Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1.) The Fireyear and Goodstone Rubber Companies are two firms located in the rubber capital of the world. These factories produce finished rubber and sell that rubber into a highly competitive world market at the fixed price of £60 per ton. The process of producing a ton of rubber also results in a ton of air pollution that affects the rubber capital of the world. This 1:1 relationship between rubber output and pollution is fixed and immutable at both lactones. Consider the following information regarding the costs (in £) of producing rubber at the two factories (Qp and QG):

Fireyear: Costs: 300 + 2 QF2 Marginal costs: 4QF
Goodstone: Costs: 500 + QG2 Marginal costs: 2QG
Total pollution emissions generated are EF + EG = QF + QG . Marginal damage from pollution is equal to £12 per ton of pollution.

a. In the absence of regulation, how much rubber would be produced by each firm? What is the profit for each firm?

b. The local government decides to impose a Pigovian tax on pollution in the community. What is the proper amount of such a tax per unit of emissions? What are the postregulation levels of rubber output and profits for each firm?

c. Suppose instead of the emission tax, the government observes the outcome in part (a) and decides to offer a subsidy to each firm for each unit of pollution abated. What is the efficient per unit amount of such a subsidy? Again calculate the levels of output and profit for each firm.

d. Compare the output and profits for the two firms in parts (a) through (c). Comment on the differences, if any, and the possibility of one or both of the firms dropping out of the market.

2.) An investment of 1 million dollars per year will avoid 900 million dollars of damage from global warming in 80 years. At a discount rate of 5%, is the investment a good idea?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91423150
  • Price:- $30

Guranteed 24 Hours Delivery, In Price:- $30

Have any Question?


Related Questions in Computer Engineering

Please discuss the data hazards associated with pipelining

Please discuss the data hazards associated with pipelining with an example and how these hazards impact the performance gain associated with pipelining.

Question suppose you wish to encrypt the messsge beyonce

Question : Suppose you wish to encrypt the messsge BEYONCE using the one time pad with the key RIHANNA. What is the keyspace of the one-time pad for a ciphertext of length L? Justify.

Question critical infrastructures -1discuss cybersecurity

Question: Critical Infrastructures - 1. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect t ...

Question 1 answer the questions below in order to determine

Question: 1) Answer the questions below in order to determine the best solution for user-related data storage within your organization. Explain your recommendation. Be sure to cite your sources. 1. Are there different ty ...

Use the management studio to create a new database called

Use the Management Studio to create a new database called the default settings(If the database already exists, use the Management Studio to delete it and than create it.

Question the three as of security are authentication

Question: The three A's of security are Authentication, Authorization, and Auditing. Write a 1-2 page paper in APA format describing these techniques and how they are used in your organization. What could be improved? Th ...

When a source operand is ambiguous such as a value defined

When a source operand is ambiguous, such as a value defined as CR EQU 0DH, which can be either a 16 bit value or an 8 bit value, how can the ambiguity be removed. This is typical of an error staring "Is it byte or word?" ...

Recall that for a block cipher a key schedule algorithm

Recall that for a block cipher, a key schedule algorithm determines the subkey for each round, based on the key K. Let K = (K0,K1,K2......K55) be a 56-bit DES key. a. List the 48 bits for each of the 16 DES subkeys K1, K ...

Search the web for two or more sites that discuss the

Search the web for two or more sites that discuss the ongoing responsibilities of security manager. What other components of security management, as outlined by this model, can be adapted for use in the security manageme ...

Three mutually exclusive new designs for an aircraft engine

Three mutually exclusive new designs for an aircraft engine are under consideration. The engine has a ten-year life. The first engine incurs a cost of $1.2 million for a net saving of $300,000 per annum as compared to an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As