Questions
Question: Describe 6 products that you have experienced and describe what stage the product was in....

Question: Describe 6 products that you have experienced and describe what stage the product was in. I'll go first as an example. Vinyl Records/decline or niche, 8 track, cassettes decline-CD's decline or niche-I-Tunes; growth. Typewriters that were Manuel, decline electric typewriter's, decline or niche word processors maturity; Beepers decline; Black & White Television decline-color-high definition growth?

Again what products did you experience in your lifetime that fit into one of the stages of the Product Life Cycle?

In: Operations Management

In the language c using the isspace() function: Write a program to count the number of...

In the language c using the isspace() function: Write a program to count the number of words, lines, and characters when user enter statements as input. A word is any sequence of non-white-space characters.

Have the program continue until end-of-file. Make sure that your program works for the case of several white space characters in a row. The character count should also include white space characters.

Example of the user input could be the statement below:

             You're traveling through

​               another dimension;

              a dimension not only

              of sight and sound,

               but of mind.

In: Computer Science

Lab-3A One-way Conditional Branching Write MIPS assembly code to prompt and read an integer value X,...

Lab-3A One-way Conditional Branching

Write MIPS assembly code to prompt and read an integer value X, and to calculate and display |X|.

Example Input/Output

Enter an integer X : 14

The absolute value is 14

Enter an integer X: -14

The absolute value is 14

Submit a single word document with the:

~MIPS code and screenshots showing:
~ ML code & Registers before execution
~ Input/Output console with at least three test data

(should cover all partitions – one positive number, one negative number, and zero)

In: Computer Science

Problem: Your boss Lilly Riley wants to purchase devices such astablets or laptop/tablet combination for...

Problem: Your boss Lilly Riley wants to purchase devices such as tablets or laptop/tablet combination for the 10 Field Sales Employees. The company would like the Field Sales Employees to be more accessible and have the ability to respond to customers more efficiently and in a timely manner. Ms. Riley has asked you to research the purchase of a device that will meet the needs of these employees. You will need to convince Ms. Riley that your tablet solution is the best solution for this group of employees. In order to persuade Ms. Riley to purchase your solution, you will need to research different devices and software that meet the needs of the Field Sales Employees. The following criteria should be considered. Ms. Riley is on a tight budget but wants the best solution.

Cost - $600 per unit, apps and accessories – device will need to access the organizations warehouse inventory application which does have a mobile interface.

Connectivity - WIFI and 4G data plan. Include the cost of data plan for each device.

Processor - Processing speed must be powerful/fast enough to multitask

Display - Easy to read and use

Size - Device must be readable and practical

Accessories - Chargers, cases, etc.

Warranty - 2 years or more

Dual Cameras - Front and rear facing for Skyping or Facetime, taking photos of items in the field

Operating System - Apple, Android, Windows

Software Available - Apps, productivity software such as word processing , spreadsheets, browsers etc.

Any costs associated should be included in the costs for the devices.

She has given you a budget of $600 dollars for each unit. There are ten Field Sales Employees. You will need to research vendor websites and evaluate and select an appropriate device using the minimum requirements listed above. Since Ms. Riley has stated that the device should also have 4G capability, you will need to consider the cost of the data plan. The data plan should be included in your analysis but is outside the $600 for each device. However, the total expense for 4G support should be included in your analysis.

The point is to get the most for the money you have allocated for the device and Ms. Riley to purchase your recommended solution.

Use appropriate persuasive techniques and memo etiquette. Be sure to use a memo format. Save your persuasive memo to a word processing file that can be read in a Word format.

In: Operations Management

Please write a python code for the following. Use dictionaries and list comprehensions to implement the...

Please write a python code for the following. Use dictionaries and list comprehensions to implement the functions defined below. You are expected to re-use these functions in implementing other functions in the file. Include a triple-quoted string at the bottom displaying your output.

Here is the starter outline for the homework:

g.

def big_words(text, min_length=10):

""" Return a list of big words whose length is at least min_length """

return []

h.

def common_words(text, min_frequency=10):

""" Return words occurring at least min_frequency times

as a list of (word, count) pairs """

return []

i.

def most_common_big_word(text, min_word_size=5):

""" Returns the most common BIG word and its frequency

as a tuple. A big word is defined as having a

length >= min_word_size """

return ("some_big_word", 1000)

j.

def avg_word_length(text):

""" Returns the average length (number of letters) of the words in text """

return 0.0

gettysburg_address = """

Four score and seven years ago our fathers brought forthon this continent, a new nation, conceived in Liberty,and dedicated to the proposition that all men are createdequal. Now we are engaged in a great civil war, testingwhether that nation, or any nation so conceived and sodedicated, can long endure. We are met on a greatbattlefield of that war. We have come to dedicate aportion of that field, as a final resting place forthose who here gave their lives that that nation mightlive. It is altogether fitting and proper that we shoulddo this. But, in a larger sense, we can not dedicate, wecan not consecrate, we can not hallow this ground.The brave men, living and dead, who struggled here,have consecrated it, far above our poor power to addor detract. The world will little note, nor longremember what we say here, but it can never forget whatthey did here. It is for us the living, rather, to bededicated here to the unfinished work which they whofought here have thus far so nobly advanced. It israther for us to be here dedicated to the great taskremaining before us—that from these honored dead wetake increased devotion to that cause for which theygave the last full measure of devotion that we herehighly resolve that these dead shall not have died invain that this nation, under God, shall have a newbirth of freedom and that government of the people, bythe people, for the people, shall not perish from theearth.

"""

In: Computer Science

Your blog post should have a unique title. It should summarize the current event source with...

Your blog post should have a unique title. It should summarize the current event source with the hyper link to the source. The blog post should connect to our textbook and sociological concepts. It should be at least 400 words. Lastly, it should be grammatical correct.
To complete this assignment you should:

First, student must create a blog, which I provide another document showing step by step instructions. Student will only have to do this once. After that is done, every time the assignment is due students just have to copy and paste their entry onto the website and share their link. Therefore, students may write their post in a word documents or any other preferred writing system.


In the blogs, students must find a current or relevant item from any of the following: films, YouTube videos, scholarly articles, and newspaper articles, and students must relate it to the sociological topic of the week (source must not too old, it need to be present). This will be the space to keep up with current events related to sociology and social problems. After the research is done, students must summarize in this information in their own words. Next, students will connect this current or relevant item to what the sociology course is covering that week. You do this by defining and quote the sociological concept from the textbook or lecture, and then describing how the current event reminds you of this concept. Students may also discuss what they learned from it. Students may not use any clips that were already used for the lectures or assigned films/docs. Hence, each blog post will consist of, at least overall, 400 words by summarizing and reflecting on the relevant item and using an outside resource to engage and enhance your connection to the reading(s).
My suggestion is to use wordpress.com, but there are other options. Blogs are free; you should not pay anything to create a blog. Please make sure to insert your word count at the end of the blog entry and the relevant item link is posted. Grammar, spelling, sentence structure, and organization is important!


My suggestion is one, strong paragraph on the summary and reflection on the source (200 words), and a second paragraph on the week’s reading and how it connects to your source (200 words). In the latter paragraph, you should be using sociological concepts and citing its source. Please make sure to insert you word count at the end of each entry.

In: Psychology

Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure...

Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by modern standards.

The first approach is called the Caesar Cipher, and is a simple “substitution cipher” where characters in a message are replaced by a substitute character.

The second approach, due to Giovan Battista Bellaso (b 1505, d 1581), uses a key word, where each character in the word specifies the offset for the corresponding character in the message, with the key word wrapping around as needed.


⦁   Using loops
⦁   String and character processing
⦁   ASCII codes


⦁   Data Manager class – CryptoManager.java
⦁   Implement each of the methods specified in this file. This version as provided will print error messages in the console, because they are just the skeletons.
⦁   Each of the methods are static, so there is no need to create an instance of the Data Manager.
⦁   Document each of your methods with a simple description and document the class with a simple description and your name using in-line comments (//…). (Just a short sentence fragment will suffice for each documentation string.)
⦁   The methods are described below.
⦁   public static boolean stringInBounds (String plainText);
   This method determines if a string is within the allowable bounds of ASCII codes according to the LOWER_BOUND and UPPER_BOUND characters. The parameter plainText is the string to be encrypted. The method returns true if all characters are within the allowable bounds, false if any character is outside.
⦁   public static String encryptCaesar(String plainText, int key);
This method encrypts a string according to the Caesar Cipher. The integer key specifies an offset and each character in plainText is replaced by the character the specified distance away from it. The parameter plainText is an uppercase string to be encrypted. The parameter key is an integer that specifies the offset of each character. The method returns the encrypted string.
⦁   public static String decryptCaesar(String encryptedText, int key);
This method decrypts a string according to the Caesar Cipher. The integer key specifies an offset and each character in encryptedText is replaced by the character "offset" characters before it. This is the inverse of the encryptCaesar method. The parameter encryptedText is the encrypted string to be decrypted, and key is the integer used to encrypt the original text. The method returns the original plain text string.
⦁   public static String encryptBellaso(String plainText, String bellasoStr);
This method encrypts a string according to the Bellaso Cipher. Each character in plainText is offset according to the ASCII value of the corresponding character in bellasoStr, which is repeated to correspond to the length of plaintext. The method returns the encrypted string.
⦁   public static String decryptBellaso(String encryptedText, String bellasoStr);
This method decrypts a string according to the Bellaso Cipher. Each character in encryptedText is replaced by the character corresponding to the character in bellasoStr, which is repeated to correspond to the length of plainText. This is the inverse of the encryptBellaso method. The parameter encryptedText is the encrypted string to be decrypted, and bellasoStr is the string used to encrypt the original text. The method returns the original plain text string.
⦁   Add additional methods if you wish to make your logic easier to follow.
⦁  
⦁   GUI Driver class – (provided)
⦁   A Graphical User Interface (GUI) is provided. Be sure that the GUI will compile and run with your methods. The GUI will not compile if your method headers in CryptoManager.java are not exactly in the format specified. When you first run the application, your methods will all throw exceptions, which will be caught by the GUI and printed out in the console.
⦁   Do not modify the GUI.
⦁   The GUI takes care of capitalizing your input strings.
⦁  
⦁   JUnit Test/Test Driver
⦁   Once your methods are implemented, run the test driver. Ensure that the driver file results in the following output, as shown in RED (of course the output will not be in red when you run the test driver):
⦁   "THIS TEST SHOULD SUCCEED" Is it in bounds? true
⦁   "THIS TEST THAT SHOULD FAIL BECAUSE { IS OUTSIDE THE RANGE" Is it in bounds? false
⦁   "This test should fail because of lowercase letters" Is it in bounds? false
⦁   Caesar cipher of "THIS IS ANOTHER TEST" should return "WKLV#LV#DQRWKHU#WHVW": WKLV#LV#DQRWKHU#WHVW
⦁   Bellaso cipher of "THIS IS ANOTHER TEST" should return "WU\VR9F#N!RF88U-'HED": WU\VR9F#N!RF88U-'HED
⦁   Caesar decryption of "WKLV#LV#DQRWKHU#WHVW" should return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁   Bellaso decryption of "WU\VR9F#N!RF88U-'HED" should return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁   Run the JUnit test file (provided). Ensure that the JUnit tests all succeed.
⦁   Include CryptoGFATest.java and CryptoManagerTest.java with the rest of your submission.

The first approach is called the Caesar Cipher, and is a simple “substitution cipher” where characters in a message are replaced by a substitute character. The substitution is done according to an integer key which specifies the offset of the substituting characters. For example, the string ABC with a key of 3 would be replaced by DEF.
If the key is greater than the range of characters we want to consider, we “wrap around” by subtracting the range from the key until the key is within the desired range. For example, if we have a range from space (‘ ‘) to ‘_’ (i.e., ASCII 32 to ASCII 95), and the key is 120, we note that 120 is outside the range. So we subtract 95-32+1=64 from 120, giving 56, which in ASCII is the character ‘8’. If the key is even higher, we can subtract the range from the key over and over until the key is within the desired range.
Since our specified range does not include lower-case letters, the GUI (provided) will change strings to upper case. You can find the ASCII table at http://www.asciitable.com/, or many other places on the Internet.
The second approach, due to Giovan Battista Bellaso (b 1505, d 1581), uses a key word, where each character in the word specifies the offset for the corresponding character in the message, with the key word wrapping around as needed.
So for the string ABCDEFG and the key word CMSC, the key word is first extended to the length of the string, i.e., CMSCCMS. Then A is replaced by ‘A’ offset by ’C’, i.e., ASCII 65+67=132. The range of the characters is also specified, and again we’ll say ‘ ‘ to ‘_’ (i.e., ASCII 32 to ASCII 95). The range is then 95-32+1=64. In our example, the offset is “wrapped” by reducing 132 by the range until it is the allowable range. 132 is adjusted to 132-64=68, or character ‘D’ in the encrypted phase. Then the same logic is applied to the second letter of the plain text ‘B’ shifted by the second letter of the key word ‘M’. This results in the character ‘O’ as the second letter in the encrypted phase, and so on. In each approach, if the resulting integer is greater than 95 (the top of our range), the integer is “wrapped around” so that it stays within the specified range. The result is “DOVGHSZ”.
Your program will implement several methods that are specified in the file “CryptoManager.java”. A Graphical User Interface is provided, as well as a test file, that you should use to make sure your methods work correctly. Be sure to follow the naming exactly, as the tests will not work otherwise.
There are several features of Java that we have not yet covered in class. Just follow the syntax specified in this document and in the file CryptoManager.java. First, the required methods are “static”, which just means that they are available from the class even if an instance has not been created. To call a static method, for example, “public static void myMethod();” the syntax is CryptoManager.myMethod();. Another feature that may be useful in this project is the method charAt(i) on a string, which returns a character at position i of a string (zero-based). So “thisString”.charAt(3); would return the char ‘s’.
Notes:
⦁   Proper naming conventions: All constants, except 0 and 1, should be named. Constant names should be all upper-case, variable names should begin in lower case, but subsequent words should be in title case. Variable and method names should be descriptive of the role of the variable or method. Single letter names should be avoided.
Indentation: It must be consistent throughout the program and must reflect the control structure

In: Computer Science

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They...

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.

What happens if the growth is constant, and g > rs? Will many stocks have g > rs?

In: Finance

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They...

Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.

What is a constant growth stock? How do you value a constant growth stock?

In: Finance

Arrange the following items in the appropriate income statement and balance sheet formats. Determine in which...

Arrange the following items in the appropriate income statement and balance sheet formats. Determine in which of these two documents each of these items belongs, then include all appropriate items in outlines of an income statement and balance sheet. Prepare your response as a Word document.

  • Sales
  • Cash
  • Depreciation expense
  • Inventory
  • Accounts payable
  • Cost of goods sold
  • Long-term debt
  • Accrued expenses
  • Accounts receivable
  • Income tax payable
  • Income tax expense
  • Retained earnings
  • Accumulated depreciation
  • Prepaid expenses
  • Interest expense
  • Sales tax payable
  • Operating expenses
  • Gross profit
  • Contributed capital

In: Accounting