Cendana Berhad has issued 170,000,000 ordinary shares of RM1 each as at 1 January 2020. During the
Fantastic news! We've Found the answer you've been seeking!
Question:
Cendana Berhad has issued 170,000,000 ordinary shares of RM1 each as at 1 January 2020. During the current year ended 31 December 2020, the following share transactions were undertaken by the company:
31 March 2020 Issued 80,000,000 ordinary shares for cash at a price of RM6 per share
31 October 2020 Bought back 30,000,000 ordinary shares an average price of RM6.50 per share
Net profit attributable to ordinary shares for the year ended 31 December 2020 was RM83,500,000
REQUIRED:
Compute the basic EPS for Cerdas Bhd for the year ended 31 December 2020.
Transcribed Image Text:
Here is a Python dictionary of the relative frequency of letters in English text: { "A": .08167, "B": .01492, "C": .02782, "D": 04253, "E": 12702, "F": .02228, "G": .02015, "H": .06094, "I": .06966, "J": .00153, "K": .00772, "L": .04025, "M": .02406, "N": 06749, "0": .07507, "P": .01929, "Q": .00095, "R": .05987, "S": .06327, "T": .09056, "U": .02758, "V": .00978, "W": .02360, "X": .00150, "Y": .01974, "Z": .00074 } Here is some plaintext: ethicslawanduniversitypolicieswarningtodefendasystemyouneedtobeabletot hinklikeanattackerand that includes understandingtechniques that canbeusedt ocompromisesecurityhoweverusingthose techniques intherealworldmayviolate thelawortheuniversitysrulesanditmaybeunethicalundersome circumstancesev enprobingforweaknessesmayresultinseverepenaltiesuptoandincludingexpuls ioncivilfinesandjailtimeourpolicyineecsisthatyoumustrespecttheprivacya ndpropertyrightsof othersatalltimesorelseyouwill fail the courseactinglawf ullyandethicallyisyourresponsibility carefullyreadthe computerfraudandab useactcfaaafederalstatute thatbroadlycriminalizes computerintrusionthisi soneof severallaws that governhackingunderstand what thelawprohibitsifindou btwecanreferyoutoanattorneyplease reviewitsspolicies onresponsibleuseoft concerningproper echnologyresourcesandcaenspolicydocumentsforguidelines The population variance of a finite population X of size N and mean u is given by N Var(X) Σ(x; -μ). i=1 (a) What is the population variance of the relative letter frequencies in English text? (b) What is the population variance of the relative letter frequencies in the given plaintext? (c) For each of the following keys-yz, xyz, wxyz, vwxyz, uvwxyz-encrypt the plaintext with a Vigenère cipher and the given key, then calculate and report the population variance of the relative letter frequencies in the resulting ciphertext. Describe and briefly explain the trend in this sequence of variances. (d) Viewing a Vigenère key of length k as a collection of k independent Caesar ciphers, calculate the mean of the frequency variances of the ciphertext for each one. (E.g., for key yz, calculate the frequency variance of the even numbered ciphertext characters and the frequency variance of the odd numbered ciphertext characters. Then take their mean.) Report the result for each key in part (c). Is the mean variance like those observed in part (b)? Part (c)? Briefly explain. (e) Consider the ciphertext that was produced with key uvwxyz. In part (d), you calculated the mean of six variances for this key. Revisit that ciphertext, and calculate the mean of the frequency variances that arise if you had assumed that the key had length 2, 3, 4, and 5. Does this suggest a variant to the Kasiski attack? (Don't say no!) Briefly explain. Here is a Python dictionary of the relative frequency of letters in English text: { "A": .08167, "B": .01492, "C": .02782, "D": 04253, "E": 12702, "F": .02228, "G": .02015, "H": .06094, "I": .06966, "J": .00153, "K": .00772, "L": .04025, "M": .02406, "N": 06749, "0": .07507, "P": .01929, "Q": .00095, "R": .05987, "S": .06327, "T": .09056, "U": .02758, "V": .00978, "W": .02360, "X": .00150, "Y": .01974, "Z": .00074 } Here is some plaintext: ethicslawanduniversitypolicieswarningtodefendasystemyouneedtobeabletot hinklikeanattackerand that includes understandingtechniques that canbeusedt ocompromisesecurityhoweverusingthose techniques intherealworldmayviolate thelawortheuniversitysrulesanditmaybeunethicalundersome circumstancesev enprobingforweaknessesmayresultinseverepenaltiesuptoandincludingexpuls ioncivilfinesandjailtimeourpolicyineecsisthatyoumustrespecttheprivacya ndpropertyrightsof othersatalltimesorelseyouwill fail the courseactinglawf ullyandethicallyisyourresponsibility carefullyreadthe computerfraudandab useactcfaaafederalstatute thatbroadlycriminalizes computerintrusionthisi soneof severallaws that governhackingunderstand what thelawprohibitsifindou btwecanreferyoutoanattorneyplease reviewitsspolicies onresponsibleuseoft concerningproper echnologyresourcesandcaenspolicydocumentsforguidelines The population variance of a finite population X of size N and mean u is given by N Var(X) Σ(x; -μ). i=1 (a) What is the population variance of the relative letter frequencies in English text? (b) What is the population variance of the relative letter frequencies in the given plaintext? (c) For each of the following keys-yz, xyz, wxyz, vwxyz, uvwxyz-encrypt the plaintext with a Vigenère cipher and the given key, then calculate and report the population variance of the relative letter frequencies in the resulting ciphertext. Describe and briefly explain the trend in this sequence of variances. (d) Viewing a Vigenère key of length k as a collection of k independent Caesar ciphers, calculate the mean of the frequency variances of the ciphertext for each one. (E.g., for key yz, calculate the frequency variance of the even numbered ciphertext characters and the frequency variance of the odd numbered ciphertext characters. Then take their mean.) Report the result for each key in part (c). Is the mean variance like those observed in part (b)? Part (c)? Briefly explain. (e) Consider the ciphertext that was produced with key uvwxyz. In part (d), you calculated the mean of six variances for this key. Revisit that ciphertext, and calculate the mean of the frequency variances that arise if you had assumed that the key had length 2, 3, 4, and 5. Does this suggest a variant to the Kasiski attack? (Don't say no!) Briefly explain.
Expert Answer:
Answer rating: 100% (QA)
Answer Calculation of Basic EPS Basic EPS Net profit attributable ... View the full answer
Related Book For
The Legal and Regulatory Environment of Business
ISBN: 978-0078023859
17th edition
Authors: Marisa Pagnattaro, Daniel Cahoy, Manning Magid, Lee Reed, Pe
Posted Date:
Students also viewed these accounting questions
-
The W. J. Howey Co. owned large tracts of citrus acreage in Lake County, Florida. For several years, it planted about five hundred acres annually, keeping half of the groves Itself and offering the...
-
The Florida Citrus Corporation estimates its taxable income for next year at $2,500,000. The company is considering expanding its product line by introducing pineapple-orange juice for the next year....
-
Question 10 Assume we have a 2's complement system with an 8-bit whole number part and a 2-bit fractional part. Find a decimal representation of 2's complements binary number 1110 0010.01 The quiz is...
-
The monochromatic emissivity of a diffuse-surface at 1600 K varies with wavelength in the following manner : = 0.4 for 0
-
Multiply: 4.37 2.1 4.37 2.1 4 37 87 4 91.7 7 4.3 7 2.1 4 3 7 8 7 4 9.1 7 7
-
Match the following and select the correct option. Height of Binary search tree(in worst o([log ]-1) 1 a (2n+1) case) Height of Ternary tree b O(n) Height of B-tree(when c minimum degree, -2) (log,...
-
Xie Company identified the following activities, costs, and activity drivers for 2017. The company manufactures two types of go-karts: deluxe and basic. Required 1. Compute a single plantwide...
-
Kamal Fatehl, production manager of Kennesaw Manufacturing, finds his profit at $ 15,000 ( as shown in the state-ment below) inadequate for expanding his business. The bank is insisting on an...
-
Kevin made two investments over the past two years. His first investment wasabaseball card thatcost$50.00,whichhe sold three months later for$55.00.The second wasashare of stockinastart-upcompany....
-
Asbat Pharmaceuticals (Asbat) is a leading pharmaceutical company that has been in existence for 22 years. Asbat has a calendar year-end and is audited annually. Asbat only operates in the United...
-
Budgets at all levels of government reflect a complex interplay of internal and external factors that determine the level of government spending and the allocation of resources among an array of...
-
Glocoma Company is expected to have free cash flow of $ 8 in the coming year. Growth rates are expected to decline at the rate of 2 % per year. The expected rate of return on the stock is 4 % . The...
-
You are driving at 20.0 m/s (44.7 mph) when a traffic light 50.0 m ahead of you turns yellow. If you step on the gas pedal, you can accelerate at 2.3 m/s; if you step on the brake, you can decelerate...
-
Mali Inc. purchased a copper mine on January 1 , Year 1 for $ 2 2 , 0 0 0 , 0 0 0 . 1 1 , 0 0 0 , 0 0 0 pounds of copper are expected to be extracted from the mine. In Year 1 , 1 , 5 0 0 , 0 0 0...
-
Topic: "Application of Family Court Ordinance -1985 to Hindu Community." Write the topic with in big size with explanation using introduction, points and conclusion.
-
Zellers Canada Itd estimates that annual manufacturing overhead costs will be $ 5 0 0 , 0 0 0 . UCW allocates overhead to jobs based on machine hours, and it expects that 3 0 0 , 0 0 0 units to be...
-
Summer thunderstorms in the southern U.S. are usually produced by towering ________ clouds that form by ________. nimbostratus; frontal uplift cumulonimbus; frontal uplift nimbostratus; convection...
-
One hundred pounds of water at atmospheric pressure are heated from 60F to 200F. What is the enthalpy change? The internal energy change? Why is the difference between the internal energy change and...
-
(a) What does it mean to have a fee simple defeasible estate? (b) What is the difference between a remainder interest and a reversion? (c) Arla and Jack own a house as joint tenants with right of...
-
Other Strict Liability Torts Explain when common carriers are not strictly liable for damage to transported goods.
-
(a) What is the purpose of a submission in an arbitration? (b) What is the proper role of the courts in determining whether a submission to arbitrate is valid?
-
What do you understand by a bank lending policy in the context of a monetary policy?
-
A columnist in the Wall Street Journal argues: Whether youre a borrower or a saver, what matters isnt the nominal interest rate but the real, post-inflation rate of return. Do you agree? Briefly...
-
What is the relationship between the MPC and the multiplier? Would a larger value for the MPC tend to increase or decrease the stability of the economy? Briefly explain.
Study smarter with the SolutionInn App