Lending Limit - Harrison
.pdf
keyboard_arrow_up
School
Auburn University *
*We aren’t endorsed by this school
Course
4970
Subject
Finance
Date
Apr 3, 2024
Type
Pages
1
Uploaded by JudgeGerbil3755
___________________________________________________________________________________________________ © 1996-2017 Jeanne M. Brett. Distributed by Negotiation and Team Resources (NTR). To request permission to reproduce contact negotiationandteamresources.com By Jeanne M. Brett Lending Limit
Role of S. Harrison You are S. Harrison, the Vice President of The First Bank of New York and Manager of the South African office. The First Bank of New York is a U.S. bank headquartered in New York City, but with substantial foreign lending activity that is done through its many overseas branches. A week ago, R. Fletcher, the worldwide commercial lending officer for Dax Pharmaceuticals, refused your proposal for a $10 million loan to Dax for a recombinant DNA plant. Fletcher is responsible for monitoring the bank's exposure to the Dax account. Dax is a U.S. pharmaceuticals firm headquartered in Chicago, but with many subsidiaries and affiliates worldwide. Fletcher indicated that the bank's exposure on Dax was close to the current lending limit, but that even if the executive committee increased the limit, there were better sites than South Africa for loans to Dax. You think that Fletcher neither understands the political situation in South Africa nor the bank's policy toward South Africa. Explaining both in a remote call was impossible since Fletcher did not want to listen to you anyway. As you see it, the political situation in Africa, in general, is volatile. South Africa is no worse, even better, than many countries. There are a variety of reasons why Dax wishes to build this plant in South Africa. First, disease, most recently AIDS, is one of Africa's major problems, thus providing a ready market for inexpensive drugs. Second, Dax has an important AIDS drug that the company believes can be produced at low cost using the recombinant DNA process. Third, the process requires skilled employees. Dax believes, and you agree, that only in South Africa is a work force with the required skills available. Dax's South African subsidiary would represent new business for your office. Since it is a U.S. company with an excellent balance sheet, you believe that it would meet nicely the bank's policy of continuing to lend in South Africa. Fletcher either has information about a change in bank policy toward doing business in South Africa or has concocted one. Several of the bank's major customers are South African mining companies. The bank's current exposure in South Africa is around $75 million. If the bank stops making loans in South Africa, or even refuses to participate in future development of South Africa, it is likely to lose such customers. You realize that loans in South Africa are being scrutinized carefully, but you did your homework on this one. This is a solid loan proposal and Fletcher knows it. You also know that although the Dax lending limit is $95 million, the bank has only $90 million in outstanding loans to Dax. $5 million is not sufficient to get this business, but if Fletcher would work with you, you think that together you could get Marks, the Executive Vice President for Commercial Lending, to go to the bank's executive committee to increase the limit by $5 million. Instead, you went over Fletcher's head and took the case directly to Marks. The Dax situation is likely to be repeated with other companies wishing to do business with the bank in South Africa unless the corporate account officers get the word about the bank’s policy towards Africa. You think that there is no one better than Marks to tell them because Marks is their boss, has had international experience, and sits on the bank’s executive committee. Marks suggested the three of you meet when you are in New York next week. You are not sure what good it will do to have Fletcher there, but you couldn't tell Marks no.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
_______________________must follow GAAP, whereas_________________ need not follow GAAP.
arrow_forward
1.A(n) ______________________________ is the attribute whose value is unique for every entity that will appear in the database.
2.______________________________ is a measure of the highest level of participation that one entity can have in another entity.
3.In set theory, a two-dimensional collection of information is called a(n) ______________________________.
4.A(n) ______________________________ is an information system that assists managers with unstructured decisions by retrieving and analyzing data for purposes of identifying and generating useful information.
5.A(n) ______________________________ is mainly about collecting and presenting information and less about doing additional processing and calculations.
6.A(n) ______________________________ is a computer-based system that supports collaborative intellectual work such as idea generation, elaboration, analysis, synthesis, information sharing, and decision making.
7.A computer's ability to imitate human decision…
arrow_forward
__________ is a process by which information and understanding are transferred between a sender and a receiver.
arrow_forward
Select the letter of the item below that best matches the definitions that follow.
a. Data Files CD ________
b. Lists ________
c. Forms ________
d. Registers ________
e. Reports and graphs ________
f. Restoring a backup ________
g. Icon bar ________
h. Home page ________
i. Backing up a file ________
1. One click access to QuickBooks Accountant Centers and Home page.
2. The process of rebuilding a backup file to a full QuickBooks Accountant file ready for additional input.
3. Electronic representations of paper documents used to record business activities such as customer invoices, vendor bills, and checks.
4. A big-picture approach of how your essential business tasks fit together organized by logical groups such as customers, vendors, and employees.
5. Groups of names such as customers, vendors, employees, items, and accounts.
6. Contains backups of all the practice files needed for chapter work and completion of assignments.
7. The process of creating a copy of a…
arrow_forward
_____________Is concerned with providing information for the use of those who are inside the organization, whereas ____________________is concerned with providing information for the use of those who are outside the organization.
arrow_forward
Source documents ________.A. are input devicesB. are output devicesC. do not have to be on paperD. cannot be electronic files
arrow_forward
________________________________is generally higher when an individual participates in setting his or her own goals thanwhen the goals are imposed from above
arrow_forward
1.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks.
2.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program,
3.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data.
4.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.
5.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant…
arrow_forward
31.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks.
32.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.
33.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data.
34.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.
35.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with…
arrow_forward
Information that is reported free from error ________.
arrow_forward
Any device used to provide the results of processing data is a(n) ________ device.
Group of answer choices
A. sources
B. input
C. output
D. storage
arrow_forward
What is a primary memory? A secondary memory? Explain what will happen to a computer without each of these components
arrow_forward
Fill in the blank.
______ standards reflect what is expected to occur.
arrow_forward
What would the entry be for the letter H.?
arrow_forward
6. __________ entail the creation of a third-party legal entity, whereas __________ do not.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub
Related Questions
- _______________________must follow GAAP, whereas_________________ need not follow GAAP.arrow_forward1.A(n) ______________________________ is the attribute whose value is unique for every entity that will appear in the database. 2.______________________________ is a measure of the highest level of participation that one entity can have in another entity. 3.In set theory, a two-dimensional collection of information is called a(n) ______________________________. 4.A(n) ______________________________ is an information system that assists managers with unstructured decisions by retrieving and analyzing data for purposes of identifying and generating useful information. 5.A(n) ______________________________ is mainly about collecting and presenting information and less about doing additional processing and calculations. 6.A(n) ______________________________ is a computer-based system that supports collaborative intellectual work such as idea generation, elaboration, analysis, synthesis, information sharing, and decision making. 7.A computer's ability to imitate human decision…arrow_forward__________ is a process by which information and understanding are transferred between a sender and a receiver.arrow_forward
- Select the letter of the item below that best matches the definitions that follow. a. Data Files CD ________ b. Lists ________ c. Forms ________ d. Registers ________ e. Reports and graphs ________ f. Restoring a backup ________ g. Icon bar ________ h. Home page ________ i. Backing up a file ________ 1. One click access to QuickBooks Accountant Centers and Home page. 2. The process of rebuilding a backup file to a full QuickBooks Accountant file ready for additional input. 3. Electronic representations of paper documents used to record business activities such as customer invoices, vendor bills, and checks. 4. A big-picture approach of how your essential business tasks fit together organized by logical groups such as customers, vendors, and employees. 5. Groups of names such as customers, vendors, employees, items, and accounts. 6. Contains backups of all the practice files needed for chapter work and completion of assignments. 7. The process of creating a copy of a…arrow_forward_____________Is concerned with providing information for the use of those who are inside the organization, whereas ____________________is concerned with providing information for the use of those who are outside the organization.arrow_forwardSource documents ________.A. are input devicesB. are output devicesC. do not have to be on paperD. cannot be electronic filesarrow_forward
- ________________________________is generally higher when an individual participates in setting his or her own goals thanwhen the goals are imposed from abovearrow_forward1.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 2.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program, 3.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data. 4.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator. 5.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant…arrow_forward31.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 32.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program. 33.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data. 34.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator. 35.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with…arrow_forward
- Information that is reported free from error ________.arrow_forwardAny device used to provide the results of processing data is a(n) ________ device. Group of answer choices A. sources B. input C. output D. storagearrow_forwardWhat is a primary memory? A secondary memory? Explain what will happen to a computer without each of these componentsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- College Accounting (Book Only): A Career ApproachAccountingISBN:9781337280570Author:Scott, Cathy J.Publisher:South-Western College Pub
College Accounting (Book Only): A Career Approach
Accounting
ISBN:9781337280570
Author:Scott, Cathy J.
Publisher:South-Western College Pub