When many people hear the word discrimination, they immediately think of race or gender discrimination which is illegal in the USA. Price discrimination, however, is legal and has nothing to do with race or gender. By definition: Charging different people different prices is legal as long as it does not use other forms of discrimination as the basis of the pricing model. Please note that prices must be made available for all to see and no two individuals making a purchase at the same time and same place are charged different prices unless qualifying criteria are met.
In: Finance
Question one: (Word count 200 words)
Imagine you are a manager in an organization and one of your employee is in a meeting with you to discuss a situation that he faces at work:
“Sir, can I have 10 minutes of your time? ….. My name is Racha and I’m facing a problem with one of my colleague Ahmed , we are supposed to be working together on a project to market and sell one of our brands, one of our potential customer was asking for detailed information and presentation of our brand product, Ahmed and myself discussed what to do on the phone the beginning of the week to prepare the presentation and to divide the work between us, I believe that we agreed on who is going to do what in the presentation and on parts of the required written document to be sent to the customer.
The set date to meet with the customer is at the end of the week-after two days- I called Ahmed yesterday to make sure that his part is done to add to my part to complete the document and the presentation, but when I called him to inquire about work, he answered me in a way I didn’t like, and said that some of that we agreed on-in our phone conversation- was not his responsibility and it was my responsibility – although I recall from our conversation- that it is his responsibility not mine.
Also he talked to me in a way – I don’t sir how to describe it- like he is ordering me to do things, this is how I felt it.
I think I did my part and he is not working enough to complete his, and now I have to do his part and it is huge and I can’t finish it in two days or we have to postpone the meeting with the client and might lose the contract.
I feel that I’m being treated in a different way than my other male colleagues in the team, although I work very hard and this not fair to be judged in this way because I’m a female employee.
Note: need to use example from the case for both answers Part A&B and applying the active listening guidelines for part A.
Active listening guidelines are:
1.Give people your attention.
2.Be ready to paraphrase.
3.Use questions if you do not understand.
4.Acknowledge the other persons feelings.
5.Encourage if the other person appears uncertain.
6. Do not react or respond in other ways until it is clear that the other person has finished.
In: Operations Management
Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board
Be sure to give thought to each assigned question before posting.
In: Computer Science
Question Four: (Word count 300 words) *this is all information i have
In: Operations Management
* Word file clearly describe the test suite (series of test cases) you design for each of the methods in TestWithJUnit.java (one test suite per method). Each test suite should contain at least 5 test cases. Each test case has to be justified: Why did you pick this test case and not another one? Imagine you are limited by time and money about the number of test cases you can pick and run. Why would you make run the test cases you propose? You have to be convincing. In particular, you have to address: WHAT each test case aims to test, and HOW you expect the method to run on this test case (what output do you expect?).
*In a new java file, that you will call TestWithJUnitTester.java, write a JUnit test for each of the test cases you have described in your word file.
* Run your test cases and report the results in your word document. In particular, you have to report whether the method behaves as expected or not on each test case, and propose an explanation in case the method does not behave as expected.
Note: your test cases cannot include the examples given within the code.
Advice: when designing test cases, think:
1/ regular functionality test: does the code perform as expected under normal/expected circumstances?
2/ edge case: does the code still perform when under stress of its expected conditions?
You need to have at least one of the first type (maybe two depending on how complex the code is), and 3 or 4 of the second type.
public class TestWithJUnit {
/* Method withoutTen:
* Return a version of the given array where all
* the 10's have been removed.
* The remaining elements should shift left
* towards the start of the array as needed,
* and the empty spaces a the end of the array
* should be 0.
* So {1, 10, 10, 2} yields {1, 2, 0, 0}.
* {1, 10, 10, 2, 10, 3, 10} yields {1, 2, 3, 0, 0, 0,
0}.
*/
public int[] withoutTen(int[] A) {
int[] result = new
int[A.length];
int index = 0;
for (int i = 0; i < A.length;
i++) {
if (A[i] != 10)
{
result[index] = A[i];
index++;
}
}
for (int i = index; i <
result.length; i++)
result[i] =
0;
return result;
}
/* Method bigArray:
* Given an integer n, bigArray creates and returns a
1D array
* that contains {1, 1, 2, 1, 2, 3, 1, 2, 3, 4, 1, 2,
... n}
* For instance, bigArray(4) = {1, 1, 2, 1, 2, 3, 1, 2,
3, 4}
* bigArray(2) = {1, 1, 2}
*/
public int[] bigArray(int n) {
int[] result = new
int[n*(n+1)/2];
int index = 0;
for (int i = 1; i <= n; i++)
{
for (int j = 1;
j <= i; j++) {
result[index] = j;
index++;
}
}
return result;
}
}
In: Computer Science
Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word
Abstract
In network communication system, exchange of data mostly occurs on
networked computers and devices, mobile phones and other internet
based smart electronic gadgets. Importance of network security is
increasing day by day for various network and software applications
in human life. Many of the human activities are automatic and in
future more areas will come as part of networking system. So most
of the end-devices will come to the internet and connect, it is
important to ensure the security of data being transmitted. The
data and network encryption algorithms play a huge role to ensure
the security of data in transmission. In this paper, we provide a
theoretical overview of various encryption techniques, namely those
that range from changes in the position of a letter or word to word
transformations and transposition. These not only provide security
when sending messages, but also security for passwords that are
used to decipher and to encrypt. The conclusions in this study
examine the current theoretical framework,
and propose the usage of methods to prevent online security
breaches
Introduction
Encryption simply means the translation of data blocks into a
secret code which is considered the most effective way to ensure
data security. To read a secret file one must have access to a
secret key that enables to decrypt it. Unsecured data where no
encryption algorithms were used travels through different networks
are open to many types of attacks and can be read, changed or
forged by any attacker who has access to that data or network. To
prevent such attacks encryption and decryption techniques are
employed. Encryption algorithms are used by many software and
network applications, but most of them are not free from
cyber-attacks. Now a days encryption techniques uses algorithms
with a “key” to encrypt data into digital secret code and then
decrypting it by restoring it to its original data. It is important
to protect things like biometric information, email data, medical
records, corporate information, personal data, legal documents,
transactions details from unauthorized access. Encryption
techniques uses a fixed length parameter or key for data
transformation. There are mainly two types of algorithms used to
encrypt data, asymmetric encryption and symmetric encryption. Many
research and analysis of different encryption algorithms such as
DES, 3DES, AES, Blowfish, Twofish, Serpent, RC2, RC5, are going on
which helps to identify the pros and cons of algorithms in various
platforms and application areas. Today's most widely used
encryption algorithms fall into two categories: symmetric and
asymmetric. Symmetric-key ciphers, also referred to as "secret
key," use a single key, sometimes referred to as a shared secret
because the system doing the encryption must share it with any
entity it intends to be able to decrypt the encrypted data. The
most widely used symmetric-key cipher is the Advanced Encryption
Standard (AES), which was designed to protect government
classified information.
Symmetric-key encryption is usually much faster than asymmetric
encryption, but the sender must exchange the key used to encrypt
the data with the recipient before the recipient can perform
decryption on the cipher text. The need to securely distribute and
manage large numbers of keys means most cryptographic processes use
a symmetric algorithm to efficiently encrypt data, but they use an
asymmetric algorithm to securely exchange the secret key. All
securely transmitted live traffic today is encrypted using
symmetric encryption algorithms for example such as live telephone
conversation, streaming video transmission, high speed data link.
Blowfish, AES, RC4,DES, RC5, and RC6 are examples of symmetric
encryption. The most widely used symmetric algorithm is AES-128,
AES-192, and AES-256. In asymmetric key encryption, different keys
are used for encrypting and decrypting a message. Asymmetric
cryptography, also known as public key cryptography, uses two
different but mathematically linked keys, one public and one
private. The public key can be shared with everyone, whereas the
private key must be kept secret. The RSA encryption algorithm is
the most widely used public key algorithm, partly because both the
public and the private keys can encrypt a message; the opposite key
from the one used to encrypt a message is used to decrypt it. This
Attribute provides a method of assuring not only confidentiality,
but also the integrity, authenticity and non reputability of
electronic communications and data at rest through the use of
digital signatures. Diffie-Hellman, RSA, ECC, ElGamal, DSA. The
following are the major asymmetric encryption algorithms used for
encrypting or digitally signing data.
In: Computer Science
In: Operations Management
Pythpn
#Exercise 1
#Ask the user for a three letter word using the prompt: three
letter word? (include a space after the ?)
#Display the entire word
#Display the word vertically, one letter at a time using print
statements and the string index
#For example, if the user enters baa, the output should be (ignore
# signs):
#baa
#b
#a
#a
#Exercise 2
#Ask the user for a number using the prompt: first number? (include
a space after the ?)
#Ask the user for a number using the prompt: second number?
(include a space after the ?)
#Convert both numbers to integers
#Calculate the product of the two numbers
#Convert the two numbers and the product to strings using the str()
function
#Display the following on screen using a print statement and the +
concatenator.(note the spacing esp no space before the .)
#The product of [first number] times [second number] is
[product].
#For example, if the user entered 2 and 3, the final output should
be:
#The product of 2 times 3 is 6.
#Exercise 3
#Ask the user for a first name using the prompt: first name?
(include a space after the ?)
#Ask the user for a last name using the prompt: last name? (include
a space after the ?)
#Ask the user for a middle inital using the prompt: middle initial?
(include a space after the ?)
#Display the user entered full name in the following format [first
name] {middle inital]. [last nmae] (note the .)
#For example, if the user entered Malu Roldan H in response to the
input statements, the output should be:
#Malu H. Roldan
#Next, display the user's initials one letter at a time vertically.
For example, for Malu H. Roldan,
#the output should be (ignore # signs):
#M
#H
#R
#Exercise 4
#Ask the user for a six letter cheer using the prompt: six letter
cheer? (include a space after the ?)
#Display the entire cheer with an exclamation point after it (e.g.
if user enters boohoo, display boohoo!)
#Display the cheer vertically, one letter at a time ending with an
exclamation point in the last line
#For example, for user entry boohoo, display (ignore #
signs):
#b
#o
#o
#h
#o
#o
#!
#Exercise 5
#a Ask the user for a birth year using the prompt: birthyear?
(include a space after the ?)
#b Convert the user input to an integer
#c Subtract the user entered birthyear from 2019
#d Convert the result of the previous line and the user entry to
strings using the str() function
#e Display the following using the + concatenator in a print
statement (note the punctuation and spacing):
#f It has been [converted result of line 5c]! years since your
birthyear in [converted user entry]!
#g Hence, if user entered 2010, display:
#h It has been 9! years since your birthyear in 2010
#i Next, display the words: You were born in the year:
#j Display the converted user entered birthyear vertically, one
digit at a time.
#k For example, for 2010 display (ignore the # signs):
#2
#0
#1
#0
In: Computer Science
Read page 322 in the textbook.
Answer the following discussion questions thoroughly. One word or one sentence answers are never enough.
10-14 What challenges are managers of health-care organizations facing?
10-15 How would the way health-care organization managers manage be different in a team-based model?
10-16 Explain how roles, norms, status systems, and group cohesiveness might influence the success of a team-based model.
10-17 What are some reasons you think a team-based model has led to improved patient outcomes and reduced costs?
In: Operations Management
Select a research paper topic and develop an abstract.
Write 150 word topic proposal for your final project.
Your topic needs to focus on a critical challenge in cybersecurity facing National Security Professionals. This challenge can come from technology, policy, international relations, economics, or any of the fields where the digital world brings its effects to bear. Think about recent cybersecurity incidents and events. What research question comes to mind when you think of cybersecurity challenges?
Your topic proposals need to be clear and precise. Use bulleted points to clearly state the topic and address the parameters in at least one or two sentences.
In: Computer Science