In: Accounting
In: Finance
Question 1: Rucas plc is a telecommunications and information technology manufacturing company based in the country of Hambia. The currency of Hambia is the Aira (AR). The company is considering manufacturing the smart phone model H3XG. If the operation were to be set up, the equipment would be purchased for AR3.5 million and the market price at the end of expected 4-year project life will be AR1.25m. The mobile phone will sell for an initial price of AR950 per unit in the first year and this price will increase in line with inflation in Hambia which is expected to continue at the current rate of 6% per annum. It is expected that 3,000 H3XG phones will be sold in the first year, increasing at a rate of 3% each year. The costs of manufacturing H3XG will consist of variable costs which will be 60% of selling price per unit and incremental fixed overheads of AR60,000 per annum. The costs will increase in line with inflation in Hambia. The working capital equal to 10% of expected sales value for the year will be required at the beginning of each year. At the end of the project the working capital will be recovered. Corporation tax in Hambia is 25%, payable one year in arrears. The tax allowable depreciation is at 20% on a reducing balance method. The required rate of return for the project is 15%. YOU ARE REQUIRED TO:
(a) Estimate the net present value of the project, and recommend, on the basis of NPV, whether the project should be undertaken. (maximum word count for the recommendation 50 words).
(b) Explain why NPV is preferable to payback period as a project selection criterion. (maximum word count 100 words).
(c) Discuss any four non-financial objectives that a company should consider when making investment decisions. (maximum word count 100 words). TOTAL 50 MARKS
In: Accounting
Demonstrate 1NF Normalization Techniques
Procedure
Bring the following table structure to first normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.
|
Instructor Name Instructor Phone Instructor Email Course Name Course Number Course Description Student1 Name Student1 Phone Student1 Email Student1 GPA Student2 Name Student2 Phone Student2 Email Student2 GPA … Student15 Name Student15 Phone Student15 Email Student15 GPA |
University
Demonstrate 2NF Normalization Techniques
Procedure
Bring the following table structure to second normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.
|
Course Number Course Description Course Credit Hours Student ID Student Name Student Phone Student Email Student Grade |
Courses
Procedure
Bring the following table structure to third normal form and explain the errors in the current structure. Your submission can be drawn in Word or hand drawn and attached to your submission. Be sure to write out your explanation of the errors in the normal form.
|
Instructor Name Instructor Phone Instructor Email Course Name Course Number Course Description Student1 Name Student1 Contact Info Student1 Major Student1 GPA Student2 Name Student2 Contact Info Student2 Major Student2 GPA … Student15 Name Student15 Contact Info Student15 Major Student15 GPA |
In: Computer Science
Consider the four definitions of information presented in this chapter. The problem with the first definition, “knowledge derived from data,” is that it merely substitutes one word we don’t know the meaning of (information) for a second word we don’t know the meaning of (knowledge). The problem with the second definition, “data presented in a meaningful context,” is that it is too subjective. Whose context? What makes a context meaningful? The third definition, “data processed by summing, ordering, averaging, etc.,” is too mechanical. It tells us what to do, but it doesn’t tell us what information is. The fourth definition, “a difference that makes a difference,” is vague and unhelpful.
Also, none of these definitions helps us to quantify the amount of information we receive. What is the information content of the statement that every human being has a navel? Zero—you already know that. In contrast, the statement that someone has just deposited $50,000 into your checking account is chock-full of information. So, good information has an element of surprise.
Considering all of these points, answer the following questions:
a. What is information made of?
b. If you have more information, do you weigh more? Why or why not?
c. When you give a copy of your transcript to a prospective employer, how is information produced? What part of that information production process do you control? What, if anything, can you do to improve the quality of information that the employer conceives?
d. Give your own best definition of information.
e. Explain how you think it is possible that we have an industry called the information technology industry, but we have great difficulty defining the word information.
In: Finance
Program C You are given some data from an animal shelter, listing animals that they currently have. They have asked you to write a program to sort the dogs and cats in age in ascending order, respectively, and write them in separate files. Assume the input file has the format of name (one word), species (one word), gender (one word), age (int), weight (double), with each animal on a separate line:
Hercules cat male 3 13.4
Toggle dog female 3 48
Buddy lizard male 2 0.3 ….
Example input/output:
Enter the file name: animals.txt
Output file name: sorted_dogs.txt sorted_cats.txt
1. Name your program animals.c.
2. The output file name should be sorted_dogs.txt and sorted_cats.txt. Assume the input file name is no more than 100 characters.
3. The program should be built around an array of animal structures, with each animal containing information of name, species, gender, age, and weight. Assume that there are no more than 200 items in the file. Assume the name of an animal is no more than 100 characters.
4. Use fscanf and fprintf to read and write data.
5. Your program should include a sorting function so that it sorts the animals in age. You can use any sorting algorithms such as selection sort and insertion sort. void sort_animals(struct animal list[], int n);
6. Output files should be in the format of name gender age weight, with 2 decimal digits for weight.
For example,
Toggle female 3 48.01
Rocky male 5 52.32
In: Computer Science
Nearby is a main() function demonstrating the use of the function earliest_word. Implement this function according to the documentation given. My solution is about 25 lines plus some closing curly braces.
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
char *earliest_word(char *fname, int *nwords);
// Opens the file fname and reads words from it
// until the end of file is reached then closes
// the file. If the file to be opened doesn't
// exist, returns NULL and sets nwords to
// -1. Tracks the alphabetic "earliest" word that
// is read in as indicated by strcmp(). Tracks how
// many words in total are read and sets nwords to
// that value. Allocates a block of memory and
// copies the earliest word found into the block
// using strcpy(). Returns a pointer to the
// freshly allocated block.
//
// ASSUMPTIONS: Words are no longer than 127
// characters so will fit in an array of size
// 128. Files have at least one word in them.
int main(){
int count; char *file; char *early;
file = "vegetables.txt";
// pumpkin carrot beet squash cucumber
early = earliest_word(file, &count);
printf("%s: %d words, %s earliest\n",
file,count,early);
// vegetables.txt: 5 words, beet earliest
free(early);
file = "fruits.txt";
// banana peach orange apple pineapple strawberry
early = earliest_word(file, &count);
printf("%s: %d words, %s earliest\n",
file,count,early);
// fruits.txt: 6 words, apple earliest
free(early);
file = "not-there.txt";
early = earliest_word(file, &count);
if(early==NULL){
printf("%s not found\n",file);
// not-there.txt not found
}
return 0;
}
C programming
In: Computer Science
| Command | Function |
| info cat | |
| Demonstrate 'cat' in use | |
| man cp | |
| Demonstrate 'cp' in use | |
| man touch | |
| Demonstrate 'touch' in use | |
| man mv | |
| Demonstrate 'mv' in use | |
| man rm | |
| Demonstrate 'rm' in use | |
| info wc | |
| Demonstrate 'wc' in use | |
| man find | |
| Demonstrate 'find' in use | |
| man chmod | |
| Demonstrate 'chmod' in use | |
| man chown | |
| Demonstrate 'chown' in use | |
| Lookup append ">>" operator online | |
| Demonstrate '>>' in use | |
| Lookup redirection ">" operator online | |
| Demonstrate '>' in use | |
| Lookup another command not previously covered | |
| Use that command | |
PART B (50 total pts) - File Operations (Windows)
| Command | Function |
| help type | |
| Demonstrate 'type' in use | |
| help copy | |
| Demonstrate 'copy' in use | |
| help xcopy | |
| Demonstrate 'xcopy' in use | |
| help move | |
| Demonstrate 'move' in use | |
| help del | |
| Demonstrate 'del' in use | |
| Demonstrate 'find' in use | |
| Demonstrate 'find' with parameters to get Word Count | |
| help attrib | |
| Demonstrate 'attrib' with parameters to get Word Count | |
| help rmdir | |
| Demonstrate 'rmdir' with parameters to get Word Count | |
| Look append ">>" operator online | |
| Demonstrate '>>' in use | |
| Look redirection ">" operator online | |
| Demonstrate '>' in use | |
| help whoami | |
| Demonstrate 'whoami' in use | |
| Lookup another command not previously covered | |
| Use that command |
In: Computer Science
Assignment 3C: Answer the following questions
Question 1.
a. Declare a 32-bit signed integer variable and initialize it with the smallest possible negative decimal value.
b. Declare an uninitialized array of 100 16-bit unsigned integers.
c. Declare a string variable containing the word “DVC” repeated 20 times, and terminated with the null char.
Question 2
For the following declarations, assuming that the address of I is 404000h
What are the addresses of J, K, and L?
What is the total number of allocated bytes?
Show the content of the individual bytes allocated in memory in hexadecimal
.DATA
I SBYTE 1, -1
J SWORD 10FFh, -256
K DWORD 23456h
L BYTE 'DVC'
Question 3
Given the following definitions:
.DATA
wval LABEL WORD
barray BYTE 10h, 20h, 30h, 6 DUP (0Ah)
ALIGN 4
warray WORD 5 DUP (1000h)
pressKey EQU <"Press any key to continue ...", 0>
darray DWORD 5 DUP (56789ABh), 7 DUP (12345678h)
dval LABEL DWORD
prompt BYTE pressKey
What will be the value of EAX, AX, and AL after executing each of the following instructions? Assume that the address of barray is 404000h.
a. mov eax, TYPE warray
b. mov eax, LENGTHOF barray
c. mov eax, SIZEOF darray
d. mov eax, OFFSET warray
e. mov eax, OFFSET darray
f. mov eax, OFFSET prompt
g. mov eax, DWORD PTR barray
h. mov al, BYTE PTR darray
i. mov ax, wval
j. mov eax, dval
In: Computer Science
1. Lets start by creating a traditional random password composed of numbers, letters, and a few special characters.
letters = "abcdefghijklmnopqrstuvwxyz"
caps = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
numbers = "1234567890"
# Make an 8 letter password by combining characters from the
three strings
2. Next you follow the XKCD model of selecting four random words and concatenating them together to for our password.
nouns = ['tissue', 'processor', 'headquarters', 'favorite',
'cure', 'ideology', 'funeral', 'engine', 'isolation', 'perception',
'hat', 'mountain', 'session', 'case', 'legislature', 'consent',
'spread', 'shot', 'direction', 'data', 'tragedy', 'illness',
'serving', 'mess', 'resistance', 'basis', 'kitchen', 'mine',
'temple', 'mass', 'dot', 'final', 'chair', 'picture', 'wish',
'transfer', 'profession', 'suggestion', 'purse', 'rabbit',
'disaster', 'evil', 'shorts', 'tip', 'patrol', 'fragment',
'assignment', 'view', 'bottle', 'acquisition', 'origin', 'lesson',
'Bible', 'act', 'constitution', 'standard', 'status', 'burden',
'language', 'voice', 'border', 'statement', 'personnel', 'shape',
'computer', 'quality', 'colony', 'traveler', 'merit', 'puzzle',
'poll', 'wind', 'shelter', 'limit', 'talent']
verbs = ['represent', 'warm', 'whisper', 'consider', 'rub',
'march', 'claim', 'fill', 'present', 'complain', 'offer',
'provoke', 'yield', 'shock', 'purchase', 'seek', 'operate',
'persist', 'inspire', 'conclude', 'transform', 'add', 'boast',
'gather', 'manage', 'escape', 'handle', 'transfer', 'tune', 'born',
'decrease', 'impose', 'adopt', 'suppose', 'sell', 'disappear',
'join', 'rock', 'appreciate', 'express', 'finish', 'modify',
'keep', 'invest', 'weaken', 'speed', 'discuss', 'facilitate',
'question', 'date', 'coordinate', 'repeat', 'relate', 'advise',
'arrest', 'appeal', 'clean', 'disagree', 'guard', 'gaze', 'spend',
'owe', 'wait', 'unfold', 'back', 'waste', 'delay', 'store',
'balance', 'compete', 'bake', 'employ', 'dip', 'frown',
'insert']
adjs = ['busy', 'closer', 'national', 'pale', 'encouraging',
'historical', 'extreme', 'cruel', 'expensive', 'comfortable',
'steady', 'necessary', 'isolated', 'deep', 'bad', 'free',
'voluntary', 'informal', 'loud', 'key', 'extra', 'wise',
'improved', 'mad', 'willing', 'actual', 'OK', 'gray', 'little',
'religious', 'municipal', 'just', 'psychological', 'essential',
'perfect', 'intense', 'blue', 'following', 'Asian', 'shared',
'rare', 'developmental', 'uncomfortable', 'interesting',
'environmental', 'amazing', 'unhappy', 'horrible', 'philosophical',
'American']
# Make a four word password by combining words from the list of nouns, verbs and adjs
3. Of course that does not make the IT department of most colleges
and businesses happy. They still want you to have at least one
capital letter and a number in your password. We’ll learn more
about this in a couple of chapters but it is easy to replace parts
of a string with a different string using the replace method. For
example "pool".replace('o', 'e') gives us peel Once you have your
final password you can replace some letters with number
substitutions. For example its common to replace the letter l with
the number 1 or the letter e with the number 3 or the o with a 0.
You can get creative. You can also easily capitalize a word using
"myword".capitalize() Once you feel confident that you understand
the code below you can use this activecode to make your password
comply with standard procedures to include special characters.
word = "pool"
word = word.replace('o', 'e')
print(word)
word = word.capitalize()
print(word)
4.
Challenge
This last part goes beyond what you have covered in the book so far, but I’ll give you the extra code you need. You will probably be able to figure out what it does and this is kind of a fun preview of things to come.
Lets suppose you DO have a 4 character password composed only of lower case letters. How many guesses would it take you to guess the password? You can actually write a program to create a four character string and compare it to the known password. If we put this process inside a loop we can keep track and see how many guesses it takes us to find the matching password.
import random
import sys
sys.setExecutionLimit(60000) # 60 seconds
my_password = "abcd"
guess_num = 0
done = False
while not done:
guessed_pw = ""
# your code here
if guessed_pw == my_password:
print("found it after ", guess_num, " tries")
done = True
In: Computer Science