BuyFindarrow_forward

Cornerstones of Financial Accounti...

4th Edition
Jay Rich + 1 other
ISBN: 9781337690881

Solutions

Chapter
Section
BuyFindarrow_forward

Cornerstones of Financial Accounti...

4th Edition
Jay Rich + 1 other
ISBN: 9781337690881
Textbook Problem
1 views

Research and Analysis Using the Annual 10-K

Obtain Marriott’s 2016 10-K through the "Investor Relations” portion of Marriott’s website, (do a web search for Marriott investor relations). Once at the Investor Relations part of the website look for “SEC Filings." When you see the list of all the filings, either filter for the “Annual Filings” or search for “10-K" when you find the list of all SF.C Filings.

Another option is to go to www.sec.gov and click “Company Filings Search" under “Filings.”

Required:

2. How much of these liabilities are classified as long-term debt (not noncurrent liabilities, but classified as long-term debt)?

To determine

Concept introduction:

Liabilities:

Liabilities are the obligation of the business or amount payable by the business. Liabilities can current or long term. Current liabilities are liabilities payable within the short term or business cycle of the company, for example Accounts payable for purchases and utilities payable. Long term liabilities are liabilities payable in a long period/ years, for example long term loan.

To indicate:

The amount of liabilities classified as Long term debt of Marriott for the year 2016.

Explanation

Liabilities are the obligation of the business or amount payable by the business. Liabilities can current or long term. Current liabilities are liabilities payable within the short term or business cycle of the company, for example Accounts payable for purchases and utilities payable...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started
Ch-9 P-11DQCh-9 P-12DQCh-9 P-13DQCh-9 P-14DQCh-9 P-15DQCh-9 P-16DQCh-9 P-17DQCh-9 P-18DQCh-9 P-19DQCh-9 P-20DQCh-9 P-21DQCh-9 P-22DQCh-9 P-1MCQCh-9 P-2MCQCh-9 P-3MCQCh-9 P-4MCQCh-9 P-5MCQCh-9 P-6MCQCh-9 P-7MCQCh-9 P-8MCQCh-9 P-9MCQCh-9 P-10MCQCh-9 P-11MCQCh-9 P-12MCQCh-9 P-13MCQCh-9 P-14MCQCh-9 P-15MCQCh-9 P-16MCQCh-9 P-17MCQCh-9 P-18MCQCh-9 P-19MCQCh-9 P-20MCQCh-9 P-21MCQCh-9 P-22CECh-9 P-23CECh-9 P-24CECh-9 P-25CECh-9 P-26CECh-9 P-27CECh-9 P-28CECh-9 P-29CECh-9 P-30CECh-9 P-31CECh-9 P-32CECh-9 P-33CECh-9 P-34CECh-9 P-35CECh-9 P-36CECh-9 P-37CECh-9 P-38CECh-9 P-39CECh-9 P-40CECh-9 P-41CECh-9 P-42CECh-9 P-43CECh-9 P-44BECh-9 P-45BECh-9 P-46BECh-9 P-47BECh-9 P-48BECh-9 P-49BECh-9 P-50BECh-9 P-51BECh-9 P-52BECh-9 P-53BECh-9 P-54BECh-9 P-55BECh-9 P-56BECh-9 P-57BECh-9 P-58BECh-9 P-59BECh-9 P-60BECh-9 P-61BECh-9 P-62BECh-9 P-63BECh-9 P-64BECh-9 P-65BECh-9 P-66ECh-9 P-67ECh-9 P-68ECh-9 P-69ECh-9 P-70ECh-9 P-71ECh-9 P-72ECh-9 P-73ECh-9 P-74ECh-9 P-75ECh-9 P-76ECh-9 P-77ECh-9 P-78ECh-9 P-79ECh-9 P-80ECh-9 P-81ECh-9 P-82ECh-9 P-83ECh-9 P-84ECh-9 P-85ECh-9 P-86ECh-9 P-87ECh-9 P-88ECh-9 P-89ECh-9 P-90ECh-9 P-91PSACh-9 P-92PSACh-9 P-93PSACh-9 P-94PSACh-9 P-95PSACh-9 P-96PSACh-9 P-97PSACh-9 P-98PSACh-9 P-99PSACh-9 P-91PSBCh-9 P-92PSBCh-9 P-93PSBCh-9 P-94PSBCh-9 P-95PSBCh-9 P-96PSBCh-9 P-97PSBCh-9 P-98PSBCh-9 P-99PSBCh-9 P-100CCh-9 P-101.1CCh-9 P-101.2CCh-9 P-102.1CCh-9 P-102.2CCh-9 P-102.3CCh-9 P-102.4CCh-9 P-103.1CCh-9 P-103.2CCh-9 P-103.3CCh-9 P-103.4CCh-9 P-104.1CCh-9 P-104.2CCh-9 P-104.3CCh-9 P-104.4CCh-9 P-105.1CCh-9 P-105.2CCh-9 P-105.3CCh-9 P-105.4CCh-9 P-105.5CCh-9 P-105.6CCh-9 P-105.7CCh-9 P-106.1CCh-9 P-106.2CCh-9 P-106.3C

Additional Business Solutions

Find more solutions based on key concepts

Show solutions add

What is steganography, and what can it be used for?

Principles of Information Security (MindTap Course List)

VocabularyState the meaning of the following terms: Duty Cycle _____ Footcandle _____ Efficacy _____ CRI _____ ...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

Define encapsulation, and explain how it is used in object-oriented analysis.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

What security risks are associated with cookies?

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)