Session 5.1 Quick Check
Describe push technology and pull technology, and provide examples of each.
What are three examples of Web 2.0 applications?
A series of related messages in a newsgroup or email is called a(n) ______________.
Most social websites have built-in ______________ that display content from different feeds.
What is a podcatcher and what does it do?
What is a mashup?
What is a common income source for developers who create mashups?
In: Computer Science
please describe below technology used, benefit, issue and conclusion in your words
Technology Used
Encryption was almost exclusively used only by governments and large enterprises until the late 1970s when the Diffie-Hellman key exchange and RSA algorithms were first published -- and the first personal computers were introduced. By the mid-1990s, both public key and private key encryption were being routinely deployed in web browsers and servers to protect sensitive data.
Devices like modems, set-top boxes, smartcards and SIM cards all use encryption or rely on protocols like SSH, S/MIME, and SSL/TLS to encrypt sensitive data. Encryption is used to protect data in transit sent from all sorts of devices across all sorts of networks, not just the internet; every time someone uses an ATM or buys something online with a smartphone, makes a mobile phone call or presses a key fob to unlock a car, encryption is used to protect the information being relayed. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material, are yet another example of encryption protecting data. Cryptographic hash functions.
Encryption is usually a two-way function, meaning the same algorithm can be used to encrypt plaintext and decrypt ciphertext. A cryptographic hash function can be viewed as a type of one-way function for encryption, meaning the function output cannot easily be reversed to recover the original input. Hash functions are commonly used in many aspects of security to generate digital signatures and data integrity checks. They take an electronic file, message or block of data and generate a short digital fingerprint of the content called a message digest or hash value. The key properties of a secure cryptographic hash function are:Output length is small compared to input o Computation is fast and efficient for any input or Any change to input affects lots of output bits o One-way value -> the input cannot be determined from the output of Strong collision resistance -> two different inputs can't create the same output
The ciphers in hash functions are optimized for hashing: They use large keys and blocks, can efficiently change keys every block and have been designed and vetted for resistance to related-key attacks. General-purpose ciphers used for encryption tend to have different design goals. For example, the symmetric-key block cipher AES could also be used for generating hash values, but its key and block sizes make it nontrivial and inefficient.
Encryption helps protect business data. The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.
1. Triple DES:
Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.
Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112bits in key strength is more like it.
Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.
2. RSA:
RSA is a public-key encryption algorithm. It also happens to be one of the methods used in our PGP and GPG programs.
Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. You’ve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge that takes attackers quite a bit of time and processing power to break.
3. Blowfish:
Blowfish is another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually. Blowfish is known for both its speed and effectiveness as many claim that it has never been defeated. Vendors have taken full advantage of its free availability in the public domain. Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. It’s definitely one of the more flexible encryption methods available.
4. Twofish:
Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed. Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. Encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt are there.
5. AES:
The Advanced Encryption Standard is the algorithm trusted as the standard by the U.S. Government and numerous organizations. Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes. AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.
Benefits of Encryption
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or any other computer network. A number of organizations either recommend or require sensitive data to be encrypted in order to prevent unauthorized third parties or threat actors from accessing the data. For example, the Payment Card Industry Data Security Standard requires merchants to encrypt customers' payment card data when it is both stored at rest and transmitted across public networks.
Modern encryption algorithms also play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:
Authentication: the origin of a message can be verified.
Integrity: proof that the contents of a message have not been changed since it was sent.
Non repudiation: the sender of a message cannot deny sending the message.
Encryption Issues
Although it seems like common sense to use data encryption in business and other entities for security, many organizations are opposed to encrypting data because of some of the obstacles involved with doing so.
Like everything else, data encryption has its pros and cons and businesses must look at all of the considerations to make an informed decision about encryption.
Data Encryption :
Encryption Keys: Without a doubt, data encryption is a monumental task for an IT specialist. The more data encryption keys there are the more difficult IT administrative tasks for maintaining all of the keys can be. If you lose the key to the encryption, you have lost the data associated with it.
Expense: Data encryption can prove to be quite costly because the systems that maintain data encryption must have capacity and upgrades to perform such tasks. Without capable systems, the reduction of systems operations can be significantly compromised.
Unrealistic Requirements: If an organization does not understand some of the restraints imposed by data encryption technology, it is easy to set unrealistic standards and requirement which could jeopardize data encryption security.
Compatibility: Data encryption technology can be tricky when you are layering it with existing programs and applications. This can negatively impact routine operations within the system.
For any cipher, the most basic method of attack is brute force; trying each key until the right one is found. The length of the key determines the number of possible keys, hence the feasibility of this type of attack. Encryption strength is directly tied to key size, but as the key size increases so, too, do the resources required to perform the computation.
Alternative methods of breaking a cipher include side-channel attacks, which don't attack the actual cipher but the physical side effects of its implementation. An error in system design or execution can allow such attacks to succeed.
Attackers may also attempt to break a targeted cipher through cryptanalysis, the process of attempting to find a weakness in the cipher that can be exploited with a complexity less than a brute-force attack. The challenge of successfully attacking a cipher is easier if the cipher has any flaw. For example, there have been suspicions that interference from the National Security Agency (NSA) weakened the Data Encryption Standard algorithm, and following revelations from former NSA analyst and contractor Edward Snowden, many believe the NSA has attempted to subvert other cryptography standards and weaken encryption products.
Conclusion
Thus, network security is one of the most important factors to consider while working over the internet, Local Area Network or other method. It doesn't matter how small or big businesses. It is said that there is no network that is immune to all attacks, a stable, fast and efficient network security system is essential to protecting data. A good network security system helps reduce the risk of data theft and sabotage. This analysis shows that AES is the better algorithm and AES does not have any well known weak points so far.
In: Computer Science
Problem 23-01
The following are Marigold Corp.’s comparative balance sheet accounts at December 31, 2020 and 2019, with a column showing the increase (decrease) from 2019 to 2020.
|
COMPARATIVE BALANCE SHEETS |
|||||||||
|---|---|---|---|---|---|---|---|---|---|
|
2020 |
2019 |
Increase |
|||||||
|
Cash |
$810,600 |
$701,400 |
$109,200 |
||||||
|
Accounts receivable |
1,135,300 |
1,156,300 |
(21,000 |
) |
|||||
|
Inventory |
1,850,800 |
1,708,800 |
142,000 |
||||||
|
Property, plant, and equipment |
3,318,800 |
2,955,300 |
363,500 |
||||||
|
Accumulated depreciation |
(1,164,400 |
) |
(1,035,600 |
) |
(128,800 |
) |
|||
|
Investment in Myers Co. |
307,400 |
277,400 |
30,000 |
||||||
|
Loan receivable |
248,800 |
— |
248,800 |
||||||
|
Total assets |
$6,507,300 |
$5,763,600 |
$743,700 |
||||||
|
Accounts payable |
$1,015,700 |
$949,200 |
$66,500 |
||||||
|
Income taxes payable |
30,200 |
50,000 |
(19,800 |
) |
|||||
|
Dividends payable |
79,500 |
100,400 |
(20,900 |
) |
|||||
|
Lease liabililty |
423,200 |
— |
423,200 |
||||||
|
Common stock, $1 par |
500,000 |
500,000 |
— |
||||||
|
Paid-in capital in excess of par—common stock |
1,499,000 |
1,499,000 |
— |
||||||
|
Retained earnings |
2,959,700 |
2,665,000 |
294,700 |
||||||
|
Total liabilities and stockholders’ equity |
$6,507,300 |
$5,763,600 |
$743,700 |
||||||
Additional information:
| 1. | On December 31, 2019, Marigold acquired 25% of Myers Co.’s common stock for $277,400. On that date, the carrying value of Myers’s assets and liabilities, which approximated their fair values, was $1,109,600. Myers reported income of $120,000 for the year ended December 31, 2020. No dividend was paid on Myers’s common stock during the year. | |
| 2. | During 2020, Marigold loaned $323,600 to TLC Co., an unrelated company. TLC made the first semiannual principal repayment of $74,800, plus interest at 10%, on December 31, 2020. | |
| 3. | On January 2, 2020, Marigold sold equipment costing $59,700, with a carrying amount of $37,700, for $39,900 cash. | |
| 4. | On December 31, 2020, Marigold entered into a capital lease for an office building. The present value of the annual rental payments is $423,200, which equals the fair value of the building. Marigold made the first rental payment of $60,000 when due on January 2, 2021. | |
| 5. | Net income for 2020 was $374,200. | |
| 6. | Marigold declared and paid the following cash dividends for 2020 and 2019. |
|
2020 |
2019 |
|||
|---|---|---|---|---|
|
Declared |
December 15, 2020 | December 15, 2019 | ||
|
Paid |
February 28, 2021 | February 28, 2020 | ||
|
Amount |
$79,500 | $100,400 |
Prepare a statement of cash flows for Marigold Corp. for the year
ended December 31, 2020, using the indirect method.
In: Accounting
Problem 23-01
The following are Shamrock Corp.’s comparative balance sheet accounts at December 31, 2020 and 2019, with a column showing the increase (decrease) from 2019 to 2020.
|
COMPARATIVE BALANCE SHEETS |
|||||||||
|
2020 |
2019 |
Increase |
|||||||
|
Cash |
$811,100 |
$702,700 |
$108,400 |
||||||
|
Accounts receivable |
1,139,100 |
1,176,000 |
(36,900 |
) |
|||||
|
Inventory |
1,847,000 |
1,704,500 |
142,500 |
||||||
|
Property, plant, and equipment |
3,317,700 |
2,945,400 |
372,300 |
||||||
|
Accumulated depreciation |
(1,158,000 |
) |
(1,048,400 |
) |
(109,600 |
) |
|||
|
Investment in Myers Co. |
312,200 |
274,000 |
38,200 |
||||||
|
Loan receivable |
250,000 |
— |
250,000 |
||||||
|
Total assets |
$6,519,100 |
$5,754,200 |
$764,900 |
||||||
|
Accounts payable |
$1,010,900 |
$960,700 |
$50,200 |
||||||
|
Income taxes payable |
29,900 |
50,500 |
(20,600 |
) |
|||||
|
Dividends payable |
80,600 |
100,700 |
(20,100 |
) |
|||||
|
Lease liabililty |
432,100 |
— |
432,100 |
||||||
|
Common stock, $1 par |
500,000 |
500,000 |
— |
||||||
|
Paid-in capital in excess of par—common stock |
1,499,300 |
1,499,300 |
— |
||||||
|
Retained earnings |
2,966,300 |
2,643,000 |
323,300 |
||||||
|
Total liabilities and stockholders’ equity |
$6,519,100 |
$5,754,200 |
$764,900 |
||||||
Additional information:
|
1. |
On December 31, 2019, Shamrock acquired 25% of Myers Co.’s common stock for $274,000. On that date, the carrying value of Myers’s assets and liabilities, which approximated their fair values, was $1,096,000. Myers reported income of $152,800 for the year ended December 31, 2020. No dividend was paid on Myers’s common stock during the year. |
|
|
2. |
During 2020, Shamrock loaned $332,200 to TLC Co., an unrelated company. TLC made the first semiannual principal repayment of $82,200, plus interest at 10%, on December 31, 2020. |
|
|
3. |
On January 2, 2020, Shamrock sold equipment costing $59,800, with a carrying amount of $38,000, for $40,100 cash. |
|
|
4. |
On December 31, 2020, Shamrock entered into a capital lease for an office building. The present value of the annual rental payments is $432,100, which equals the fair value of the building. Shamrock made the first rental payment of $60,300 when due on January 2, 2021. |
|
|
5. |
Net income for 2020 was $403,900. |
|
|
6. |
Shamrock declared and paid the following cash dividends for 2020 and 2019. |
|
2020 |
2019 |
|||
|
Declared |
December 15, 2020 |
December 15, 2019 |
||
|
Paid |
February 28, 2021 |
February 28, 2020 |
||
|
Amount |
$80,600 |
$100,700 |
Prepare a statement of cash flows for Shamrock Corp. for the year
ended December 31, 2020, using the indirect method
In: Accounting
Country facing a lost decade of growth, ANZ warns
By Shane Wright (Sydney Morning Herald, 21 January 2020)
Australia is facing a lost decade of economic growth, ANZ has warned, that will see living standards slip and wages grow modestly while putting pressure on the Morrison government's plan for a string of budget surpluses.
…
ANZ head of Australian economics David Plank said growth through the current decade would average 2.6 per cent, with that tipped to fall to between 2 and 2.5 per cent across the 2020s. He said that level of growth, lower than both estimated by the Reserve Bank and the federal Treasury, would be driven by tepid non-mining business investment, weak productivity and household consumption held back by high debt and modest wage increases.
…
Australian households, despite record levels of wealth due to high house prices, were carrying record levels of debt that would crimp their spending plans.
…
In its December budget update, Treasury forecast economic growth to lift to 2.75 per cent through 2020-21 and then climb to 3 per cent for the next two years. That level of growth is expected to help drive down unemployment and push up wages.
…
The last paragraph of the article in above question states that economic growth in the future is expected to decrease unemployment and increase wages. Explain the effect these changes in unemployment and wages would have on the AD and SAS curves, and on the short run macroeconomic equilibrium.
In: Economics
what kind of fiscal and monetary policy should government authorities implement? Explain why and give specific examples of each policy that might be implemented. What effect would these policies have on aggregate demand (AD)?
Country facing a lost decade of growth, ANZ warns
By Shane Wright (Sydney Morning Herald, 21 January 2020)
Australia is facing a lost decade of economic growth, ANZ has warned, that will see living standards slip and wages grow modestly while putting pressure on the Morrison government's plan for a string of budget surpluses.
…
ANZ head of Australian economics David Plank said growth through the current decade would average 2.6 per cent, with that tipped to fall to between 2 and 2.5 per cent across the 2020s. He said that level of growth, lower than both estimated by the Reserve Bank and the federal Treasury, would be driven by tepid non-mining business investment, weak productivity and household consumption held back by high debt and modest wage increases.
…
Australian households, despite record levels of wealth due to high house prices, were carrying record levels of debt that would crimp their spending plans.
…
In its December budget update, Treasury forecast economic growth to lift to 2.75 per cent through 2020-21 and then climb to 3 per cent for the next two years. That level of growth is expected to help drive down unemployment and push up wages.
…
In: Economics
Herman Corporation reported the following transactions for 2019:
|
1. |
Sold equipment for $28,000. The original cost was $60,000; the book value is $24,000 |
|
2. |
Issued 2,000 shares of $20 par value common stock for $48 per share |
|
3. |
Paid $12,000 for an Insurance policy which goes into effect in January 2020 |
|
4. |
Recognized $8,000 in Interest expense on Dec 31, 2019 - to be paid on April 30, 2020 |
|
5. |
Received $32,000 as collections from customers for 2018 sales, and $72,000 for 2019 sales |
|
6. |
Reacquired 300 shares of its own common stock at $80 per share |
|
7. |
Received $8,000 in dividends on stock held as available for sale |
|
8. |
Recorded depreciation expense for $20,000 |
|
9. |
Paid $4,000 of dividends to common stockholders |
|
10. |
Purchased equipment costing $260,000, by making a cash down payment of $80,000 and signing a note for the remaining $180,000. |
|
11. |
Acquired a building with a market value of $1,000,000 by issuing 20,000 shares of common stock. |
|
12. |
Paid salaries of $72,000 |
|
13. |
Cash received from sale of available for sale securities $24,000 |
|
14. |
Repaid a loan, which included $20,000 of the principal and $4,000 in interest |
Herman Corporation uses the direct method for preparing the 2019
Statement of Cash Flows.
1. The net cash flow from operating activities is
2. The net cash flow from investing activities is
3. The net cash flow from financing activities is
In: Accounting
Company A has a market value of equity of $2,000 million and 80 million shares outstanding. Company B has a market value of equity of $400 million and 25 million shares outstanding. Company A announces at the beginning of 2019 that is going to acquire Company B.
The projected pre-tax gains in operating income (in millions of $) from the merger are:
| 2019 | 2020 | 2021 | 2022 | 2023 | |
| Pre-tax Gains in Operating Income | 12 | 16 | 28 | 38 |
45 |
The projected pre-tax gains in operating income are expected to grow at 4% after year 2023. The company is using a discount rate of 8% to value the synergies. The marginal corporate tax rate is 35%.
Company A has decided to pay a $300 million premium for Company B. Assume that capital markets are efficient and that there is a 100% probability the deal will be closed.
1/ By how much the price per share of Company A would change at the time of the announcement of the acquisition?
2/ If Company A were to make a 100% stock offer for Company B, what would the exchange ratio be? Remember that the exchange ratio is the number of Company A’s shares that the shareholders of Company B will receive in exchange for each of their shares.
3/ If Company A were to offer 0.80 share of Company A for each share of company B, by how much the price per share of Company A would change at the time of the announcement of the acquisition?
In: Accounting
Read the following article and answer the following questions.
VOLATILE COFFEE PRICES: COVID-19 AND MARKET FUNDAMENTALS
Since the covid-19 outbreak was declared a global pandemic by the World Health Organization in midMarch, the virus has spread to virtually all coffee exporting and importing countries. The ICO Composite Indicator Price, which is a weighted average of all major coffee origins and types, has shown a fluctuating but upward trend since February 2020. Due to social distancing and other measures imposed by governments to contain the virus, some coffee workers were quarantined and only one worker at a time can access a container to load bags of coffee. These have resulted in disruptions and delays, and subsequently in increased transaction and trade costs of coffee. Moreover, at the onset of COVID-19, there was higher supermarket sales of coffee resulting from panic buying and stockpiling as the public worried that coffee shops might be closed during the pandemic. Modified from the article in http://www.ico.org/news/coffee-break-series-2e.pdf
a. Some factors could affect the demand for and supply of coffee. Identify the two factors mentioned in the above article. Clearly state whether they affect demand or supply.
b. Suppose, under the above impacts in (a), there was a fall in the equilibrium quantity of coffee in the market. Draw a well-labeled demand-and-supply diagram to illustrate these impacts on the market for coffee. Briefly explain your answer.
In: Economics
|
|
Prepare the journal entry recording pension expense. (Credit account titles are automatically indented when amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts.)
In: Accounting