Examlex

Solved

The Following Is an Extract from the Balance Sheet as at December

question 16

Essay

The following is an extract from the balance sheet as at December 31,1011:
The following is an extract from the balance sheet as at December 31,1011:    The company did not declare dividends on preferred shares in 2011. Transactions in 2012 include the following: i. March 15: Hewitt purchased 15,000 preferred shares on the stock exchange for $15.25 per share and held these in treasury. ii. March 28: The company redeemed 5,000 preferred shares directly from shareholders. iii. July 1: The market price of common shares shot up to $5 per share,so Hewitt decided to split the common shares two to one. iv. August 1: Hewitt cancelled 14,000 preferred shares that were held in treasury. v. December 31: The company declared dividends of $0.50 per common share. Requirement: Prepare the journal entries to record the above transactions. The company uses the single-transaction method to account for treasury shares. The company did not declare dividends on preferred shares in 2011. Transactions in 2012 include the following:
i. March 15: Hewitt purchased 15,000 preferred shares on the stock exchange for $15.25 per share and held these in treasury.
ii. March 28: The company redeemed 5,000 preferred shares directly from shareholders.
iii. July 1: The market price of common shares shot up to $5 per share,so Hewitt decided to split the common shares two to one.
iv. August 1: Hewitt cancelled 14,000 preferred shares that were held in treasury.
v. December 31: The company declared dividends of $0.50 per common share.
Requirement:
Prepare the journal entries to record the above transactions. The company uses the single-transaction method to account for treasury shares.


Definitions:

Access Controls

Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.

Access Control

Access control is a security technique that regulates who or what can view or use resources in a computing environment.

Encryption

The method of transforming data or information into a coded format to safeguard against unauthorized entry.

RFID

Stands for Radio-Frequency Identification, a technology used to identify and track tags attached to objects using electromagnetic fields.

Related Questions