In: Operations Management
Can I get detailed explanation about the following topics
Keyword Queries
Boolean Queries
Phrase Queries
Proximity Queries
Natural Language Queries
Wildcard Queries
Rather than the solution for Chapter 27, proplem 18RQ in Fundamentals of database system (6th Edition) and also provide me with examples
Regards
In: Computer Science
You are the manager responsible for the audit of Aspersion, a limited liability company, which mainly provides national cargo services with a small fleet of aircraft. The draft accounts for the year ended 30 September 2001 show profit before taxation of Kshs2·7 million (2000 ñ Kshs2·2 million) and total assets of Kshs10·4 million (2000 ñ Kshs9·8 million). The following issues are outstanding and have been left for your attention:
(1) The sale of a cargo carrier to Abra, a private limited company, during the year resulted in a loss on disposal of Kshs400,000. The aircraft cost Kshs1·2 million when it was purchased in October 1992 and was being depreciated on a straight-line basis over 20 years. The minutes of the board meeting at which the sale was approved record that Aspersionís finance director, Iain Jolteon, has a 30% equity interest in Abra.
(2) As well as cargo carriers, Aspersion owns two light aircraft which were purchased in 1998 to provide business passenger flights to a small island under a three year service contract. It is now known that the contract will not be renewed when it expires at the end of March 2002. The aircraft, which cost Kshs450,000 each, are being depreciated over fifteen years.
(3) Deferred tax amounting to Kshs570,000 as at 30 September 2001 has been calculated relating to tangible non-current assets at a tax rate of 30% using the full provision method (IAS 12 ëIncome Taxesí). On 1 December 2001, the government announced an increase in the corporate income tax rate to 34%. The directors are proposing to adjust the draft accounts for the further liability arising.
Required:
For each of the above points:
(i) Comment on the matters that you should consider; and
(ii) State the audit evidence that you should expect to find, in undertaking your review of the audit working papers and financial statements of Aspersion.
In: Accounting
Business Problem: A computer company produces laptop and desktop computers. The data analytics team in collaboration with the marketing team developed a predictive model that forecasts the expected demand for laptops to be at least 1,000, and for desktops to be at least 800 per day. (Assumption: production is in accordance with the demand) The production facility has a limited capacity of no more than 2,000 laptops and 1,700 desktops per day. The Sales Department indicates that contractual agreements of at most 2,000 computers per day must be satisfied. Each laptop computer generates $600 net profit and each desktop computer generates $300 net profit. The company wants to determine how many of each type should be made daily to maximize net profits.
2. Formulate a linear programming model that represents the preceding business challenge. b. Identify the decision variables. c. What is our objective function in terms of these decision variables, write down its mathematical equation) d. What are the constraints for this problem, write down their respective mathematical equations.
b) Decision Variables: X (laptop) & Y (desktop) # of units to produce for laptop & desktop a day
c) Objective function: Maximize the profit
Max profit Z = 600x + 300y
d) Constraints:
Expected demand x=>1000 and y=>800
Production capacity x<=2000, y<=1700
Contractual agreements x + y <=2000 non negative restrictions x=>0 and y=>0
NEED HELP WITH IpsolveAPI Library in R
3. Solve the problem using lpSolveAPI library in R to come up with the most optimum solution of this problem a. Write down R program to get the most optimal solution b. What is the optimal number of laptop and desktop computers to be made each day? c. What is the value of the objective function (total net profit) for the solution?
install.packages('lpSolveAPI')
library(lpSolveAPI)
lprec <- make.lp(0,2)
lp.control(lprec,sense="max")
set.objfn(lprec,c(600,300))
In: Operations Management
You work for a landscaping company named A-Cut-Above, Inc. During the night of 10/9/18, the company’s headquarters burns down. Unfortunately, the company did not complete off-site backups of its database and had no disaster recovery plan in place. As a result, it must build a new database from scratch. Thankfully, one of the managers had printed out a summary of the activity completed during the week of the fire (see next page). You decide to use this information to start creating a database. You also remember some aspects of A-Cut-Above’s process for creating and assigning routes. Each morning, the ERP selects a list of customers that require a mowing on the current day of the week (using the Cust_Day attribute). Then, the computer uses a web service through Google to find the optimal routes for the day, which may include multiple stops. Each route is then assigned to an employee, who picks their equipment (i.e. truck and mower) for the day and notifies the computer of the truck ID and mower ID corresponding with the equipment they selected. Before departing, the employee also inputs the beginning mileage for the truck they selected. When a route is completed, the employee returns their equipment, notes all stops were completed (stored as Comp_Desc), and enters the ending mileage reading for the truck that they used to complete the route. If the employee is unable to finish a route for whatever reason, they return to headquarters and enter a completion description (Comp_Desc) of “Not Complete” for any unfinished stops and “Complete” for finished stops. They may also add notes describing why a route was stopped. At that point, the computer formulates a new route (or routes) that include all unfinished jobs. The new routes are then assigned to employees similar to how they are assigned each morning. Using the information from above and the report on the next page, specify a database in UNF, 1NF, 2NF, and 3NF using the notation taught during Week 4’s lecture. Place repeating groups inside of the following brackets: “{“ and “}”. Place tables inside the following brackets: “[“ and “]”. Do not use character values as part of the primary key. Name tables if there is more than one. Underline the attributes comprising the primary key for each table. Finally, designate foreign keys for 3NF.
In: Accounting
Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for which you have been employed as a database administrator for the past nine years. You leave a message on the office phone of your superior, John Dalton, the CIO of SuperMart.
SuperMart is a medium-sized retail company that evolved from a grocery chain in the 1980s. While the corporation has 200 stores, primarily in your region of the country, it carries a full line of grocery and household items in large outlets that are linked by a very up-to-date computer network with real-time integration of data into a series of databases. Your department has been working on a project that will be transferring all data into a data warehouse and streamlining data mining operations. Security for the system is handled by a security department for physical security, an IT security division of the network administration department, and by the team of data security and privacy specialists within your own data management department.
Even in these early moments of this possible breach of security, after your shock wears off, you understand that the CIO's response will be to meet immediately with all security personnel, with the database administrator, the network manager, the corporate legal team, and possibly the CEO and CFO. You have assigned your assistant to get as much information as possible from authorities, and you are making initial notes on a plan to proceed with SuperMart's response to such a potentially toxic data breach.
Using the scenario above research and discuss the 3 topics below.
In: Computer Science
Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for which you have been employed as a database administrator for the past nine years. You leave a message on the office phone of your superior, John Dalton, the CIO of SuperMart.
SuperMart is a medium-sized retail company that evolved from a grocery chain in the 1980s. While the corporation has 200 stores, primarily in your region of the country, it carries a full line of grocery and household items in large outlets that are linked by a very up-to-date computer network with real-time integration of data into a series of databases. Your department has been working on a project that will be transferring all data into a data warehouse and streamlining data mining operations. Security for the system is handled by a security department for physical security, an IT security division of the network administration department, and by the team of data security and privacy specialists within your own data management department.
Even in these early moments of this possible breach of security, after your shock wears off, you understand that the CIO's response will be to meet immediately with all security personnel, with the database administrator, the network manager, the corporate legal team, and possibly the CEO and CFO. You have assigned your assistant to get as much information as possible from authorities, and you are making initial notes on a plan to proceed with SuperMart's response to such a potentially toxic data breach.
Using the scenario above research and discuss the 3 topics below.
In: Computer Science
Part 1 – Create a Stock Class
Write a class named Stock.
Stock Class Specifications
Include member variables for name (string), price (double), shares (double).
Write a default constructor.
Write a constructor that takes values for all member variables as parameters.
Write a copy constructor.
Implement Get/Set methods for all member variables.
Implement the CalculateValue function. This function should multiply the prices by the shares and return that value. Use the following function header: double CalculateValue().
Add a member overload for the assignment operator.
Add a non-member operator<< overload. Prints the values of all member variables on the given ostream.
Stock Class Updates
The Stock class should implement all the specifications from the first assignment plus the updates and features listed below.
Change all member variables to pointers. You will need to update code in any functions that use these member variables. Do NOT change any function signatures for this class. All functions should operate the same as before from the user of the classes’ perspective. For example, assume the get/set functions for title have the following signatures:
std::string GetName();
void SetName(std::string n);
These signatures should remain exactly the same. The same goes for any other functions that use these member variables. Only the internal implementation of the functions will change to accommodate the use of pointers.
Update the constructors. The constructors should allocate memory for the pointer member variables.
Add a destructor. The destructor should deallocate memory for the pointer member variables.
Update operator= and copy constructor. The operator= and copy constructor should be updated to perform deep copies.
Update operator<<. Make sure it prints out the values and not the addresses.
Add a non-member operator>> overload. The >> operator is used for input. Reads the values of all member variables from the given istream.
You can assume that a one word string is being used for name in order to make it a little easier to code. This is important because if you did not make that assumption you could not use the >> operator to read a string value. The >> operator only reads up until the first whitespace it encounters.
Part 2 – Create a Portfolio Class
Write a class that will store a collection of Stock. This class will be used to keep track of data for multiple Stock class instances. You MUST implement ALL of the specifications below.
Portfolio Class Specifications
Create a private member variable that is a static array of Stock. The size of the array can be whatever you want it to be.
Your class must implement all of the following functions (use the given function prototypes):
void Set(int index, Stock s) – Sets the value at the given index to the given Stock instance. You should test the index to make sure that it is valid. If the index is not valid then do not set the value.
Stock Get(int index) – Return the Stock located at the given index in the array.
int PriceRangeCount(double lowerBound, double upperBound) – Returns the count of the number of Stocks that fall within the given range. For example, assume the following number of Stock prices: 10, 20, 15, 25, 30, 40
If lowerBound is 20 and upperBound is 30 then the returned value should be 3. Any values that fall on the boundaries should be included in the count. In this example we are getting a count of the number of stocks that have a price between $20 and $30. Remember, this function is using price and not value.
Stock MostShares() – Returns the Stock in the Portfolio that has the most shares.
bool FindByName(string name, Stock &v) – Returns true if the Stock with the given name is in the array and false otherwise. If the Stock is in the array you should copy it into the Stock reference parameter.
double TotalValue() – Returns the sum of all Stock values (not prices) in the collection.
int Size() – Returns the size of the array.
void Initialize() – Initializes all of the elements of the array to reasonable default values.
string GetAuthor() – Returns your name. Just hard code your name into the function.
Create a default constructor that will initialize all elements of the array to default values.
Portfolio Class Updates
The Portfolio class should implement all the specifications from the first assignment plus the updates and features listed below.
Dynamic array. Change the internal implementation of the array so that the array is dynamically allocated.
Add a size member variable to the class. This member variable should ALWAYS contain the number of elements in the array (size of the array). Some functions may cause the size of the array to change so make sure that this member variable is updated to reflect the new size.
Update all the necessary code in the class so that it is usable with a dynamic array. One example of this is to change the ending condition of loops that visit all elements of the array. The ending limit should not be hard coded. They should use the new size variable as the ending condition.
Add a one parameter constructor that takes a size. This constructor should dynamically allocate an array of the given size. It should also set the size member variable to reflect the size.
Add a copy constructor. This function should make a deep copy of the passed in instance.
Add a destructor. This function should perform any necessary cleanup.
Add a member overload of operator= (assignment operator). This method should perform a deep copy of the passed in instance. After this function ends the size of the current instance’s array should be the same as the other instance’s array and all the data from the other instance should be copied into the current instance’s array.
Hint: C++ arrays have a fixed size. You may need to delete and then reallocate memory for the current instance’s array in order to make the current instance’s array the same size as the other instance’s array. Be careful for memory leaks.
Add a non-member operator<< overload. Prints the values of all elements of the array on the given ostream.
Add a Resize function. Here is the function signature:
void Resize(int newSize);
This function should create a new array that has the passed in size. You MUST retain any values that were previously in the array. The new array size can be larger or smaller. If the new array size is SMALLER just retain as many elements from the previous array that can fit.
Hint: C++ arrays have a fixed size. You may need to delete and then reallocate memory. Be careful for memory leaks.
Add a function named Clone with the following signature:
Portfolio *Clone();
This method should allocate a new dynamic instance of Portfolio that is a deep copy of the current instance. This method should return a pointer to the new instance.
Part 4 – Main Function
Main should create instances of Stock and Portfolio and contain an automated unit test for both of them.
Automated Test
Part 2 – Console Application - Main Function
Create a C++ console application that imports and uses the static library solution that you created. The console application should have a main function. In main you should create instances of the updated Portfolio class and demonstrate that ALL functions work properly. You can write unit testing code if you want but you are not required to.
In: Computer Science
QUESTION 4
CASE STUDY
Read the following case study and then answer the
questions.
A market darling falls to Earth: The EOH
Meltdown
Background
EOH was listed on the JSE in 1997. Over the next
twenty years it grew to one of the largest technology businesses on
the African continent.
By 2017 it operated in 36 countries in Africa and
internationally. It had grown its annual turnover to R15,4 bn rand
and was generally viewed as a highly successful company. In 2016
the share price peaked at R177 per share. Because of its
performance, EOH shares were included in most investment
portfolios, including that of pension funds.
However, within a mere four years, EOH's market value
has collapsed, falling from a peak of R20 billion in 2016 to just
R3 billion at present. This is reflected in the 92% plunge in its
share price, from R174.83 to R14.61. So, what has caused this
massive sell-off?
The first cracks begin to show
In 2016, EOH was thrust into a corporate scandal after
allegations of compliance and governance irregularities emerged,
involving various government departments such as Defence, Water and
Sanitation, as well as the South African Police Service and
eThekwini municipality, among others. The rumours in the market
almost instantly translated into a massive loss in shareholder
confidence.
The management of EOH tried to quell the market fears
with the following statement:
"The combination of the macroeconomic environment and
the adverse, unfounded media coverage that EOH received,
temporarily affected the group's position in the market. Despite
these market conditions all areas of the business coped very
well."
For the time-being, the management could hold things
together. By the time the 2017 Annual Results were finalized the
performance of the company did not reflect the negative market
perceptions. But the rumours persisted, and this prompted the
company to launch an internal investigation into public sector
contracts.
Unfolding events
In May 2017, EOH announced that its founder and chief
executive Asher Bohbot, will be stepping down at the end of June
2017 after 19 years as the CEO. Zunaid Mayet who previously worked
as chief executive of the EOH Industrial Technologies division
replaced Bohbot as Group CEO. Bohbot then became the chairman of
the Board.
In March 2018, EOH announced that it would split its
business into two new operating entities. Rob Godlonton was
appointed to head the new EOH subsidiary and the EOH CEO Zunaid
Mayet was relinquishing his role as group CEO to take the reins at
the newly created subsidiary Nextec. This created room for a new
CEO.
In June 2018 Africa News 24-7 reported that the
National Homebuilders Registration Council and the National
Treasury placed EOH on a database of restricted suppliers. It was
believed that the Registration Council requested for the company to
be blacklisted after a contract was breached.
It was further announced that two non-executive
directors will resign from the EOH Holdings board with effect from
1 July 2018: Lucky Khumalo and Johan van Jaarsveld, and that four
executive directors: Brian Gubbins, Rob Godlonton, Ebrahim Laher
and Jehan Mackay, will relinquish their positions in the Board to
focus on their executive roles in the business.
These resignations cleared the way for a new "more
balanced" independent Board to be appointed.
In September 2018 Stephen Van Coller was appointed as
the new CEO. This was followed by the appointment of several other
people to establish a new management team.
In February 2019, the software giant Microsoft served
EOH with notice that they will terminate their channel partner
contract with the EOH after an anonymous whistle-blower filed a
complaint with the United States Securities and Exchange Commission
(SEC) in November 2018. They alleged misconduct and corruption in
relation to a R120 million contract that was concluded with the SA
Department of Defence. Notice was served whilst Microsoft launched
their own investigation.
It was estimated that the loss of the Microsoft
contract would wipe several millions off the profit line of the
company. In response to this news EOH's share price fell a further
4.3% to R13.46. This meant that the share had lost 71% of its value
in the preceding 12 months and 90% in the preceding three years.
Also, in February 2019, EOH founder Asher Bohbot, announced that he
will be stepping down as the Board Chairman in the interest of
improved governance. At the same time two other longstanding
members of the Board also stepped down namely Rob Sporen, a
non-executive director and founding member of EOH, who has been
with the group for 20 years, and Tshilidzi Marwala, another
non-executive director who had served on the board for 11
years.
In the very same month (February 2019) the Board of
EOH requested a law firm; ENSafrica (ENS), to conduct a
comprehensive investigation into EOH contracts in order to identify
any wrongdoing or criminal conduct in the acquisition, award or
execution of those contracts.
Further developments and remedial
actions
In June 2019, Dr Xolani Mkhwanazi, was appointed as
the new Chairman to the Board.
In July 2019, the ENS report was released. Several
senior executives had handed in their resignations prior to the
release of the report.
Although the report was not released to the public,
EOH announced that the investigation by ENS had found evidence of
serious governance failings and wrongdoing at the company. These
included unsubstantiated payments, tender irregularities and other
unethical business dealings primarily limited to public sector
business run from its head office as well as EOH Mthombo, a
division of the company.
EOH announced that they have terminated the employment
relationships with individuals who have been directly implicated in
the identified wrongdoing and indicated that it had reported the
concerns and the details of those implicated to the Directorate for
Priority Crimes Investigation, known as the Hawks.
In August 2019 it was announced that two more
directors resigned from their positions.
What does the future hold?
In October 2019 during an interview, Van Coller (the
new CEO) indicated that the corruption that has tainted EOH related
to contracts entered into between 2014 and 2017. It involved eight
people and approximately 20 suppliers. Action had been instituted
against those implicated.
He further indicated that the Board was busy
developing a comprehensive remedial plan, with a number of
measures, some of which had already been implemented. The recent
appointments of a new board chairperson and three independent,
non-executive directors were important milestones for the group to
enhance and complement leadership capability and governance
oversight.
He also indicated that audit firm PWC assisted the
company with setting up an internal audit function while ENS had
helped implement an anti-bribery programme based upon the
International Standard for Anti Bribery Management
Systems.
One question however remains, can a company such as
EOH survive this ordeal and will the remedial actions be enough to
steer EOH to more peaceful waters? Only time will tell.
Adapted from various newspaper
articles.
4.1 Explain why the events leading up to the
appointment of a new CEO and Chairman to the Board of EOH can be
seen as a breakdown in corporate governance. (4)
4.2 Identify/name four (4) stakeholders of EOH and
indicate how their interests were compromised by the unfolding
events and the drop in the share price. (8)
4.3 Identify and describe four (4) principles listed
by King IV which should have guided the Board of EOH, but which was
somehow compromised. This could relate to mistakes or failures by
the board or management of EOH. (8)
4.4 Will the shareholders of EOH have a possible claim
or legal recourse against the Board members who served between
2016-2018 for the fact that the value of their investments was
destroyed? In other words, can the Board be held liable?
(5)
In: Finance
Airline Company Case Study This document describes the data requirements for a fictional airline company, Anchor Air. In this case study, the company's key information requirements are identified. This information primarily deals with the assets the airline must use and manage to operate: airports, maintenance flight routes, and scheduled flights onto which customers book seats along with information about the passengers themselves. Employees The company needs to keep the following information regarding its employee. In the US, all employees have a unique social security number. Other information on employees that the airline might need include facts such as the employee's name; the employee's home street address and the employees city, statement and zipcode; the employee's hone phone number; the employee's salary; and the employee's brithdate. Additionally, some employees are pilot crew, while others are attendant crew. For pilots, the company need to keep the following information:the pilot's rank (probationary, junior, regular, senior); a list of the aircraft the pilot is rated to fly; should reference only aircraft the company owns; the number of flight hours the pilots has flown; the pilots home airport (this should be an airport that the airline is allowed to use); and an additional contact number for the pilot. For attendants, the company needs to keep the following information: the attendant's rank (probationary, crew, chief); the attendant's home airport (again it should be one the airline is allowed to use); and an additional contact number for the attendant Airports An airline is only allowed to fly to specific airports. This airline is a US company and is allowed to fly between US domestic airports only. The company needs to maintain information about the airports it is allowed to use. Airports are identified in the US with a three letter code (upper case)m which are unique. Other facts about airports include which city and state they are in, and how many gates are available for boarding and debarking the aircraft customers. The number of gates must be a positive integer. All of this information is required. Airline Flight Routes The airline has many aircraft flying every day to provide transport for its customers. By regulation, the airline is assigned certain routes between a origin airport and a destination airport. Each route (which is identified by a unique code), is schedule for the same time on the same day every week. While the origin and destination airports are the same every time the route is flown, the gates at the origin and destination airports may change from week to week. The origin and destination airports must each refer to one of the airports to which the airline flies. All of this information is required. Scheduled Flights The airline needs to keep track of the flight routes as they are schedule each day. The schedule simply needs to track which route is being flown (see the previous section on Airline Flight Routes) on which date and what are the departure and arrival gates at the origin and destiation airport, respectively. Flight Prices The seats available on each flight can have varying prices, depending on the class of the seat and these prices can vary from day to day. The database must track the ticket price for the following seat categories: first-class; business class; coach class; and economy class. The ticket price is for a specific seat category for a specific flight route id of the airline on a specific date. Ticket prices must be positive monetary amounts (two decimal places). All of this information is required. Passengers The airline is required to keep certain information about passengers who have booked flights with the airline. The database includes the last name, first name, middle initial, the street address, the city, the state, the zip code, and the phone numbers of the of the passenger and the passengers' email. The required information for the database is the first name, the last name, the street address, the city, the state, the zip code. The the other passenger information is optional. A passenger may give a number of phone numbers or none at all. Flight Bookings The airline must keep information that represents a passenger's booking for one of the airline's flights. The information must show which passenger is booked on a which route on which date and for what price. All of this information is required. Flight Crews The company has to assign crew members (pilots and flight attendants) for each date that one of its routes is flown. For each occurrence of a route being flown on a particular date, the company needs to know which pilots and flight attendants are assigned for that flight on that date. There can be different numbers of crew members assigned, but assume that all flights have cetween two and four pilot crew and four and eight attendant crew.
Relational Database Implementation
In this step, you will implement the table schema developed in step 2, using the Postgres SQL DDL language. Your
deliverable will be a Postgres SQL DDL script which when run in Postgres creates the tables for your case study.
Table Population
In this step, you'll create a data set for your database. Your deliverable will be a Postgres SQL DML script which
when run, inserts your data set into the database tables and also a text document with the data presented in a tabular
format.
Database Operational testing
In this final step, you'll create a Postgres SQL DML script which performs a set of queries on your populated database.
Each case study has a set of sample queries. Choose any ten of these queries and implement them. Your deliverable
will be a Postgres SQL DML script, which when run, performs the queries on your database as well as a text
document with the query results presented in a tabular form. Note, you can capture the query results from the result
window of pgAdminIII.
In: Computer Science