-for-Profit

Organizations 20

Summary 21 Exercises 22 Case Exercise: Designing a Managerial

Incentives Contract 23 Case Exercise: Shareholder Value of Renewable

Energy from Wind Power at Hydro Co.: Is RE < C? 24

2 Fundamental Economic Concepts 28 Chapter Preview 28

Managerial Challenge: Why Charge $25 per Bag on Airline Flights? 28

Demand and Supply: A Review 29 The Diamond-Water Paradox and the

Marginal Revolution 31 Marginal Utility and Incremental Cost

Simultaneously Determine Equilibrium Market Price 32

Individual and Market Demand Curves 33 The Demand Function 34 Import-Export Traded Goods 36 Individual and Market Supply Curves 37 Equilibrium Market Price of Gasoline 38

Marginal Analysis 43 Total, Marginal, and Average Relationships 44

The Net Present Value Concept 48 Determining the Net Present Value of an

Investment 48 Sources of Positive Net Present Value Projects 50 Risk and the NPV Rule 51

Meaning and Measurement of Risk 52 Probability Distributions 52 Expected Values 53 Standard Deviation: An Absolute Measure

of Risk 54 Normal Probability Distribution 54 Coefficient of Variation: A Relative Measure

of Risk 56

What Went Right/What Went Wrong: Long-Term Capital Management (LTCM) 56

Risk and Required Return 57 Summary 59 Exercises 59 Case Exercise: Revenue Management at

American Airlines 61

i x Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

PART II

DEMAND AND FORECASTING 63

3 Demand Analysis 64 Chapter Preview 64

Managerial Challenge: Health Care Reform and Cigarette Taxes 64

Demand Relationships 66 The Demand Schedule Defined 66 Constrained Utility Maximization and

Consumer Behavior 67

What Went Right/What Went Wrong: Chevy Volt 71

The Price Elasticity of Demand 72 Price Elasticity Defined 73 Interpreting the Price Elasticity: The Relationship

between the Price Elasticity and Sales Revenue 76 The Importance of Elasticity-Revenue

Relationships 82 Factors Affecting the Price Elasticity of Demand 84

International Perspectives: Free Trade and the Price Elasticity of Demand: Nestlé Yogurt 86

The Income Elasticity of Demand 87 Income Elasticity Defined 87

Cross Elasticity of Demand 90 Cross Price Elasticity Defined 90 Interpreting the Cross Price Elasticity 90 Antitrust and Cross Price Elasticities 90 An Empirical Illustration of Price, Income,

and Cross Elasticities 92 The Combined Effect of Demand Elasticities 92

Summary 93 Exercises 94 Case Exercise: Polo Golf Shirt Pricing 97

4 Estimating Demand 99 Chapter Preview 99

Managerial Challenge: Demand for Whitman’s Chocolate Samplers 99

Statistical Estimation of the Demand Function 100 Specification of the Model 101

A Simple Linear Regression Model 103 Assumptions Underlying the Simple Linear

Regression Model 104 Estimating the Population Regression

Coefficients 105 Using the Regression Equation to Make

Predictions 108 Inferences about the Population Regression

Coefficients 110 Correlation Coefficient 113

The Analysis of Variance 114 Multiple Linear Regression Model 116

Use of Computer Programs 116 Estimating the Population Regression

Coefficients 116 Using the Regression Model to Make Forecasts 116 Inferences about the Population Regression

Coefficients 117 The Analysis of Variance 119 Summary 120 Exercises 120 Case Exercise: Soft Drink Demand Estimation 124

4A Problems in Applying the Linear Regression Model 127 Introduction 127

Autocorrelation 127 Heteroscedasticity 129 Specification and Measurement Errors 130 Multicollinearity 131 Simultaneous Equation Relationships and

the Identification Problem 131 Nonlinear Regression Models 134

Semilogarithmic Transformation 134 Double-Log Transformation 134 Reciprocal Transformation 135 Polynomial Transformation 135 Summary 136 Exercises 136

5 Business and Economic Forecasting 139 Chapter Preview 139

Managerial Challenge: Excess Fiber Optic Capacity at Global Crossing Inc. 139

The Significance of Forecasting 141 Selecting a Forecasting Technique 141

Hierarchy of Forecasts 141 Criteria Used to Select a Forecasting

Technique 142 Evaluating the Accuracy of Forecasting Models 142

What Went Right/What Went Wrong: Crocs Shoes 142

Alternative Forecasting Techniques 143 Deterministic Trend Analysis 143

Components of a Time Series 143 Some Elementary Time-Series Models 144 Secular Trends 145 Seasonal Variations 148

Smoothing Techniques 150 Moving Averages 151 First-Order Exponential Smoothing 153

Barometric Techniques 156 Leading, Lagging, and Coincident Indicators 156

Survey and Opinion-Polling Techniques 157 Forecasting Macroeconomic Activity 158

x Contents

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Sales Forecasting 159 Econometric Models 159

Advantages of Econometric Forecasting Techniques 159

Single-Equation Models 159 Multi-Equation Models 161 Consensus Forecasts: Livingston and

Blue Chip Forecaster Surveys 162 Stochastic Time-Series Analysis 163 Forecasting with Input-Output Tables 166

International Perspectives: Long-Term Sales Forecasting by General Motors in Overseas Markets 166 Summary 167 Exercises 167 Case Exercise: Cruise Ship Arrivals in Alaska 171 Case Exercise: Lumber Price Forecast 172 Case Exercise: Forecasting in the Global

Financial Crisis 173

6 Managing in the Global Economy 176 Chapter Preview 176

Managerial Challenge: Financial Crisis Slows U.S. Household Consumption and Crushes Business Investment: Can Exports to China Provide a Recovery? 176

Introduction 179

What Went Right/What Went Wrong: Export Market Pricing at Toyota 180

Import-Export Sales and Exchange Rates 180 Foreign Exchange Risk 180

International Perspectives: Collapse of Export and Domestic Sales at Cummins Engine 182

Outsourcing 184 China Trade Blossoms 186

China Today 188 The Market for U.S. Dollars as Foreign

Exchange 190 Import-Export Flows and Transaction

Demand for a Currency 190 The Equilibrium Price of the U.S. Dollar 192 Speculative Demand, Government Transfers,

and Coordinated Intervention 192 Short-Term Exchange Rate Fluctuations 193

Determinants of Long-Run Trends in Exchange Rates 193 The Role of Real Growth Rates 194 The Role of Real Interest Rates 196 The Role of Expected Inflation 197

Purchasing Power Parity 198 PPP Offers a Better Yardstick of

Comparative Size of Business Activity 199

What Went Right/What Went Wrong: Big Box U.S. Retailers in China 200 Relative Purchasing Power Parity 201 Qualifications of PPP 202 The Appropriate Use of PPP: An Overview 202

What Went Right/What Went Wrong: GM, Toyota, and the Celica GT-S Coupe 203 Trade-Weighted Exchange Rate Index 204

International Trade: A Managerial Perspective 207 Shares of World Trade and Regional Trading

Blocs 207 Comparative Advantage and Free Trade 210 Import Controls and Protective Tariffs 212 The Case for Strategic Trade Policy 214 Increasing Returns 216 Network Externalities 216

Free Trade Areas: The European Union and NAFTA 217 Optimal Currency Areas 218 Intraregional Trade 219 Mobility of Labor 219 Correlated Macroeconomic Shocks 219

Largest U.S. Trading Partners: The Role of NAFTA 220 A Comparison of the EU and NAFTA 222 Gray Markets, Knockoffs, and Parallel

Importing 223

What Went Right/What Went Wrong: Ford Motor Co. and Exide Batteries: Are Country Managers Here to Stay? 224

Perspectives on the U.S. Trade Deficit 225 Summary 227 Exercises 228 Case Exercise: Predicting the Long-Term

Trends in Value of the U.S. Dollar and the Euro 229

Case Exercise: Elaborate the Debate on NAFTA 229

6A Foreign Exchange Risk Management 230

International Perspectives: Toyota and Honda Buy U.S. Assembly Capacity 231

PART III

PRODUCTION AND COST 233

7 Production Economics 234 Chapter Preview 234

Managerial Challenge: Green Power Initiatives Examined: What Went Wrong in California’s Deregulation of Electricity? 234

Contents xi

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

(Managerial Challenge Assignment)

 

The Production Function 236 Fixed and Variable Inputs 237

Production Functions with One Variable Input 239 Marginal and Average Product Functions 239 The Law of Diminishing Marginal

Returns 240

What Went Right/What Went Wrong: Factory Bottlenecks at a Boeing Assembly Plant 241 Increasing Returns with Network Effects 241 Producing Information Services under

Increasing Returns 243 The Relationship between Total, Marginal,

and Average Product 244 Determining the Optimal Use of the

Variable Input 246 Marginal Revenue Product 247 Marginal Factor Cost 247 Optimal Input Level 247

Production with Multiple Variable Inputs 248 Production (Output Constant) Isoquants 248 The Marginal Rate of Technical

Substitution 250 Determining the Optimal Combination of

Inputs 252 Isocost Lines 253 Minimizing Cost Subject to an Output

Constraint 254 A Fixed Proportions Optimal Production

Process 255 Production Processes and Process Rays 256

Measuring the Efficiency of a Production Process 257

Returns to Scale 258 Measuring Returns to Scale 259 Increasing and Decreasing Returns to Scale 260 The Cobb-Douglas Production Function 260 Empirical Studies of the Cobb-Douglas

Production Function in Manufacturing 261 A Cross-Sectional Analysis of U.S.

Manufacturing Industries 261 Summary 264 Exercises 265 Case Exercise: The Production Function

for Wilson Company 268

7A Production Economics of Renewable and Exhaustible Natural Resources, Advanced Material 270 Renewable Resources 270 Exhaustible Natural Resources 274

Exercises 279

8 Cost Analysis 280 Chapter Preview 280

Managerial Challenge: Can a Leaner General Motors Compete Effectively? 280

The Meaning and Measurement of Cost 281 Accounting versus Economic Costs 281 Three Contrasts between Accounting

and Economic Costs 282 Short-Run Cost and Product Functions 286

Average and Marginal Cost Functions 286 Long-Run Cost Functions 291

Optimal Capacity Utilization: Three Concepts 291

Economies and Diseconomies of Scale 292 The Percentage of Learning 293 Diseconomies of Scale 296 The Overall Effects of Scale Economies and

Diseconomies 296

International Perspectives: How Japanese Companies Deal with the Problems of Size 297 Summary 299 Exercises 300 Case Exercise: Cost Analysis of Patio Furniture 302 Case Exercise: Profit Margins on the

Amazon Kindle 304

9 Applications of Cost Theory 305 Chapter Preview 305

Managerial Challenge: How Exactly Have Computerization and Information Technology Lowered Costs at Chevron, Timken, and Merck? 305

Estimating Cost Functions 306 Issues in Cost Definition and Measurement 307 Controlling for Other Variables 307 The Form of the Empirical Cost-Output

Relationship 308

What Went Right/What Went Wrong: Boeing: The Rising Marginal Cost of Wide-Bodies 309 Statistical Estimation of Short-Run Cost

Functions 310 Statistical Estimation of Long-Run Cost

Functions 311 Determining the Optimal Scale of an Operation 311 Economies of Scale versus Economies of Scope 314 Engineering Cost Techniques 314 The Survivor Technique 316 A Cautionary Tale 317

Break-Even Analysis 317 Graphical Method 318

xii Contents

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Algebraic Method 318 Some Limitations of Break-Even Analysis 321 Doing a Break-Even versus a Contribution

Analysis 321 A Limitation of Contribution Analysis 323 Operating Leverage 323 Inherent Business Risk 325 Summary 325 Exercises 326 Case Exercise: Cost Functions 327 Case Exercise: Charter Airline Operating

Decisions 328

PART IV

PRICING AND OUTPUT DECISIONS: STRATEGY AND TACTICS 331

1 0 Prices, Output, and Strategy: Pure and Monopolistic Competition 332 Chapter Preview 332

Managerial Challenge: Resurrecting Apple in the Tablet World 332

Introduction 333 Competitive Strategy 334

What Went Right/What Went Wrong: Xerox 335 Generic Types of Strategies 336 Product Differentiation Strategy 336 Cost-Based Strategy 336 Information Technology Strategy 337 The Relevant Market Concept 339

Porter’s Five Forces Strategic Framework 339 The Threat of Substitutes 340 The Threat of Entry 341 The Power of Buyers and Suppliers 344 The Intensity of Rivalrous Tactics 345 The Myth of Market Share 349

A Continuum of Market Structures 349 Pure Competition 350 Monopoly 351 Monopolistic Competition 352 Oligopoly 352

Price-Output Determination under Pure Competition 353 Short Run 353 Profit Maximization under Pure Competition

(Short Run): Adobe Corporation 356 Long Run 357

Price-Output Determination under Monopolistic Competition 360

What Went Right/What Went Wrong: The Dynamics of Competition at Amazon.com 361 Short Run 361 Long Run 361

Selling and Promotional Expenses 363 Determining the Optimal Level of Selling

and Promotional Outlays 364 Optimal Advertising Intensity 365 The Net Value of Advertising 366

Competitive Markets under Asymmetric Information 367 Incomplete versus Asymmetric Information 367 Search Goods versus Experience Goods 368 Adverse Selection and the Notorious Firm 368 Insuring and Lending under Asymmetric

Information: Another Lemons Market 370 Solutions to the Adverse Selection Problem 371

Mutual Reliance: Hostage Mechanisms Support Asymmetric Information Exchange 371

Brand-Name Reputations as Hostages 372 Price Premiums with Non-Redeployable Assets 374 Summary 376 Exercises 377 Case Exercise: Netflix and Redbox Compete

for Movie Rentals 379 Case Exercise: Saving Sony Music 380

1 1 Price and Output Determination: Monopoly and Dominant Firms 382 Chapter Preview 382

Managerial Challenge: Dominant Microprocessor Company Intel Adapts to Next Trend 382

Monopoly Defined 383 Sources of Market Power for a Monopolist 383

Increasing Returns from Network Effects 384

What Went Right/What Went Wrong: Pilot Error at Palm 387

Price and Output Determination for a Monopolist 388 Spreadsheet Approach: Profit versus Revenue

Maximization for Polo Golf Shirts 388 Graphical Approach 389 Algebraic Approach 390 The Importance of the Price Elasticity of

Demand 391 The Optimal Markup, Contribution Margin,

and Contribution Margin Percentage 393 Gross Profit Margins 395 Components of the Margin 395 Monopolists and Capacity Investments 396

Contents xiii

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Limit Pricing 397 Using Limit Pricing to Hamper the Sales

of Generic Drugs 398 Regulated Monopolies 399

Electric Power Companies 400

What Went Right/What Went Wrong: The Public Service Company of New Mexico 400 Natural Gas Companies 401

The Economic Rationale for Regulation 401 Natural Monopoly Argument 401 Summary 403 Exercises 403 Case Exercise: Differential Pricing of

Pharmaceuticals: The HIV/AIDS Crisis 407

1 2 Price and Output Determination: Oligopoly 409 Chapter Preview 409

Managerial Challenge: Google’s Android and Apple’s iPhone Displace Nokia in Smart phones? 409

Oligopolistic Market Structures 411 Oligopoly in the United States: Relative

Market Shares 411 Interdependencies in Oligopolistic Industries 416

The Cournot Model 416 Cartels and Other Forms of Collusion 418

Factors Affecting the Likelihood of Successful Collusion 420

Cartel Profit Maximization and the Allocation of Restricted Output 421

International Perspectives: The OPEC Cartel 423 Cartel Analysis: Algebraic Approach 428

Price Leadership 430 Barometric Price Leadership 430 Dominant Firm Price Leadership 431

The Kinked Demand Curve Model 434 Avoiding Price Wars 435

What Went Right/What Went Wrong: Good-Better-Best Product Strategy at Marriott Corporation and Kodak 438 Summary 440 Exercises 441 Case Exercise: Web-Based Satellite Phones

Displace Motorola’s Mobile Phone 443

1 3 Best-Practice Tactics: Game Theory 444 Chapter Preview 444

Managerial Challenge: Large-Scale Entry Deterrence of Low-Cost Discounters: Southwest Airline/AirTran 444

Oligopolistic Rivalry and Game Theory 446

What Went Right/What Went Wrong: Nintendo’s Wii U 446 A Conceptual Framework for Game Theory

Analysis 447 Components of a Game 448 Cooperative and Noncooperative Games 450 Other Types of Games 450

Analyzing Simultaneous Games 451 The Prisoner’s Dilemma 451 Dominant Strategy and Nash Equilibrium

Strategy Defined 453 The Escape from Prisoner’s Dilemma 456

Multiperiod Punishment and Reward Schemes in Repeated Play Games 456

Unraveling and the Chain Store Paradox 457 Mutual Forbearance and Cooperation in

Repeated Prisoner’s Dilemma Games 459 Bayesian Reputation Effects 460 Winning Strategies in Evolutionary Computer

Tournaments: Tit for Tat 460 Price-Matching Guarantees 462 Industry Standards as Coordination

Devices 464 Analyzing Sequential Games 465

A Sequential Coordination Game 466 Subgame Perfect Equilibrium in

Sequential Games 468 Business Rivalry as a Self-Enforcing

Sequential Game 469 First-Mover and Fast-Second Advantages 470

Credible Threats and Commitments 472 Mechanisms for Establishing Credibility 473 Replacement Guarantees 475

Hostages Support the Credibility of Commitments 476

Credible Commitments of Durable Goods Monopolists 477

Planned Obsolescence 478 Post-Purchase Discounting Risk 479 Lease Prices Reflect Anticipated Risks 481 Summary 481 Exercises 482 Case Exercise: International Perspectives:

The Superjumbo Dilemma 487

13A Entry Deterrence and Accommodation Games 489 Excess Capacity as a Credible

Threat 489 Precommitments Using Non-Redeployable

Assets 489 Customer Sorting Rules 492

A Role for Sunk Costs in Decision Making 493

xiv Contents

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

(Managerial Challenge Assignment)

 

Perfectly Contestable Markets 494 Brinkmanship and Wars of Attrition 495

Tactical Insights about Slippery Slopes 497 Summary 498 Exercises 499

1 4 Pricing Techniques and Analysis 500 Chapter Preview 500

Managerial Challenge: Pricing the Chevy Volt 500

A Conceptual Framework for Proactive, Systematic-Analytical, Value-Based Pricing 501

Optimal Differential Price Levels 504 Graphical Approach 505 Algebraic Approach 506 Multiple-Product Pricing Decision 507 Differential Pricing and the Price Elasticity

of Demand 508 Differential Pricing in Target Market

Segments 513 Direct Segmentation with “Fences” 514 Optimal Two-Part Tariffs 516

What Went Right/What Went Wrong: Unlimited Data at Verizon Wireless 516 Couponing 518

What Went Right/What Went Wrong: Two-Part Pricing at Disney World 518

What Went Right/What Went Wrong: Price-Sensitive Customers Redeem 519 Bundling 519 Price Discrimination 522

Pricing in Practice 524 Product Life Cycle Framework 524 Full-Cost Pricing versus Incremental

Contribution Analysis 526 Pricing on the Internet 528 Summary 531 Exercises 532

14A The Practice of Revenue Management 535 A Cross-Functional Systems Management

Process 536 Sources of Sustainable Price Premiums 538 Revenue Management Decisions, Advanced

Material 538 Proactive Price Discrimination 539 Capacity Reallocation 540 Optimal Overbooking 543 Summary 546 Exercises 546

PART V

ORGANIZATIONAL ARCHITECTURE AND REGULATION 547

1 5 Contracting, Governance, and Organizational Form 548 Chapter Preview 548

Managerial Challenge: Controlling the Vertical: Ultimate TV versus Google TV 548

Introduction 549 The Role of Contracting in Cooperative

Games 549 Vertical Requirements Contracts 551 The Function of Commercial Contracts 552 Incomplete Information, Incomplete Contracting,

and Post-Contractual Opportunism 555 Corporate Governance and the Problem

of Moral Hazard 555

What Went Right/What Went Wrong: Forecasting the Great Recession with Workouts and Rollovers 557 The Need for Governance Mechanisms 558

What Went Right/What Went Wrong: Moral Hazard and Holdup at Enron and WorldCom 559

The Principal-Agent Model 559 The Efficiency of Alternative Hiring

Arrangements 559 Creative Ingenuity and the Moral Hazard

Problem in Managerial Contracting 561 Formalizing the Principal-Agent Problem 563 Screening and Sorting Managerial Talent

with Optimal Incentives Contracts 564

What Went Right/What Went Wrong: Why Have Restricted Stock Grants Replaced Executive Stock Options at Microsoft? 565

Choosing the Efficient Organizational Form 567

What Went Right/What Went Wrong: Cable Allies Refuse to Adopt Microsoft’s WebTV as an Industry Standard 570

International Perspectives: Economies of Scale and International Joint Ventures in Chip Making 571 Prospect Theory Motivates Full-Line Forcing 572

Vertical Integration 574

What Went Right/What Went Wrong: Dell Replaces Vertical Integration with Virtual Integration 577

Contents xv

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

The Dissolution of Assets in a Partnership 577 Summary 579 Exercises 580 Case Exercise: Borders Books and

Amazon.com Decide to Do Business Together 581

Case Exercise: Designing a Managerial Incentive Contract 582

Case Exercise: The Division of Investment Banking Fees in a Syndicate 582

15A Auction Design and Information Economics 583 Optimal Mechanism Design 583

Queue Service Rules 583 First-Come, First-Served versus Last-Come,

First-Served 584 Stratified Lotteries for Concerts 585

Auctions 586 Types of Auctions 586 Winner’s Curse in Asymmetric Information

Bidding Games 587 Information Revelation in Common-Value

Auctions 589 Bayesian Strategy with Open Bidding Design 590 Strategic Underbidding in Private-Value

Auctions 592 Second-Highest Sealed-Bid Auctions:

A Revelation Mechanism 594 Revenue Equivalence of Alternative Auction

Types 596 Contractual Approaches to Asymmetric

Information in Online Auctions 598 Incentive-Compatible Revelation

Mechanisms 600 Cost Revelation in Joint Ventures and

Partnerships 600 Cost Overruns with Simple Profit-Sharing

Partnerships 601 Clarke-Groves Incentive-Compatible

Revelation Mechanism 603 An Optimal Incentives Contract 603

International Perspectives: Joint Venture in Memory Chips: IBM, Siemens, and Toshiba 604 Implementation of IC Contracts 605

International Perspectives: Whirlpool’s Joint Venture in Appliances Improves upon Maytag’s Outright Purchase of Hoover 606 Summary 607 Exercises 608 Case Exercise: Spectrum Auction 609 Case Exercise: Debugging Computer

Software: Versioning at Intel 610

1 6 Government Regulation 611 Chapter Preview 611

Managerial Challenge: Cap and Trade, Deregulation, and the Coase Theorem 611

The Regulation of Market Structure and Conduct 612 Market Performance 613 Market Conduct 613 Contestable Markets 614

Antitrust Statutes and Their Regulatory Enforcement 615 The Sherman Act (1890) 615 The Clayton Act (1914) 615 The Robinson-Patman Act (1936) 616 The Hart-Scott-Rodino Antitrust

Improvement Act (1976) 617 Antitrust Prohibition of Selected Business

Decisions 618 Collusion: Price Fixing 618 Mergers That Substantially Lessen

Competition 620 Merger Guidelines (2010) 621 Monopolization 621 Wholesale Price Discrimination 623 Refusals to Deal 624 Resale Price Maintenance Agreements 624

Command and Control Regulatory Constraints: An Economic Analysis 625 The Deregulation Movement 627

What Went Right/What Went Wrong: The Need for a Regulated Clearinghouse to Control Counterparty Risk at AIG 627

Regulation of Externalities 628 Coasian Bargaining for Reciprocal

Externalities 629 Qualifications of the Coase Theorem 630 Impediments to Bargaining 631 Resolution of Externalities by Regulatory

Directive 632 Resolution of Externalities by Taxes and

Subsidies 633 Resolution of Externalities by Sale of Pollution

Rights: Cap and Trade 635 Governmental Protection of Business 635

Licensing and Permitting 635 Patents 636

The Optimal Deployment Decision: To License or Not 636 Pros and Cons of Patent Protection and

Licensure of Trade Secrets 637

What Went Right/What Went Wrong: Delayed Release at Aventis 638

xvi Contents

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

What Went Right/What Went Wrong: Technology Licenses Cost Palm Its Lead in PDAs 640

What Went Right/What Went Wrong: Motorola: What They Didn’t Know Hurt Them 641 Conclusion on Licensing 641 Summary 642 Exercises 643 Case Exercise: Do Luxury Good Manufacturers

Have a Legitimate Interest in Minimum Resale Price Maintenance: Leegin v. Kay’s Kloset? 645

Case Exercise: Microsoft Tying Arrangements 646 Case Exercise: Music Recording Industry

Blocked from Consolidating 647

1 7 Long-Term Investment Analysis 648 Chapter Preview 648

Managerial Challenge: Industrial Renaissance in America: Insourcing of GE Appliances 648

The Nature of Capital Expenditure Decisions 649

A Basic Framework for Capital Budgeting 650 The Capital Budgeting Process 650

Generating Capital Investment Projects 651 Estimating Cash Flows 651 Evaluating and Choosing the Investment

Projects to Implement 653 Estimating the Firm’s Cost of Capital 656

Cost of Debt Capital 657 Cost of Internal Equity Capital 657 Cost of External Equity Capital 659 Weighted Cost of Capital 659

Cost-Benefit Analysis 660 Accept-Reject Decisions 661 Program-Level Analysis 662

Steps in Cost-Benefit Analysis 662 Objectives and Constraints in Cost-Benefit

Analysis 664

Analysis and Valuation of Benefits and Costs 665 Direct Benefits 665 Direct Costs 665 Indirect Costs or Benefits and Intangibles 665

The Appropriate Rate of Discount 666 Cost-Effectiveness Analysis 667

Least-Cost Studies 667 Objective-Level Studies 668 Summary 668 Exercises 669 Case Exercise: Industrial Development

Tax Relief and Incentives 672 Case Exercise: Multigenerational Effects of

Ozone Depletion and Greenhouse Gases 673

APPENDICES A The Time Value of Money A-1 B Differential Calculus Techniques in

Management B-1 C Tables C-1 D Check Answers to Selected

End-of-Chapter Exercises D-1 Glossary G-1 Index I-1 Notes

WEB APPENDICES A Consumer Choice Using Indifference Curve

Analysis B International Parity Conditions C Linear-Programming Applications D Capacity Planning and Pricing against a Low-Cost

Competitor: A Case Study of Piedmont Airlines and People Express

E Pricing of Joint Products and Transfer Pricing F Decisions under Risk and Uncertainty G Maximization of Production Output Subject to a

Cost Constraint, Advanced Material H Long-Run Costs with a Cobb-Douglas Production

Function, Advanced Material

Contents xvii

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Preface

ORGANIZATION OF THE TEXT

The 13th edition has been thoroughly updated with 45 new applications and dozens of new figures and tables. Responding to user request, we continue to expand the review of microeco- nomic fundamentals in Chapter 2, employing a wide-ranging discussion of the equilibrium price of crude oil and gasoline as well as the marginal analysis of long-lasting lightbulbs and driving a Mini-Cooper. A wind vane symbol highlights discussion of environmental effects and sustainability spread throughout the text. Another special feature is the extensive treatment in Chapter 6 of managing global businesses, import-export trade, exchange rates, currency unions and free trade areas, trade policy, and an expanded new section on China.

Several major new analyses appear in the 13th edition (and the chapter in which they appear): moral hazard in teams (1), demand for a branded candy product (4), forecasting in the global financial crisis (5), geographic distribution of value-added for an iPad (6), GM’s cost structure post-bailout (8), $80 operating loss on flat screen TVs (10), Chrome takes share (12), pricing the Chevy Volt and ebook pricing (14), luxury goods and RPMs (16), and insourcing of appliance manufacturing at GE (17).

There is more comprehensive material on applied game theory in Chapters 13, 13A, 15, 15A, and Web Appendix D than in any other managerial economics textbook, and a unique treatment of revenue (yield) management appears in Chapter 14A. Part V includes the hot topics of corporate governance, information economics, auction design, and the choice of organizational form. Chapter 16 on economic regulation includes a broad discussion of cap and trade policy, pollution taxes, and the optimal abatement of externalities. Chapter 17 now leads off with a capital budgeting decision by GE to return appliance manufacturing to the United States.

By far the most distinctive feature of the book is its 300 boxed examples, Managerial Challenges, What Went Right/What Went Wrong explorations of corporate practice, and mini-case examples on every other page demonstrating what each analytical concept is used for in practice. This list of concept applications is highlighted on the inside front and back covers.

STUDENT PREPARATION

The text is designed for use by upper-level undergraduates and first-year graduate stu- dents in business schools, departments of economics, and professional schools of man- agement, public policy, and information science as well as in executive training programs. Students are presumed to have a background in the basic principles of micro- economics, although Chapter 2 offers an extensive review of those topics. No prior work in statistics is assumed; development of all the quantitative concepts employed is self-contained. The book makes occasional use of elementary concepts of differential calculus. In all cases where calculus is employed, at least one alternative approach, such as graphical, algebraic, or tabular analysis, is also presented. Spreadsheet applications have become so prominent in the practice of managerial economics that we now address optimization in that context.

x ix Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

PEDAGOGICAL FEATURES OF THE 13TH EDITION

The 13th edition of Managerial Economics makes extensive use of pedagogical aids to enhance individualized student learning. The key features of the book are:

1. Managerial Challenges. Each chapter opens with a Managerial Challenge (MC) illumi- nating a real-life problem faced by managers that is closely related to the topics covered in the chapter. Instructors can use the new discussion questions following each MC to “hook” student interest at the start of the class or in preclass preparation assignments.

2. What Went Right/What Went Wrong. This feature allows students to relate business mistakes and triumphs to what they have just learned, and helps build that elusive goal of managerial insight.

3. Extensive Use of Boxed Examples. More than 300 real-world applications and examples derived from actual corporate practice are highlighted throughout the text. These applications help the analytical tools and concepts to come alive and thereby enhance student learning. They are listed on the inside front and back covers to highlight the prominence of this feature of the book.

4. Environmental Effects Symbol. A wind vane symbol highlights numerous passages that address environmental effects and sustainability throughout the book.

5. Exercises. Each chapter contains a large problem analysis set. Check answers to selected problems color-coded in blue type are provided in Appendix D at the end of the book. Problems that can be solved using Excel are highlighted with an Excel icon. The book’s Web site (www.cengage.com/economics/mcguigan) has answers to all the other textbook problems.

6. Case Exercises. Most chapters include mini-cases that extend the concepts and tools developed into a deep fact situation context of a real-world company.

7. Chapter Glossaries. In the margins of the text, new terms are defined as they are introduced. The placement of the glossary terms next to the location where the term is first used reinforces the importance of these new concepts and aids in later studying.

8. International Perspectives. Throughout the book, special International Perspec- tives sections that illustrate the application of managerial economics concepts to an increasingly global economy are provided. A globe symbol highlights this internationally relevant material.

9. Point-by-Point Summaries. Each chapter ends with a detailed, point-by-point summary of important concepts from the chapter.

10. Diversity of Presentation Approaches. Important analytical concepts are presented in several different ways, including tabular, spreadsheet, graphical, and algebraic analysis to individualize the learning process.

ANCILLARY MATERIALS

A complete set of ancillary materials is available to adopters to supplement the text, including the following:

Instructor’s Manual and Test Bank The instructor’s manual and test bank that accompany the book contain suggested answers to the end-of-chapter exercises and cases. The authors have taken great care to provide an error-free manual for instructors to use. The manual is available to instruc- tors on the book’s Web site as well as on the Instructor’s Resource CD-ROM (IRCD).

xx Preface

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

The test bank, containing a large collection of true-false, multiple-choice, and numerical problems, is available to adopters and is also available on the Web site in Word format, as well as on the IRCD.

ExamView Simplifying the preparation of quizzes and exams, this easy-to-use test creation software includes all of the questions in the printed test bank and is compatible with Microsoft Windows. Instructors select questions by previewing them on the screen, choosing them randomly, or picking them by number. They can easily add or edit questions, instructions, and answers. Quizzes can also be created and administered online, whether over the Internet, a local area network (LAN), or a wide area network (WAN).

Textbook Support Web Site When you adopt Managerial Economics: Applications, Strategy, and Tactics, 13e, you and your students will have access to a rich array of teaching and learning resources that you won’t find anywhere else. Located at www.CengageBrain.com, this outstanding site features additional Web Appendices including appendices on indifference curve analysis of con- sumer choice, international parity conditions, linear programming applications, a capacity planning entry deterrence case study, joint product pricing and transfer prices, decision making under uncertainty, and production optimization subject to cost constraints. It also provides links to additional instructor and student resources.

Accessing CengageBrain 1. Use your browser to go to www.CengageBrain.com. 2. The first time you go to the site, you will need to register. It’s free. Click on “Sign

Up” in the top right corner of the page and fill out the registration information. (After you have signed in once, whenever you return to CengageBrain, you will enter the user name and password you have chosen and you will be taken directly to the companion site for your book.)

3. Once you have registered and logged in for the first time, go to the “Search for Books or Materials” bar and enter the author or ISBN for your textbook. When the title of your text appears, click on it and you will be taken to the companion site. There you can choose among the various folders provided on the Student side of the site. NOTE: If you are currently using more than one Cengage textbook, the same user name and password will give you access to all the companion sites for your Cengage titles. After you have entered the information for each title, all the titles you are using will appear listed in the pull-down menu in the “Search for Books or Materials” bar. Whenever you return to CengageBrain, you can click on the title of the site you wish to visit and go directly there.

PowerPoint Presentation Available on the product companion Web site, this comprehensive package provides an excellent lecture aid for instructors. Prepared by Richard D. Marcus at the University of Wisconsin–Milwaukee, these slides cover many of the most important topics from the text, and they can be customized by instructors to meet specific course needs.

CourseMate Interested in a simple way to complement your text and course content with study and practice materials? Cengage Learning’s Economics CourseMate brings course concepts to life with interactive learning, study, and exam preparation tools that support the printed

Preface xxi

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

textbook. Watch student comprehension soar as your class works with the printed textbook and the textbook-specific Web site. Economics CourseMate goes beyond the book to deliver what you need! You and your students will have access to ABC/BBC videos, Cengage’s EconApps (such as EconNews and EconDebate), unique study guide content specific to the text, and much more.

ACKNOWLEDGMENTS

A number of reviewers, users, and colleagues have been particularly helpful in providing us with many worthwhile comments and suggestions at various stages in the development of this and earlier editions of the book. Included among these individuals are:

William Beranek, J. Walter Elliott, William J. Kretlow, William Gunther, J. William Hanlon, Robert Knapp, Robert S. Main, Edward Sussna, Bruce T. Allen, Allen Moran, Edward Oppermann, Dwight Porter, Robert L. Conn, Allen Parkman, Daniel Slate, Richard L. Pfister, J. P. Magaddino, Richard A. Stanford, Donald Bumpass, Barry P. Keating, John Wittman, Sisay Asefa, James R. Ashley, David Bunting, Amy H. Dalton, Richard D. Evans, Gordon V. Karels, Richard S. Bower, Massoud M. Saghafi, John C. Callahan, Frank Falero, Ramon Rabinovitch, D. Steinnes, Jay Damon Hobson, Clifford Fry, John Crockett, Marvin Frankel, James T. Peach, Paul Kozlowski, Dennis Fixler, Steven Crane, Scott L. Smith, Edward Miller, Fred Kolb, Bill Carson, Jack W. Thornton, Changhee Chae, Robert B. Dallin, Christopher J. Zappe, Anthony V. Popp, Phillip M. Sisneros, George Brower, Carlos Sevilla, Dean Baim, Charles Callahan, Phillip Robins, Bruce Jaffee, Alwyn du Plessis, Darly Winn, Gary Shoesmith, Richard J. Ward, William H. Hoyt, Irvin Grossack, William Simeone, Satyajit Ghosh, David Levy, Simon Hakim, Patricia Sanderson, David P. Ely, Albert A. O’Kunade, Doug Sharp, Arne Dag Sti, Walker Davidson, David Buschena, George M. Radakovic, Harpal S. Grewal, Stephen J. Silver, Michael J. O’Hara, Luke M. Froeb, Dean Waters, Jake Vogelsang, Lynda Y. de la Viña, Audie R. Brewton, Paul M. Hayashi, Lawrence B. Pulley, Tim Mages, Robert Brooker, Carl Emomoto, Charles Leathers, Marshall Medoff, Gary Brester, Stephan Gohmann, L. Joe Moffitt, Christopher Erickson, Antoine El Khoury, Steven Rock, Rajeev K. Goel, Lee S. Redding, Paul J. Hoyt, Bijan Vasigh, Cheryl A. Casper, Semoon Chang, Kwang Soo Cheong, Barbara M. Fischer, John A. Karikari, Francis D. Mummery, Lucjan T. Orlowski, Dennis Proffitt, and Steven S. Shwiff.

People who were especially helpful in the preparation of the 13th edition include Robert F. Brooker, Kristen E. Collett-Schmitt, Simon Medcalfe, Dr. Paul Stock, Shahab Dabirian, James Leady, Stephen Onyeiwu, and Karl W. Einoff. A special thanks to B. Ramy Elitzur of Tel Aviv University for suggesting the exercise on designing a manage- rial incentive contract and to Bob Hebert, Business Librarian at Wake Forest School of Business, for his tireless pursuit of reference material.

We are also indebted to Wake Forest University and the University of Louisville for the support they provided and owe thanks to our faculty colleagues for the encouragement and assistance provided on a continuing basis during the preparation of the manuscript. We wish to express our appreciation to the members of the Cengage Learning staff for their help in the preparation and promotion of this book. We are grateful to the Literary Executor of the late Sir Ronald A. Fisher, F.R.S.; to Dr. Frank Yates, F.R.S.; and to Longman Group, Ltd., London, for permission to reprint Table III from their book Statistical Tables for Biological, Agricultural, and Medical Research (6th ed., 1974).

James R. McGuigan R. Charles Moyer

Frederick H. deB. Harris

xxii Preface

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

About the Authors

James R. McGuigan James R. McGuigan owns and operates his own numismatic investment firm. Prior to this business, he was Associate Professor of Finance and Business Economics in the School of Business Administration at Wayne State University. He also taught at the University of Pittsburgh and Point Park College. McGuigan received his undergraduate degree from Carnegie Mellon University. He earned an M.B.A. at the Graduate School of Business at the University of Chicago and his Ph.D. from the University of Pittsburgh. In addition to his interests in economics, he has coauthored books on financial management. His research articles on options have been published in the Journal of Financial and Quantitative Analysis.

R. Charles Moyer R. Charles Moyer earned his B.A. in Economics from Howard University and his M.B.A. and Ph.D. in Finance and Managerial Economics from the University of Pittsburgh. Profes- sor Moyer is Dean of the College of Business at the University of Louisville. He is Dean Emeritus and former holder of the GMAC Insurance Chair in Finance at the Babcock Graduate School of Management, Wake Forest University. Previously, he was Professor of Finance and Chairman of the Department of Finance at Texas Tech University. Professor Moyer also has taught at the University of Houston, Lehigh University, and the University of New Mexico, and spent a year at the Federal Reserve Bank of Cleveland. Professor Moyer has taught extensively abroad in Germany, France, and Russia. In addition to this text, Moyer has coauthored two other financial management texts. He has been published in many leading journals, including Financial Management, Journal of Financial and Quantitative Analysis, Journal of Finance, Financial Review, Journal of Financial Research, International Journal of Forecasting, Strategic Management Journal, and Journal of Economics and Business. Professor Moyer is a member of the Board of Directors of King Pharmaceuticals, Inc., Capital South Partners, and the Kentucky Seed Capital Fund.

Frederick H. deB. Harris Frederick H. deB. Harris is the John B. McKinnon Professor of Managerial Economics and Finance at the School of Business, Wake Forest University. His specialties are pricing tactics and capacity planning. Professor Harris has taught integrative managerial econom- ics core courses and B.A., B.S., M.S., M.B.A., and Ph.D. electives in business schools and economics departments in the United States, Germany, France, Italy, and Australia. He has won two school-wide Professor of the Year teaching awards and two Researcher of the Year awards. Other recognitions include Outstanding Faculty by Inc. magazine (1998), Most Popular Courses by Business Week Online 2000–2001, and Outstanding Faculty by BusinessWeek’s Guide to the Best Business Schools, 5th to 9th eds., 1997–2004.

Professor Harris has published widely in economics, marketing, operations, and finance journals, including the Review of Economics and Statistics, Journal of Financial and Quantitative Analysis, Journal of Operations Management, Journal of Industrial Economics, and Journal of Financial Markets. From 1988 through 1993, Professor Harris served on the Board of Associate Editors of the Journal of Industrial Economics.

xx i i i Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

His path breaking work on price discovery has been frequently cited in leading academic journals, and several articles with practitioners have been published in the Journal of Trading. In addition, he often benchmarks the pricing, order processing, and capacity planning functions of large companies against state-of-the-art techniques in revenue management and writes about his findings in journals like Marketing Management and INFORMS’s Journal of Revenue and Pricing Management.

xxiv About the Authors

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

PART I Introduction

ECONOMIC, POLITICAL, AND SOCIAL ENVIRONMENT

1. Business Conditions (Trends, Cycles, and Seasonal Effects)

2. Factor Market Conditions (Capital, Labor, and Raw Materials)

3. Competitors’ Reactions and Tactical Response

4. Organizational Architecture and Regulatory Constraints

Cash Flows Risk

Firm Value (Shareholders’ Wealth)

ECONOMIC ANALYSIS AND DECISIONS

1. Demand Analysis 2. Production and Cost Analysis 3. Product, Pricing, and Output

Decisions 4. Capital Expenditure Analysis

© Ce ng ag e Le ar ni ng

1 Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

CHAPTER

1 Introduction and Goals of the Firm

CHAPTER PREVIEW Managerial economics is the application of microeconomics to problems faced by decision makers in the

private, public, and not-for-profit sectors. Managerial economics assists managers in efficiently allocating

scarce resources, planning corporate strategy, and executing effective tactics. In this chapter, the

responsibilities of management are explored. Economic profit is defined, and the role of profits in

allocating resources in a free enterprise system is examined. The primary goal of the firm, namely,

shareholder wealth maximization, is developed along with a discussion of how managerial decisions

influence shareholder wealth. The problems associated with the separation of ownership and control,

moral hazard in teams, and principal-agent relationships in large corporations are explored.

MANAGERIAL CHALLENGE How to Achieve Sustainability: Southern Company Electric Power Generation1

In the second decade of the twenty-first century, compa- nies all across the industrial landscape are seeking to achieve sustainability. Sustainability is a powerful meta- phor but an elusive goal. It means much more than aligning oneself with environmental sensitivity, though that commitment itself tests higher in opinion polling of the latent preferences of Americans and Europeans than any other response. Sustainability also implies renewability and longevity of business plans that are adaptable to changing circumstances. But what exactly should management pursue as a set of objectives to achieve this goal?

Management response to pollution abatement illus- trates one type of sustainability challenge. At the insis- tence of the prime minister of Canada during the Reagan Administration, the U.S. Congress enacted a bipartisan cap-and-trade bill to address smokestack emissions. Sulfur dioxide and nitrous oxide (SOX and NOX) emis- sions precipitate as acid rain, mist, and ice, imposing

damage downwind hundreds of miles away to trees, painted and stone surfaces, and asthmatics. The Clean Air Act (CAA) of 1990, amended in 1997 and 2003, granted tradable pollution allowances (TPAs) to known polluters. The CAA also authorized an auction market for these TPA assets. The Environmental Pro- tection Agency Web site (www.epa.gov) displays on a daily basis the equilibrium, market-clearing price of these new assets on the balance sheet (e.g., $250 per ton of soot). The cap-and-trade system literally identi- fied for the first time a price for the use of what had previously been unpriced common property resources— namely, acid-free air and rainwater. As a result, large point-source polluters like power plants and steel mills now incur an actual cost per ton for the SOX and NOX–laden soot by-products of burning lots of high sulfur coal. These amounts were promptly placed in spreadsheets designed to find ways of minimizing operating costs.2 No less importantly, each polluter felt

Cont.

2 Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

powerful incremental incentives to reduce compliance cost by abating pollution. And an entire industry devoted to developing pollution abatement technology sprang up.

The TPAs granted were set at approximately 80 per- cent of the known pollution taking place at each plant in 1990. For example, Duke Power’s Belews Creek power plant, generating 120,085 tons of nitrous oxide acidic soot annually from burning 400 train carloads of coal per day, was granted 96,068 tons of allowances

(see Figure 1.1). Although this approach “grandfathered” a substantial amount of pollution, the gradual transition cap-and-trade legislation was pivotally important to its widespread success. Industries such as steel and electric power were given five years to comply with the regulated emissions requirements, and then in 1997, the initial allowances were cut in half. Duke Power initially bought 19,146 allowances for Belews Creek at prices ranging from $131 to $480 per ton and then in 2003 built two 30-story smokestack scrubbers that reduced the NOX emissions by 75 percent.

Another major electric utility, Southern Company, analyzed three compliance choices on a least-cost cash flow basis: (1) buying allowances, (2) installing smoke- stack scrubbers, or (3) adopting fuel-switching technol- ogy to burn low-sulfur coal or even cleaner natural gas. In a widely studied case, the Southern Company found its huge Bowen plant in North Georgia would require a $657 million scrubber that after tax deductions for capital equipment depreciation and further offsets from excess allowance revenue cost $476 million. Alterna- tively, continuing to burn high-sulfur coal from the

FIGURE 1.1 Nitrous Oxide from Coal-Fired Power Plants (Daily Emissions in Tons, pre Clean Air Act)

Asheville CP&L

Cliffside Duke

Duke Allen

Marshall Duke

Riverbend Duke

Belews Creek Duke

Buck Duke44

39 59 24

164

329 tons NOx

14

13 55

194

17

13

Cape Fear CP&L

Weatherspoon CP&L

Sutton CP&L

Lee CP&L

Mayo CP&L

Roxboro CP&L

Dan River Duke

55

27

Source: NC Division of Air Quality.

Cont.

© AP

Ph ot o/ St ep he n M or to n

MANAGERIAL CHALLENGE Continued

Chapter 1: Introduction and Goals of the Firm 3

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

WHAT IS MANAGERIAL ECONOMICS?

Managerial economics extracts from microeconomic theory those concepts and techni- ques that enable managers to select strategic direction, to allocate efficiently the resources available to the organization, and to respond effectively to tactical issues. All such mana- gerial decision making seeks to do the following:

1. identify the alternatives, 2. select the choice that accomplishes the objective(s) in the most efficient manner, 3. taking into account the constraints, 4. and the likely actions and reactions of rival decision makers.

For example, consider the following stylized decision problem:

Example Capacity Expansion at Honda, N.A., and Toyota Motors, N.A. Honda and Toyota are attempting to expand their already substantial assembly opera- tions in North America. Both companies face increasing demand for their U.S.-manufactured vehicles, especially Toyota Camrys and Honda Accords. Camrys and Accords rate extremely highly in consumer reports of durability and reliability.

(continued)

MANAGERIAL CHALLENGE Continued nearby Appalachian Mountain region and purchasing the requisite allowances in the cap-and-trade market was projected to cost $266 million. And finally, switch- ing to low-sulfur coal while adopting fuel-switching technology was found to cost $176 million. All these analyses were performed on a present value basis with cost projections over 25 years. Chapter 2 offers a quick primer on the net present value concept.

Southern Company’s decision to switch to low- sulfur coal was hailed far and wide as environmentally sensitive and sustainable. Many electric utilities support cap-and-trade policies and actively pursue the mandate of the states in which they operate to derive 15 percent of their power from renewable energy (RE). In a Case Study at the end of the chapter, we analyze several wind power RE alternatives for generating electricity.

The choice of fuel-switching technology to abate smokestack emissions was a shareholder value- maximizing choice for Southern Company for two rea- sons. First, switching to low-sulfur coal minimized their projected cash flow compliance costs under the CAA but, in addition, the fuel-switching technology created a strategic flexibility (a “real option”) and that in itself created additional shareholder value. In this chapter, we will see what maximizing capitalized value of equity (shareholder value) is and what it is not.

Discussion Questions n What is the basic externality problem with

acid rain? What objectives should manage- ment serve in responding to the acid rain problem?

n How does the Clean Air Act’s cap-and- trade approach to air pollution affect the Southern Company’s analysis of the previously unpriced common property air and water resources damaged by smokestack emissions?

n How should management comply with the Clean Air Act, or should the Southern Com- pany just pay the EPA’s fines? Why? How would you decide?

n Which among Southern Company’s three alternatives for compliance offered the most strategic flexibility? Explain.

1Based on Frederick Harris, Alternative Energy Symposium, Wake Forest Schools of Business (September 2008); and “Acid Rain: The Southern Com- pany,” Harvard Business School Publishing, HBS: 9-792-060. 2EPA fines for noncompliance of $2,000 per ton have always far exceeded the auction market cost of allowances ($131–$473 in recent years).

4 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

The demand for used Accords is so strong that they depreciate only 45 percent in their first four years. Other competing vehicles may depreciate as much as 65 percent in the same period. Toyota and Honda have identified two possible strategies (S1NEW and S2USED) to meet the growing demand for Camrys and Accords. Strat- egy S1NEW involves an internal expansion of capacity at Toyota’s $700 million Princeton, Indiana, plant and Honda’s Marysville, Ohio, plant. Strategy S2USED involves the purchase and renovation of assembly plants now owned by General Motors. The new plants will likely receive substantial public subsidies through reduced property taxes. The older plants already possess an enormous infrastructure of local suppliers and regulatory relief.

The objective of Toyota’s managers is to maximize the value today (present value) of the expected future profit from the expansion. This problem can be summarized as follows:

Objective function: Maximize the present value (P.V.) of profit (S1NEW, S2USED)

Decision rule: Choose strategy S1NEW if P.V. (Profit S1NEW) > P.V. (Profit S2USED) Choose strategy S2USED if the reverse.

This simple illustration shows how resource-allocation decisions of managers attempt to maximize the value of their firms across forward-looking dynamic strate- gies for growth while respecting all ethical, legal, and regulatory constraints.

THE DECISION-MAKING MODEL

The ability to make good decisions is the key to successful managerial performance. All decision making shares several common elements. First, the decision maker must estab- lish the objectives. Next, the decision maker must identify the problem. For example, the CEO of electronics retailer Best Buy may note that the profit margin on sales has been decreasing. This could be caused by pricing errors, declining labor productivity, or the use of outdated retailing concepts. Once the source or sources of the problem are identi- fied, the manager can move to an examination of potential solutions. The choice between these alternatives depends on an analysis of the relative costs and benefits, as well as other organizational and societal constraints that may make one alternative preferable to another.

The final step in the decision-making process, after all alternatives have been evalu- ated, is to analyze the best available alternative under a variety of changes in the assump- tions before making a recommendation. This crucial final step is referred to as a sensitivity analysis. Knowing the limitations of the planned course of action as the deci- sion environment changes, the manager can then proceed to an implementation of the decision, monitoring carefully any unintended consequences or unanticipated changes in the market. The case problem at the end of the chapter highlights the role of sensitiv- ity analysis in analyzing wind turbines as a renewable energy source of electricity.

The Responsibilities of Management In a free enterprise system, managers are responsible for a number of goals. Managers are responsible for proactively solving problems in the current business model before

Chapter 1: Introduction and Goals of the Firm 5

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

they become crises and for selecting strategies to assure the more likely success of the next business model. Research In Motion built the world’s best international cell phone (the Blackberry) but missed the market as customer demand evolved to web-enabled smart phones with 500,000 and then millions of apps. Managers create organizational structure and culture based on the organization’s mission. Senior management especially is responsible for establishing a vision of new business directions and setting stretch goals to get there. In addition, managers coordinate the integration of marketing, opera- tions, and finance functions. If plant managers don’t know the realized margins from particular segments targeted by the sales team, then they will often expedite and fulfill orders to the wrong customers. Finally, managers undertake the critical responsibility of motivating and monitoring teamwork.

Moral Hazard in Teams Teamwork skills and the ability to motivate teams is widely acknowledged as the single most critical trait of effective managers. This applies equally to Navy Seal teams, factory work cell teams, brand management teams, or consulting teams. Why is that? Why is teamwork so important, and why is attaining good teamwork so hard? The essence of teamwork is synergistic value creation in excess of the sum of the parts. As individuals on a team, we can each “pull our own weight” or contribute more than that and com- pound our extra effort with the extraordinary efforts of those around us. Just as in sports, 110 percent effort on company teams often defeats more skilled opponents and sometimes even those with better resources. But how does a manager attain the commit- ment from a team to put forth 110 percent effort when doing less would not impose as much personal sacrifice, and when individual shirking on one’s effort may not be trans- parently obvious? This constitutes the so-called moral hazard problem in team-making.

WHAT WENT RIGHT • WHAT WENT WRONG

Saturn Corporation3 When General Motors (GM) rolled out their “different kind of car company,” J.D. Powers rated product quality 8 percent ahead of Honda, and customers liked the no- haggle selling process. Saturn achieved the 200,000 unit sales enjoyed by the Honda Civic and the Toyota Corolla in two short years and caught the 285,000 volume of the Ford Escort in Saturn’s fourth year. Making interpersonal aspects of customer service the number-one priority and possessing superior inventory and MIS systems, Saturn dealerships proved very profitable and quickly developed a reputation for some of the highest customer loyalty in the industry.

However, with pricing of the base Saturn model $1,200 below the $12,050 rival Japanese compact cars, the GM parent earned only a $400 gross profit margin per vehicle. In a typical year, this meant GM was recovering only about $100 million of its $3 billion capital investment, a paltry 3 percent return. Netting out GM’s 11 percent cost of capital, each Saturn was losing approximately $1,000. These figures compare to a $3,300 gross profit margin per vehicle in

some of GM’s other divisions. Consequently, cash flow was not reinvested in the Saturn division, products were not updated, and the models stagnated. By 1997, sales were slumping at −9 percent and in 1998 they fell an addi- tional 20 percent. In 2009, GM announced it was perma- nently closing the Saturn division.

GM managers had not established the next Saturn busi- ness model which would have transferred young childless couples to more profitable GM divisions as their lifecycle called for bigger sedans, minivans, and SUVs. Rather than trading up to Buick and Pontiac, middle-aged loyal Saturn owners sought to trade up within Saturn, and finding no sporty larger models available, they switched to larger Japanese imports like the Honda Accord and Toyota Camry. After almost collapsing, Saturn introduced a sport wagon, an efficient SUV, and a high-profile sports coupe. GM ultimately abandoned the brand in 2009.

3Based on M. Cohen, “Saturn’s Supply-Chain Innovation,” Sloan Manage- ment Review (Summer 2000), pp. 93–96; “Small Car Sales Are Back” and “Why Didn’t GM Do More for Saturn?” BusinessWeek, September 22, 1997, pp. 40–42, and March 16, 1998, p. 62.

6 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

If penalties and sanctions are few and far between, only a sense of moral duty induces full-effort teamwork rather than the reduced effort associated with free-riding.

Consider the following example of the teamwork involved in bringing a product to market. Mack and Myer are collaborating on a product launch. Each has specialized skills that are required to achieve the maximum output and a gross profit of $100 if they each “Pull Hard,” devoting their best effort to the project. In that event, $25 per- sonal cost for each leaves $25 net profit available to each of them. If either shirks and reduces effort unilaterally, the output is reduced and gross profit declines by 30 percent to $70 to be divided between them, but the shirker reduces his or her personal cost to $0, thereby yielding a $35 net profit to the free rider and only $10 to the dutiful teammate who Pulled Hard. If both shirk and fail to provide best effort, then output collapses, gross profit falls to $30, yielding each just $15 net profit. These payoffs are depicted in the normal form game matrix Figure 1.2, Panel A.

What if this is a one-time-only situation, and each player must decide simultaneously without knowing the choice of his or her teammate? One of the insights of game theory is that in the absence of repeated games involving the same teammates, rational players in such situations will ignore reputation effects and select the action whose payoff dom- inates all others. In this case, that means each player will choose to Shirk since the $35 outcome exceeds $25, and the $15 outcome exceeds $10. In short, the outcomes from the action Shirk in the right-hand column dominate those in the Pull Hard column (and so too in the rows of the payoff matrix). Each team member therefore prefers to defect (by choosing Shirk), whatever the choice of his or her teammate; Shirk is said to be a domi- nant strategy. Therefore, {Shirk, Shirk} emerges as a dominant strategy outcome with great predictability.

But if they both do so, a tragic dilemma arises. In the southeast {Shirk, Shirk} cell, the payoff to each player is just $15, and total value added is only $30. Both teammates

FIGURE 1.2 Payoffs from Team Production with and without a Supervisor

Mack Panel A No Supervisor

Panel B Supervisor Present. A $10 Manager is Hired as a Monitor of Shirking for which A $15 Penalty is Imposed.

Pull Hard Shirk

$25 $35 $25 $10

$10 $15 $35 $15

Pull Hard

Meyer Shirk

Mack

Pull Hard Shirk

$20 $15 $20 $5

$5 $–5 $15 $–5

Pull Hard

Meyer Shirk

© Ce ng ag e Le ar ni ng

Chapter 1: Introduction and Goals of the Firm 7

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

realize, however, that if they had just found a way to elicit cooperation from one another, $50 net profit would have been available in the northwest {Pull Hard, Pull Hard} cell. Their individually optimal decision-making (reflected by the dominant strategy to defect from cooperative arrangements) leaves −$20 foregone profits until the players themselves organize their team-making differently. As a result, we might well expect that the players would evolve mechanisms for contracting around the moral hazard problem in order to capture the foregone value. How can this be accomplished?

What if the team hired a manager as project supervisor to monitor the teamwork and punish shirking? Splitting the cost of paying a manager $10 leaves $40 gross profit in the {Pull Hard, Pull Hard} cell, to be divided evenly between Mack and Meyer. In the diago- nal cells, the manager now penalizes whichever teammate shirks their duty −$15. The payoff for this unilateral defector now becomes ($70/2 ¼ $35) � $15 � $5 ¼ $15, less than the ($100/2 ¼ $50) � $25 � $5 ¼ $20 associated with the cooperative decision to Pull Hard. And this is a symmetric payoff game, so both players now conclude the same thing—that is, it pays to adopt mutually cooperative teamwork and deliver full effort. Since each player will receive only ($30/2 ¼ $15) � $15 � $5 ¼ �$5 in the event they both shirk their duties, and ($70/2 ¼ $35) � $25 � $5 ¼ $5 in the event their Hard Pull is unilaterally defected upon, each decides to Pull Hard. Indeed, examining the new payoff matrix in Figure 1.2, Panel B the choice pair {Pull Hard, Pull Hard} has now become the dominant strategy. So, in conclusion, moral hazard in teams can be avoided. What is needed is a manager as supervisor who imposes sanctions for the shirk- ing behavior of teammates that decide to free ride.

Managers in a capitalist economy are motivated to monitor teamwork ultimately because of their overarching goal to maximize returns to the owners of the business— that is, economic profits.

Economic profit is the difference between total sales revenue (price times units sold) and total economic cost. The economic cost of any activity may be thought of as the highest valued alternative opportunity that is forgone. To attract labor, capital, intellec- tual property, land, and matériel, the firm must offer to pay a price that is sufficient to convince the owners of these resources to forego other alternative activities and commit their resources to this use. Thus, economic costs should always be thought of as oppor- tunity costs—that is, the costs of attracting a resource such as investment capital from its next best alternative use.

THE ROLE OF PROFITS

In a free enterprise system, economic profits play an important role in guiding the deci- sions made by the thousands of competing independent resource owners. The existence of profits determines the type and quantity of goods and services that are produced and sold, as well as the resulting derived demand for resources. Several theories of profit indi- cate how this works.

Risk-Bearing Theory of Profit Economic profits arise in part to compensate the owners of the firm for the risk they assume when making their investments. Because a firm’s shareholders are not entitled to a fixed rate of return on their investment—that is, they are claimants to the firm’s residual cash flows after all other contractual payments have been made—they need to be compensated for this risk in the form of a higher rate of return.

economic profit The difference between to- tal revenue and total economic cost. Eco- nomic cost includes a “normal” rate of return on the capital contri- butions of the firm’s partners.

8 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

The risk-bearing theory of profits is explained in the context of normal profits, where normal is defined in terms of the relative risk of alternative investments. Normal profits for a high-risk firm, such as Las Vegas hotels and casinos, a biotech pharmaceutical company, or an oil field exploration well operator, should be higher than normal profits for firms of lesser risk, such as water utilities. For example, in 2005, the industry average return on net worth for the casino hotel/gaming industry was 12.6 percent, compared to 9 percent for the water utility industry.

Temporary Disequilibrium Theory of Profit Although there exists a long-run equilibrium normal rate of profit (adjusted for risk) that all firms should tend to earn, at any point in time, firms may find themselves earning a rate of return above or below this long-run normal return level. This can occur because of temporary dislocations (shocks) in various sectors of the economy. Rates of return in the oil industry rose substantially when the price of crude oil doubled from $75 in mid- 2007 to $146 in July 2008. However, those high returns declined sharply by late 2008, when oil market conditions led to excess supplies and the price of crude oil fell to $45.

Monopoly Theory of Profit In some industries, one firm is effectively able to dominate the market and persistently earn above-normal rates of return. This ability to dominate the market may arise from economies of scale (a situation in which one large firm, such as Boeing, can produce additional units of 747 aircraft at a lower cost than can smaller firms), control of essen- tial natural resources (crude oil), control of critical patents (biotech pharmaceutical firms), or governmental restrictions that prohibit competition (cable franchise owners). The conditions under which a monopolist can earn above-normal profits are discussed in greater depth in Chapter 11.

Innovation Theory of Profit The innovation theory of profit suggests that above-normal profits are the reward for successful innovations. Firms that develop high-quality products (such as Porsche) or successfully identify unique market opportunities (such as Apple) are rewarded with the potential for above-normal profits. Indeed, the U.S. patent system is designed to ensure that these above-normal return opportunities furnish strong incentives for continued innovation.

Managerial Efficiency Theory of Profit Closely related to the innovation theory is the managerial efficiency theory of profit. Above-normal profits can arise because of the exceptional managerial skills of well- managed firms. No single theory of profit can explain the observed profit rates in each industry, nor are these theories necessarily mutually exclusive. Profit performance is invariably the result of many factors, including differential risk, innovation, managerial skills, the existence of monopoly power, and chance occurrences.

OBJECTIVE OF THE FIRM

These theories of simple profit maximization as an objective of management are insight- ful, but they ignore the timing and risk of profit streams. Shareholder wealth maximiza- tion as an objective overcomes both these limitations.

Chapter 1: Introduction and Goals of the Firm 9

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Example Shareholder Wealth Maximization at Berkshire Hathaway Warren E. Buffett, chairman and CEO of Berkshire Hathaway, Inc., has described the long-term economic goal of Berkshire Hathaway as follows: “to maximize the average annual rate of gain in intrinsic business value on a per-share basis.”4 Berkshire’s book value per share has increased from $19.46 in 1964, when Buffett acquired the firm, to $141,537 in 2013, a compound annual rate of growth of 20.3 percent. The Standard and Poor’s 500 companies experienced 9.6 percent growth over this same time period.

Berkshire’s directors are all major stockholders. In addition, at least four of the directors have over 50 percent of their family’s net worth invested in Berkshire. Man- agers and directors own over 47 percent of the firm’s stock. As a result, Buffett’s firm has always placed a high priority on the goal of maximizing shareholder wealth.

4Annual Report, Berkshire Hathaway, Inc. (2005).

The Shareholder Wealth-Maximization Model of the Firm Shareholder wealth is measured by the market value of a firm’s common stock, which is equal to the present value of all expected future cash flows to equity owners discounted at the shareholders’ required rate of return, plus a value for the firm’s embedded real options:

V0 � ðShares OutstandingÞ ¼ π1ð1þ keÞ1 þ π2ð1þ keÞ2

þ π3ð1þ keÞ3 þ � � � þ π∞ð1þ keÞ∞

þ Real Option Value V0 � ðShares OutstandingÞ ¼ ∑

t=1

πt ð1þ keÞt

þ Real Option Value [1.1]

where V0 is the current value of a share of stock (the stock price), πt represents the eco- nomic profits expected in each of the future periods (from period 1 to ∞), and ke equals the required rate of return.

A number of different factors (like interest rates and economy-wide business cycles) influence the firm’s stock price in ways that are beyond the manager’s control, but many factors (like innovation and cost control) are not. Real option value represents the cost savings or revenue expansions that arise from preserving flexibility in the business plans the managers adopt. For example, the Southern Company saved $90 million in comply- ing with the Clean Air Act by adopting fuel-switching technology that allowed burning of alternative fuels (coal, fuel oil or natural gas) whenever the full cost of one input became cheaper than another.

Note that Equation 1.1 does take into account the timing of future profits. By dis- counting all future profits at the required rate of return, ke, Equation 1.1 shows that a dollar received in the future is worth less than a dollar received immediately. (The tech- niques of discounting to present value are explained in more detail in Chapter 2 and Appendix A at the end of the book.) Equation 1.1 also provides a way to evaluate differ- ent levels of risk since the higher the risk the higher the required rate of return ke used to discount the future cash flows, and the lower the present value. In short, shareholder value is determined by the amount, timing, and risk of the firm’s expected future profits.

shareholder wealth A measure of the value of a firm. Shareholder wealth is equal to the value of a firm’s com- mon stock, which, in turn, is equal to the present value of all fu- ture cash returns ex- pected to be generated by the firm for the benefit of its owners.

10 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Example Resource-Allocation Decisions and Shareholder Wealth: Apple Computer5

In distributing its stylish iPad personal computers and high tech iPhone smart phones, Apple has considered three distribution channels. On the one hand, copying Dell’s direct-to-the-consumer approach would entail buying components from Motor- ola, AMD, Intel, and so forth and then hiring third-party manufacturers to assemble what each customer ordered just-in-time to fulfill Internet or telephone sales. Inven- tories and capital equipment costs would be very low indeed; almost all costs would be variable. Alternatively, Apple could enter into distribution agreements with an independent electronics retailer like ComputerTree. Finally, Apple could retail its own products in Apple Stores. This third approach entails enormous capital invest- ment and a higher proportion of fixed cost, especially if the retail chain sought high visibility locations and needed lots of space.

When Apple opened its 147th retail store on Fifth Avenue in New York City. The location left little doubt as to the allocation of company resources to this new distri- bution strategy. Apple occupies a sprawling subterranean space topped by a glass cube that Steve Jobs himself designed, across from Central Park, opposite the famed Plaza Hotel. Apple’s profits in this most heavily trafficked tourist and retail corridor will rely on several initiatives: (1) in-store theatres for workshop training on iMac pro- grams to record music or edit home movies, (2) numerous technical experts available for troubleshooting with no waiting time, and (3) continuing investment in one of the world’s most valuable brands. Shortly after opening, Apple made $151 million in operating profits on $2.35 billion in sales at these Apple Stores, a 6.4 percent profit margin relative to approximately a 2 percent profit margin company wide.

5Based on Nick Wingfield, “How Apple’s Store Strategy Beat the Odds,” Wall Street Journal (May 17, 2006), p. B1.

SEPARATION OF OWNERSHIP AND CONTROL: THE PRINCIPAL-AGENT PROBLEM

Profit maximization and shareholder wealth maximization are very useful concepts when alternative choices can be easily identified and when the associated costs and revenues can be readily estimated. Examples include scheduling capacity for optimal production runs, determining an optimal inventory policy given sales patterns and available produc- tion facilities, introducing an established product in a new geographic market, and choosing whether to buy or lease a machine. In other cases, however, where the alterna- tives are harder to identify and the costs and benefits less clear, the goals of owners and managers are seldom aligned.

Divergent Objectives and Agency Conflict As sole proprietorships and closely held businesses grow into limited liability corpora- tions, the owners (the principals) frequently delegate decision-making authority to pro- fessional managers (the agents). Because the manager-agents usually have much less to lose than the owner-principals, the agents often seek acceptable levels (rather than a

Chapter 1: Introduction and Goals of the Firm 11

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

maximum) of profit and shareholder wealth while pursuing their own self-interests. This is known as a principal-agent problem or “agency conflict.”

For example, as crude oil prices fluctuated wildly by 30 to 50 percent, Exxon-Mobil’s managers once diversified the company into product lines like computer software devel- opment—an area where Exxon-Mobil had little or no expertise or competitive advantage. The managers were hoping that diversification would smooth out their executive bonuses tied to quarterly earnings, and it did. However, the decision to diversify ended up caus- ing an extended decline in the value of Exxon-Mobil’s stock.

Pursuing their own self-interests can also lead managers to focus on their own long- term job security. In some instances this can motivate them to limit the amount of risk taken by the firm because an unfavorable outcome resulting from the risk could lead to their dismissal. Kodak is a good example. In the early 2000s, Kodak’s executives didn’t want to risk developing immature digital photography products. When the demand for digital camera products subsequently soared, Kodak was left with too few markets for its traditional film products. In 2012, Kodak filed for bankruptcy.

Finally, the cash flow to owners erodes when the firm’s resources are diverted from their most productive uses to perks for managers. In 1988, RJR Nabisco was a firm that had become bloated with corporate retreats in Florida, an extensive fleet of corporate air- planes and hangars, and an executive fixation on an awful-tasting new product (the “smokeless” cigarette Premier). This left RJR Nabisco with substantially less value in the marketplace than would have been possible with better resource allocation decisions. Recognizing the value enhancement potential, Kohlberg Kravis Roberts & Co. (KKR) ini- tiated a hostile takeover bid and acquired RJR Nabisco for $25 billion in early 1989. The purchase price offered to common stockholders by KKR was $109 per share, much better than the $55 pre-takeover price. The new owners moved quickly to sell many of RJR’s poorly performing assets, slash operating expenses, and cancel the Premier project. Although the deal was heavily leveraged with a large amount of debt borrowed at high interest rates, a much-improved cash flow allowed KKR to pay down the debt within seven years, substantially ahead of schedule.

To forge a closer alliance between the interests of shareholders and managers, some companies structure a larger proportion of the manager’s compensation in the form of performance-based payments. For example, in 2011, CEO of Exxon-Mobil, Rex Tillotson received $17.9 million in restricted stock as long-term incentive pay (in addition to his $1.8 million salary and $2.3 million bonus for current performance). If Mr. Tillotson succeeds in raising shareholder value, he will profit handsomely in 2016 when his deferred compensation in the form of stock can be sold and converted to cash. Other firms like Hershey Foods, CSX, Union Carbide, and Berkshire Hathaway require senior managers and directors to own a substantial amount of company stock in order to align the pocketbook interests of managers directly with those of stockholders. In sum, how motivated a manager will be to act in the interests of the firm’s stockholders depends on the structure of his or her compensation package, the threat of dismissal, and the threat of takeover by a new group of owners.

Example Agency Costs and Corporate Restructuring: O.M. Scott & Sons6

The existence of high agency costs sometimes prompts firms to financially restructure themselves to achieve higher operating efficiencies. For example, the lawn products firm, O.M. Scott & Sons, was purchased by the Scott managers in a highly leveraged

(continued)

12 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

buyout (an MBO). Faced with large interest and principal payments and having the potential to profit directly from more efficient operation of the firm, the new owner- managers quickly put in place accounting controls and operating procedures designed to improve Scott’s performance. By monitoring inventory levels more closely and negotiating more aggressively with suppliers, the firm was able to reduce its average monthly working capital investment from an initial level of $75 million to $35 mil- lion. At the same time, new incentive pay for the sales force caused revenue to increase from $160 million to a record $200 million.

6A more complete discussion of the Scott experience can be found in Brett Duval Fromson, “Life after Debt: How LBOs Do It,” Fortune (March 13, 1989), pp. 91–92.

Agency Problem Principal-agent problems arise from the inherent unobservability of managerial effort combined with the presence of random disturbances in team production. The job performance of piecework garment workers is easily monitored, but the work effort of managers may not be observable at less-than-prohibitive cost. The creative ingenuity in anticipating and then proactively solving problems before they arise is inherently unobservable. Yet, this is what senior managers do. Owners know it when they see it, but often do not recognize when it is missing because a manager’s creative ingenuity is often inseparable from good and bad luck. Owners therefore find it difficult to know when to reward managers for upturns and when to blame them for poor performance.

Separation of ownership (shareholders) and control (management) in large corpora- tions permits managers to pursue goals, such as maximization of their own personal wel- fare, that are not always in the long-term interests of shareholders. As a result of pressure from large institutional shareholders, such as Fidelity Funds, from statutes such as Sarbanes-Oxley mandating stronger corporate governance, and from federal tax laws severely limiting the deductibility of executive pay, a growing number of corpora- tions are seeking to assure that a larger proportion of the manager’s pay occurs in the form of performance-based bonuses. They are doing so by (1) tying executive bonuses to the performance of comparably situated competitor companies, (2) by raising the per- formance hurdles that trigger executive bonuses, and (3) by eliminating severance packages that provide windfalls for executives whose poor performance leads to a take- over or their own dismissal.

Just prior to the Financial Crisis, CEOs of the 350 largest U.S. corporations were paid $6 million in 2005 in median total direct compensation. The 10 companies with the highest shareholder returns the previous five years paid $10.6 million in salary, bonus, and long-term incentives. The 10 companies with the lowest shareholder returns paid $1.6 million. Figure 1.3 shows that across these 350 companies, CEO total compensation has mirrored corporate profitability, spiking when profits grow and collapsing when profits decline. In the global economic crisis of 2008–2009, CEO salaries declined in 63 percent of NYSE Euronext companies, and bonuses and raises were frozen, cut, or eliminated in 47 percent and 52 percent, respectively.7

7“NYSE Euronext 2010 CEO Report,” NYSEMagazine.com (September 2009), p. 27.

Chapter 1: Introduction and Goals of the Firm 13

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Example Executive Performance Pay: General Electric8

As a representative example of a performance-based pay package, General Electric CEO Jeff Immelt had in 2006 a salary of $3.2 million, a cash bonus of $5.9 million, and gains on long-term incentives that converted to stock options of $3.8 million. GE distributes stock options to 45,000 of its 300,000 employees, but decided that one-half of CEO Jeff Immelt’s 250,000 “performance share units” should only convert to stock options if GE cash flow grew at an average of 10 percent or more for five years, and the other one-half should convert only if GE shareholder return exceeded the five- year cumulative total return on the S&P 500 index.

Basing these executive pay packages on demonstrated performance relative to industry and sector benchmarks has become something of a cause célèbre in the United States. The reason is that by 2011 median CEO total compensation of $10.6 million had grown to 258 times the $41,000 salary of the average U.S. worker. In Europe, the comparable figure is 38 times the median worker salary of $35,000, and similar multipliers to those in Europe apply in Asia. So, what U.S. CEOs get paid was the focus of much public policy discussion even before the pay scandals at AIG and Merrill Lynch/Bank of America.

8Based on http://people.forbes.com/rankings/jeffrey-r-immelt/36126.

FIGURE 1.3 CEO Pay Trends, 1999–2011

+25%

+15%

+5%

–15%

–25%

0 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2009 2010 2011

–5%

Corporate profits CEO compensation

2008

Source: Mercer Human Resource Consulting and The Hay Group.

14 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

In an attempt to mitigate these agency problems, firms incur several agency costs, which include the following:

1. Grants of restricted stock or deferred stock options to structure executive compensation in such a way as to align the incentives for management with shareholder interests.

2. Internal audits and accounting oversight boards to monitor management’s actions. In addition, many large creditors, especially banks, now monitor financial ratios and investment decisions of large debtor companies on a monthly or even biweekly basis. These initiatives strengthen the firm’s corporate governance.

3. Bonding expenditures and fraud liability insurance to protect the shareholders from managerial dishonesty.

4. Complex internal approval processes designed to limit managerial discretion, but which prevent timely responses to opportunities.

IMPLICATIONS OF SHAREHOLDER WEALTH MAXIMIZATION

Critics of those who want to align the interests of managers with equity owners often allege that maximizing shareholder wealth focuses on short-term payoffs—sometimes to the detriment of long-term profits. However, the evidence suggests just the opposite. Short-term cash flows reflect only a small fraction of the firm’s share price; the first 5 years of expected dividend payouts explain only 18 percent, and the first 10 years only 35 percent of the share prices of NYSE stocks.9 The goal of shareholder wealth maximization requires a long-term focus.

WHAT WENT RIGHT • WHAT WENT WRONG

Eli Lilly Depressed by Loss of Prozac Patent10 Pharmaceutical giants like GlaxoSmithKline, Merck, Pfizer, and Eli Lilly expend an average of $802 million to develop a new drug. It takes 12.3 years to research and test for efficacy and side effects, conduct clinical trials, and then produce and market a new drug. Only 4 in 100 candidate molecules or screening compounds lead to investigational new drugs (INDs). Only 5 in 200 of these INDs display sufficient efficacy in animal test- ing to warrant human trials. Clinical failure occurs in 6 of 10 human trials, and only half of the FDA-proposed drugs are ultimately approved. In sum, the joint proba- bility of successful drug discovery and development is just 0.04 × 0.025 × 0.4 × 0.5 = 0.0002, two hundredths of 1 percent. Those few patented drugs that do make it to the pharmacy shelves, especially the blockbusters with several billion dollars in sales, must contribute enough operating profit to recover the cost of all these R & D failures.

In 2000, one of the key extension patents for Eli Lilly’s blockbuster drug for the treatment of depression, Prozac, was overturned by a regulator and a U.S. federal judge. Within one month, Eli Lilly lost 70 percent of Prozac’s sales to the generic equivalents. Although this company has several other blockbusters, Eli Lilly’s share price plummeted 32 per- cent. CEO Sidney Taurel said he had made a mistake in not rolling out Prozac’s successor replacement drug when the patent extension for Prozac was first challenged. Taurel then moved quickly to establish a new management concept throughout the company. Now, each new Eli Lilly drug is assigned a team of scientists, marketers, and regulatory experts who oversee the entire life cycle of the product from research inception to patent expiration. The key function of these cross-functionally integrated teams is contingency anal- ysis and scenario planning to deal with the unexpected.

10C. Kennedy, F. Harris, and M. Lord, “Integrating Public Policy and Public Affairs into Pharmaceutical Marketing: Differential Pricing and the AIDS Pandemic,” Journal of Public Policy and Marketing (Fall 2004), pp. 1–23; and “Eli Lilly: Bloom and Blight,” The Economist (October 26, 2002), p. 60.

agency costs Costs associated with resolving conflicts of interest among shareholders, managers, and lenders.

9J. R. Woolridge, “Competitive Decline: Is a Myopic Stock Market to Blame?” Journal of Applied Corporate Finance (Spring 1988), pp. 26–36.

Chapter 1: Introduction and Goals of the Firm 15

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Admittedly, value-maximizing managers must manage change—sometimes radical changes in competition (free-wheeling electric power), in technology (Internet signal compression), in revenue collection (music), and in regulation (cigarettes)—but they must do so with an eye to the long-run sustainable profitability of the business. In short, value-maximizing managers must anticipate change and make contingency plans.

Shareholder wealth maximization also reflects dynamic changes in the information available to the public about a company’s expected future cash flows and foreseeable risks. An accounting scandal at Krispy Kreme caused the stock price to plummet from $41 to $20 per share in one month. Stock price also reflects not only the firm’s preexist- ing positive net present value investments, but also the firm’s strategic investment oppor- tunities (the “embedded real options”) a management team develops. Amgen, a biotechnology company, had shareholder value of $42 million in 1983 despite no sales, no cash flow, no capital assets, no patents, and poorly protected trade secrets. By 1993, Amgen had sales of over $1.4 billion and cash flow of $408 million annually. Amgen had developed and exercised enormously valuable strategic opportunities.

Example Amgen’s Potential Profitability Is Realized Amgen, Inc. uses state-of-the-art biotechnology to develop human pharmaceutical and diagnostic products. After a period of early losses during their start-up phase, profits increased steadily from $19 million in 1989 to $355 million in 1993 to $670 million in 1996. On the strength of royalty income from the sale of its Epogen product, a stimulator of red blood cell production, profits jumped to $900 million per year by 1999. In 2009, Amgen was valued at $60 billion with revenues and cash flows having continued to grow throughout the previous 10 years at 19 percent annually.

In general, only about 85 percent of shareholder value can be explained by even 30 years of cash flows.11 The remainder reflects the capitalized value of strategic flexibil- ity to expand some profitable lines of business, to abandon others, and to retain but delay investment in still others until more information becomes available. These addi- tional sources of equity value are referred to as embedded real options.

We need to address why NPV and option value are additive concepts. NPV was invented to value bonds where all the cash flows are known and guaranteed by contract. As a result, the NPV analysis adjusts for timing and for risk but ignores the value of flexibility present in some capital budgeting projects but not others. These so-called embedded options present the opportunity but not the obligation to take actions to max- imize the upside or minimize the downside of a capital investment. For example, invest- ing in a fuel-switching technology in power plants allows Southern Company to burn fuel oil when that input is cheap and burn natural gas when it is cheaper. Similarly, building two smaller assembly plants, one in Japan and another in the United States, allows Honda Camry production to be shifted as currency fluctuations cause costs to fall in one plant location relative to the other. In general, a company can create flexi- bility in their capital budgeting by: (1) facilitating follow-on projects through growth options, (2) exiting early without penalty through abandonment options, or (3) staging

11Woolridge, op. cit.

16 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

investment over a learning period until better information is available through deferral options. The scenario planning that comes from such financial thinking compares the value of expanding, leaving, or waiting to the opportunity loss from shrinking, staying, or immediate investment. Strategic flexibility of this sort expands upon the NPV from discounted cash flow alone.

Example Real Option Value Attributable to Fuel-Switching Technology at Southern Company Ninety-six percent of all companies employ NPV analysis.12 Eighty-five percent employ sensitivity analysis to better understand their capital investments. Only 67 percent of companies pursue the scenario planning and contingency analysis that underlies real option valuation. A tiny 11 percent of companies formally calculate the value of their embedded real options. That suggests an opportunity for recently trained managers to introduce these new techniques of capital budgeting to improve stockholder value. Southern Company recently calculated that its embedded real option from fuel-switching technology was worth more than $45 million on a capital budgeting proposal of approximately one-half billion dollars—so, the strategic flexibil- ity of a real option reduced cost approximately by almost 10 percent.

12Based on P. Ryan and G. Ryan, “Capital Budgeting Practices of the Fortune 1000: How Have Things Changed?” Journal of Business and Management (Fall 2002). pp. 355–364

Value-maximizing behavior on the part of managers is also distinguishable from satis- ficing behavior. Satisficers strive to “hit their targets” (e.g., on sales growth, return on investment, or safety ratings). Not value maximizers. Rather than trying to meet a stan- dard like 97 percent, 99 percent, or 99.9 percent error-free takeoffs and landings at O’Hare field in Chicago, or deliver a 9, 11, or 12.1 percent return on shareholders’ equity, the value-maximizing manager will commit himself or herself to continuous incremental improvements. Any time the marginal benefits of an action exceed its mar- ginal costs, the value-maximizing manager will respond “Just do it!”

Caveats to Maximizing Shareholder Value Managers should concentrate on maximizing shareholder value alone only if three con- ditions are met. These conditions require: (1) complete markets, (2) no significant asym- metric information, and (3) known recontracting costs. We now discuss how a violation of any of these conditions necessitates a much larger view of management’s role in firm decision making.

Complete Markets To directly influence a company’s cash flows, forward or futures markets as well as spot markets must be available for the firm’s inputs, outputs, and by- products. For example, forward and futures markets for crude oil and coffee bean inputs allow Texaco-Chevron and Starbucks coffeehouses to plan their costs with more accurate cash flow projections. For a small 3 to 5 percent fee known in advance, value- maximizing managers can lock in their input expense using the commodity futures mar- kets and avoid unexpected cost increases. This completeness of the markets allows a reduction in the cost-covering prices of gasoline and cappuccino.

Chapter 1: Introduction and Goals of the Firm 17

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Example Tradable Pollution Permits at Duke Power13

By establishing a market for tradable air pollution permits, the Clean Air Act set a price on the sulfur dioxide (SO2) by-product from burning high-sulfur coal. Uncon- trolled SO2 emissions from coal-fired power plants in the Midwest raised the acidity of rain and mist in eastern forests from Maine to Georgia to levels almost 100 times higher than the natural acidity of rainfall. Dead trees, peeling paint, increased asthma, and stone decomposition on buildings and monuments were the result.

To elicit substantial pollution abatement at the least cost, the Clean Air Act of 1990 authorized the Environmental Protection Agency to issue tradable pollution allowan- ces (TPAs) to 467 known SO2 polluters for approximately 70 percent of the previous year’s emissions. The utility companies doing the polluting then began to trade the allowances. Companies that were able to abate their emissions at a low cost sold their allowances to plants that couldn’t abate their emissions as cost effectively. In other words, the low-cost abaters who were able to cut their emissions cheaply could then sell their permits they didn’t need to higher-cost abaters. The result was that the nation’s air got 30 percent cleaner at the least possible cost.

As a result of the growing completeness of this market, electric utilities like Duke Power now know what expense line to incorporate in their cash flow projections for the SO2 by-products of operating with high-sulfur coal. TPAs can sell for more than $100 per ton, and a single utility plant operation may require 15,000 tons of permits or more. The continuous trade-off between installing $450 million pollution abate- ment equipment, utilizing higher-cost alternative fuels like low-sulfur coal and natural gas, or paying the current market price of these EPA-issued pollution permits can now be explicitly analyzed and the least-cost solutions found.

13Based on “Acid Rain: The Southern Company,” Harvard Business School Publishing, HBS: 9-792-060; “Cornering the Market,” Wall Street Journal (June 5, 1995), p. B1; and Economic Report of the President, February 2000 (Washington, DC: U.S.G.P.O., 2000), pp. 240–264.

No Asymmetric Information Monitoring and coordination problems within the corporation and contracting problems between sellers and buyers often arise because of asym- metric information. Line managers and employees can misunderstand what senior executives want when they challenge employees to find a thousand different ways to save 1 percent. At Food Lion such miscommunications elicited undesirable shortcuts in food preparation and storage. Diane Sawyer of ABC News then secretly recorded seafood-counter employ- ees spraying old salmon with a light concentration of ammonia to restore the red appear- ance of fresh fish. Clearly, this was not what the senior executives at Food Lion intended.

Building a good reputation with customers, workers, and the surrounding tax jurisdic- tion is one way companies deal with the problem of asymmetric information, and man- agers must attend to these reputational effects on shareholder value. We discuss the implications of asymmetric information further in Chapter 10.

Known Recontracting Costs Finally, to focus exclusively on the discounted pres- ent value of future cash flows necessitates that managers obtain not only sales revenue and expense estimates but also forecasts of future recontracting costs for pivotal inputs. Owners of professional sports teams are acutely aware of how unknown recontracting costs with star players can affect the value of their franchises. The same thing can occur with an indispensable one corporate executive. A CFO, COO, CMO, or CIO can

18 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

often “hold up” the firm’s owners when the time comes for contract renewals. In another arena, Westinghouse entered into long-term supply contracts to provide fuel rods to nuclear power plants across the country. Thereafter, when the market price of uranium quadrupled, Westinghouse refused to deliver the promised fuel rods, and recontracting costs skyrocketed. Value-maximizing managers must anticipate and mitigate these recon- tracting problems.

To the extent markets are incomplete, information is asymmetric, or recontracting costs are unknown, managers must attend to these matters in order to maximize share- holder wealth rather than simply focus myopically on maximizing profits.

Residual Claimants Why is it that the primary duty of management and the board of directors of a company is to the shareholders themselves? Shareholders have a residual claim on the firm’s net cash flows after all expected contractual returns have been paid. All the other stake- holders (employees, customers, bondholders, banks, suppliers, the surrounding tax juris- dictions, the community in which plants are located, etc.) have contractual expected returns. If expectations created by those contracts are not met, any of these stakeholders has access to the full force of the contract law in securing what they are due. Share- holders have contractual rights, too, but those rights simply entitle them to whatever is left over, that is, to the residual. As a consequence, when shareholder owners hire a CEO and a board, they create a fiduciary duty to allocate the company’s resources in such a way as to maximize the net present value of these residual claims. This is what constitu- tes the objective of shareholder wealth maximization.

Be very clear, however, that the value of any company’s stock is quite dependent on reputation effects. Underfunding a pension plan or polluting the environment results in massive losses of capitalized value because the financial markets anticipate (correctly) that such a company will have reduced future cash flows to owners. Labor costs to attract new employees will rise; tax jurisdictions will reduce the tax preferences offered in new plant locations; customers may boycott; and the public relations, lobbying, and legal costs of such a company will surely rise. All this implies that wealth-maximizing managers must be very carefully attuned to stakeholder interests precisely because it is in their shareholders’ best interests to do so.

Goals in the Public Sector and Not-for-Profit Enterprises14

The value-maximization objective developed for private sector firms is not an appropri- ate objective in the public sector or in not-for-profit (NFP) organizations. These organi- zations pursue a different set of objectives because of the nature of the goods and services they supply and the manner in which they are funded.

There are three characteristics of NFP organizations that distinguish them from for- profit enterprises and influence their decision making. First, no one possesses a right to receive profit or surpluses in an NFP enterprise. This absence of a profit motive can have a serious impact on the incentive to be efficient. Second, NFP enterprises are exempt from taxes on corporate income. Finally, donations to NFPs are tax deductible, which gives NFP enterprises an advantage when competing for capital.

Not-for-profit organizations include performing arts groups, museums, libraries, hos- pitals, churches, volunteer organizations, cooperatives, credit unions, labor unions, pro- fessional societies, foundations, and fraternal organizations. Some of these organizations

14This section draws heavily on Burton A. Weisbrod, The Nonprofit Economy (Cambridge, MA: Harvard University Press, 1988).

Chapter 1: Introduction and Goals of the Firm 19

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

offer services to a group of clients, such as the patients of a hospital. Others provide ser- vices primarily to their members such as tennis clubs or credit unions. Finally, some NFP organizations produce products to benefit the general public. Local symphony and theater companies are examples.

NFPs as well as government agencies tend to provide services that have significant public-good characteristics. In contrast to private goods, like a bite-sized candy bar, a public good can be consumed by more than one person. Moreover, excluding those who do not pay can only be done at a prohibitively high cost. Examples of public goods include national defense and flood control. If an antiballistic missile system or a flood control levy is constructed, no one can be excluded from its protection even those that refuse to contribute to the cost. Therefore, even if exclusion were feasible, the indi- visibility of missile defense or flood control makes the incremental cost (and therefore the efficient price) of adding another participant quite low.

Some goods, such as recreational facilities and the performing arts, have both private- good and public-good characteristics. For example, concerts and parks may be shared (within limits) and are partially non-excludable in the sense that they convey prestige and quality-of-life benefits to the entire community.15 The more costly the exclusion, the more likely the good or service will be provided by the public sector rather than the private sector. Portrait artists and personal fitness trainers offer pay-as-you-go private fee arrangements. Chamber music fans and tennis court users often organize in consumption-sharing and cost-sharing clubs. At the end of the spectrum, open-air sym- phony concerts and large parks usually necessitate some public financing.

Not-for-Profit Objectives Several organizational objectives have been suggested for the NFP enterprise. These include the following:

1. Maximizing the quantity and quality of output subject to a break-even budget constraint.

2. Maximizing the outcomes preferred by the NFP’s contributors. 3. Maximizing the longevity of the NFP’s administrators.

The Efficiency Objective in Not-for-Profit Organizations Cost-benefit analysis has been developed to more efficiently allocate public and NFP resources among competing uses. Because government and NFP spending is normally constrained by a budget ceiling, the goals actually used in practice can be any one of the following:

1. Maximize the benefits for given costs. 2. Minimize the costs while achieving a fixed level of benefits. 3. Maximize the net benefits (benefits minus costs).

Cost-benefit analysis is only one factor in the final decision, however. It does not incorporate many of the more subjective considerations or less easily quantifiable objec- tives, like how fair it might be. Such matters must be introduced at a later stage in the analysis, generally through the political process.

public goods Goods that may be consumed by more than one per- son at the same time with little or no extra cost, and for which it is expensive or impossi- ble to exclude those who do not pay.

15William J. Baumol and W. G. Bowen, Performing Arts: The Economic Dilemma (Brookfield, VT: Ashgate Publishing Co., 1993).

cost-benefit analysis A resource- allocation model that can be used by public sector and not- for-profit organizations to evaluate programs or investments on the basis of the magnitude of the discounted costs and benefits.

20 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

SUMMARY

n Managers are responsible for proactively solving problems in the current business model, for setting stretch goals, establishing the vision, and setting strategy for future business, for monitoring team- work, and integrating the operations, marketing, and finance functions.

n Teamwork is subject to moral hazard because shirking one’s duty is a dominant strategy in one time only prisoners’ dilemmas. Hiring managers as monitors of teamwork may mitigate the moral haz- ard problem and elicit mutually cooperative best efforts from all members of a team.

n Economic profit is defined as the difference between total revenues and total economic costs. Economic costs include a normal rate of return on the capital contributed by the firm’s owners. Economic profits exist to compensate investors for the risk they assume, because of temporary disequilibrium con- ditions, because of the existence of monopoly power, and as a reward to firms that are especially innovative or highly efficient.

n As an overall objective of the firm, the shareholder wealth-maximization model is flexible enough to account for differential levels of risk and timing differences in the receipt of benefits and the incur- ring of future costs. Shareholder wealth captures the net present value of future cash flows to owners from positive NPV projects plus the value of embedded real options. The latter place a dollar value on strategic flexibility.

n Managers may not always behave in a manner consistent with the shareholder wealth- maximization objective. The agency costs associ- ated with preventing or at least mitigating these deviations from the owner-principal’s objective are substantial.

n Random changes in company performance, per- haps unrelated to a manager’s effort, combined with the unobservable nature of their task—to apply creative ingenuity in proactive problem solv- ing—presents a difficult principal-agent problem to resolve. Owner-principals seldom know when to

blame manager-agents for weak company perfor- mances or give them credit for strong performances either of which may have resulted from chance.

n Governance mechanisms (including internal moni- toring by subcommittees appointed by boards of directors and large creditors, internal/external monitoring by large block shareholders, auditing and variance analysis) can be used to limit mana- gerial discretion and thereby mitigate agency problems.

n Shareholder wealth maximization implies a firm should be forward-looking, dynamic, and have a long-term outlook; anticipate and manage change; acquire strategic investment opportunities; and maximize the present value of expected cash flows to owners within the boundaries of the statutory law, administrative law, and ethical standards of conduct.

n Shareholder wealth maximization will be difficult to achieve when firms suffer from problems related to incomplete markets, asymmetric information, and unknown recontracting costs. In the absence of these complications, managers should maximize the present value of the discounted future net cash flows to residual claimants—namely, equity owners. If any of the complicating factors is pres- ent, managers must first attend to those issues before attempting to maximize shareholder wealth.

n Not-for-profit enterprises exist to supply a good or service desired by their primary contributors.

n Public sector organizations often provide services having significant public-good characteristics. Pub- lic goods are goods that can be consumed by more than one person at a time with little additional cost, and for which excluding those who do not pay for the goods is exceptionally difficult or prohibitively expensive.

n Regardless of their specific objectives, both public and private institutions should seek to furnish their goods or services in the most efficient way, that is, at the least cost possible.

Chapter 1: Introduction and Goals of the Firm 21

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Exercises

Answers to the exer- cises in blue can be found in Appendix D

at the back of the book.

1. One of the approaches for the Southern Company to comply with the Clean Air Act is to adopt fuel-switching technology. Do you think this strategic flexibility would have value to Southern Company’s shareholders? Why?

2. Explain several dimensions of the shareholder-principal conflict with manager- agents known as the principal-agent problem. To mitigate agency problems between senior executives and shareholders, should the compensation committee of the board devote more to executive salary and bonus (cash compensation) or more to long- term incentives? Why? What role does each type of pay play in motivating managers?

3. Corporate profitability declined by 20 percent from 2008 to 2009. What performance percentage would you use to trigger executive bonuses for that year? Why? What issues would arise with hiring and retaining the best managers?

4. In the Southern Company Managerial Challenge, which alternative for complying with the Clean Air Act creates the greatest real option value? How exactly does that alternative save money? Why? Explain why installing a scrubber “burns” this option.

5. Firms in the patented pharmaceutical industry earned an average return on net worth of 22 percent in 2006, compared with an average return of 14 percent earned by over 1,400 firms followed by Value Line. Which theory or theories of profit do you think best explain(s) the performance of the drug industry?

6. In the context of the shareholder wealth-maximization model of a firm, what is the expected impact of each of the following events on the value of the firm? Explain why. a. New foreign competitors enter the market. b. Strict pollution control requirements are enacted. c. A previously nonunion workforce votes to unionize. d. The rate of inflation increases substantially. e. A major technological breakthrough is achieved by the firm, reducing its costs of

production. 7. In 2008–2009, the price of jet and diesel fuel used by air freight companies decreased

dramatically. As the CEO of FedEx, you have been presented with the following pro- posals to deal with the situation: a. Reduce shipping rates to reflect the expense reduction. b. Increase the number of deliveries per day in some markets. c. Make long-term contracts to buy jet fuel and diesel at a fixed price for the next

two years and set shipping rates to a level that will cover these costs. Evaluate these alternatives in the context of the decision-making model presented in the text.

8. How would each of the following actions be expected to affect shareholder wealth? a. Southern Company adopts fuel-switching technology at its largest power plants. b. Ford Motor Company pays $2.5 billion for Jaguar. c. General Motors offers large rebates to stimulate sales of its automobiles. d. Rising interest rates cause the required returns of shareholders to increase. e. Import restrictions are placed on the French competitors of Napa wineries. f. There is a sudden drop in the expected future rate of inflation. g. A new, labor-saving machine is purchased by Wonder Bread and results in the

layoff of 300 employees.

22 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Case Exercises Designing a Managerial Incentives Contract

Specific Electric Co. asks you to implement a pay-for-performance incentive contract for its new CEO and four EVPs on the Executive Committee. The five managers can either work really hard with 70 hour weeks at a personal opportunity cost of $200,000 in reduced personal entrepreneurship and increased stress-related health care costs or they can reduce effort, thereby avoiding the personal costs. The CEO and EVPs face three possible random outcomes: the probability of the company experiencing good luck is 30 percent, medium luck is 40 percent, and bad luck is 30 percent. Although the senior management team can distinguish the three “states” of luck as the quarter unfolds, the Compensation Committee of the Board of Directors (and the shareholders) cannot do so. Once the board designs an incentive contract, soon thereafter the good, medium, or bad luck occurs, and thereafter the senior managers decide to expend high or reduced work effort. One of the observable shareholder values listed below then results.

SHAREHOLDER VALUE

GOOD LUCK

(30%)

MEDIUM LUCK

(40%)

BAD LUCK

(30%)

High Effort $1,000,000,000 $800,000,000 $500,000,000

Reduced Effort $ 800,000,000 $500,000,000 $300,000,000

Assume the company has 10 million shares outstanding offered at a $65 initial share price, implying a $650,000,000 initial shareholder value. Since the EVPs and CEOs effort and the company’s luck are unobservable to the owners and company directors, it is not possible when the company’s share price falls to $50 and the company’s value to $500,000,000 to distinguish whether the company experienced reduced effort and medium luck or high effort and bad luck. Similarly, it is not possible to distinguish reduced effort and good luck from high effort and medium luck.

Answer the following questions from the perspective of a member of the Compensation Committee of the board of directors who is aligned with shareholders’ interests and is decid- ing on a performance-based pay plan (an “incentive contract”) for the CEO and EVPs.

Questions 1. What is the maximum amount it would be worth to shareholders to elicit high

effort all of the time rather than reduced effort all of the time? 2. If you decide to pay 1 percent of this amount (in Question 1) as a cash bonus,

what performance level (what share price or shareholder value) in the table should trigger the bonus? Suppose you decide to elicit high effort by paying a bonus should the company’s value rise to $800,000,000. What two criticisms can you see of this incentive contract plan?

3. Suppose you decide to elicit high effort by paying a bonus only for an increase in the company’s value to $1,000,000,000. When, and if, good luck occurs, what two criticisms can you see of this incentive contract plan?

4. Suppose you decide to elicit high effort by paying the bonus when the company’s value falls to $500,000,000. When, and if, bad luck occurs, what two criticisms can you see of this incentive contract plan?

5. If the bonus compensation scheme must be announced in advance, and if you must pick one of the three choices in questions 2, 3 and 4, which one would you pick and

Chapter 1: Introduction and Goals of the Firm 23

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

why? In other words, under incomplete information, what is the optimal decision by the Board’s Compensation Committee dedicated to act in the shareholders’ interest?

6. Audits are basically sampling procedures to verify with a predetermined accuracy the sources and uses of the company receipts and expenditures; the larger the sam- ple, the higher the accuracy. In an effort to identify the share price that should trig- ger a bonus, how much would you, the Compensation Committee, be willing to pay an auditing consultant who could sample the expense and revenue flows in real time and deliver perfect forecasting information about the “luck” the firm’s sales force is experiencing? Compare shareholder value with this perfect forecast information rel- ative to the best choice among the bonus plans you selected in Question 5. Define the difference as the Potential Value of Perfect Forecast Information.

7. Design a stock option-based incentive plan to elicit high effort. Show that one mil- lion stock options at a $70 exercise price improve shareholder value relative to the best of the cash bonus plans chosen in Question 5.

8. Design an incentive plan that seeks to elicit high effort by granting restricted stock. Show that one-half million shares granted at $70 improves shareholder value rela- tive to all prior alternatives.

9. Sketch the game tree for designing this optimal managerial incentive contract among the alternatives in question 2, 3, and 4. Who makes the first choice? Who the second? What role does randomness play? Which bonus pay contract represents a best reply response in each endgame? Which bonus pay contract should the Compensation Committee of the Board select to maximize expected value? How does that compare with your selection based on the contingent claims analysis in Questions 1–8?

Shareholder Value of Renewable Energy from Wind Power at Hydro Co.:16 Is RE < C? Despite a decade of subsidies and considerable success in Denmark, Germany, and Britain, renewable energy in the U.S. accounts for only 7 to 8 percent of total energy consumption. Hydroelectric power remains the most successful source of renewable energy in the United States where it accounts for 2.8 percent at a cost of $0.89/kwh (see Figure 1.4). Ethanol and other biofuels account for 1.6 percent, and surprisingly wind power and solar power are good for only 0.7 percent and 0.1 percent, respectively. Part of the explanation is that the EU is more ambitious, setting a stretch goal of 20 percent of energy consumption from renewable by 2020.

Electricity from renewables in the United States must compete against conventional fos- sil fuels averaging approximately $.11/kwh costs nationwide. Land-based wind turbines, for example, have now become as inexpensive as conventional coal and natural gas at $.096/kwh and $.098/kwh, respectively, accounting for plant construction, fuel, maintenance, and other operating costs (again see Figure 1.4). Of course with carbon capture and storage, coal becomes much more expensive at $.141/kwh. The extensive shale gas discoveries in the U.S. have made combined-cycle natural gas-fired power plants cheaper than coal at $.092/kwh.

Solar energy remains a huge disappointment. Photovoltaic technology and storage has progressed but remains in its infancy such that the ratio of yield onto the electric grid relative to 24-day potential capacity is only 25 percent. Steam-generating solar farms have an even lower energy conversion factor of 20 percent. Consequently even though solar capacity can be dispersed to individual rooftop installations and transmission costs are therefore much lower than wind or geothermal power, solar energy remains the most expensive source of renewable energy at $.153/kwh. With much better technology, geo- thermal and biomass are major RE successes at $.098/kwh and $.115/kwh, respectively.

16Based on Frederick Harris, Alternative Energy Symposium, Wake Forest University (September 19, 2008).

24 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Wind farms and massive solar collector arrays already provide 20 percent of the elec- tric power generation in Denmark and 15 percent in Germany. Hydro, a Norwegian alu- minum company, has established wind turbine pilot projects where entire communities are electricity self-sufficient. At 80 meters of elevation, class 3 wind energy (steady 22 kph breeze) is available almost everywhere on the planet, implying wind power potential worldwide of 72 million megawatts. Harvesting just the best 5 percent of this wind energy (3.6 million megawatts) would make it possible to retire several thousand coal- fired power plants, 617 of which operate in the United States today.17

So-called alternative energy is: (1) renewable, (2) in abundant local supply, and (3) gen- erates a low carbon footprint. Renewables are naturally replenishing sources including wind, solar, hydro, biofuel, biomass, geothermal, tidal, ocean current, and wave energy. Nuclear energy is not renewable because of the waste disposal issues. To date, by far the most successful renewables are hydroelectric power plants and ethanol-based biofuels, each accounting for about 2 percent of energy worldwide. New sources of renewable energy such as wind and solar power are often judged against fuel oil at $15, natural gas at $6, and coal at $4 per million BTUs (see Figure 1.5). One ton of plentiful high-sulfur-content coal generates approximately a megawatt of electricity and a ton of carbon dioxide (CO2). In 2008, the European Union’s cap-and-trade legislation to reduce carbon emissions imposed a $.023 per ton additional CO2 emissions charge atop the $.085 purchase price of coal. Finding renewable energy sources that have full costs lower than coal’s $.023 + $.085 ¼ $.108 for a megawatt hour (RE < C) is a reasonable objective of energy policy. 17Older, smaller 500-megawatt coal-fired plants have adopted little pollution abatement technology. Nuclear power plants are much larger, generating typically 2,000 megawatts of electricity. Duke Power’s Belews Creek plant at 2,200 megawatts is one of the largest coal-fired power plants in the United States (see Figure 1.1). Following the installation of a $450 million smokestack scrubber, it is also one of the cleanest.

FIGURE 1.4 U.S. Average Cost for Electricity Generation 2012 (equilibrium P = $0.11/kwh)

Hy dr

o

Na tu

ral G

as Fi

red w

/C CS

Wi nd

Ge ot

he rm

al

Co nv

en tio

na l C

oa l

Ad va

nc ed

N uc

lea r

Bio ma

ss

Ad va

nc ed

Co al

wi th

CC S

0.000

ce nt

s/ kw

h

0.050

0.100

0.150

0.200

0.250

0.300

So lar

Th erm

al

So lar

PV

© Ce ng ag e Le ar ni ng

20 14

Chapter 1: Introduction and Goals of the Firm 25

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

Why pursue wind and solar power rather than other alternative energy sources? Nuclear energy has a decades-long timeline for construction and permitting especially of nuclear waste disposal sites. Corn-based ethanol runs up the cost of animal feedstocks and raises food prices. In addition, corn contains only one-eighth the BTUs of sugarcane, which is in abundant supply in the Caribbean and Brazil. Unfortunately, the U.S. Congress has placed a $0.54 per gallon tariff on sugarcane-based ethanol. Natural gas is 80 percent cleaner than coal and extraordinarily abundant in the United States, the world’s biggest energy user at 21 million barrels per day (mbd), 13 mbd being imported. The United States contains almost 30 percent of the known deposits worldwide of natu- ral gas (and coal) but only 3 percent of the proven reserves of crude oil.

A 0.6 megawatt wind turbine that costs $1.2 million today will generate $4.4 million in discounted net present value of electricity over a 15-year period, sufficient to power 440 Western European or American households with 100 percent capacity utilization and continuous 15 mph wind.18 Mechanical energy in the turbine is converted directly into electrical potential energy with a magnetic coil generator. When the wind does not blow, Hydro has demonstrated and patented a load-shifting technology that consists of a hydrolysis electrolyzer splitting water into oxygen and hydrogen, a hydrogen storage container, and a fuel cell to convert the hydrogen chemical energy back to electrical cur- rent (see Figure 1.6). With the three extra pieces of equipment, the capital investment rises from $1.2 million to $2.7 million. Even so, wind power can be quite profitable with full cost recovery periods as short as seven years under ideal operating conditions.

Of course, frequently the operating conditions with wind power are far less than ideal. Despite the presence of wind at elevation across the globe, few communities want 80+ meter wind turbines as tall as a football field in their backyard sight lines. Lower instal- lations result in less wind and therefore less electricity. In addition, the conversion of one form of energy to another always burns energy. In Hydro’s load-shifting process of convert- ing mechanical energy from the turbine to chemical energy in the electrolyzer and then to electrical energy in the hydrogen fuel cell, about 30 percent of the maximum energy coming

18600,000 kilowatt hours × $0.11 average electricity rates × 24 hours × 365 days equals $578,160 per year for 15 years of expected working life of the turbine. Based on “Hydro: From Utsira to Future Energy Solutions,” Ivey School of Business, Case #906M44, 2006.

FIGURE 1.5 RE < C? Can Renewable Energy Cost Less Than Coal?, 1999–2011

1999 2001 2003 2005

Coal

Natural gas

USD price per million BTU

Fuel oil

2007 2009 2011

5

10

15

20

Source: Thomson Datastream; U.S. Energy Information Administration.

26 Part I: Introduction

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 

 

directly to the electrical grid from the turbine’s generator when the wind is blowing hard and steady is lost. Experiments in many wind conditions at the Utsira site suggest that baseline output of Hydro’s pilot project in Norway has a maximum energy conversion factor (CF) of 70 percent with 60 percent more typical. Even lower 45 percent CFs are expected in typical operating conditions elsewhere. Seventy percent CF realizes $3.1 million of electricity.

Questions 1. As a value-maximizing aluminum company, should Hydro invest in wind power in

light of the Utsira pilot project? Why or why not? 2. Larger-scale turbines increase the electricity more than proportionately to the

increase in costs. A 1 megawatt turbine costs $2.6 million, with the remaining equipment costs unchanged, for a total required investment of $4.1 million to power approximately 760 households. Electricity revenue over 15 years rises to $7.2 million in discounted present value. What conversion factor allows cost recov- ery of this larger-scale turbine?

3. If the net present value of the Utsira project is negative, yet Hydro goes ahead and funds the investment anyway, what ethical obligations does Hydro have to its share- holders? Discuss the role of corporate social responsibility and of back-up plans to address the possible full costing of coal, as in the European Union where carbon per- mits for a ton of coal have at times increased coal resource costs by 25 percent.

4. On what basis could shareholder value possibly rise if Hydro invests in negative NPV wind power projects?

5. Electric power generation is responsible for 43 percent of all energy consumption in the United States. Coal provides the preponderant fuel (38 percent), with nuclear power (19 percent) and natural gas (30 percent) providing most of the rest. Renewable energy provides only 12 percent. Recently, T. Boone Pickens proposed converting the trucking fleet in the United States to liquefied natural gas (LNG) and using wind power to replace the missing LNG in electric power production. What infrastructure issues do you see that must be resolved before the Pickens plan could be adopted?

FIGURE 1.6 Continuous Electricity from Wind Power

Wind Turbine

(0.6 MWh)

Electrolyzer H2O → H2 + O

H2 Fuel Cell H2 + O → H2O

Hydro’s Patented Control &

Regulating System

H2 Storage

Electric Power

Grid

80% → $3.5 mil 70% → $3.1 mil 60% → $2.6 mil

$2.7 m Investment

CF:

© Ce ng ag e Le ar ni ng

20 11

Chapter 1: Introduction and Goals of the Firm 27

Copyright 201 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

 

USE PYTHON ONLY PLEASE

Zeller’s congruence is an algorithm developed by Christian Zeller to calculate the day of the week. The formula is

h = (q + 26(m+1)//10 + k + k//4 +j//4 +5j) % 7

where

– h is the day of the week (0: Saturday, 1: Sunday, 2: Monday, 3: Tuesday, 4: Wednesday, 5: Thursday, 6: Friday).
– q is the day of the month.
– m is the month (3: March, 4: April, …, 12: December). January and February are counted as months 13 and 14 of the previous year.
– j is year//100.
– k is the year of the century (i.e., year % 100).

Write a program that prompts the user to enter a year, month, and day of the month, and then it displays the name of the day of the week.

Sample Run 1

Enter year: (e.g., 2008): 2013

Enter month: 1-12: 1

Enter the day of the month: 1-31: 25

Day of the week is Friday

Sample Run 2

Enter year: (e.g., 2008): 2012

Enter month: 1-12: 5

Enter the day of the month: 1-31: 12

Day of the week is Saturday

Hint: Use the // operator for integer division. January and February are counted as 13 and 14 in the formula, so you need to convert the user input 1 to 13 and 2 to 14 for the month and change the year to the previous year.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Structure (Python) homework help

Data Structure (Python) homework help

# Course: CS261 – Data Structures # Assignment: 5 # Description: ‘Helper’ data structures class SLNode: def __init__(self, key: str, value: object) -> None: “”” Singly Linked List Node class DO NOT CHANGE THIS CLASS IN ANY WAY “”” self.next = None self.key = key self.value = value def __str__(self): “”” Return content of the node in human-readable form “”” return ‘(‘ + str(self.key) + ‘: ‘ + str(self.value) + ‘)’ class LinkedList: “”” Class implementing a Singly Linked List Supported methods are: insert, remove, contains, length, iterator DO NOT CHANGE THIS CLASS IN ANY WAY YOU ARE ALLOWED TO CREATE AND USE OBJECTS OF THIS CLASS IN YOUR SOLUTION “”” def __init__(self) -> None: “”” Init new SLL “”” self.head = None self.size = 0 def __str__(self) -> str: “”” Return content of SLL in human-readable form “”” content = ” if self.head is not None: content = str(self.head) cur = self.head.next while cur is not None: content += ‘ -> ‘ + str(cur) cur = cur.next return ‘SLL [‘ + content + ‘]’ def insert(self, key: str, value: object) -> None: “”” Insert new node at the beginning of the list “”” new_node = SLNode(key, value) new_node.next = self.head self.head = new_node self.size = self.size + 1 def remove(self, key: str) -> bool: “”” Remove first node with matching key Return True is some node was removed, False otherwise “”” prev, cur = None, self.head while cur is not None: if cur.key == key: if prev: prev.next = cur.next else: self.head = cur.next self.size -= 1 return True prev, cur = cur, cur.next return False def contains(self, key: str) -> SLNode: “”” If node with matching key in the list -> return pointer to that node (SLNode), otherwise return None “”” cur = self.head while cur is not None: if cur.key == key: return cur cur = cur.next return cur def length(self) -> int: “”” Return the length of the list “”” return self.size def __iter__(self) -> SLNode: “”” Provides iterator capability for the SLL class so it can be used in for … in … type of loops. EXAMPLE: for node in my_list: print(node.key, node.value) “”” cur = self.head while cur is not None: yield cur cur = cur.next class DynamicArray: “”” Class implementing a Dynamic Array Supported methods are: append, pop, swap, get_at_index, set_at_index, length DO NOT CHANGE THIS CLASS IN ANY WAY YOU ARE ALLOWED TO CREATE AND USE OBJECTS OF THIS CLASS IN YOUR SOLUTION “”” def __init__(self, arr=None): “”” Initialize new dynamic array “”” self.data = arr.copy() if arr else [] def __str__(self) -> str: “”” Return content of dynamic array in human-readable form “”” return str(self.data) def append(self, value: object) -> None: “”” Add new element at the end of the array “”” self.data.append(value) def pop(self) -> object: “”” Removes element from end of the array and return it “”” return self.data.pop() def swap(self, i: int, j: int) -> None: “”” Swaps values of two elements given their indicies “”” self.data[i], self.data[j] = self.data[j], self.data[i] def get_at_index(self, index: int) -> object: “”” Return value of element at a given index “”” return self.data[index] def __getitem__(self, index: int) -> object: “”” Return value of element at a given index using [] syntax “”” return self.get_at_index(index) def set_at_index(self, index: int, value: object) -> None: “”” Set value of element at a given index “”” self.data[index] = value def __setitem__(self, index: int, value: object) -> None: “”” Set value of element at a given index using [] syntax “”” self.set_at_index(index, value) def length(self) -> int: “”” Return the length of the DA “”” return len(self.data)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CS-340 2-1 Assignment:CRUD In MongoDB homework help

CS-340 2-1 Assignment:CRUD In MongoDB homework help

Please see attached for better formatting.

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

4 Datebase Management Questions homework help

4 Datebase Management Questions homework help

Answer the following questions. Other than #2 (problem and exercises 5), diagrams are required for all.

 

1. Problems and Exercises 3 (c, d, e) (Page 144) 25 Points

For simplicity, subtype discriminators were left off many figures in this chapter. Add subtype discriminator notation in each figure listed below. If necessary, create a new attribute for the discriminator.

c. Figure 3-4b (page 119)

d. Figure 3-7a (page 123)

e. Figure 3-7b (page 127)

2. Problems and Exercises 5 (Page 144) 25 Points

Refer to the EER diagram for patients in Figure 3-3 (page 118). Make any assumptions you believe are necessary. Develop sample definitions for each entity type, attribute, and relationship in the diagram.

3. Problems and Exercises 8 (Page 144) 25 Points

At a weekend retreat, the entity type PERSON has three subtypes: CAMPER, BIKER, and RUNNER. Draw a separate EER diagram segment for each of the following situations:

 

1. At a given time, a person must be exactly one of these subtypes.

2. A person may or may not be one of these subtypes. However, a person who is one of these subtypes cannot at the same time be one of the other subtypes.

3. A person may or may not be one of these subtypes. On the other hand, a person may be any two (or even three) of these subtypes at the same time.

4. d. At a given time, a person must be at least one of these subtypes.

 

 

4. Problems and Exercises 9 (Page 144) 25 Points

A bank has three types of accounts: checking, savings, and loan. Following are the attributes for each type of account:

CHECKING: Acct No, Date Opened, Balance, Service Charge

SAVINGS: Acct No, Date Opened, Balance, Interest Rate

LOAN: Acct No, Date Opened, Balance, Interest Rate, Payment

 

Assume that each bank account must be a member of exactly one of these subtypes. Using generalization, develop an EER model segment to represent this situation

using the traditional EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor. Remember to include a subtype discriminator.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Microsoft Worksheet homework help

Microsoft Worksheet homework help

.Field ame Data Type

Fei:tlD Short Text

Fed:il!izetl’..;J’ ame S ort Text

N tri,entRa , · o Short Text

Pric.e C i:ency

A Skills Approach: Access 2016 Chapter 2: Working with Tables

Challenge Yourself 2.3 In this project, you will continue working with the greenhouse database from Chapter 1, Challenge Yourself 1.3. You will add a new table to keep track of the fertilizers used in the greenhouse and the plants that use them. You will make changes to the Plants, Employees, and MaintenanceLog tables including adding fields, deleting fields, and modifying field properties. You will also create and modify table relationships. This project has been modified for use in SIMnet®

Skills needed to complete this project: • Creating a Table in Design View and Setting the Primary Key • Modifying the Field Size Property • Renaming Fields • Setting the Default Value Property • Adding Fields in Datasheet View • Adding a Lookup Field from Another Table • Deleting Fields in Datasheet View • Working with Attachment Fields • Adding a Lookup Field from a List • Inserting, Deleting, and Moving Fields in Design View • Using Quick Start to Add Related Fields • Changing Data Type • Formatting Fields • Creating Relationships • Enforcing Deletions and Updates in Relationships

IMPORTANT: Download the resource file needed for this project from the Resources link. Be sure to extract the file after downloading the resources zipped folder. Please visit SIMnet Instant Help for step-by- step instructions.

1. Open the start file AC2016-ChallengeYourself-2-3.

2. If necessary, enable active content by clicking the Enable Content button in the Message Bar.

3. The file will be renamed automatically to include your name. Change the project file name if directed to

do so by your instructor.

4. Create a new table in Design view using the following data.

Step 1 Download start file

a.

b.

c.

d.

e. Set the FertID field as the primary key.

f. Save the table with the name the table: Fertilizers

g. Close the table.

5. Open the Plants table and make the following changes. You may work in Datasheet view or Design view

as appropriate.

1 | Page Challenge Yourself 2.3 Last Updated 3/15/18

A Skills Approach: Access 2016 Chapter 2: Working with Tables

a. Set the field size for the PlantID field to: 10

b. Rename the FlowerColor field to: PrimaryColor

c. Set the Default Value property for the PrimaryColor field to white.

d. Add a lookup field named PreferredFertilizer to the end of the Plants table to reference

the FertilizerName field in the Fertilizers table. The lookup list should be sorted alphabetically by the

FertilizerName data. The primary key field should be hidden. Enforce referential integrity. Download Resources

e. Add an Attachment field after the PreferredFertilizer field. Add the image geranium.jpg to the record

for the spotted geranium.

f. Delete the MaxHeightFeet field.

g. Save and close the table.

6. Open the Employees table and make the following changes. You may work in Datasheet view or Design

view as appropriate.

a. Move the LastName field so it appears before the FirstName field. Hint: Make the change in Design

view so the change is applied to the underlying structure of the table.

b. Add the Phone Quick Start fields between the FirstName and Position fields.

c. Modify the Position field to use a lookup list with the following values: Supervisor,

Greenhouse Tech 1, and Greenhouse Tech 2. Hint: Use the Lookup Wizard to

create the lookup list and enter the values yourself. Double-click the right border of the Col1 column

in the wizard to AutoFit the column to the data.

d. Save and close the table.

7. Open the MaintenanceLog table and make the following changes:

a. Change the data type for the Watered field from Short Text to Yes/No.

b. Change the data type for the Inspected field from Short Text to Yes/No.

c. Change the data type for the Pruned field from Short Text to Yes/No.

d. Change the format for the MaintenanceDate field to Medium Date.

e. Save and close the table.

8. Review the table relationships and make the following changes.

a. Create a one-to-many relationship between the PlantID field in the Plants table and the PlantID

field in the MaintenanceLog table. Enforce referential integrity.

b. Modify the relationship between the EmployeeID field in the Employees table and the

EmployeeID field in the MaintenanceLog table so any deletions or changes to the EmployeeID in

the Employees table will be carried through to the EmployeeID field in the MaintenanceLog table.

c. Close the Relationships window, saving the layout changes.

2 | Page Challenge Yourself 2.3 Last Updated 3/15/18

Step 3 Grade my Project

Step 2 Upload & Save

A Skills Approach: Access 2016 Chapter 2: Working with Tables

3 | Page Challenge Yourself 2.3 Last Updated 3/15/18

9. Close the database and exit Access.

10. Upload and save the project file.

11. Submit project for grading.

  • Challenge Yourself 2.3
    • Skills needed to complete this project:
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

PSEUDOCODE

MUST BE COMPLETED TODAY AT 9PM EST!!!!!

1. Train Ticket

Train Ticket for one person. Write a program that reads a person’s age, then computes and displays the price the person needs to pay for the train ride according to the following rules:

  • Children younger than 6 years old ride for free.
  • If the ticket is bought at the train station:
    • A person over 70 years old pays $5.20
    • Everyone else pays $11.50.
  • If ticket is bought inside the train, there is an extra charge of 15% compared to train station prices.

Note that a person’s age is within the range of 0 to 120 years. Other inputs are considered error conditions.

1.1- Inputs, Outputs and Error Conditions

In the space below, determine the inputs, outputs and error conditions for the problem.

1.2- Algorithms
In the space below, write your algorithm using pseudocode

1.3- Test cases

In the space below, list a thorough set of test cases for your program. Write in the following format [inputs], where the inputs are separated by commas. [inputs][output]

2. Bank

A bank charges fees and/or gives interest based on the balance of a customer. Write a program that reads the customer balance then calculates and displays the new balance after the application of fees and or interest based on the following rules:

• A negative balance incurs a $50 overdraft fee. • A balance below $500 (but positive) incur on a $10 maintenance fee. • A balance from $500 to $1000 (inclusive) gain 0.1% interest. • A balance over $1000 will gain 2% interest.

2.1-Input, Output, Error Conditions

In the space below, determine the inputs, outputs and error conditions for the problem.

2.2- Algorithm

In the space below, write your algorithm using pseudocode

2.3- Test cases

In the space bellow, list a thorough set of test cases for your program. Write in the following format [inputs], where the inputs are separated by commas. [inputs][output]

3. Count Operations – WCS111 FM

WCS111 FM, a radio station by computer scientists for computer scientists. The station runs a contest where listeners win prizes based on how many hours they spend programming in Java. The following program displays the listener prize based on the number of hours spent programming.

3.1- Minimum

What is the minimum number of operations that can be executed in the code?

3.2- Maximum

What is the maximum number of operations that can be executed in the code?

4. Count Operations – Lucky Twos

Lucky Twos determines and displays the number of digits that are 2s in a whole number. For example, the number of 2s in 3487 is 0, while the number of 2s in 272521 is 3. Note: whole numbers are non-negative integers starting at zero 0, 1, 2, 3, 4. Assume that the fractional part is discarded in the division: 10 / 4 = 2 8 / 5  = 1 20 / 3 = 6

4.1- Let n be the number of digits of the whole number. What is the number of operations that are executed in the code in terms of n?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Communications And Computer Network homework help

Data Communications And Computer Network homework help

Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States

 

 

S E V E N T H E D I T I O N

Data Communications and Computer Networks A Business User’s Approach

Curt M. White DePaul University

Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States

 

 

Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White

Editor-In-Chief: Joe Sabatino

Senior Acquisitions Editor: Charles McCormick, Jr.

Senior Product Manager: Kate Mason

Editorial Assistant: Courtney Bavaro

Marketing Director: Keri Witman

Marketing Manager: Adam Marsh

Senior Marketing Communications Manager: Libby Shipp

Marketing Coordinator: Suellen Ruttkay

Media Editor: Chris Valentine

Art and Cover Direction, Production Management, and Composition: PreMediaGlobal

Cover Credit: © Masterfile Royalty Free

Manufacturing Coordinator: Julio Esperas

© 2013 Course Technology, Cengage Learning

ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher.

For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706.

For permission to use material from this text or product, submit all requests online at cengage.com/permissions.

Further permissions questions can be e-mailed to permissionrequest@cengage.com.

Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers.

Library of Congress Control Number: 2011942796

ISBN 13: 978-1-133-62646-6

ISBN 10: 1-133-62646-7

Instructor Edition:

ISBN 13: 978-1-133-62721-0

ISBN 10: 1-133-62721-8

Course Technology 20 Channel Center Street Boston, MA 02210 USA

Microsoft, the Office logo, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Course Technology, a part of Cengage Learning, is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. UNIX® is a registered trademark of The Open Group

Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.

iPhone, iPad, iPod, Nano, and Mac OS X Server are registered trademarks of Apple Inc.

Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice.

Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: www.cengage.com/global

Printed in the United States of America 1 2 3 4 5 6 7 15 14 13 12 11

 

 

To Kathleen, Hannah Colleen, and Samuel Memphis—it’s never boring

Data Communications And Computer Network homework help

 

This page intentionally left blank

 

 

Brief Contents

PREFACE xv

1 Introduction to Computer Networks and Data Communications 1

2 Fundamentals of Data and Signals 29 3 Conducted and Wireless Media 63 4 Making Connections 103 5 Making Connections Efficient:

Multiplexing and Compression 121 6 Errors, Error Detection, and Error Control 149 7 Local Area Networks: Part 1 175 8 Local Area Networks: Part II 207 9 Introduction to Metropolitan Area

Networks and Wide Area Networks 241 10 The Internet 269 11 Voice and Data Delivery Networks 307 12 Network Security 339 13 Network Design and Management 373

GLOSSARY 401

INDEX 415

v

 

 

This page intentionally left blank

 

 

Contents

PREFACE xv

1 Introduction to Computer Networks and Data Communications 1 The Language of Computer Networks 3 The Big Picture of Networks 4 Communications Networks—Basic Layouts 5

Microcomputer-to-local area network layouts 6 Microcomputer-to-Internet layouts 7 Local area network-to-local area network layouts 7 Personal area network-to-workstation layouts 8 Local area network-to-metropolitan area network layouts 9 Local area network-to-wide area network layouts 9 Wide area network-to-wide area network layouts 10 Sensor-to-local area network layouts 10 Satellite and microwave layouts 11 Cell phone layouts 11 Terminal/microcomputer-to-mainframe computer layouts 12

Convergence 13 Network Architectures 14

The TCP/IP protocol suite 15 The OSI model 18 Logical and physical connections 20

Network Layouts in Action 22 The TCP/IP Protocol Suite in Action 23 Summary 24 Key Terms 26 Review Questions 26 Exercises 26 Thinking Outside the Box 27 Hands-On Projects 27

vii

 

 

2 Fundamentals of Data and Signals 29 Data and Signals 31

Analog vs. digital 32 Fundamentals of signals 35

Converting Data into Signals 39 Transmitting analog data with analog signals 40 Transmitting digital data with digital signals: digital encoding schemes 40 Transmitting digital data with discrete analog signals 45 Transmitting analog data with digital signals 48

Data Codes 51 EBCDIC 53 ASCII 54 Unicode 55

Data and Signal Conversions in Action: Two Examples 56 Summary 58 Key Terms 58 Review Questions 59 Exercises 59 Thinking Outside the Box 60 Hands-On Projects 61

3 Conducted and Wireless Media 63 Conducted Media 64

Twisted pair wire 64 Coaxial cable 69 Fiber-optic cable 70

Wireless Media 74 Media Selection Criteria 91 Conducted Media in Action: Two Examples 94 Wireless Media in Action: Three Examples 96 Summary 99 Key Terms 99 Review Questions 100 Exercises 100 Thinking Outside the Box 101 Hands-On Projects 102

4 Making Connections 103 Interfacing a Computer to Peripheral Devices 104

Characteristics of interface standards 105 An early interface standard 106 Universal Serial Bus (USB) 106 Other interface standards 108

Data Link Connections 110 Asynchronous connections 110 Synchronous connections 112 Isochronous connections 113

Terminal-to-Mainframe Computer Connections 113 Making Computer Connections in Action 115 Summary 116 Key Terms 117 Review Questions 117 Exercises 118 Thinking Outside the Box 118 Hands-On Projects 119

viii Contents

 

 

5 Making Connections Efficient: Multiplexing and Compression 121 Frequency Division Multiplexing 122 Time Division Multiplexing 125

Synchronous time division multiplexing 125 Statistical time division multiplexing 130

Wavelength Division Multiplexing 131 Discrete Multitone 133 Code Division Multiplexing 134 Comparison of Multiplexing Techniques 136 Compression—Lossless vs. Lossy 137

Lossless compression 138 Lossy compression 140

Business Multiplexing in Action 144 Summary 145 Key Terms 146 Review Questions 146 Exercises 146 Thinking Outside the Box 147 Hands-On Projects 148

6 Errors, Error Detection, and Error Control 149 Noise and Errors 151

White noise 151 Impulse noise 152 Crosstalk 152 Echo 153 Jitter 153 Attenuation 154

Error Prevention 154 Error Detection 155

Parity checks 156 Arithmetic checksum 158 Cyclic redundancy checksum 159

Error Control 161 Toss the frame/packet 162 Return a message 162 Correct the error 168

Error Detection in Action 170 Summary 171 Key Terms 172 Review Questions 172 Exercises 173 Thinking Outside the Box 173 Hands-On Projects 174

7 Local Area Networks: Part 1 175 Primary Function of Local Area Networks 176 Advantages and Disadvantages of Local Area Networks 178 The First Local Area Network: The Bus/Tree 180 A More Modern LAN 182

Contention-based protocols 184

Contents ix

 

 

Switches 186 Isolating traffic patterns and providing multiple access 190 Full-duplex switches 190 Virtual LANs 191 Link aggregation 192 Spanning tree algorithm 192 Quality of service 194

Wired Ethernet 194 Wired Ethernet Frame Format 197 LANs in Action: A Small Office Solution 198 Summary 201 Key Terms 202 Review Questions 203 Exercises 203 Thinking Outside the Box 204 Hands-On Projects 205

8 Local Area Networks: Part II 207 Wireless Ethernet 209

Wireless LAN standards 211 Wireless CSMA/CA 212 CSMA/CA frame format 214

Network Operating Systems 215 Network Operating Systems Past and Present 216

Novell NetWare 217 Microsoft Windows NT and Windows Server 2000, 2003, and 2008 220 UNIX 223 Linux 223 Mac OS X Server 224

Servers 225 Client/server networks vs. peer-to-peer networks 227

Network Support Software 227 Utilities 228 Internet software 230

Software Licensing Agreements 230 LAN Support Devices 232 Lan Software in Action: A Small Company Makes a Choice 234

Primary uses of current system 234 Network maintenance and support 234 Cost of the NOS 235 Any unique hardware choices affecting NOS decision 235 Single location or multiple locations 235 Political pressures affecting decision 236 Final decision 236

Wireless Networking in Action: Creating a Wireless LAN for Home 236 Summary 237 Key Terms 238 Review Questions 239 Exercises 239 Thinking Outside the Box 240 Hands-On Projects 240

x Contents

 

 

9 Introduction to Metropolitan Area Networks and Wide Area Networks 241 Metropolitan Area Network Basics 242

SONET vs. Ethernet 244

Wide Area Network Basics 247 Types of network clouds 249 Connection-oriented vs. connectionless network applications 252

Routing 254 Dijkstra’s least-cost algorithm 256 Flooding 257 Centralized vs. distributed routing 258 Adaptive vs. fixed routing 260 Routing examples 261

Network Congestion 261 The problems associated with network congestion 262 Possible solutions to congestion 262

WANs in Action: The Smartphone 264 Summary 265 Key Terms 266 Review Questions 266 Exercises 267 Thinking Outside the Box 268 Hands-On Projects 268

10 The Internet 269 Internet Protocols 271

The Internet Protocol 272 Internet Protocol version 6 277 The Transmission Control Protocol 280 The Internet Control Message Protocol 282 User Datagram Protocol 282 The Address Resolution Protocol 283 The Dynamic Host Configuration Protocol 284 Network Address Translation 284 Tunneling protocols and virtual private networks 285

The World Wide Web 286 Locating a document on the Internet 287

Internet Services 289 Electronic mail (e-mail) 289 The File Transfer Protocol 290 Remote login (Telnet) 292 Voice over IP 292 Listservs 295 Streaming audio and video 295 Instant messages, tweets, and blogs 295

The Internet and Business 296 Cookies and state information 297 Intranets and extranets 297

The Future of the Internet 298 The Internet in Action: A Company Creates a VPN 299 Summary 301 Key Terms 302 Review Questions 303

Contents xi

 

 

Exercises 303 Thinking Outside the Box 304 Hands-On Projects 304

11 Voice and Data Delivery Networks 307 The Basic Telephone System 308

Telephone lines and trunks 308 The telephone network before and after 1984 310 Telephone networks after 1996 311 Limitations of telephone signals 312 Dial-up Internet service 313

Digital Subscriber Line 314 DSL basics 315 DSL formats 316

Cable Modems 317 T-1 Leased Line Service 318 Frame Relay 319

Committed information rate or service level agreements 321

Asynchronous Transfer Mode 322 ATM classes of service 323 Advantages and disadvantages of ATM 325

MPLS and VPN 325 Summary of the Data Delivery Services 326 Convergence 327

Computer-telephony integration 328 Unified communications 330

Telecommunications Systems in Action: A Company Makes a Service Choice 330

Prices 330 Making the choice 330

Summary 333 Key Terms 335 Review Questions 335 Exercises 336 Thinking Outside the Box 337 Hands-On Projects 337

12 Network Security 339 Standard System Attacks 340 Physical Protection 343 Controlling Access 344

Passwords and ID systems 346 Access rights 347 Auditing 349

Securing Data 350 Basic encryption and decryption techniques 350

Securing Communications 359 Spread spectrum technology 359 Guarding against viruses 361 Firewalls 362 Wireless security 365

Security Policy Design Issues 365 Network Security in Action: Making Wireless LANs Secure 367

xii Contents

 

 

Summary 368 Key Terms 370 Review Questions 370 Exercises 371 Thinking Outside the Box 371 Hands-On Projects 372

13 Network Design and Management 373 Systems Development Life Cycle 374 Network Modeling 376

Wide area connectivity map 377 Metropolitan area connectivity map 378 Local area connectivity map 378

Feasibility Studies 379 Capacity Planning 382 Creating a Baseline 385 Network Administrator Skills 388 Generating Usable Statistics 389 Network Diagnostic Tools 390

Tools that test and debug network hardware 390 Network sniffers 391 Managing operations 391 Simple network management protocol 392

Capacity Planning and Network Design in Action: Better Box Corporation 394 Summary 396 Key Terms 397 Review Questions 398 Exercises 398 Thinking Outside the Box 399 Hands-On Projects 399

GLOSSARY 401

INDEX 415

Contents xiii

Data Communications And Computer Network homework help

 

This page intentionally left blank

 

 

Preface

Today’s business world could not function without data communications and computer networks. Most people cannot make it through an average day without coming in contact with or using some form of computer network. In the past, this field of study occupied the time of only engineers and technicians, but it now in- volves business managers, end users, programmers, and just about anyone who might use a telephone or computer! Because of this, Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition maintains a business user’s perspective on this vast and increasingly significant subject.

In a generic sense, this book serves as an owner’s manual for the individual computer user. In a world in which computer networks are involved in nearly every facet of business and personal life, it is paramount that each of us under- stands the basic features, operations, and limitations of different types of com- puter networks. This understanding will make us better managers, better employees, and simply better computer users. As a computer network user, you will probably not be the one who designs, installs, and maintains the network. Instead, you will have interactions—either direct or indirect—with the indivi- duals who do. Reading this book should give you a strong foundation in com- puter networks, which will enable you to work effectively with network administrators, network installers, and network designers.

Here are some of the many scenarios in which the knowledge contained in this book would be particularly useful:

■ You work for a company and must deal directly with a network specialist. To better understand the specialist and be able to conduct a meaningful dia- log with him or her, you need a basic understanding of the many aspects of computer networks.

■ You are a manager within a company and depend on a number of network specialists to provide you with recommendations for the company’s network. You do not want to find yourself in a situation in which you must blindly accept the recommendations of network professionals. To ensure that you can make intelligent decisions regarding network resources, you need to know the basic concepts of data communications and computer networks.

■ You work in a small company, in which each employee wears many hats. Thus, you may need to perform some level of network assessment, administration, or support.

xv

 

 

■ You have your own business and need to fully understand the advantages of using computer networks to support your operations. To optimize those advantages, you should have a good grasp of the basic characteristics of a computer network.

■ You have a computer at home or at work, and you simply wish to learn more about computer networks.

■ You have realized that to keep your job skills current and remain a key player in the information technology arena, you must understand how different computer networks work and become familiar with their advantages and shortcomings.

Audience Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition is intended for a one-semester course in business data commu- nications for students majoring in business, information systems, management information systems, and other applied fields of computer science. Even computer science departments will find the book valuable, particularly if the students read the Details sections accompanying most chapters. It is a readable resource for computer network users that draws on examples from business environments.

In a university setting, this book can be used at practically any level above the first year. Instructors who wish to use this book at the graduate level can draw on the many advanced projects provided at the end of each chapter to cre- ate a more challenging environment for the advanced student.

Defining Characteristics of This Book The major goal of this seventh edition is the same as that of the first edition: to go beyond simply providing readers with a handful of new definitions, and in- stead introduce them to the next level of details found within the fields of com- puter networks and data communications. This higher level of detail includes the network technologies and standards necessary to support computer network systems and their applications. This book is more than just an introduction to advanced terminology. It involves introducing concepts that will help the reader achieve a more in-depth understanding of the often complex topic of data com- munications. It is hoped that once readers attain this in-depth understanding, the topic of networks and data communications will be less intimidating to them. To facilitate this understanding, the book strives to maintain high stan- dards in three major areas: readability, a balance between the technical and the practical, and currency.

Readability Great care has been taken to provide the technical material in as readable a fashion as possible. Each new edition has received a complete rewrite, in which every sentence has been re-examined in an attempt to convey the concepts as clearly as possible. Given the nature of this book’s subject matter, the use of ter- minology is unavoidable. However, every effort has been made to present terms in a clear fashion, with minimal use of acronyms and even less use of computer jargon.

Balance Between the Technical and the Practical As in the very successful first edition, a major objective in writing Data Communications and Computer Networks, Seventh Edition was to achieve a good balance between the more technical aspects of data communications and its everyday practical aspects. Throughout each chapter, there are sections entitled

xvi Preface

 

 

“Details,” which delve into the more specialized aspects of the topic at hand. Should readers not have time to explore this technical information, they can skip these Details sections without missing out on the basic concepts of the topic.

Current Technology Because of the fast pace of change in virtually all computer-related fields, every attempt has been made to present the most current trends in data communica- tions and computer networks. Some of these topics include:

■ Introduction to Thunderbolt interface ■ Updated information on IPv6 ■ Spanning tree algorithm, link aggregation, and quality of service for LANs ■ Latest wireless technologies ■ Updated examples on multiplexing techniques ■ Greater emphasis on switching in local area networks ■ Advanced encryption standards ■ Compression techniques ■ Current LAN network operating systems (Windows Server®, UNIX®and

Linux®) ■ Introduction to cloud computing

It is also important to remember the many older technologies still in preva- lent use today. Discussions of these older technologies can be found, when appropriate, in each chapter of this book.

Organization The organization of Data Communications and Computer Networks, Seventh Edition roughly follows that of the TCP/IP protocol suite, from the physical layer to the upper layers. In addition, the book has been carefully designed to consist of 13 chapters in order to fit well into a typical 15- or 16-week semester (along with any required exams). Although some chapters may not require an entire week of study, other chapters may require more than one week. The in- tent was to design a balanced introduction to the study of computer networks by creating a set of chapters that is cohesive but at the same time allows for flexibility in the week-to-week curriculum.

Thus, instructors may choose to emphasize or de-emphasize certain topics, depending on the focus of their curriculums. If all 13 chapters cannot be covered during one term, it is possible for the instructor to concentrate on certain chapters. For example, if the curriculum’s focus is information systems, the instructor might concentrate on Chapters 1, 3, 4, 6–8, 10, 12, and 13. If the focus is on the more technical aspects of computer networks, the instructor might concentrate on Chapters 1–11. It is the author’s recommendation, however, that all chapters be covered in some level of detail.

Features To assist readers in better understanding the technical nature of data communi- cations and computer networks, each chapter contains a number of significant features. These features are based on older, well-tested pedagogical techniques as well as some newer techniques.

Opening Case Each chapter begins with a short case or vignette that emphasizes the main con- cept of the chapter and sets the stage for exploration. These cases are designed to spark readers’ interest and create a desire to learn more about the chapter’s concepts.

Preface xvii

 

 

Learning Objectives Following the opening case is a list of learning objectives that should be accom- plished by the end of the chapter. Each objective is tied to the main sections of the chapter. Readers can use the objectives to grasp the scope and intent of the chapter. The objectives also work in conjunction with the end-of-chapter summary and review questions, so that readers can assess whether they have adequately mastered the material.

Details Many chapters contain one or more Details sections, which dig deeper into a particular topic. Readers who are interested in more technical details will find these sections valuable. Since the Details sections are physically separate from the main text, they can be skipped if the reader does not have time to explore this level of technical detail. Skipping these sections will not affect the reader’s overall understanding of a chapter’s material.

In Action At the end of each chapter’s main content presentation is an In Action example that demonstrates an application of the chapter’s key topic in a realistic environ- ment. Although a number of In Action examples include imaginary people and organizations, every attempt was made to make the hypothetical scenarios as representative as possible of situations and issues found in real-world business and home environments. Thus, the In Action examples help the reader visualize the concepts presented in the chapter.

End-of-Chapter Material The end-of-chapter material is designed to help readers review the content of the chapter and assess whether they have adequately mastered the concepts. It includes:

■ A bulleted summary that readers can use as a review of the key topics of the chapter and as a study guide.

■ A list of the key terms used within the chapter. ■ A list of review questions that readers can use to quickly check whether or

not they understand the chapter’s key concepts. ■ A set of exercises that draw on the material presented in the chapter. ■ A set of Thinking Outside the Box exercises, which are more in-depth in na-

ture and require readers to consider various possible alternative solutions by comparing their advantages and disadvantages.

■ A set of Hands-On Projects that require readers to reach beyond the material found within the text and use outside resources to compose a response. Many of these projects lend themselves nicely to writing assignments. Thus, they can serve as valuable tools for instructors, especially at a time when more and more colleges and universities are seeking to implement “writing across the curriculum” strategies.

Glossary At the end of the book, you will find a glossary that includes the key terms from each chapter.

Student Online Companion The student online companion for this book can be found at www. cengagebrain.com, and search by title, author name, or ISBN. It contains a number of features, including:

■ Hands-on labs that allow students to practice one or more of the chapter concepts ■ A set of more in-depth discussions on older topics such as X.21, dial-up

modems, ISDN, Dijkstra’s algorithm, SDLC, and BISYNC ■ Suggestions for further readings on numerous topics within the book

xviii Preface

 

 

This Web site also presents visual demonstrations of many key data commu- nications and networking concepts introduced in this text. A visual demonstration accompanies the following concepts:

■ Chapter One: Introduction to Computer Networks and Data Communications— Layer encapsulation example

■ Chapter Four: Making Connections—RS-232 example of two modems establishing a connection

■ Chapter Five: Making Connections Efficient: Multiplexing and Compression— Example of packets from multiple sources coming together for synchronous TDM, and a second example demonstrating statistical TDM

■ Chapter Six: Errors, Error Detection, and Error Control—Sliding window example using ARQ error control

■ Chapter Seven: Local Area Networks: Part One—CSMA/CD example with workstations sending packets and collisions happening

■ Chapter Seven: Local Area Networks: Part One—Two LANs with a bridge showing how bridge tables are created and packets routed; a second example shows one LAN with a switch in place of a hub

■ Chapter Nine: Introduction to Metropolitan Area Networks and Wide Area Networks—Datagram network sending individual packets; and virtual circuit network first creating a connection and then sending packets down a prescribed path

■ Chapter Ten: The Internet—Domain Name System as it tries to find the dotted decimal notation for a given URL

Changes to the Seventh Edition In order to keep abreast of the changes in computer networks and data commu- nications, this Seventh Edition has incorporated many updates and additions in every chapter, as well as some reorganization of sections within chapters. Here’s a summary of the major changes that can be found in each of the following chapters:

Chapter One, Introduction to Computer Networks and Data Communications, introduces an update on the many types of computer network connections, along with many of the major concepts that will be discussed in the following chapters, with an emphasis on the TCP/IP protocol suite followed by the OSI models. The topic of convergence has been introduced in this first chapter and will be revisited as needed in subsequent chapters.

Chapter Two, Fundamentals of Data and Signals, covers basic concepts that are critical to the proper understanding of all computer networks and data communications.

Chapter Three, Conducted and Wireless Media, introduces the different types of media for transmitting data. The section on cellular telephones was updated to include the latest cell phone technologies.

Chapter Four, Making Connections, discusses how a connection or interface is created between a computer and a peripheral device, with a stronger emphasis on the USB interface.

Chapter Five, Making Connections Efficient: Multiplexing and Compression, introduces the topic of compression. Lossless compression techniques such as run-length encoding are discussed, as well as lossy compression techniques such as MP3 and JPEG. Examples of multiplexing have been updated.

Chapter Six, Errors, Error Detection, and Error Control, explains the actions that can take place when a data transmission produces an error. The concept of arithmetic checksum, as it is used on the Internet, is included.

Chapter Seven, Local Area Networks: Part One, is devoted to the basic con- cepts of local area networks. These two chapters on local area networks have been reorganized. The topics of minimum spanning tree, link aggregation, and

Preface xix

 

 

quality of service have been introduced. The local area network switch has been given more prominence, to reflect its current importance in the industry.

Chapter Eight, Local Area Networks: Part Two, introduces wireless local area networks and discusses the various network operating systems and other network software, with updated material on Microsoft, Linux, Unix, and the MAC OS X Server.

Chapter Nine, Introduction to Metropolitan Area Networks and Wide Area Networks, introduces the basic terminology and concepts of both metropolitan area networks and wide area networks. Cloud computing is also introduced.

Chapter Ten, The Internet, delves into the details of the Internet, including TCP/IP, DNS, and the World Wide Web. Additional information on IP addresses and IPv6 has been included. A discussion on the topic of Voice over IP is included, as well as the material on MPLS, service level agreements, and convergence.

Chapter Eleven, Voice and Data Delivery Networks, provides a detailed introduction to the area of telecommunications—in particular, networks that specialize in local and long-distance delivery of data. The topic of basic dial-up telephone service was reduced to better reflect its diminishing importance in today’s technology markets.

Chapter Twelve, Network Security, covers the current trends in network security. The topic of firewalls was updated.

Chapter Thirteen, Network Design and Management, introduces the systems development life cycle, feasibility studies, capacity planning, and base- line studies, and shows how these concepts apply to the analysis and design of computer networks.

Teaching Tools The following supplemental materials are available when this book is used in a classroom setting. All of the teaching tools available with this book are provided to the instructor on a single CD-ROM. Many can also be found at the Cengage Web site (login.cengage.com/sso).

Electronic Instructor’s Manual—The Instructor’s Manual that accompanies this textbook includes additional instructional material to assist in class preparation, including Sample Syllabi, Chapter Outlines, Technical Notes, Lecture Notes, Quick Quizzes, Teaching Tips, Discussion Topics, and Key Terms.

ExamView®—This textbook is accompanied by ExamView, a powerful testing software package that allows instructors to create and administer printed, computer (LAN-based), and Internet exams. ExamView includes hundreds of questions that correspond to the topics covered in this text, enabling students to generate detailed study guides that include page references for further review. The computer-based and Internet testing components allow students to take exams at their computers and also save the instructor time by grading each exam automatically.

PowerPoint Presentations—This book comes with Microsoft PowerPoint slides for each chapter. These are included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors can add their own slides for additional topics they introduce to the class.

Acknowledgments Producing a textbook requires the skills and dedication of many people. Unfortu- nately, the final product displays only the author’s name on the cover and not the names of those who provided countless hours of input and professional advice. I would first like to thank the people at Course Technology for being so vitally

xx Preface

 

 

supportive and one of the best teams an author could hope to work with: Charles McCormick, Jr., Senior Acquisitions Editor; Kate Mason, Senior Product Manager; and Divya Divakaran, Content Product Manager.

I must also thank my colleagues at DePaul University who listened to my problems, provided ideas for exercises, proofread some of the technical chapters, and provided many fresh ideas when I could think of none myself.

Finally, I thank my family: my wife Kathleen, my daughter Hannah, and my son Samuel. It was your love and support (again!) that kept me going, day after day, week after week, and month after month.

Curt M. White

Preface xxi

 

 

This page intentionally left blank

 

 

Chapter 1 Introduction to Computer Networks and Data Communications

MAKING PREDICTIONS is a difficult task, and predicting the future of computing is no exception. History is filled with computer-related predictions that were so inaccurate that today they are amusing. For example, consider the following predictions:

“I think there is a world market for maybe five computers.” Thomas Watson, chairman of IBM, 1943

“I have traveled the length and breadth of this country, and talked with the best people, and I can assure you that data processing is a fad that won’t last out the year.” Editor in charge of business books for Prentice Hall, 1957

“There is no reason anyone would want a computer in their home.” Ken Olsen, president and founder of Digital Equipment Corporation, 1977

“640K ought to be enough for anybody.” Bill Gates, 1981

“We believe the arrival of the PC’s little brother [PCjr] is as significant and lasting a develop- ment in the history of computing as IBM’s initial foray into microcomputing has proven to be.” PC Magazine, December 1983 (The PCjr lasted less than one year.)

Apparently, no matter how famous you are or how influential your position, it is very easy to make very bad predictions. Nevertheless, it is hard to imagine that anyone can make a prediction worse than any of those above. Buoyed by this false sense of optimism, let us make a few forecasts of our own:

Someday before you head out the door, you will reach for your umbrella, and it will tell you what kind of weather to expect outside. A radio signal will connect the umbrella to a local weather service that will download the latest weather conditions for your convenience.

Someday you will be driving a car, and if you go faster than some predetermined speed, the car will send a text message to your parents informing them of your “driving habits.”

Someday we will wear a computer—like a suit of clothes—and when we shake hands with a person, data will transfer down our skin, across the shaking hands, and into the other person’s “computer.”

Sometime in the not too distant future, you will place some hot dogs and hamburgers on the grill and then go inside to watch the ball game. Suddenly, you will get a message on your cell phone: “Your food is done cooking.”

OBJECTIVES After reading this chapter, you should be able to:

Ê Define the basic terminology of computer networks

Ê Recognize the individual components of the big picture of computer networks

Ê Recognize the basic network layouts

Ê Define the term “convergence” and describe how it applies to computer networks

Ê Cite the reasons for using a network architecture and explain how they apply to current network systems

Ê List the layers of the TCP/IP protocol suite and describe the duties of each layer

Ê List the layers of the OSI model and describe the duties of each layer

Ê Compare the TCP/IP protocol suite and OSI model, and list their differences and similarities

1

 

 

Someday you will have a car battery that, when the power in the battery gets too weak to start the car, will call you on your cell phone to inform you that you need a replacement or a charge.

One day you will be in a big city and place a call on your cell phone to request a taxi. The voice on the other end will simply say, “Stay right where you are. Do you see the taxi coming down the street? When it stops in front of you, hop in.”

Someday you will be driving in a big city and your phone or Global Positioning System (GPS) device will tell you where the nearest empty parking spot on the street is.

Do these predictions sound far-fetched and filled with mysterious technologies that only scientists and engineers can understand? They shouldn’t, because they are not predictions. They are scenar- ios happening today with technologies that already exist. What’s more, none of these advances would be possible today were it not for computer networks and data communications.

INTRODUCTION

The world of computer networks and data communications is a surprisingly vast and increasingly significant field of study. Once considered primarily the domain of network engineers and technicians, computer networks now involve business managers, computer programmers, system designers, office managers, home computer users, and everyday citizens. It is virtually impossible for the average person on the street to spend 24 hours without directly or indirectly using some form of computer network.

Ask any group, “Has anyone used a computer network today?,” and more than one-half of the people might answer, “Yes.” Then ask the others, “How did you get to work, school, or the store today if you did not use a computer net- work?” Most transportation systems use extensive communication networks to monitor the flow of vehicles and trains. Expressways and highways have computer- ized systems for controlling traffic signals and limiting access during peak traffic times. Some major cities are placing the appropriate hardware inside city buses and trains so that the precise location of each bus and train is known. This information enables the transportation systems to keep the buses evenly spaced and more punc- tual, and allows the riders to know when the next bus or train will arrive.

In addition, more and more people are using satellite-based GPS devices in their cars to provide driving directions and avoid traffic hotspots. Similar systems can unlock your car doors if you leave your keys in the ignition and can locate your car in a crowded parking lot—beeping the horn and flashing the headlights if you cannot remember where you parked.

But even if you didn’t use mass transit or a GPS device in your car today, there are many other ways to use a computer network. Businesses can order parts and inventory on demand and build products to customer-designed specifi- cations electronically, without the need for paper. Online retail outlets can track every item you look at or purchase. Using this data, they can make recommen- dations of similar products and inform you in the future when a new product becomes available. Twenty-four-hour banking machines can verify the user’s identity by taking the user’s thumbprint.

In addition, cable television continues to expand, offering extensive pro- gramming, pay-per-view options, video recording, digital television and music, and multi-megabit connectivity to the Internet. The telephone system, the oldest and most extensive network of communicating devices, continues to become more of a computer network every day. The most recent “telephone” networks can now deliver voice, Internet, and television over a single connection. Cellular telephone systems cover virtually the entire North American continent and allow

2 Chapter 1

 

 

users to upload and download data to and from the Internet, send and receive images, and download streaming video such as television programs. That hand- held device you are holding can play music, make phone calls, take pictures, surf the Web, and let you play games while you wait for the next train.

Welcome to the amazing world of computer networks! Unless you have spent the last 24 hours in complete isolation, it is nearly impossible to not have used some form of computer network and data communications. Because of this growing integration of computer networks and data communications into business and life, we cannot leave this area of study to technicians. All of us— particularly information systems, business, and computer science students—need to understand the basic concepts. Armed with this knowledge, we not only will be better at communicating with network specialists and engineers but also will become better students, managers, and employees.

THE LANGUAGE OF COMPUTER NETWORKS

Over the years, numerous terms and definitions relating to computer networks and data communications have emerged. To gain insight into the many subfields of study, and to become familiar with the emphasis of this textbook, let us examine the more common terms and their definitions.

A computer network is an interconnection of computers and computing equipment using either wires or radio waves and can share data and computing resources. Computer networks that use radio waves are termed wireless and can involve broadcast radio, microwaves, or satellite transmissions. Networks span- ning an area of several meters around an individual are called personal area networks (PANs). Personal area networks include devices such as laptop com- puters, personal digital assistants, and wireless connections. Networks that are a little larger in geographic size—spanning a room, a floor within a building, a building, or a campus—are local area networks (LANs). Networks that serve an area up to roughly 50 kilometers—approximately the area of a typical city— are called metropolitan area networks (MANs). Metropolitan area networks are high-speed networks that interconnect businesses with other businesses and the Internet. Large networks encompassing parts of states, multiple states, countries, and the world are wide area networks (WANs). Chapters Seven and Eight concentrate on local area networks, and Chapters Nine, Ten, and Eleven concentrate on metropolitan area networks and wide area networks.

The study of computer networks usually begins with the introduction of two important building blocks: data and signals. Data is information that has been translated into a form more conducive to storage, transmission, and calculation. As we shall see in Chapter Two, a signal is used to transmit data. We define data com- munications as the transfer of digital or analog data using digital or analog signals. Once created, these analog and digital signals then are transmitted over conducted media or wireless media (both of which are discussed in Chapter Three).

Connecting devices to a computer, or a computer to a network, requires in- terfacing, a topic covered in Chapter Four. Because sending only one signal over a medium at one time can be an inefficient way to use the transmission medium, many systems perform multiplexing. Multiplexing is the transmission of multiple signals on one medium. For a medium to transmit multiple signals simulta- neously, the signals must be altered so that they do not interfere with one an- other. Compression is another technique that can maximize the amount of data sent over a medium. Compression involves squeezing data into a smaller package, thus reducing the amount of time (as well as storage space) needed to transmit the data. Multiplexing and compression are covered in detail in Chapter Five.

When the signals transmitted between computing devices are corrupted and errors result, error detection and error control are necessary. These topics are discussed in detail in Chapter Six.

Introduction to Computer Networks and Data Communications 3

 

 

Once upon a time, a voice network transmitted telephone signals, and a data network transmitted computer data. Eventually, however, the differences between voice networks and data networks disappeared. The merging of voice and data networks is one example of convergence, an important topic that will be presented later in this chapter and further developed in subsequent chapters.

Computer security (covered in Chapter Twelve) is a growing concern of both professional computer support personnel and home computer users with Internet connections. Network management is the design, installation, and sup- port of a network and its hardware and software. Chapter Thirteen discusses many of the basic concepts necessary to support properly the design and improvement of network hardware and software, as well as the more common management techniques used to support a network.

THE BIG PICTURE OF NETWORKS

If you could create one picture that tries to give an overview of a typical computer network, what might this picture include? Figure 1-1 shows such a picture, and it includes examples of local, personal, and wide area networks. Note that this picture shows two different types of local area networks (LAN 1 and LAN 2). Although a full description of the different components constitut- ing a local area network is not necessary at this time, it is important to note that most LANs include the following hardware:

■ Workstations, which are personal computers/microcomputers (desktops, laptops, netbooks, handhelds, etc.) where users reside

■ Servers, which are the computers that store network software and shared or private user files

■ Switches, which are the collection points for the wires that interconnect the workstations

■ Routers, which are the connecting devices between local area networks and wide area networks

Figure 1-1 An overall view of the interconnection between different types of networks

User A

WAN 1 Modem

Microwave Tower

LAN 1 LAN 2

PAN 1

Web Server

PDA Workstations

Routers

Switch

WAN 2

Routers

4 Chapter 1

 

 

There are also many types of wide area networks. Although many different technologies are used to support wide area networks, all wide area networks include the following components:

■ Nodes, which are the computing devices that allow workstations to connect to the network and that make the decisions about where to route a piece of data

■ Some type of high-speed transmission line, which runs from one node to another

■ A subnetwork, or cloud, which consists of the nodes and transmission lines, collected into a cohesive unit

To see how the local area networks and wide area networks work together, consider User A (in the upper-left corner of Figure 1-1), who wishes to retrieve a Web page from the Web server shown in the lower-right corner. To do this, User A’s computer must have both the necessary hardware and software required to communicate with the first wide area network it encoun- ters, WAN 1—User A’s Internet service provider. Assuming that User A’s com- puter is connected to this wide area network through a DSL telephone line, User A needs some type of modem. Furthermore, if this wide area network is part of the Internet, User A’s computer requires software that talks the talk of the Internet: TCP/IP (Transmission Control Protocol/Internet Protocol).

Notice that no direct connection exists between WAN 1, where User A resides, and LAN 2, where the Web server resides. To ensure that User A’s Web page request reaches its intended receiver (the Web server), User A’s soft- ware attaches the appropriate address information that WAN 1 uses to route User A’s request to the router that connects WAN 1 to LAN 1. Once the request is on LAN 1, the switch-like device connecting LAN 1 and LAN 2 uses address information to pass the request to LAN 2. Additional address information then routes User A’s Web page request to the Web server, whose software accepts the request.

Under normal traffic and conditions, this procedure might take only a frac- tion of a second. When you begin to understand all the steps involved and the great number of transformations that a simple Web page request must undergo, the fact that it takes only a fraction of a second to deliver is amazing.

COMMUNICATIONS NETWORKS—BASIC LAYOUTS

The beginning of this chapter described a few applications of computer net- works and data communications that you encounter in everyday life. From that sampling, you can see that setting out all the different types of jobs and services that use some sort of computer network and data communications would gener- ate an enormous list. Instead, let us examine basic network systems and their layouts to see how extensive the uses of data communications and computer networks are. The basic layouts that we will examine include:

■ Microcomputer-to-local area network ■ Microcomputer-to-Internet ■ Local area network-to-local area network ■ Personal area network-to-workstation ■ Local area network-to-metropolitan area network ■ Local area network-to-wide area network ■ Wide area network-to-wide area network ■ Sensor-to-local area network ■ Satellite and microwave ■ Cell phones ■ Terminal/microcomputer-to-mainframe computer

Introduction to Computer Networks and Data Communications 5

 

 

Microcomputer-to-local area network layouts Perhaps the most common network layout today, the microcomputer-to- local area network layout is found in virtually every business and academic environment—and even in many homes. The microcomputer—which also is com- monly known as the personal computer, PC, desktop computer, laptop computer, notebook, netbook, or workstation—began to emerge in the late 1970s and early 1980s. (For the sake of consistency, we will use the older term “microcomputer” to signify any type of computer based on a microprocessor, disk drive, and memory.) The LAN, as we shall see in Chapter Seven, is an excellent tool for pro- viding a gateway to other networks, software, and peripherals. In some LANs, the data set that accompanies application software resides on a central computer called a server. Using microcomputers connected to a LAN, end users can request and download the data set, then execute the application on their computers. If users wish to print documents on a high-quality network printer, the LAN con- tains the network software necessary to route their print requests to the appropri- ate printer. If users wish to access their e-mail from the corporate e-mail server, the local area network provides a fast, stable connection between user worksta- tions and the e-mail server. If a user wishes to access the Internet, the local area network provides an effective gateway to the outside world. Figure 1-2 shows a diagram of this type of microcomputer-to-local area network layout.

Figure 1-2 A microcomputer lab, showing the cabling that exits from the back of a workstation and runs to a LAN collection point

Metal Conduit

Cables

LAN Collection Point

Workstations

Cables

One common form of microcomputer-to-local area network layout in the business world is the client/server system. In a client/server system, a user at a microcomputer, or client machine, issues a request for some form of data or service. This could be a request for a database record from a database server or a request to retrieve an e-mail message from an e-mail server. This request travels across the system to a server that contains a large repository of data and/or programs. The server fills the request and returns the results to the client, displaying the results on the client’s monitor.

A type of microcomputer-to-local area network layout that continues to grow in popularity is the wireless layout. A user sitting at a workstation or laptop uses wireless communications to send and receive data to and from a wireless access point. This access point is connected to the local area network and basically serves as the “bridge” between the wireless user device and the wired network. Although this setup uses radio frequency transmissions, we still consider it a microcomputer-to-local area network layout.

6 Chapter 1

 

 

Microcomputer-to-Internet layouts With the explosive growth of the Internet and the desire of users to connect to the Internet from home (either for pleasure or work-related reasons), the microcomputer-to-Internet layout continues to grow steadily. Originally, most home users connected to the Internet via a dial-up telephone line and a modem. This arrangement allowed for a maximum data transfer rate of roughly 56,000 bits per second (56 kbps). (The connections do not actually achieve 56 kbps, but that is a discussion we will have in Chapter Eleven.) No longer is the dial- up modem the most often used layout. Today, a majority of home users either connect to the Internet using digital subscriber line (DSL) or access the Internet through a cable modem service. All of these telecommunications services will be examined in more detail in Chapter Eleven. (In comparing the various data transfer rates of services and devices, we will use the convention in which lower- case k equals 1000. Also as part of the convention, lowercase b will refer to bits, while uppercase B refers to bytes.)

To communicate with the Internet using a dial-up, DSL, or cable modem connection, a user’s computer must connect to another computer already com- municating with the Internet. The easiest way to establish this connection is through the services of an Internet service provider (ISP). In this case, the user’s computer needs to have the necessary software to communicate with the Inter- net. The Internet “talks” only TCP/IP, so users must use software that supports the TCP and IP protocols. Once the user’s computer is talking TCP/IP, a connection to the Internet can be established. Figure 1-3 shows a typical microcomputer-to-Internet layout.

Figure 1-3 A microcomputer/ workstation sending data over a DSL line to an Internet service provider and onto the Internet Modem

Internet Service Provider

High-Speed Line

Internet

Router

Modems

Local area network-to-local area network layouts Because the local area network is a standard in business and academic environ- ments, it should come as no surprise that many organizations need the services of multiple local area networks and that it may be necessary for these LANs to communicate with each other. For example, a company may want the local area network that supports its research department to share an expensive color

Introduction to Computer Networks and Data Communications 7

 

 

laser printer with its marketing department’s local area network. Fortunately, it is possible to connect two local area networks so that they can share peripherals as well as software. The devices that usually connect two or more LANs are the switch and router.

In some cases, it may be more important to prevent data from flowing between local area networks than to allow data to flow from one network to another. For instance, some businesses have political reasons for supporting multiple networks—each division may want its own network to run as it wishes. Additionally, there may be security reasons for limiting traffic flow between networks; or allowing data destined for a particular network to traverse other networks simply may generate too much network traffic. Devices that connect local area networks can help manage these types of services as well. For example, the switch can filter out traffic not intended for the neighboring net- work, thus minimizing the overall amount of traffic flow. Figure 1-4 provides an example of two LANs connected by a switch.

Figure 1-4 Two local area networks connected by a switch

Hub

LAN A

Switch

LAN B Hub

Personal area network-to-workstation layouts The personal area network was created in the late 1990s and is one of the newer forms of computer networks. Using wireless transmissions with devices such as personal digital assistants (PDAs), laptop computers, and portable music players, an individual can transfer voice, data, and music from handheld devices to other devices such as microcomputer workstations (see Figure 1-5). Likewise, a user can download data from a workstation to one of these portable devices. For example, a user might use a PDA to record notes during a meeting. Once the meeting is over, the user can transmit the notes over a wireless connection from the PDA to his or her workstation. The workstation then runs a word processor to clean up the notes, and the formatted notes are uploaded to a local area network for corporate dissemination. Another example is the hands-free Bluetooth-enabled connection that people hang on their ear so they can converse with their cell phone without placing the cell phone up to their ear. It is also very common now to transfer digital photos and videos from cameras to micro- computers using short-range, wireless signals.

8 Chapter 1

 

 

Figure 1-5 A user transferring data from a personal digital assistant via a personal area network to a workstation attached to a local area network

Local Area

Network

WorkstationPersonal Area

Network

Local area network-to-metropolitan area network layouts Toward the end of the twentieth century, a new form of network appeared that interconnected businesses within a metropolitan area. Typically, this intercon- nection uses only fiber-optic links at extremely high speeds. These new networks are labeled metropolitan area networks. A metropolitan area network is a high- speed network that interconnects multiple sites within a close geographic region, such as a large urban area. For example, businesses that require a high-speed connection to their Internet service providers might use a metropolitan area net- work for interconnection (see Figure 1-6). As we shall see in more detail in Chapter Nine, metropolitan area networks are a cross between local area networks and wide area networks. They can transfer data at fast LAN speeds but over larger geographic regions than typically associated with a local area network.

Figure 1-6 Businesses interconnected within a large metropolitan area via a metropolitan area network

Fiber-Optic System

Businesses

Internet Service Provider

Local area network-to-wide area network layouts You have already seen that the local area network is commonly found in business and academic environments. If a user working at a microcomputer connected to a local area network wishes to access the Internet (a wide area

Introduction to Computer Networks and Data Communications 9

 

 

network), the user’s local area network must have a connection to the Internet. A device called a router is employed to connect these two networks. A router converts the local area network data into wide area network data. It also performs security functions and must be properly programmed to accept or reject certain types of incoming and outgoing data packets. Figure 1-7 shows a local area network connected to a wide area network via a router.

Figure 1-7 Local area network- to-wide area network layout

Wide Area

Network

Workstations

Hub or Switch Router

Wide area network-to-wide area network layouts The Internet is not a single network but a collection of thousands of networks. In order to travel any distance across the Internet, a data packet undoubtedly will pass through multiple wide area networks. Connecting a wide area network to a wide area network requires special devices that can route data traffic quickly and efficiently. These devices are high-speed routers. After the data packet enters the high-speed router, an address in the network layer (the IP address) is extracted, a routing decision is made, and the data packet is for- warded on to the next wide area network segment. As the data packet travels across the Internet, router after router makes a routing decision, moving the data toward its final destination. We will examine the Internet in more detail in Chapter Ten, then follow up with a discussion of several other types of wide area network technologies in Chapter Eleven.

Sensor-to-local area network layouts Another common layout found in everyday life is the sensor-to-local area network layout. In this type of layout, the action of a person or object triggers a sensor—for example, a left-turn light at a traffic intersection—that is connected to a network. In many left-turn lanes, a separate left-turn signal will appear if and only if one or more vehicles are in the left-turn lane. A sensor embedded in the roadway detects the movement of an automobile in the lane above and triggers the left-turn mechanism in the traffic signal control box at the side of the road. If this traffic signal control box is connected to a larger traffic control system, the sensor is connected to a local area network.

Another example of sensor-to-local area network layout is found within manufacturing environments. Assembly lines, robotic control devices, oven tem- perature controls, and chemical analysis equipment often use sensors connected to data-gathering computers that control movements and operations, sound alarms, and compute experimental or quality control results. Figure 1-8 shows a diagram of a typical sensor-to-local area network layout in a manufacturing environment.

10 Chapter 1

 

 

Figure 1-8 An automobile moves down an assembly line and triggers a sensor

Wiring to LAN Sensors

Wiring to LAN

Robot Arm

Satellite and microwave layouts Satellite and microwave layouts are continuously evolving technologies used in a variety of applications. If the distance between two networks is great and running a wire between them would be difficult (if not impossible), satellite and microwave transmission systems can be an extremely effective way to connect the two networks or computer systems. Examples of these applications include digital satellite TV, meteorology, intelligence operations, mobile maritime telephony, GPS navigation systems, wireless e-mail, worldwide mobile telephone systems, and video conferencing. Figure 1-9 shows a diagram of a typical satellite system.

Figure 1-9 Example of a television company using a satellite system to broadcast television services into homes and businesses

Homes

Satellite Dish

Television Company

Home

Business

Satellite

Cell phone layouts One of the most explosive areas of growth in recent years has been cell phone networks. Figure 1-10 shows an example of a handheld PDA that, along with making telephone calls, can transmit and receive data. The PDA has a modem installed, which transmits the PDA’s data across the cell phone network to the

Introduction to Computer Networks and Data Communications 11

 

 

cell phone switching center. The switching center then transfers the PDA’s data over the public telephone network or through a connection onto the Internet. Many newer handheld devices have combined data accessing capabilities with a cell phone and can transfer data over cell phone connections.

Figure 1-10 An example of a user with a smart cell phone transmitting and receiving data

Telephone Company

Land-Based Telephone Line

Wireless Transmission

Tower

Smart Cell Phone

Terminal/microcomputer-to-mainframe computer layouts Today, many businesses still employ a terminal-to-mainframe layout, although the number of these systems in use is not what it used to be. During the 1960s and 1970s, the terminal-to-mainframe layout was in virtually every office, manufacturing, and academic environment. These types of systems are still being used for inquiry/response applications, interactive applications, and data-entry applications, such as you might find when applying for a new driver’s license at the Department of Motor Vehicles (Figure 1-11).

Figure 1-11 Using a terminal (or thin client workstation) to perform a text-based input transaction

Computer Terminal

Next!

Cable Connecting to Mainframe

12 Chapter 1

 

 

The terminal-to-mainframe layouts of the 1960s and 1970s used “dumb” terminals because the end user was doing relatively simple data-entry and retrieval operations, and a workstation with a lot of computing power and storage was not necessary. A computer terminal was a device that was essen- tially a keyboard and screen with no long-term storage capabilities and little, if any, processing power. Computer terminals were used for entering data into a system, such as a mainframe computer, and then displaying results from the mainframe. Because the terminal did not possess a lot of computing power, the mainframe computer controlled the sending and receiving of data to and from each terminal. This required special types of protocols (sets of rules used by communication devices), and the data was usually transmitted at relatively slow speeds, such as 9600 or 19,200 bits per second (bps).

During this period, many of the same end users who had terminals on their desks also now found a microcomputer there (and thus had very little room for anything else). In time, terminal-emulation cards were developed, which allowed a microcomputer to imitate the abilities of a computer terminal. As terminal emulation cards were added to microcomputers, terminals were removed from end users’ desks, and microcomputers began to serve both functions. Now, if users wished, they could download information from the mainframe computer to their microcomputers, perform operations on the data, and then upload the information to the mainframe. Today, one rarely sees dumb computer terminals. Instead, most users use microcomputers and access the mainframe using either a terminal emulation card, a Web browser and Web interface, Telnet software (more on this in Chapter Ten), or a thin client. A thin client workstation is similar to a microcomputer but has no hard drive storage.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab 9 – READ INSTRUCTIONS Assignment

Assessment Worksheet

Developing Disaster Recovery Backup Procedures and Recovery Instructions Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you applied the same concepts of disaster recovery backup procedures and recovery instructions to your own data. You explained how you can lower recovery time objectives (RTOs) with proper backup and recovery procedures, you defined a process for IT system and application recovery procedures, you identified a backup solution for saving your own data, and you tested and verified your backups for RTO compliance.

Lab Assessment Questions & Answers

1. How do documented backup and recovery procedures help achieve RTO?

 

2. True or false: To achieve an RTO of 0, you need 100 percent redundant, hot-stand-by infrastructure (that is, IT systems, applications, data, and so on).

 

3. What is most important when considering data backups?

 

4. What is most important when considering data recovery?

 

5. What are the risks of using your external e-mail box as a backup and data storage solution?

 

 

 

75

 

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

 

 

6. Identify the total amount of time required to recover and install the Lab Assessment Worksheet(s) and to open the file(s) to verify integrity. (Calculate your timed RTO using your computer clock and your documented instructions.)

 

7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower?

 

8. What are some recommendations for lowering the RTO for retrieval and access to the backup data file?

 

9. If you drive RTO lower, what must you do to streamline the procedure?

 

10. Why are documenting and testing critical to achieve a defined RTO?

 

11. Why is it a best practice for an organization to document its backup and recovery steps for disaster recovery?

 

12. What can you do to cut down on the recovery time for accessing, copying, and recovering your Lab Assessment Worksheets to achieve the RTO?

 

13. What will encryption of a disk or data in storage do to the RTO definition when attempting to retrieve and recover cleartext data for production use?

 

14. How many total steps did your backup and recovery procedures consist of for this lab exercise? Are there any that can be combined or streamlined?

 

 

 

 

 

15. If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system administrator logon credentials, what additional step would be required in the recovery phase?

 

 

  1. Course Name and Number:
  2. Student Name:
  3. Instructor Name:
  4. Lab Due Date:
  5. Text92:
  6. Text93:
  7. Text94:
  8. Text95:
  9. Text96:
  10. Text97:
  11. Text98:
  12. Text99:
  13. Text100:
  14. Text101:
  15. Text102:
  16. Text103:
  17. Text104:
  18. Text105:
  19. Text106:
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!