BOSS Manufacturing Company, which employs about 160 productions and administrative workers have the following payroll procedures:
The factory supervisor interviews and hires all job applicants. The new employee prepares a W-4 form (Employee’s Withholding Exemption Certificate) and gives it to the supervisor. The supervisor writes the hourly rate of pay for the new employee in the corner of the W-4 form and then gives the form to the payroll clerk as notice that a new worker has been hired. The supervisor verbally advises the payroll department of any subsequent pay raises.
A supply of blank time cards is kept in a box near the entrance to the factory. All workers take a time card on Monday morning and fill in their names. The workers are nice people. During the week they record the time they arrive and leave work by punching their time cards in the time clock located near the main entrance to the factory. At the end of the week, the workers drop the time cards in a box near the exit.
A payroll clerk, who is also nice, retrieves the completed time cards from the box on Monday morning. Employees are automatically removed from the payroll master file when they fail to turn in a time card.
The payroll checks are manually signed by the chief accountant and then given to the factory supervisor, who distributes them to the employees. The factory supervisor arranges for delivery of the paychecks to any employee who is absent on payday.
The payroll bank account is reconciled by the chief accountant, who also prepares the various quarterly and annual tax reports.
a. Identify weaknesses in current procedures and explain the threats that they may allow to occur.
b. Suggest ways to improve the BOSS Manufacturing Company’s internal controls over hiring and payroll processing. List up to five recommendations.
In: Accounting
Which of the following attacks can be mitigated by proper data retention policies?
A. Dumpster diving
B. Man-in-the-browser
C. Spear phishing
D. Watering hole
A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites. Which of the following tools will the security administrator use to conduct this inventory MOST efficiently?
A. Tcpdump
B. Protocol analyzer
C. Netstat
D. Nmap
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?
A. Network tap
B. Honeypot
C. Aggregation
D. Port mirror
Which of the following is a security consideration for IoT devices?
A. IoT devices have built-in accounts that users rarely access.
B. IoT devices have less processing capabilities.
C. IoT devices are physically segmented from each other.
D. IoT devices have purpose-built applications.
In: Other
To obviate current beach erosion potentials and as a part of
beach re-nourishment, Research department’s Dr. Smith proposed a
construction of a series of submerged wave energy dissipation
structures (=submerged-plate breakwaters) at 110 ft from the
shoreline of the Beach. Based on design specifications of the
structure, the distribution of the number of waves dissipatable by
the proposed structure per hour could be approximated by a normal
distribution with a mean of 189 waves and a standard deviation of 7
waves.
1) Use the Empirical Rule to describe the 90% distribution/range of
X, i.e., the number
of waves dissipatable by the proposed structure per hour.
2) If the structure is built with dissipating a maximum 195
waves/hour capacity, what
fraction of an hour, i.e., minutes, might the structure be unable
to handle incoming
waves (or in other word, how many minutes per hour the structure
exceeds 195
waves/hour capacity)?
3) What wave dissipating capacity of the structure should be built
so that the
probability of the incoming waves exceeding the structure capacity
is equal to only
0.05 (or 5%)?
In: Statistics and Probability
Write a python program using the following requirements:
Create a class called Sentence which
Include a unit test in an if __name__ block to test the class. Use assert to check for errors.
Unit Test Example:
In: Computer Science
Instructions: Florida Power and Light (FPL) are seeking to add
two more nuclear power plants on the current Homestead location
where two nuclear power plants already exist.
FPL seeks two more South Florida nuclear reactors article
http://articles.sun-sentinel.com/2014-05-12/business/fl-fpl-nuclear-preview-20140512_1_turkey-point-fpl-reactors
Based on what you have learned so far from this class, discuss the
following:
What problems might these new power plants encounter if they were
built in South Florida with a lifespan of 40 years?
What advantages are there in giving FPL the licenses for these new
plants?
What disadvantages are there in giving FPL the licenses for these
new plants?
What are some other alternatives to the nuclear power plants?
What precautions would you demand if these power plants were
built?
Given what you know, if you were in a position to approve or
disapprove the licenses, what would you vote, and why?
Make sure to:
Write a short essay or paragraph of at least 300 words.
In: Mechanical Engineering
Write a function ‘sort1’ that takes in an array of non-zero
positive integers as input and returns a second vector
that contains only the odd numbers. It will return zero if all
elements are even. Use error-traps to check against
probable errors in user input. In case of an error, it will return
NaN. You are allowed to use Matlab built-in function
round(). Check your code with the following arrays:
>> y1 = [18, -5, 89, -7, 4, 10, 12, 34, -2, 45];
>> y2 = [34, 67, 89, 0, 12, 87, 0, 5];
>> y3 = [ 8, 3, 11, 4, 7, 12, 19, 3, 5, 6]
>> z1 = sort1(y1)
z1 =
NaN
>> z2 = sort1(y2)
z2 =
NaN
>> z3 = sort(y3)
z3 =
3 11 7 19 3 5
** You cannot use any built in Matlab functions other than round(). I don't need all the test runs. I'm just stuck halfway through the code and can't finish it.
In: Computer Science
1. Explain the following terms in relation to landscape architecture: parterre, Genius loci, tabula rasa, tacit knowing
2. Compare between landscape design as modern professional practice and Landscape design in history. Provide examples.
3. Compare between the French and English landscape design in the history.
Include names of pioneer in the field.
4. Explain the different of built environment and non-built environment in relation to landscape Architecture.
5. Use your imagination and design the land using only earth. Play with the topography in order to create spaces and corridors. You have a story you want to tell in these spaces. Your words are spaces and paths. Each space or path conveys a message, an image, or a feeling. Through the sequence of spaces, the story will be told. There are no restrictions what so ever to limit your imagination. Only be logical and sensitive. Do the sketch/ sketches in 2 scale. Write any principles you are using in your design related to land form.
The objective of the design problem is to show how you are dealing with the land form; a unique or distinguished design is not required here.
In: Civil Engineering
This C++ program will use arrays, recursion, and
pass by reference to calculate 02, 12,
22, 32, 42 and then print a
message.
Write a driver program (main) that includes the
following:
An array class (not a built-in-array) of
5 integers initialized to 0,1,2,3,4 the bases
An integer initialized to 2 to hold the
exponent
A string initialized to “Good Job!\n”;
A for loop that calls the recursive pow
function with all of the bases and the exponent.
Call the print function with the string using pass
by reference by passing the address of s.
You must use the array class (not built-in-arrays)
for full credit.
Write a pow function that implements raising a
base to a power. The function takes an int base and an int
exp. It returns an int which is baseexp. You
must use recursion for full credit.
Base case: base1 = base
Recursive case: baseexp = base *
baseexp-1
Write a print function that takes a string pointer and
uses the indirection operator (*) to print the contents of the
string to the screen. This function does not return anything.
This function must use pass by reference with pointers for full
credit.
In: Computer Science
Orchid Biotech Company is evaluating several different development projects for experimental drugs. Although the cash flows are difficult to forecast, the company has come up with the following estimates of the initial capital requirements and
NPVs
for the projects. Given a wide variety of staffing needs, the company has also estimated the number of research scientists required for each development project (all cost values are given in millions of dollars).
|
Project Number |
Initial Capital ($) |
Number of Research Scientists |
NPV ($) |
|
I |
10 |
2 |
10.1 |
|
II |
15 |
3 |
19.0 |
|
III |
15 |
4 |
22.0 |
|
IV |
20 |
3 |
25.0 |
|
V |
30 |
12 |
60.2 |
a. Suppose that Orchid has a total capital budget of $60 million. How should it prioritize these projects?
b. Suppose that Orchid currently has 12
research scientists and does not anticipate being able to hire more in the near future. How should Orchid prioritize these projects?
In: Finance
For each of the following situations, identify the inventory method that you would use or, given the use of a particular method, state the strategy that you would follow to accomplish your goal:
In: Accounting