Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

On January 1 , 2 0 2 0 , Corgan Company acquired 8 0 percent of the outstanding voting stock of Smashing, Inc., for a

On January 1,2020, Corgan Company acquired 80 percent of the outstanding voting stock of Smashing, Inc., for a total of $1,080,000 in cash and other consideration. At the acquisition date, Smashing had common stock of $780,000, retained earnings of $330,000, and a noncontrolling interest fair value of $270,000. Corgan attributed the excess of fair value over Smashing's book value to various covenants with a 20-year remaining life. Corgan uses the equity method to account for its investment in Smashing.
During the next two years, Smashing reported the following:
Net Income Dividends Declared Inventory Purchases from Corgan
2020 $ 230,000 $ 43,000 $ 180,000
2021210,00053,000200,000
Corgan sells inventory to Smashing using a 60 percent markup on cost. At the end of 2020 and 2021,40 percent of the current year purchases remain in Smashing's inventory.
Compute the equity method balance in Corgan's Investment in Smashing, Inc., account as of December 31,2021.
Prepare the worksheet adjustments for the December 31,2021, consolidation of Corgan and Smashing.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Statistics The Art And Science Of Learning From Data

Authors: Alan Agresti, Christine A. Franklin, Bernhard Klingenberg

4th Edition

133860825, 321997832, 133860914, 978-0321997838

Students also viewed these Accounting questions

Question

Solve each system. x + 4y = - 3x + 2y = 17 -9

Answered: 1 week ago

Question

45. How does network authentication work and why is it useful?

Answered: 1 week ago

Question

40. Compare and contrast IPSec tunnel mode and IPSec transfer mode.

Answered: 1 week ago