31. The 2018 Math Portion of the SAT scores are normally distributed with a mean of 527 and a standard deviation of 117. Give the range of scores that will satisfy the 68%, 95% and 99.7% of the Empirical Rule.
32. Use the mean and standard deviation from #31 for the Math Portion of the SAT. Suzette took the SAT in 2018 and scored higher, on the Math Portion, than the bottom 30% but lower than the top 12% of those taking the test. Give the upper and lower bounds for Suzette’s score.
In: Statistics and Probability
Using the sequence of the BPSL1549 protein – carry out an NCBI BLAST search using an appropriate BLAST program for the type of input sequence and restrict your search to the non redundant protein sequences (nr) database.What does the list of significant alignments tell you? Select all that apply. *
In: Biology
1. Why do firms provide stock and stock options to non-executive employees?
Discuss empirical evidence that bears this.
2. What risks are incurred when making loans to borrowers based in foreign countries? Explain.
3. Is it better to invest in mutual funds rather than buying stocks? Explain using the concept of RISK APPETITE.
In: Finance
Explain a time you encountered non-uniform pricing, or price discrimination. Identify the type of price discrimination it was. Using the criteria necessary for price discrimination, evaluate how well that good fit price discrimination. Finally, evaluate the effect such price discrimination has on you and society.
Your journal entry must be at least 200 words in length. No references or citations are necessary.
In: Accounting
Scenario: An auto shop is designing a database to keep track of repairs. So far, we have this UNF relation, with some sample data shown. Normalize to 1NF.
REPAIRS: # VIN, Make, Model, Year, ( Mileage, Date, Problem, Technician, Cost )
|
VIN |
Make |
Model |
Year |
Mileage |
Date |
Problem |
Technician |
Cost |
|
15386355 |
Ford |
Taurus |
2000 |
128242 |
6/6/2014 |
Won’t start |
Gary |
$300 |
|
15386355 |
Ford |
Taurus |
2000 |
129680 |
6/20/2014 |
Tail light out |
Trisha |
|
|
43532934 |
Honda |
Civic |
2010 |
38002 |
6/18/2014 |
Brakes slow |
Gary |
$240 |
|
15386355 |
Ford |
Taurus |
2000 |
130786 |
7/5/2014 |
Windshield chip |
Trisha |
$20 |
Explain your reasoning here (not what you did but why you did it). Why did you create the relations the way you did?
Your 1NF relation or relations go here.
In: Computer Science
A manufacturing company produces products. The following product information is stored: product name, product ID and quantity on hand. These products are made up of many components. Each component can be supplied by one or more suppliers. The following component information is kept: component ID, name, description, suppliers who supply them, and products in which they are used. Show table names, primary keys, attributes for each table, relationships between the entities including all constrains required.
Assumptions in your database design:
• A supplier can exist without providing components.
• A component must be associated with a supplier.
• A component must be associated with a product.
• A product cannot exist without components.
Design your database and implement it by providing all the required DDL and DML SQL statement to create the needed database objects and populate the tables with data. Make sure you included all required constraints and appropriates column datatypes.
Submit:
Write the sql code for creating these tables (the DDL statements).
Write query and update DML in SQL that must contain a where condition.
INSERT must populate all columns
Provide at least three statements for each type of DML • All needed constraints. Make sure you name all your constraints.
In: Computer Science
This format should allow you more time to think about your answer. The length of your answers should range from 2-4 paragraphs, depending on the complexity of the question. Each question is worth 10 points. Remember to use the readings and your class notes to answer the questions. Use citations/quotes and then go on to interpret and explain the quote in your own words.
Modern Marxian economics has sought to adapt Marx’s theory to contemporary capitalism. Three empirical studies demonstrate this. Describe the additional insights brought to the analysis of: (1) the productivity slowdown of the 1970s (Weisskopf, Bowles, Gordon); (2) the long-run change in the rate of profit (Dumenil and Levy); (3) the identification of financialization as a new phase of capitalist development (Lapavitsas).
In: Economics
1) In your
opinion, in 2018, what personal characteristics are
employers looking for in individuals whom they consider for
long-term employment and probable advancement in their
organization?
2) To what extent
can one develop these characteristics? Please support your
points with in-text citations and include a reference
list.
3) Should the HR department help to develop these characteristics in employees?
In: Operations Management
In databases, Normalization used to reduce redundancy and update anomalies from the tables. There are several Normal forms that are used in database 1NF, 2NF, BCNF etc.
The term functional dependency is very important in NF. Multivalued attributes, Atomicity property etc. plays important role in NF
Action Items
In: Computer Science
An organization has the following password policies:
- password must be at least 16 characters long
- three failed login attempts will lock the account for 5 minutes
- password must have one uppercase letter, one lowercase letter, and one non alphanumeric symbol
a database server was recently breached, and the incident Response Team suspect the passwords were compromised. Users with permission on the database server were forced to change their passwords for that server. Unauthorised and suspicious logins are now being detected on the same server. Which of the following is the most likely issue, that should be done?
users have reset their account to a previously used password, Implement a password history policy
service accounts are being used to log on to the server, restrict service account permissions to read/ write
single sign-on is allowing remote login to the database server, disable single sign-on until it can be properly configured
users are logged in after work hours, Implement time of day restrictions for the database servers
In: Computer Science