Android Programming
Create an app called GuessWho.
The point of the app will to have the user play a guessing game
based on a displayed image.
The user will be greeted with a screen that has an image of a
person, four buttons and a next button. The four buttons should
each have a different name on it. One of the names will be the
actual name of the person in the image.
Your guess who quiz should consist of at least 5 questions. Each
question should have a unique image and a different correct
answer.
The Model of the app should be a QuizQuestion. The QuizQuestion
should have an image resource ID for the person being guessed, the
strings for the four possible guesses and what the right answer
is.
Your model should have appropriate constructor and get/set
methods.
Your app should tell the user if they are correct if they press the
button with the correct name, and your app should tell the user
they are wrong if they tap the button of an incorrect name.
There should be a next button that takes the user to the next
question of the quiz.
If the user completes the last question of the quiz, your app
should Toast to the screen how many correct guesses they had and
how many incorrect guesses they had.
If the user gets to the end of the quiz and presses next, they
should go back to the first question after seeing the Toast.
For portrait orientation the image should appear first, then two
guess buttons below the image, then two more guess buttons below
the image, then the next button on the bottom of the screen.
For landscape orientation, the image should appear on the left side
of the screen. To the right should be the 4 guess buttons. To the
right of the buttons should be the next button.
(Feel free to use different layouts then these if you think they
look better. The point is there should be a different landscape and
portrait layout.)
The Controller Activity class should be a class called
GuessWhoActivity. This should be the lone activity in your app
responsible for handling user interaction and displaying questions
and answers.
The view should be your .xml layout files.
The app should remember what question the user was on if they
switch from landscape to portrait mode. (Example: If they were on
the 3rd question in portrait mode and switch to landscape, they
should still be on the 3rd question when they get to landscape
mode).
Make sure to not be using hard coded strings. Use strings.xml.
In: Computer Science
Java. Given an input file with each line representing a record of data and the first token (word) being the key that the file is sorted on, we want to load it and output the line number and record for any duplicate keys we encounter. Remember we are assuming the file is sorted by the key and we want to output to the screen the records (and line numbers) with duplicate keys. We are given a text file and have to use the scanner class to lod it
Your task is to
create a FindDuplicates class with the following:
Declaration of an instance variables for the String filename
non-default Constructor - creates an object for user passed filename argument
Accessor methods return the value of each instance variable
Mutator methods that allows th user to set each instance variable (no validation required),
a "getDuplicates()" method that reads from the file (until end-of-file) using Scanner class, finds duplicate records based on the first token on each line (the key), and returns as a String the record number and entire duplicate record one to a line (see above Sample output)
toString() - returns a String message with the value of the instance variable
Sample Output
Enter File Name: input1.txt
FileName:input1.txt
DUPLICATES
12 102380 CS US W 2.8 3.267 125
14 102395 PPCI US W 2.769 2.5 115
25 102567 PPCI US W 3.192 3.412 112
35 102912 CS US Z 3.81 3.667 88
44 103087 CS US Z 2.956 2.688 90
76 103944 CS US W 3.134 3.294 134
77 103944 CS US W 3.698 3.7 94
86 104046 CS US W 2.863 3.133 65
88 104047 CS US W 3.523 3.524 77
89 104047 CS US O 3.825 3.824 49
91 104048 CS US W 3.071 3 94
92 104048 CS US W 3.114 3.111 44
93 104048 CS US W 3.375 3.6 71
Press any key to continue . . .
In: Computer Science
11.7: Customer Accounts
Write a program that uses a structure to store the following data
about a customer account:
Customer name
Customer address
City
State
ZIP code
Telephone
Account balance
Date of last payment
The program should use an array of at least 20 structures. It should let the user enter data into the array, change the contents of any element, and display all the data stored in the array. The program should have a menu-driven user interface.
Prompts And Output Labels. Your main menu
should be the following:
1. Enter new account
information
2. Change account information
3. Display all account
information
4. Exit the program
The user is expected to enter 1 or 2 or 3 or 4.
The main menu is displayed at the start of the program and after
the handling of choices 1, 2, and 3.
If 1 is entered for the main menu, the program
prompts for each of the data listed above, in the order listed
above, using the above data descriptions (e.g. "ZIP code") as
prompts (followed in each case by a colon). After reading in and
processing the data, the program prints
You have entered information for
customer number X
where X is the customer number: 0 for the first customer and
increasing by 1 for each subsequent customer that is entered.
If 2 is entered for the main menu, the program
prompts for the customer number:
Customer number:
Upon entering a valid customer number the program displays all the
data for the particular customer that has been saved:
Customer name: ...
Customer address: ...
City: ...
State: ...
ZIP code: ...
Telephone: ...
Account balance: ...
Date of last payment: ...
The program then skips one or two lines and prompts for a change,
using the same prompts as in choice 1 above for
all the data items associated with a customer.
If 3 is entered for the main menu, the program
displays all the data for each customer that has been saved, using
the display format in choice 2 above. After the
display of each customer, the program prompts "Press enter to
continue..." and waits for the user to hit return.
If 4 is entered for the main menu, the program
terminates.
Input Validation (OPTIONAL). When the data for a new account is entered, be sure the user enters data for all the fields. No negative account balances should be entered.
In: Computer Science
Loss control activities of a business focus on finding and implementing solutions to reduce the probability of loss (loss prevention) and/or reduce the actual amount of loss (loss reduction), and therefore reduce the total cost of risk to maximize firm profitability.
Loss control techniques have been widely used in environmental loss prevention, catastrophic loss prevention, and employee-related risk management. Many firms face loss exposures caused by using, storing, and transporting hazardous materials, caustic substances, gasses, acids, etc., and may have unique issues posed by deployment of “greener” vehicle fleets using CNG, LNG, and bio-fuel solutions. Catastrophic risks, such as earthquakes, tornado, hurricanes or big fire, also pose significant threat to the property safety and business continuation for firms. Employee behavior-related risks and product safety are also important concern of corporate risk management.
Lack of effective loss control (such as inadequate systems, inadequate standards, and inadequate compliance with safety standards) may cause significant damage to a firm, such as injury costs, property damage, liability damage, bad press, lower sales, loss of employee morale, so on and so forth, as British Petroleum (BP) or Toyota had suffered in the past.
In this project, select an S&P 500 company and analyze its loss control policies focusing on either environmental loss prevention, or catastrophic loss prevention, or employee-related risk management.
Your analysis should address the following questions in the least:
A. Direct Property Loss
B. Indirect (or consequential) Property Loss
C. Liability Loss
D. Personnel Loss
E. Crime
F. Other Loss Exposures
In: Finance
c++ problem:
Use an STL stack to reverse a line of input characters that are read into a string. Your stack should contain the characters of the user's string. Use getline() for input – it needs to be part of your C++ tool inventory.
A note on getline: Suppose I am doing the following -
This program reverses a string using the STL stack
Enter your string of less than 80 characters followed by an ENTER
a string input
Enter another? 1 = continue. Anything else to stop
1
Enter your string of less than 80 characters followed by an ENTER
a second string
This code will not work by simply using the following loop:
int go = 1;
cout << "This program reverses a string using the STL stack" << endl;
while(go == 1){
cout << "Enter your string of less than 80 characters followed by an ENTER" << endl;
char* s = (char *)malloc(80);
cin.getline(s,81,'\n');
cout << s << endl;
cout << "Enter another? 1 = continue. Anything else to stop" << endl;
cin >> go;
}
Try it and see what happens! Also note that I never got rid of the memory I allocated with malloc – your code must get rid of it. Also, malloc outside the loop for more efficient code.
You must use a getchar() (part of the cstdio library) after cin >> go;
The reason is that when you enter 1 you also use the Enter key. This is still in the buffer when you hit getline again! So you will read in '\n'
Also note that when you get something off of the STL stack you must use .top() to look at it followed by .pop() to remove it.
Example:
This program reverses a string using the STL stack
Enter your string of less than 80 characters followed by an Enter
m&m cheeto mayo
oyam oteehc m&m
Enter another? 1 = continue. Anything else to stop
1
Enter your string of less than 80 characters followed by an Enter
celery lettuce apple
elppa ecuttel yrelec
Enter another? 1 = continue. Anything else to stop
0
Press any key to continue . . .
In: Computer Science
Project Risk Response
Risk responses and action steps are defined during the risk response planning phase. Here the project team must plan the actions that will be taken should any identified risk actually materialize. This is typically done for some subset of the total population of risk issues identified—most likely those that are of the highest probability and/or impact. Risks can be both negative (threats) and positive (opportunities). The possible strategies for responding to negative risks include the following: avoid, transfer, mitigate, and accept. The possible strategies for responding to positive risks include the following: exploit, enhance, share, and accept.
QUESTION
Based on the below risk register regarding the Pepsi Refresh Program
Summarize the approach for developing risk response strategies. For example, which risks should one first attempt to avoid? Should they do it based on the risk factor score (P*I) or EMV?
Describe the process to use to determine risk triggers (the event that tells someone that the risk event is imminent).
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
|
|
Risk No. |
Risk Name |
Risk Event Description |
Risk Impact Description |
Risk Type |
Risk Source |
Risk Trigger |
Impact Score 1 to 5 |
Prob. Score 1 to 5 |
Risk Factor P*I |
EMV* |
Response Type |
Response |
|
|
1 |
Sales Decline |
Not having the direct brand tie-in to project decreased odds of driving sales |
Brand declined to quantify the project's effect on sales |
Financial |
Project Success |
0.8 |
5 |
4 |
$99,099 |
||||
|
2 |
Internet |
Disruption of Internet services prevents idea submissions and voting |
Decreases the participation level engaged in the project |
Operational |
Technology |
0.9 |
5 |
4.5 |
$25,000 |
||||
|
3 |
Unsatisfied Vendors |
Vendor(s) may not support ideas presented by participants |
Loose vendor support |
Reputation |
Environment |
1.0 |
2 |
2 |
|||||
|
4 |
Nonuser-friendly website |
Target audience finds the website user interface confusing |
If participants find it hard to interact with the website, they may go away and never try again |
Operational |
Technology |
0.4 |
4 |
1.6 |
|||||
|
5 |
Participants being treated fairly |
Organizations participating in project feeling that votes are not properly/fairly being collected |
Being accused can cause claims fraud out of the contest |
Compliance |
Reputation |
0.8 |
2 |
1.6 |
|||||
|
6 |
Project testing produce unsatisfied results |
The board is not satisfied with the results after analyzing data from the 1-year pilot |
The board decides to put a halt to the program |
Strategic |
Project Success |
0.3 |
5 |
1.5 |
|||||
|
7 |
Participant Behavior |
There is unwanted or inappropriate behavior on website that brings negative views about the project cause |
Resulting in negative influences on potential grantees and/or interested voters to support the cause |
Reputation |
Environment |
0.3 |
4 |
1.2 |
|||||
|
8 |
Insufficient Resources for traditional marketing |
Printing advertisements can be very costly |
Resulting in not having enough people to distribute this type of advertisement |
Financial |
Staffing |
0.6 |
2 |
1.2 |
|||||
|
9 |
Scattered results |
The program Supports numerous organizations across various issues/geographies so ideas are all over the place. |
Makes it hard to concentrate on an impact of a specific issue |
Strategic |
Project Success/Reputation |
0.3 |
2 |
0.6 |
|||||
In: Operations Management
Case study
Rachael Tomkins is 55 years old and is a certified practising accountant. She works part time and lives with her husband Paul, aged 64 and daughter Marie, aged 17. Her grandmother Jean aged 90, lives in a small flat at the back of their house and her mother Mary, aged 72 lives in an Over 55s housing unit nearby. In her early 20s Rachael’s father, a Vietnam Veteran, committed suicide. Rachael is described by her family as reliable and caring. She has a small group of friends from her local parish church. Rachael has regular contact with her GP to manage her Diabetes Type 2. She is prescribed metformin and has been trying to lose weight. She also sees a psychiatrist Dr Lianne Yu for management of her symptoms of schizophrenia. She is prescribed Olanzapine and Lithium. She was diagnosed with schizophrenia in her early 20’s when she was studying at university. She was hospitalised with acute psychosis several times before her symptoms were stabilised. She was able to complete her university degree and has worked part time. The last time she experienced acute psychosis was 17 years ago, just after the birth of her daughter. Her symptoms stabilised, and she has been maintained in recovery for almost 15 years. This year has been a particularly challenging year for Rachael. Both her husband’s parents passed away within months of each other, her daughter commenced Year 12 and her grandmother had an infection in her middle toe, which resulted in a series of trips to the doctor, hospitalization and finally amputation of the affected toe. Rachael has become irritable with her family, and has developed erratic sleeping patterns, a lack of interest in grooming, and avoided social interactions with her friends or family. She complained to them that her neighbors were spying on her. In the 48 hours before she was admitted to hospital two incidents escalated Rachael’s need for professional help. In the first episode, she yelled and threatened the neighbor across the fence. She accused him of spying on her with a ‘trackamanometer’. Her husband intervened and took her back into the house. In the second incident later that day, Rachael started screaming at her family to evacuate the house because they would be bombed. Rachael insisted the newsreader on the TV was giving her this important information and they must all get out of the house. Rachael ran onto the road. A concerned neighbor called the police, who were able to convince her to accompany them to the hospital. She was met by her psychiatrist Dr. Yu who reports the following -Rachael is disheveled, dressed in a pajama top and track pants, no shoes, she has an exacerbation of auditory hallucinations, with persecutory delusions and disorganized thinking. Rachael agrees to be admitted because she says ‘I’m frightened’. Rachael is admitted for inpatient psychiatric care. Faculty of Health | School of Nursing, Midwifery & Paramedicine In the hospital, Rachael is argumentative and resistive to staff interactions and interventions, and her family are frightened and bewildered by her dramatic deterioration.
Q. Rachael will be admitted to the mental health inpatient unit. Write a nursing care plan based on the nursing diagnosis.
Q. What are the risk factors? Does Racheal have any protective factors? If so, what are they?
can you please provide answer to these questions from the above case study.
thank you.....
In: Nursing
Please make sure that you respond to both passages and follow closely to the three questions in the prompts (bullets). Do NOT do additional research on the topic. The purpose of the exercise is to analyze the existing passages; not to demonstrate additional research skills. You do not need to provide a Works Cited or Reference page. Note: there is no page limit, however, you need to sufficiently answer the prompts in essay format.
Holistic Assessment of Critical Thinking
Essay Directions:
Read the passages below and write an essay that addresses the following:
• What is the position in each passage?
• What evidence or reasons are given in support of each position?
• Which position is more convincing and why?
Do no additional research on the topics other than using a dictionary.
The Controversy: Does buying green products improve the environment?
Passage 1. Con: from “Buying Green Products Is an Inadequate Environmental Remedy” by Monica Hesse
"When wannabe environmentalists try to change purchasing habits without also altering their consumer mind-set, something gets lost in translation."
Buying green is a sign that people recognize the need to protect the environment, claims Monica Hesse in the following viewpoint. However, she argues, consuming green products is not the solution. Consumption will not solve the nation's environmental challenges, Hesse explains. To be truly green means to buy less, not green, she maintains. Replacing products thought to be environmentally unsound increases consumption, which in turn increases environmental problems, she reasons.
In satiric fashion, she admonishes the green consumer:
“Congregation of the Church of the Holy Organic, let us buy.”
“Let us buy Anna Sova Luxury Organics Turkish towels, 900 grams per square meter, $58 apiece. Let us buy the eco-friendly 600-thread-count bed sheets, milled in Switzerland with U.S. cotton, $570 for queen-size.”
“Let us purge our closets of those sinful synthetics, purify ourselves in the flame of the soy candle at the altar of the immaculate Earth Weave rug, and let us buy, buy, buy until we are whipped into a beatific froth of free-range fulfillment.”
“And let us never consider the other organic option—not buying—because the new green consumer wants to consume, to be more celadon than emerald, in the right color family but muted, without all the hand-me-down baby clothes and out-of-date carpet.”
Passage 2. Pro: from “Buying Green Products Will Improve the Environment” by Jenny Shank
"There's a certain thrill, that you get to go out and replace everything," says Leslie Garrett, author of "The Virtuous Consumer," a green shopping guide. "New bamboo T-shirts, new hemp curtains."
Garrett describes the conflicting feelings she and her husband experienced when trying to decide whether to toss an old living room sofa: "Our dog had chewed on it—there were only so many positions we could put it in" without the teeth marks showing. But it still fulfilled its basic role as a sofa: "We could still sit on it without falling through." They could still make do.
They could still, in this recession-wary economy, where everyone tries to cut back, subscribe to the crazy notion that conservation was about ... conserving. Says Garrett, "The greenest products are the ones you don't buy."
There are exceptions. "Certain environmental issues trump other issues," Garrett says. "Preserving fossil fuels is more critical than landfill issues." If your furnace or fridge is functioning but inefficient, you can replace it guilt-free.
Ultimately, Garrett and her husband did buy a new sofa (from Ikea—Garrett appreciated the company's ban on carcinogens). But they made the purchase only after finding another home for their old couch—a college student on Craigslist was happy to take it off their hands.
The sofa example is what Josh Dorfman, host of the Seattle radio show "The Lazy Environmentalist," considers to be a best-case scenario for the modern consumer. "Buying stuff is intrinsically wrapped up in our identities," Dorfman says. "You can't change that behavior. It's better to say, 'You're a crazy shopaholic. You're not going to stop being a crazy shopaholic. But if you're going to buy 50 pairs of jeans, buy them from this better place.'"
Then again, his show is called "The Lazy Environmentalist."
Source Citations
Hesse, Monica. "Buying Green Products Is an Inadequate Environmental Remedy." The Environment, edited by Louise I. Gerdes, Greenhaven Press, 2009. Opposing Viewpoints. Opposing Viewpoints in Context
Shank, Jenny. "Buying Green Products Will Improve the Environment." The Environment, edited by Louise I. Gerdes, Greenhaven Press, 2009. Opposing Viewpoints. Opposing Viewpoints in Context
In: Economics
Calculations First Trial UPDATED
Theoretical yield (CaCO3):
Actual yield (CaCO3):
Percent yield:
Moles of Ca present in original solution, based on actual yield:
Mass of CaCl2 present in original solution, based on actual yield:
Can someone please help me with these three easy questions please? Thank you! SHOW ALL WORK!!
THIS IS MY DATA FROM MY LAB EXPERIMENT. I JUST NEED FOR YOU TO FIND THE ANSWERS TO THE ABOVE QUESTIONS WITH WORK SHOWN!
|
Table 1: Data and Observations |
|
|
Mass |
|
|
CaCl2 : |
ORGINAL MASS: 2.0g AFTER 24 HOURS 5.8g |
|
K2CO3 : |
2.5g |
|
Filter Paper |
2.1 g |
|
Watch Glass |
33.6g |
|
Precipitate |
3.3g |
Procedure
Put on your safety glasses and gloves (provided in your safety box).
Turn on the scale by pressing the button labeled "0/T". If your scale does not turn on, you may have to remove the battery cover and remove a small strip of plastic from the battery housing. Once the scale is on, press the "0/T" button a second time to zero the scale. Make sure that the units are in grams (g). If not, press the M button until the units displayed are in grams.
Place a weigh boat on the scale and record the mass in Table 2. Zero the mass of the weigh boat by pressing the "0/T" button. Your scale should now read 0 g.
Add 2.0 g of CaCl2 to the weigh boat. Record the mass in Table 2. Set this sample aside, and let it sit exposed to the air (but otherwise undisturbed) for 24 hours. Complete Steps 3 - 23 while you wait.
Place a 250 mL beaker on the scale and zero it.
Add 2.0 g of CaCl2 to the beaker. Record the exact mass of the powder in Table 1.
Remove the beaker from the scale. Use a 100 mL graduated
cylinder to measure and pour 50 mL of distilled water into the
beaker and mix with the stir rod until all the CaCl2 has
dissolved.
Note: This is an exothermic process, so the beaker may become
warm.
Place a 50 mL beaker on the scale and zero the scale.
Add 2.5 g of K2CO3 to the 50 mL beaker. Record the exact mass of the powder in Table 1.
Remove the beaker from the scale. Use the 100 mL graduated cylinder to measure and pour 25 mL of distilled water into the 50 mL beaker. Mix with the stir rod until all the K2CO3 has dissolved.
Rinse the stir rod with water.
Add all of the K2CO3 solution to the beaker containing the CaCl2 solution. It is important that all of the K2CO3 is added to the beaker. To ensure this, rinse the 50 mL beaker with up to 5 mL distilled water, and pour the rinse in the CaCl2 solution.
Using the stopwatch to keep time, stir the solution with the stir rod for four minutes. Then, allow it to sit for 15 minutes. This will allow sufficient time for the chemical reaction to occur.
Rinse the stir rod with water.
Place a piece of filter paper on the scale and record the mass in Table 1.
Place a watch glass on the scale and record the mass in Table 1.
Fold the filter paper in half and in half again so that it resembles a triangle with one arched side.
Pull apart one fold of the filter paper so that three sides of the filter paper remain together, with one side making up the other half of the funnel shape (Figure 5).
Hold the funnel over a sink or any sized container. Place the paper into the funnel and use a pipette to drip 5 mL of distilled water around the edges of the filter paper. This will prevent the filter paper from rising up out of the funnel.
Rest the funnel on top of the Erlenmeyer flask.
After 15 minutes has passed, swirl the beaker and slowly filter the solution (that you created in Step 9) from the 250 mL beaker through the filter paper. Additional distilled water may also be used to transfer any remaining solid into the filtration apparatus.
After all the solution has been filtered, use the pipette to rinse the filter paper with approximately 5 mL of isopropyl alcohol to aid the drying process. Allow the isopropyl alcohol to completely drip through the filter before removing filter paper from the funnel.
Carefully remove the filter paper. Unfold and place it precipitate-side up onto the pre-weighed watch glass. Be sure not to lose any precipitate during this transfer.
Allow the precipitate to dry, undisturbed, for at least 24 hours. Determine the mass of the product recovered by re-weighing the system and subtracting the weight of the filter paper and watch glass. Record your data in Table 1.
Re-weigh the sample of CaCl2 that was allowed to sit exposed for 24 hours. Subtract the mass of the weigh boat and record the mass and your observations in Table 2.
TABLE 2 IS NOT IMPORTANT IN SOLVING THE QUESTION AS IT JUST ASKS FOR MY OBERVATION OF CaCl2 AFTER 24 HOURS. ALSO TO FIND THE ACTUAL YIELD, YOU WOULD HAVE TO FIND FIRST THE PERCENT YIELD AND THEORTICAL YIELD.
In: Chemistry
Dell technologies agreed on a $63bn acquisition of EMC Corporation in 2016. It was one of the largest tech deals in history. The merger makes Dell Technologies the leading provider of storage systems, second in servers, and third in PCs. Consider the press release below: “ AUSTIN, TEXAS , SEPTEMBER 7, 2016 - Dell Technologies today announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Dell Technologies serves 98 percent of the Fortune 500 and comprises several market leading businesses. The two largest, and most well-known, are the Dell client solutions business and the Dell EMC infrastructure solutions business – both of which are supported by Dell EMC Services. In addition, Dell Technologies contains Boomi, Pivotal, RSA, SecureWorks, Virtustream and VMware. This unique structure combines the focus and innovation of a startup with the global scale and service of a large enterprise. Dell Technologies’ scale will enable it to deliver more innovation and investment in R&D, sales and marketing, services and support and deliver more efficient and cost-effective solutions for customers. Furthermore, while the company will publically report its financial results, it is privately controlled, enabling it to better focus investments on its customer and partner ecosystem over the long term. Michael Dell, chairman and CEO of Dell Technologies, said, "We are at the dawn of the next industrial revolution. Our world is becoming more intelligent and more connected by the minute, and ultimately will become intertwined with a vast Internet of Things, paving the way for our customers to do incredible things. This is why we created Dell Technologies. We have the products, services, talent and global scale to be a catalyst for change and guide customers, large and small, on their digital journey." Dell Technologies blends Dell’s go-to-market strength with small business and mid-market customers and EMC’s strength with large enterprises and stands as a market leader in many of the most important and high-growth areas of the $2 trillion information technology market, including positions as a “Leader” in 20 Gartner Magic Quadrants and a portfolio of more than 20,000 patents and applications. Jamie Dimon, Chairman and CEO, JPMorgan Chase, commented, “Financial services is one of the first-movers in embracing technology to better serve our customers, and the next wave of digitalization continues a trend that’s been occurring my whole lifetime. As one of the world’s biggest users of Dell and EMC, we spend approximately $9 billion a year on technology, including infrastructure as well as cloud computing, big data analytics and cybersecurity. We make sure we spend wisely and select our partners very carefully. I’ve known Michael Dell for 30 years. He’s top notch, ethical, and deeply cares about everyone he works with – both internally at his company and across the industry. I'm thrilled for Michael and the new company, and we are eager to see everything they create in the future.” Marc Benioff, Chairman and CEO, Salesforce, added, “Salesforce’s partnership with Dell and EMC has been instrumental in pushing innovation across the industry. Michael is an incredible visionary and one of the most important leaders in our industry. He has been an amazing partner contributing to our success. Now with Dell Technologies, he is once again reshaping the technology industry." Tim McGrath, President and CEO of PC Connection, Inc., commented, “Our relationship with Dell has grown tremendously in the past six-plus years. Along with being recognized as a Dell Partner of the Year in both 2014 and 2015, the business has grown significantly. As partners of Dell, EMC, VMware and RSA, we are able to provide customers with innovative, value driven, and secure end-to-end IT solutions. With the combination of the Dell Technologies family of businesses, PC Connection, Inc. is expanding its capabilities offering an ever broadening comprehensive portfolio to our customers. We look forward to strengthening our partnership with Dell Technologies to ensure that our customers have the technical support, guidance, and product selection needed to help solve their business challenges with IT.” Source: https://www.emc.com/about/news/press/2016/20160907-01.htm
Question You are required to write a report by conducting a research on the above deal from its initial inception to completion, by relating the elements of mergers and acquisitions and by paying particular attention to the following:
(i) Synergies and expected gains from the acquisition;
(ii) The potential motives of, and the investment strategy of Dell in this acquisition
(iii) Your observations on why EMC Corporation is ready for this acquisition; (iv) Current consequences of Dell Inc and its market position?
(v) Shareholders’ position of Dell Inc.
In: Finance