Questions
Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country...

Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country of Hambia. The currency of Hambia is the Aira (AR). The company is considering manufacturing the smart phone model H3XG. If the operation were to be set up, the equipment would be purchased for AR3.5 million and the market price at the end of expected 4-year project life will be AR1.25m. The mobile phone will sell for an initial price of AR950 per unit in the first year and this price will increase in line with inflation in Hambia which is expected to continue at the current rate of 6% per annum. It is expected that 3,000 H3XG phones will be sold in the first year, increasing at a rate of 3% each year. The costs of manufacturing H3XG will consist of variable costs which will be 60% of selling price per unit and incremental fixed overheads of AR60,000 per annum. The costs will increase in line with inflation in Hambia. The working capital equal to 10% of expected sales value for the year will be required at the beginning of each year. At the end of the project the working capital will be recovered. Corporation tax in Hambia is 25%, payable one year in arrears. The tax allowable depreciation is at 20% on a reducing balance method. The required rate of return for the project is 15%. YOU ARE REQUIRED TO:
(a) Estimate the net present value of the project, and recommend, on the basis of NPV, whether the project should be undertaken. (maximum word count for the recommendation 50 words).
(b) Explain why NPV is preferable to payback period as a project selection criterion. (maximum word count 100 words).
(c) Discuss any four non-financial objectives that a company should consider when making investment decisions. (maximum word count 100 words). TOTAL 50 MARKS

In: Accounting

Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country...

Question 1:
Rucas plc is a telecommunications and information technology manufacturing company based in the country of Hambia. The currency of Hambia is the Aira (AR). The company is considering manufacturing the smart phone model H3XG. If the operation were to be set up, the equipment would be purchased for AR3.5 million and the market price at the end of expected 4-year project life will be AR1.25m.
The mobile phone will sell for an initial price of AR950 per unit in the first year and this price will increase in line with inflation in Hambia which is expected to continue at the current rate of 6% per annum. It is expected that 3,000 H3XG phones will be sold in the first year, increasing at a rate of 3% each year. The costs of manufacturing H3XG will consist of variable costs which will be 60% of selling price per unit and incremental fixed overheads of AR60,000 per annum. The costs will increase in line with inflation in Hambia.
The working capital equal to 10% of expected sales value for the year will be required at the beginning of each year. At the end of the project the working capital will be recovered. Corporation tax in Hambia is 25%, payable one year in arrears. The tax allowable depreciation is at 20% on a reducing balance method. The required rate of return for the project is 15%.
YOU ARE REQUIRED TO:
(a) Estimate the net present value of the project, and recommend, on the basis of NPV, whether the project should be undertaken. (maximum word count for the recommendation 50 words).
(b) Explain why NPV is preferable to payback period as a project selection criterion.​(maximum word count 100 words).​​​​​​​
(c) Discuss any four non-financial objectives that a company should consider when making investment decisions. (maximum word count 100 words).​​​​
TOTAL 50 MARKS

In: Finance

Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country...

Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country of Hambia. The currency of Hambia is the Aira (AR). The company is considering manufacturing the smart phone model H3XG. If the operation were to be set up, the equipment would be purchased for AR3.5 million and the market price at the end of expected 4-year project life will be AR1.25m. The mobile phone will sell for an initial price of AR950 per unit in the first year and this price will increase in line with inflation in Hambia which is expected to continue at the current rate of 6% per annum. It is expected that 3,000 H3XG phones will be sold in the first year, increasing at a rate of 3% each year. The costs of manufacturing H3XG will consist of variable costs which will be 60% of selling price per unit and incremental fixed overheads of AR60,000 per annum. The costs will increase in line with inflation in Hambia. The working capital equal to 10% of expected sales value for the year will be required at the beginning of each year. At the end of the project the working capital will be recovered. Corporation tax in Hambia is 25%, payable one year in arrears. The tax allowable depreciation is at 20% on a reducing balance method. The required rate of return for the project is 15%. YOU ARE REQUIRED TO:

(a) Estimate the net present value of the project, and recommend, on the basis of NPV, whether the project should be undertaken. (maximum word count for the recommendation 50 words).

(b) Explain why NPV is preferable to payback period as a project selection criterion. (maximum word count 100 words).

(c) Discuss any four non-financial objectives that a company should consider when making investment decisions. (maximum word count 100 words). TOTAL 50 MARKS

In: Accounting

Demonstrate 1NF Normalization Techniques Procedure Bring the following table structure to first normal form and explain...

Demonstrate 1NF Normalization Techniques

Procedure

Bring the following table structure to first normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.

Instructor Name

Instructor Phone

Instructor Email

Course Name

Course Number

Course Description

Student1 Name

Student1 Phone

Student1 Email

Student1 GPA

Student2 Name

Student2 Phone

Student2 Email

Student2 GPA

Student15 Name

Student15 Phone

Student15 Email

Student15 GPA


University

                                                                          

Demonstrate 2NF Normalization Techniques

Procedure

Bring the following table structure to second normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.

Course Number

Course Description

Course Credit Hours

Student ID

Student Name

Student Phone

Student Email

Student Grade


Courses

  • Demonstrate 3NF Normalization Techniques

Procedure

Bring the following table structure to third normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.

Instructor Name

Instructor Phone

Instructor Email

Course Name

Course Number

Course Description

Student1 Name

Student1 Contact Info

Student1 Major

Student1 GPA

Student2 Name

Student2 Contact Info

Student2 Major

Student2 GPA

Student15 Name

Student15 Contact Info

Student15 Major

Student15 GPA

In: Computer Science

Consider the four definitions of information presented in this chapter. The problem with the first definition,...

Consider the four definitions of information presented in this chapter. The problem with the first definition, “knowledge derived from data,” is that it merely substitutes one word we don’t know the meaning of (information) for a second word we don’t know the meaning of (knowledge). The problem with the second definition, “data presented in a meaningful context,” is that it is too subjective. Whose context? What makes a context meaningful? The third definition, “data processed by summing, ordering, averaging, etc.,” is too mechanical. It tells us what to do, but it doesn’t tell us what information is. The fourth definition, “a difference that makes a difference,” is vague and unhelpful.

Also, none of these definitions helps us to quantify the amount of information we receive. What is the information content of the statement that every human being has a navel? Zero—you already know that. In contrast, the statement that someone has just deposited $50,000 into your checking account is chock-full of information. So, good information has an element of surprise.

Considering all of these points, answer the following questions:

a. What is information made of?

b. If you have more information, do you weigh more? Why or why not?

c. When you give a copy of your transcript to a prospective employer, how is information produced? What part of that information production process do you control? What, if anything, can you do to improve the quality of information that the employer conceives?

d. Give your own best definition of information.

e. Explain how you think it is possible that we have an industry called the information technology industry, but we have great difficulty defining the word information.

In: Finance

Program C You are given some data from an animal shelter, listing animals that they currently...

Program C You are given some data from an animal shelter, listing animals that they currently have. They have asked you to write a program to sort the dogs and cats in age in ascending order, respectively, and write them in separate files. Assume the input file has the format of name (one word), species (one word), gender (one word), age (int), weight (double), with each animal on a separate line:

Hercules cat male 3 13.4

Toggle dog female 3 48

Buddy lizard male 2 0.3 ….

Example input/output:

Enter the file name: animals.txt

Output file name: sorted_dogs.txt sorted_cats.txt

1. Name your program animals.c.

2. The output file name should be sorted_dogs.txt and sorted_cats.txt. Assume the input file name is no more than 100 characters.

3. The program should be built around an array of animal structures, with each animal containing information of name, species, gender, age, and weight. Assume that there are no more than 200 items in the file. Assume the name of an animal is no more than 100 characters.

4. Use fscanf and fprintf to read and write data.

5. Your program should include a sorting function so that it sorts the animals in age. You can use any sorting algorithms such as selection sort and insertion sort. void sort_animals(struct animal list[], int n);

6. Output files should be in the format of name gender age weight, with 2 decimal digits for weight.

For example,

Toggle female 3 48.01

Rocky male 5 52.32

In: Computer Science

Nearby is a main() function demonstrating the use of the function earliest_word. Implement this function according...

Nearby is a main() function demonstrating the use of the function earliest_word. Implement this function according to the documentation given. My solution is about 25 lines plus some closing curly braces.

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

char *earliest_word(char *fname, int *nwords);

// Opens the file fname and reads words from it

// until the end of file is reached then closes

// the file. If the file to be opened doesn't

// exist, returns NULL and sets nwords to

// -1. Tracks the alphabetic "earliest" word that

// is read in as indicated by strcmp(). Tracks how

// many words in total are read and sets nwords to

// that value. Allocates a block of memory and

// copies the earliest word found into the block

// using strcpy(). Returns a pointer to the

// freshly allocated block.

//

// ASSUMPTIONS: Words are no longer than 127

// characters so will fit in an array of size

// 128. Files have at least one word in them.

int main(){

int count; char *file; char *early;

file = "vegetables.txt";

// pumpkin carrot beet squash cucumber

early = earliest_word(file, &count);

printf("%s: %d words, %s earliest\n",

   file,count,early);

// vegetables.txt: 5 words, beet earliest

free(early);

file = "fruits.txt";

// banana peach orange apple pineapple strawberry

early = earliest_word(file, &count);

printf("%s: %d words, %s earliest\n",

   file,count,early);

// fruits.txt: 6 words, apple earliest

free(early);

file = "not-there.txt";

early = earliest_word(file, &count);

if(early==NULL){

printf("%s not found\n",file);

// not-there.txt not found

}

return 0;

}

C programming

In: Computer Science

Look up and use each of these Linux commands. (Each command will have two parts) Summarize...

  1. Look up and use each of these Linux commands. (Each command will have two parts)
    • Summarize their function then use the command
    • Use the Command and document the output (<parameters of your choice>
    • Command Function
      info cat
      Demonstrate 'cat' in use  
      man cp
      Demonstrate 'cp' in use  
      man touch
      Demonstrate 'touch' in use  
      man mv
      Demonstrate 'mv' in use  
      man rm
      Demonstrate 'rm' in use  
      info wc
      Demonstrate 'wc' in use  
      man find
      Demonstrate 'find' in use  
      man chmod
      Demonstrate 'chmod' in use  
      man chown
      Demonstrate 'chown' in use
      Lookup append ">>" operator online
      Demonstrate '>>' in use  
      Lookup redirection ">" operator online
      Demonstrate '>' in use  
      Lookup another command not previously covered
      Use that command

PART B (50 total pts) - File Operations (Windows)

  1. Look up and use each of these MSDOS commands. (Each command will have two parts).
    • Summarize their function then use the command
    • Use the Command and document the output
    • Command Function
      help type
      Demonstrate 'type' in use  
      help copy
      Demonstrate 'copy' in use  
      help xcopy
      Demonstrate 'xcopy' in use  
      help move
      Demonstrate 'move' in use  
      help del
      Demonstrate 'del' in use  
      Demonstrate 'find' in use  
      Demonstrate 'find' with parameters to get Word Count
      help attrib
      Demonstrate 'attrib' with parameters to get Word Count
      help rmdir
      Demonstrate 'rmdir' with parameters to get Word Count
      Look append ">>" operator online
      Demonstrate '>>' in use
      Look redirection ">" operator online
      Demonstrate '>' in use  
      help whoami
      Demonstrate 'whoami' in use  
      Lookup another command not previously covered
      Use that command

In: Computer Science

Assignment 3C: Answer the following questions Question 1. a. Declare a 32-bit signed integer variable and...

Assignment 3C: Answer the following questions

Question 1.

a. Declare a 32-bit signed integer variable and initialize it with the smallest possible negative decimal value.

b. Declare an uninitialized array of 100 16-bit unsigned integers.

c. Declare a string variable containing the word “DVC” repeated 20 times, and terminated with the null char.

Question 2

For the following declarations, assuming that the address of I is 404000h

What are the addresses of J, K, and L?

What is the total number of allocated bytes?

Show the content of the individual bytes allocated in memory in hexadecimal

.DATA

I SBYTE 1, -1

J SWORD 10FFh, -256

K DWORD 23456h

L BYTE 'DVC'

Question 3

Given the following definitions:

.DATA

wval LABEL WORD

barray BYTE 10h, 20h, 30h, 6 DUP (0Ah)

ALIGN 4

warray WORD 5 DUP (1000h)

pressKey EQU <"Press any key to continue ...", 0>

darray DWORD 5 DUP (56789ABh), 7 DUP (12345678h)

dval LABEL DWORD

prompt BYTE pressKey

What will be the value of EAX, AX, and AL after executing each of the following instructions? Assume that the address of barray is 404000h.

a. mov eax, TYPE warray

b. mov eax, LENGTHOF barray

c. mov eax, SIZEOF darray

d. mov eax, OFFSET warray

e. mov eax, OFFSET darray

f. mov eax, OFFSET prompt

g. mov eax, DWORD PTR barray

h. mov al, BYTE PTR darray

i. mov ax, wval

j. mov eax, dval

In: Computer Science

1. Lets start by creating a traditional random password composed of numbers, letters, and a few...

1. Lets start by creating a traditional random password composed of numbers, letters, and a few special characters.

letters = "abcdefghijklmnopqrstuvwxyz"
caps = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
numbers = "1234567890"

# Make an 8 letter password by combining characters from the three strings

2. Next you follow the XKCD model of selecting four random words and concatenating them together to for our password.

nouns = ['tissue', 'processor', 'headquarters', 'favorite', 'cure', 'ideology', 'funeral', 'engine', 'isolation', 'perception', 'hat', 'mountain', 'session', 'case', 'legislature', 'consent', 'spread', 'shot', 'direction', 'data', 'tragedy', 'illness', 'serving', 'mess', 'resistance', 'basis', 'kitchen', 'mine', 'temple', 'mass', 'dot', 'final', 'chair', 'picture', 'wish', 'transfer', 'profession', 'suggestion', 'purse', 'rabbit', 'disaster', 'evil', 'shorts', 'tip', 'patrol', 'fragment', 'assignment', 'view', 'bottle', 'acquisition', 'origin', 'lesson', 'Bible', 'act', 'constitution', 'standard', 'status', 'burden', 'language', 'voice', 'border', 'statement', 'personnel', 'shape', 'computer', 'quality', 'colony', 'traveler', 'merit', 'puzzle', 'poll', 'wind', 'shelter', 'limit', 'talent']
verbs = ['represent', 'warm', 'whisper', 'consider', 'rub', 'march', 'claim', 'fill', 'present', 'complain', 'offer', 'provoke', 'yield', 'shock', 'purchase', 'seek', 'operate', 'persist', 'inspire', 'conclude', 'transform', 'add', 'boast', 'gather', 'manage', 'escape', 'handle', 'transfer', 'tune', 'born', 'decrease', 'impose', 'adopt', 'suppose', 'sell', 'disappear', 'join', 'rock', 'appreciate', 'express', 'finish', 'modify', 'keep', 'invest', 'weaken', 'speed', 'discuss', 'facilitate', 'question', 'date', 'coordinate', 'repeat', 'relate', 'advise', 'arrest', 'appeal', 'clean', 'disagree', 'guard', 'gaze', 'spend', 'owe', 'wait', 'unfold', 'back', 'waste', 'delay', 'store', 'balance', 'compete', 'bake', 'employ', 'dip', 'frown', 'insert']
adjs = ['busy', 'closer', 'national', 'pale', 'encouraging', 'historical', 'extreme', 'cruel', 'expensive', 'comfortable', 'steady', 'necessary', 'isolated', 'deep', 'bad', 'free', 'voluntary', 'informal', 'loud', 'key', 'extra', 'wise', 'improved', 'mad', 'willing', 'actual', 'OK', 'gray', 'little', 'religious', 'municipal', 'just', 'psychological', 'essential', 'perfect', 'intense', 'blue', 'following', 'Asian', 'shared', 'rare', 'developmental', 'uncomfortable', 'interesting', 'environmental', 'amazing', 'unhappy', 'horrible', 'philosophical', 'American']

# Make a four word password by combining words from the list of nouns, verbs and adjs


3. Of course that does not make the IT department of most colleges and businesses happy. They still want you to have at least one capital letter and a number in your password. We’ll learn more about this in a couple of chapters but it is easy to replace parts of a string with a different string using the replace method. For example "pool".replace('o', 'e') gives us peel Once you have your final password you can replace some letters with number substitutions. For example its common to replace the letter l with the number 1 or the letter e with the number 3 or the o with a 0. You can get creative. You can also easily capitalize a word using "myword".capitalize() Once you feel confident that you understand the code below you can use this activecode to make your password comply with standard procedures to include special characters.

word = "pool"
word = word.replace('o', 'e')
print(word)
word = word.capitalize()
print(word)

4.

Challenge

This last part goes beyond what you have covered in the book so far, but I’ll give you the extra code you need. You will probably be able to figure out what it does and this is kind of a fun preview of things to come.

Lets suppose you DO have a 4 character password composed only of lower case letters. How many guesses would it take you to guess the password? You can actually write a program to create a four character string and compare it to the known password. If we put this process inside a loop we can keep track and see how many guesses it takes us to find the matching password.

import random
import sys
sys.setExecutionLimit(60000) # 60 seconds
my_password = "abcd"
guess_num = 0
done = False
while not done:

guessed_pw = ""
# your code here

if guessed_pw == my_password:
print("found it after ", guess_num, " tries")
done = True

In: Computer Science