Premium Essay

Finance User

In:

Submitted By juan16
Words 573
Pages 3
Case 8

Paying Off That Dream House

37

8
Loan Amortization

costs) advertised at 5% and 30-year rates at 5.75%. Evelyn and Paul realize that refinancing is quite a hassle due to all the paperwork involved but with rates being down to 30-year lows, they don't want to let this opportunity pass them by. About 2 years ago, rates were down to similar levels but they had procrastinated, and had missed the boat. This time, however, the couple called their mortgage officer at the Uptown Bank and locked in the 5%, 15-year rate. Nothing was going to stop them from reducing the costs of paying off their dream house this time!

Questions:
1. What is Evelyn and Paul's monthly mortgage payment prior to the refinancing?

Paying Off That Dream House

2. During the first 5 years of owning their dream home, how much money has the couple paid towards the mortgage? What proportion of this has been applied towards interest? 3. Had the couple opted for the original I5-year mortgage proposal (15 year, 8%), how much higher would their monthly payment have been?

When Evelyn and Paul Peters were "house hunting" five years ago, the mortgage rates were pretty high. The fixed rate on a 30-year mortgage was 8.75% while the I5-year fixed rate was at 8%. After walking through many homes, they finally reached a consensus and decided to buy a $200,000 two-story house in an up and coming suburban neighborhood in the Midwest. To avoid prepaid mortgage insurance (PMI) the couple had to borrow from family members and come up with the 20% down payment and the additional required closing costs. Since Evelyn and Paul had already accumulated significant credit card debt and were still paying off their college loans, they decided to opt for lower monthly payments by taking on a 30-year mortgage, despite its higher interest rate. Currently, due to a worsening of economic conditions,

Similar Documents

Free Essay

Virtual Organization

...security measures. While reviewing the virtual organization for Riordan Manufacturing, there were some inconsistencies in the home page, accounting and finance, and human resources section that can be improved on. Home Page The home page is the most important web page for a user because it prepares and sets the tone for navigation and functionality. A glaring omission from the Riordan home page is the purpose of the Intranet and its usefulness for employees. Currently, the home page contains the mission statement, company facts, and a brief history. While this information is important, we would recommend creating a separate page named “About”, or placing it under the current link of “Riordan Industries”, which would be a more appropriate location. Our recommendation for the home page would be to include more details about the intranet itself. What is an intranet? Why is it important? Who are the users? These questions are very important, especially for someone who is new to the company. Additionally, eight headings/links are located at the top of the page and with the exception of the “Home” link, they all have drop down menus, which is great. We recommend adding a small paragraph on the home page for the eight headings that includes a brief description of the section and its useful tools, if any. This allows users to quickly identify where they need to browse and not navigate aimlessly...

Words: 1041 - Pages: 5

Free Essay

Stock Market Simulation

...Behaviour 4 3.3 Software Interfaces 4 3.4 Communications Interfaces 4 4. Quality Requirements 12 5. Fundamental Assumptions 12 6. Expected Changes 12 7. Appendices 13 Introduction 1 Purpose To fully document the expected functionality and requirements for our Stock Market Simulation Game. 2 Document Conventions • Concept of Operations gives a user-oriented, high-level overview of our Stock Market Simulator. • Behavioral Requirements gives a more-detailed vision of the simulator's operations, which is better suited to developers and those interested in the technology. 3 Intended Audience and Reading Suggestions The set of stakeholders includes the team members, the project and overseeing managers, and potential users of our stock market simulation. • Team Members - can use this document to gain a detailed understanding of the requirements needing to be met by our product from both user-centric and design-centric viewpoints. • Managers - can use this page to assess the level of detail the group is working from to guide development. • Potential Users - can view this page to gain deeper insight into the program specifications if they are interested in the development process. 4 Product Scope...

Words: 2658 - Pages: 11

Premium Essay

Nt1430 Unit 1 Ex 1

...Software that a user has the freedom to distribute and change 2. What are 3 characteristics of free software? Freedom to study how the program works, freedom to redistribute copies, and freedom to improve the program 3. What is GNU? Gnu’s not UNIX, is the complete UNIX-compatible software system that was written to be given away free to everyone who can use it. 4. What is Linux? An open-source operating system modelled on UNIX. 5. What did each provide to Linux? UNIX introduced people to the concept, GNU insured total freedom with it, and ran FreeBSD and NetBSD in Linux compatible binary. 6. Who helped build the O.S.? The internet helped mold Linux. Chapter 2 1. What does installing Fedora involve? 1. Set Bios to boot from CD/ DVD 2. Wait 60 seconds, it will install 3. RAM sets up instead of hard disk so it can be cancelled at any time 4. Configure Fedora 5. Write hard disk 6. First boot runs 7. Ready to use Chapter 3 1. What is a live system? An operating system from a removable medium 2. What advantages does it have over an installed system? Customization, cost, free market, stability, and community 3. Where is the /boot partition put? It must reside completely below cylinder 1023 of the hard disk. 4. When does Fedora system start X by default? It depends on distribution and how the user sets it up. Chapter 11 1. How does single-user differ from multi-user mode? Some task can only be done in single-user mode. Back-up...

Words: 362 - Pages: 2

Free Essay

Final Project Part One and Two

...company’s Internet connection and what steps will be taken to ensure that employees follow the guidelines set forth by this policy. This policy applies to all Richman Investments’ employees, contractors, consultants, temporary workers and third parties who have worked with or will work with Richman Investments. This policy applies to all equipment, networks, systems, workstations, internet, intranet, LAN-WAN, BlackBerrys that are belong in part or whole to Richman Investments. In each of the branches that you have there are always certain areas, such as accounting/finance, billing, personnel, and customer accounts. Only the users who belong to those areas will be granted access to those systems. The user will be verified by both a smart card which will be inserted into the smart card reader provided by the company as well as a 4-10 digit PIN which will be changed every 30 days to ensure PIN integrity. When the users try and enter the system using wireless devices they will be required to use a RSA token and use the PIN provided. Mobile...

Words: 1024 - Pages: 5

Premium Essay

Nursing Informatics Task #1

...Task 724.4.2-01-05 Discuss an original presentation to introduce the new EMR system to staff on you unit. In your Presentation: 1. Discuss how access to information is important to the delivery of nursing care, specifically how the EMR system will benefit nurses in their work with Pt’s. Hello everyone. My name is John Smith. I am a RN here at the Hospital and I am the Director of Nursing Informatics. As I’m sure all of you know to be successful in the care of our Patients you have to work as an interdisciplinary team and timely COMMUNICATION is key! As you can see I have capitalized communication to emphasize how important it is. As a Nurse on the unit a big part of communication is reporting a patient’s condition after you have assessed and treated them. This is not only done verbally be talking to the Attending MD, Consulting MD’s Patients and their Family members, but also documenting this in the Pt’s legal medical record. Without effective, accurate and timely documentation of all aspects of a Patients care by the multiple disciplines taking care of the Patients you can have severe consequences including and up to death of the patient. I’m here to discuss the implementation of the EMR system we will be going live with next month. For those of you who don’t know what EMR stands for it means “Electronic Medical Record”. I do not want you to feel intimidated by having to use a computer for those of you who don’t use one often or at all. We will be training all of...

Words: 2761 - Pages: 12

Free Essay

Essays

...Security Management and Control (Date) (Institution Affiliation) Introduction The internet has continued to grow exponentially over time which has led to multiplication of individual, business, and government applications on the internet, with immediate benefits to the end users. These network-based services and applications, however, pose security risks to the information and individual resources of governments and companies. Information that belong to a particular company or individual is an asset that must be protected, therefore, there should adequate security measures to avoid the risk of losing that asset. Network security is a way of protecting the digital information assets of a company. This paper describes the various goals of network security which are: Maintaining information integrity, protecting the information confidentiality and ensuring that the information is available. It is therefore very important that all the networks be protected from all the threats and vulnerabilities for the company to achieve its full potential and goals. Potential malicious attacks and threats A threat is defined as any event or circumstance that has the potential to adversely affect the organizational assets, or operations which includes image, functions, mission, or reputation of the company through unauthorized access, disclosure, destruction, modification of information or denial of service. An attack is an exploit or intrusion, which is an assault to a system that makes...

Words: 1440 - Pages: 6

Premium Essay

Programming

...Introduction The proposed system is a school management system. There has been recent development of school management software to increase efficiency in both primary and secondary schools (Sammons, P., 1995). The system encompasses a website where all stakeholders can access everything that they need online. The users can retrieve what they want from the system easily. The use of traditional methods of record keeping is being phased out in a very rapid pace. The traditional methods have been associated with a lot of redundancy in data. The methods are also nit efficient to use in this era of pervasive computing. The users of the system include students, teachers, workers, the administration as well as the computer technologists. The different users of the system have different roles in the system. They also have different levels of operations. Some users have more privileges than others in the system. The Purpose of the system The system is aimed at providing a remedy to the weaknesses in the existing system. Students marks will be keyed into the system without difficulties. This will enable the system to display the marks and perform various statistical computations (Cheng, Y., 1996). The teachers will also be in a position to record the number of students absent and the overall attendance. The recording will enable the administration of the school to track the overall performance of the students. The students will be able to view their marks from the system. The system...

Words: 2413 - Pages: 10

Premium Essay

New Module

...Content Weight (%) Page No. LIST OF ABBREVIATIONS .....................................................................................................5 TRADING………………………………………………………….30………………………….7 1.1 INTRODUCTION .....................................................................................................................7 1.2 NEAT SYSTEM .....................................................................................................................9 1.3 MARKET TYPES ....................................................................................................................9 1.3.1 Normal Market..............................................................................................................9 1.3.2 Odd Lot Market.............................................................................................................9 1.3.3 RETDEBT Market .........................................................................................................9 1.3.4 Auction Market............................................................................................................10 1.4 CORPORATE HIERARCHY ....................................................................................................10 1.5 LOCAL DATABASE ..............................................................................................................10 1.6 MARKET PHASES ............................................................................................

Words: 86982 - Pages: 348

Premium Essay

Mobile Bi Dresner

...Secure Business Intelligence on Apple ® Mobile Devices MicroStrategy Mobile for iPhone and iPad MOBILE INTELLIGENCE Copyright Information All Contents Copyright © 2011 MicroStrategy Incorporated. All Rights Reserved. TRAdeMARk InfoRMATIon MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i evaluation edition, MicroStrategy 7i olap Services, MicroStrategy 8, MicroStrategy 9, MicroStrategy distribution Services, MicroStrategy MultiSource option, MicroStrategy Command Manager, MicroStrategy enterprise Manager, MicroStrategy object Manager, MicroStrategy Reporting Suite, MicroStrategy Power User, MicroStrategy Analyst, MicroStrategy Consumer, MicroStrategy email delivery, MicroStrategy BI Author, MicroStrategy BI Modeler, MicroStrategy evaluation edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect, MicroStrategy BI developer kit, MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server, MicroStrategy Business Intelligence Platform, MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer Analyzer, MicroStrategy desktop, MicroStrategy desktop Analyst, MicroStrategy desktop designer, MicroStrategy eCRM 7, MicroStrategy education, MicroStrategy eTrainer, MicroStrategy executive, MicroStrategy Infocenter, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal edition, MicroStrategy MdX Adapter, MicroStrategy narrowcast Server, MicroStrategy...

Words: 6771 - Pages: 28

Premium Essay

Tft2 Task 2

...Introduction The major healthcare provider in question has experienced a potential security breach within their records. They are now currently investigating how this happened and what information was access by the unauthorized individual. However, the company is now interested in established a baseline framework to avoid future information breaches from occurring. This document will outline three major IT frameworks and how each could have mitigated the recent information breach. ISO Policy The ISO 27001 recommendation is a high-level discussion. A precise policy was not located. The discussion did contain a preventive feature to denied access afterhours; however, how the afterhours check relates to a policy is not clear. The COBIT5 recommendation is a discussion and needs to develop a policy. The discussion includes auditing in general; however, details about the auditing need to be developed once a precise policy is developed. The NIST framework discussion includes review of log files. Details need to be developed about the review once a policy is developed. The three major security frameworks in the discussion are excellent overall recommendations. Precise policy statements that will prevent an identified security flaw in the scenario need to be developed. The first policy presented is ISO 27001 (International Standards Organization Security Standards). According to the ISO website, “The ISO 27000 family of standards helps organizations keep information assets secure. Using...

Words: 3049 - Pages: 13

Premium Essay

Looko

...User Guide Version 9 Document version 9501-1.0-18/08/2007 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER’S LICENSE The Appliance described in this document is furnished under the terms of Elitecore’s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original...

Words: 48399 - Pages: 194

Premium Essay

Sample Code of an E-Opinion Website

...src="opinion.jpg" height=80>ONLINE OPINIONS.....</big></center></font> <hr size=5 color=blue> <br><br> <font size=5 face="arial"><center>Get honest user reviews on products, places, movies and more...</center> </font> <br> <table border=0 cols=6> <tr> <td><img src="automotive.jpg" align=left height=100 width=200></td> <td><img src="electronics.jpg" align=left height=100 width=200></td> <td><img src="food.jpg" align=left height=100 width=200></td> <td><img src="movies.jpg" align=left height=100 width=200></td> <td><img src="finance.jpg" align=left height=100 width=200></td> <td><img src="book.jpg" align=left height=100 width=200></td> </tr> <tr> <td><font size=5 color=black face="papyrus">Automative</font></td> <td><font size=5 color=red face="papyrus">Electronics</font></td> <td><font size=5 color=blue face="papyrus">Food, Beverages</font></td> <td><font size=5 color=brown face="papyrus">Movies, Music</font></td> <td><font size=5 color=green face="papyrus">Personal Finance</font></td> <td><font size=5 color=orange face="papyrus">Books</font></td> </tr> </table><br><br> <p align=center> <font...

Words: 1172 - Pages: 5

Premium Essay

Quality Assurance in It

...Quality Systems in IT Assignment Implementing Quality Assurance in IT Systems Name: Elise Xuereb Group: 1HND6 Table of Contents Question 1 (P1.1) 2 ISO 9000:2005: ‘Quality Management Systems - Fundamentals and Vocabulary’ 2 ISO 9001:2008: Quality Management Systems - Requirements 3 ISO 19011:2011: Guidelines for auditing management systems 3 Question 7 (D2.1) Take responsibility for managing and organizing quality assurance activities. For 2 quality assurance practices in each stage identified above, you need to do a plan of implementing it. You need to discuss at least 3 people involved and the work operations that need to be done. Criteria: • Correctly write a plan of action for 2 quality assurance practices including 3 people involved and work operations involved. Plan of Action: System Initiation People involved: Project Manager, System Analyst and Quality Assurance Tester. Work that needs to be done and a plan of how it needs to be implemented: 1. Developing a Quality Assurance (QA) Plan: As indicated in Question 6, this step should be implemented by, initially having an exploration phase. In this phase, the client comes up with the procedures that ensures that quality assurance is present in the project. For instance, when having a robust and secure system, the performance of the system should be constant so that no system downtime will take place. Here, one must take into consideration whether the stakeholders have experience with...

Words: 6690 - Pages: 27

Free Essay

System Hardening and Child’s Facebook Account

...Running head: SYSTEM HARDENING AND CHILD’S FACEBOOK ACCOUNT System Hardening and Child’s Facebook Account System Hardening and Child’s Facebook Account This paper will describe methods for hardening a new Apple MacBook computing system. Although I myself do not use a MacBook I recently had the opportunity to harden my daughters newly won MacBook within the timeframe of this course. In the Information Technology (IT) world hardening is a term that describes the process of configuring a system so that it is secure, for the purposes of preventing unauthorized access, providing protection from malware and maintaining integrity, security and privacy of personal or proprietary data. This paper will also describe methods for setting up and securing a child’s first Facebook account. Wireless Access Point Hardening Once our MacBook has been hardened, the next step should be connecting to the Internet through a Wireless Access Point (WAP), a function that is available through a wireless router, provided by the Internet Service Provider (ISP) or self-purchased. A wired connection would be more secure but, as a matter of functionality with a laptop it is more practical to configuring and utilize a wireless connection. The default service set identifier (SSID), which is basically the name of the WAP, will probably be set at the default of the name and model of the router. For security purposes the SSID should be changed to something unique...

Words: 2226 - Pages: 9

Premium Essay

Project Document

...Mr.Chaminda wijesinghe for having inspired us and guided us and being available for consultant on a daily basis throughout the entire duration of this project. And also, we are grateful to the show room manager of Lankem Paints Ltd, Mr.Anushka Perera for furnishing necessary information & details about their system in a friendly manner. And we would also like to thank our parents and friends for their encouragement. SUMMARY OF THE REPORT This system study involves understanding the existing manual inventory control system of LANKEM ROBBIALAC (PVT) Ltd. It is the aim of this project to create a computerized inventory control system whilst eliminating the drawbacks of the current system to provide a faster & efficient and user friendly system. The proposed new system will provide a reliable computer based system while minimizing cost and frauds. We hope to reduce time taken for office work and provide up to date information upon requests to the management. This fast and accurate supply of information to the management will enable them to take decisions fast and provide a better service to the customer further more stock will be updated immediately and sales will be registered and logged without external influences. Table of Contents 1. Introduction ………………………………………………………………………………………………… 1.1 Terms of Reference 1.2 Scope of Study 1.3 Objectives of the Study 1.4 Methodology 1.5 Duration of the Project 2. Existing System...

Words: 5404 - Pages: 22