Questions
When many people hear the word discrimination, they immediately think of race or gender discrimination which...

When many people hear the word discrimination, they immediately think of race or gender discrimination which is illegal in the USA. Price discrimination, however, is legal and has nothing to do with race or gender. By definition: Charging different people different prices is legal as long as it does not use other forms of discrimination as the basis of the pricing model. Please note that prices must be made available for all to see and no two individuals making a purchase at the same time and same place are charged different prices unless qualifying criteria are met.

  1. Describe a business that uses price discrimination, the pricing model, and how it is not considered illegal (meaning how it is legal to do).
  2. Are there situations in which price discrimination is unfair and should be considered illegal (remember to not confuse the word discrimination with price discrimination.
  3. Lastly, evaluate the profitability of using different prices for different people. That would mean that some people are paying more, while others are paying less. This would suggest less profits, so why not just charge everyone the same high price??? Explain your understanding of how price discrimination works to maximize profits for the business.

In: Finance

Question one: (25 marks) (Word count 200 words) Imagine you are a manager in an organization...

Question one: (Word count 200 words)

Imagine you are a manager in an organization and one of your employee is in a meeting with you to discuss a situation that he faces at work:

“Sir, can I have 10 minutes of your time? ….. My name is Racha and I’m facing a problem with one of my colleague Ahmed , we are supposed to be working together on a project to market and sell one of our brands, one of our potential customer was asking for detailed information and presentation of our brand product, Ahmed and myself discussed what to do on the phone the beginning of the week to prepare the presentation and to divide the work between us, I believe that we agreed on who is going to do what in the presentation and on parts of the required written document to be sent to the customer.

The set date to meet with the customer is at the end of the week-after two days- I called Ahmed yesterday to make sure that his part is done to add to my part to complete the document and the presentation, but when I called him to inquire about work, he answered me in a way I didn’t like, and said that some of that we agreed on-in our phone conversation- was not his responsibility and it was my responsibility – although I recall from our conversation- that it is his responsibility not mine.

Also he talked to me in a way – I don’t sir how to describe it- like he is ordering me to do things, this is how I felt it.

I think I did my part and he is not working enough to complete his, and now I have to do his part and it is huge and I can’t finish it in two days or we have to postpone the meeting with the client and might lose the contract.

I feel that I’m being treated in a different way than my other male colleagues in the team, although I work very hard and this not fair to be judged in this way because I’m a female employee.

  1. Use and apply active listening guidelines to solve this situation- use examples from the case.
  2. In your opinion why we use active listening in the above situation- use examples related to the case above.

Note: need to use example from the case for both answers Part A&B and applying the active listening guidelines for part A.

Active listening guidelines are:

1.Give people your attention.

2.Be ready to paraphrase.

3.Use questions if you do not understand.

4.Acknowledge the other persons feelings.

5.Encourage if the other person appears uncertain.

6. Do not react or respond in other ways until it is clear that the other person has finished.

In: Operations Management

Hey can you please answer this question in detail and explanation in your own word i...

Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board

  1. You are working as a system analyst for a consulting firm contracted by a college to create a management system for its students. During the process you create a state transition diagram for an object called Students. What are the possible states of a student? And what happens to a student who stops attending the college for a time and then decides to return a some point in the future to continue his or her studies?
  2. Do you believe it is harder for experience analysts to learn UML and other object-oriented techniques, since they are accustomed to thinking about data and processes as separate OR do you believe analytical knowledge and experience are transferable and useful in the newer, object-oriented approach? What are the reasons for your conclusion?
  3. The text talks about system analysts and coders creating objects and code modules. Why do analysts and programmer utilize objects and code modules? What are the benefits and costs of this approach? Is the benefits worth the cost?

Be sure to give thought to each assigned question before posting.

In: Computer Science

Question Four: (Word count 300 words) *this is all information i have Conduct a research for...

Question Four: (Word count 300 words) *this is all information i have

  1. Conduct a research for any issue you chose in real life, shortly describe the issue of your choice and explain which type of data will be collected and why? Also apply two of the investigating methods in collecting the data and mention the advantages and disadvantages of the two tools with examples of your chosen issue.
  2. Conduct a career audit for yourself whether in your current job or in a future job and apply your personal marketing plan.

In: Operations Management

* Word file clearly describe the test suite (series of test cases) you design for each...

* Word file clearly describe the test suite (series of test cases) you design for each of the methods in TestWithJUnit.java (one test suite per method). Each test suite should contain at least 5 test cases. Each test case has to be justified: Why did you pick this test case and not another one? Imagine you are limited by time and money about the number of test cases you can pick and run. Why would you make run the test cases you propose? You have to be convincing. In particular, you have to address: WHAT each test case aims to test, and HOW you expect the method to run on this test case (what output do you expect?).

*In a new java file, that you will call TestWithJUnitTester.java, write a JUnit test for each of the test cases you have described in your word file.

* Run your test cases and report the results in your word document. In particular, you have to report whether the method behaves as expected or not on each test case, and propose an explanation in case the method does not behave as expected.

Note: your test cases cannot include the examples given within the code.

Advice: when designing test cases, think:

1/ regular functionality test: does the code perform as expected under normal/expected circumstances?

2/ edge case: does the code still perform when under stress of its expected conditions?

You need to have at least one of the first type (maybe two depending on how complex the code is), and 3 or 4 of the second type.

public class TestWithJUnit {

   /* Method withoutTen:
   * Return a version of the given array where all
   * the 10's have been removed.
   * The remaining elements should shift left
   * towards the start of the array as needed,
   * and the empty spaces a the end of the array
   * should be 0.
   * So {1, 10, 10, 2} yields {1, 2, 0, 0}.
   * {1, 10, 10, 2, 10, 3, 10} yields {1, 2, 3, 0, 0, 0, 0}.
   */
   public int[] withoutTen(int[] A) {
       int[] result = new int[A.length];
       int index = 0;
      
       for (int i = 0; i < A.length; i++) {
           if (A[i] != 10) {
               result[index] = A[i];
               index++;
           }
       }
       for (int i = index; i < result.length; i++)
           result[i] = 0;
      
       return result;
   }
  
   /* Method bigArray:
   * Given an integer n, bigArray creates and returns a 1D array
   * that contains {1, 1, 2, 1, 2, 3, 1, 2, 3, 4, 1, 2, ... n}
   * For instance, bigArray(4) = {1, 1, 2, 1, 2, 3, 1, 2, 3, 4}
   * bigArray(2) = {1, 1, 2}
   */
   public int[] bigArray(int n) {
       int[] result = new int[n*(n+1)/2];
       int index = 0;
      
       for (int i = 1; i <= n; i++) {
           for (int j = 1; j <= i; j++) {
               result[index] = j;
               index++;
           }
       }
      
       return result;
   }
      
}

In: Computer Science

Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word ​Abstract In...

Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word

​Abstract

In network communication system, exchange of data mostly occurs on networked computers and devices, mobile phones and other internet based smart electronic gadgets. Importance of network security is increasing day by day for various network and software applications in human life. Many of the human activities are automatic and in future more areas will come as part of networking system. So most of the end-devices will come to the internet and connect, it is important to ensure the security of data being transmitted. The data and network encryption algorithms play a huge role to ensure the security of data in transmission. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word to word transformations and transposition. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework,
and propose the usage of methods to prevent online security breaches

​ Introduction
Encryption simply means the translation of data blocks into a secret code which is considered the most effective way to ensure data security. To read a secret file one must have access to a secret key that enables to decrypt it. Unsecured data where no encryption algorithms were used travels through different networks are open to many types of attacks and can be read, changed or forged by any attacker who has access to that data or network. To prevent such attacks encryption and decryption techniques are employed. Encryption algorithms are used by many software and network applications, but most of them are not free from cyber-attacks. Now a days encryption techniques uses algorithms with a “key” to encrypt data into digital secret code and then decrypting it by restoring it to its original data. It is important to protect things like biometric information, email data, medical records, corporate information, personal data, legal documents, transactions details from unauthorized access. Encryption techniques uses a fixed length parameter or key for data transformation. There are mainly two types of algorithms used to encrypt data, asymmetric encryption and symmetric encryption. Many research and analysis of different encryption algorithms such as DES, 3DES, AES, Blowfish, Twofish, Serpent, RC2, RC5, are going on which helps to identify the pros and cons of algorithms in various platforms and application areas. Today's most widely used encryption algorithms fall into two categories: symmetric and asymmetric. Symmetric-key ciphers, also referred to as "secret key," use a single key, sometimes referred to as a shared secret because the system doing the encryption must share it with any entity it intends to be able to decrypt the encrypted data. The most widely used symmetric-key cipher is the ​Advanced Encryption Standard (AES​), which was designed to protect government classified information.
Symmetric-key ​encryption is usually much faster than asymmetric encryption, but the sender must exchange the key used to encrypt the data with the recipient before the recipient can perform decryption on the cipher text. The need to securely distribute and manage large numbers of keys means most cryptographic processes use a symmetric algorithm to efficiently encrypt data, but they use an asymmetric algorithm to securely exchange the secret key. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Blowfish, AES, RC4,DES, RC5, and RC6 are examples of symmetric encryption. The most widely used symmetric algorithm is AES-128, AES-192, and AES-256. In asymmetric​ key encryption, different keys are used for encrypting and decrypting a message. Asymmetric cryptography, also known as public key cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. The RSA encryption algorithm is the most widely used public key algorithm, partly because both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This Attribute provides a method of assuring not only confidentiality, but also the integrity, authenticity and non reputability of electronic communications and data at rest through the use of digital signatures. Diffie-Hellman, RSA, ECC, ElGamal, DSA. The following are the major asymmetric encryption algorithms used for encrypting or digitally signing data.

In: Computer Science

Question Four: (Word count 300 words) A- Conduct a research for any issue you chose in...

Question Four: (Word count 300 words)
A- Conduct a research for any issue you chose in real life, shortly describe the issue of your choice and explain which type of data will be collected and why? Also apply two of the investigating methods in collecting the data and mention the advantages and disadvantages of the two tools with examples of your chosen issue.
B- Conduct a career audit for yourself whether in your current job or in a future job and apply your personal marketing plan.

In: Operations Management

Pythpn #Exercise 1 #Ask the user for a three letter word using the prompt: three letter...

Pythpn

#Exercise 1
#Ask the user for a three letter word using the prompt: three letter word? (include a space after the ?)
#Display the entire word
#Display the word vertically, one letter at a time using print statements and the string index
#For example, if the user enters baa, the output should be (ignore # signs):
#baa
#b
#a
#a

#Exercise 2
#Ask the user for a number using the prompt: first number? (include a space after the ?)
#Ask the user for a number using the prompt: second number? (include a space after the ?)
#Convert both numbers to integers
#Calculate the product of the two numbers
#Convert the two numbers and the product to strings using the str() function
#Display the following on screen using a print statement and the + concatenator.(note the spacing esp no space before the .)
#The product of [first number] times [second number] is [product].
#For example, if the user entered 2 and 3, the final output should be:
#The product of 2 times 3 is 6.

#Exercise 3
#Ask the user for a first name using the prompt: first name? (include a space after the ?)
#Ask the user for a last name using the prompt: last name? (include a space after the ?)
#Ask the user for a middle inital using the prompt: middle initial? (include a space after the ?)
#Display the user entered full name in the following format [first name] {middle inital]. [last nmae] (note the .)
#For example, if the user entered Malu Roldan H in response to the input statements, the output should be:
#Malu H. Roldan
#Next, display the user's initials one letter at a time vertically. For example, for Malu H. Roldan,
#the output should be (ignore # signs):
#M
#H
#R

#Exercise 4
#Ask the user for a six letter cheer using the prompt: six letter cheer? (include a space after the ?)
#Display the entire cheer with an exclamation point after it (e.g. if user enters boohoo, display boohoo!)
#Display the cheer vertically, one letter at a time ending with an exclamation point in the last line
#For example, for user entry boohoo, display (ignore # signs):
#b
#o
#o
#h
#o
#o
#!

#Exercise 5
#a Ask the user for a birth year using the prompt: birthyear? (include a space after the ?)
#b Convert the user input to an integer
#c Subtract the user entered birthyear from 2019
#d Convert the result of the previous line and the user entry to strings using the str() function
#e Display the following using the + concatenator in a print statement (note the punctuation and spacing):
#f It has been [converted result of line 5c]! years since your birthyear in [converted user entry]!
#g Hence, if user entered 2010, display:
#h It has been 9! years since your birthyear in 2010
#i Next, display the words: You were born in the year:
#j Display the converted user entered birthyear vertically, one digit at a time.
#k For example, for 2010 display (ignore the # signs):
#2
#0
#1
#0

In: Computer Science

Read page 322 in the textbook. Answer the following discussion questions thoroughly. One word or one...

Read page 322 in the textbook.

Answer the following discussion questions thoroughly. One word or one sentence answers are never enough.

10-14    What challenges are managers of health-care organizations facing?

10-15    How would the way health-care organization managers manage be different in a team-based model?

10-16    Explain how roles, norms, status systems, and group cohesiveness might influence the success of a team-based model.

10-17    What are some reasons you think a team-based model has led to improved patient outcomes and reduced costs?

In: Operations Management

Select a research paper topic and develop an abstract. Write 150 word topic proposal for your...

Select a research paper topic and develop an abstract.

Write 150 word topic proposal for your final project.

Your topic needs to focus on a critical challenge in cybersecurity facing National Security Professionals. This challenge can come from technology, policy, international relations, economics, or any of the fields where the digital world brings its effects to bear. Think about recent cybersecurity incidents and events. What research question comes to mind when you think of cybersecurity challenges?

Your topic proposals need to be clear and precise. Use bulleted points to clearly state the topic and address the parameters in at least one or two sentences.

In: Computer Science