Question: Describe 6 products that you have experienced and describe what stage the product was in. I'll go first as an example. Vinyl Records/decline or niche, 8 track, cassettes decline-CD's decline or niche-I-Tunes; growth. Typewriters that were Manuel, decline electric typewriter's, decline or niche word processors maturity; Beepers decline; Black & White Television decline-color-high definition growth?
Again what products did you experience in your lifetime that fit into one of the stages of the Product Life Cycle?
In: Operations Management
In the language c using the isspace() function: Write a program to count the number of words, lines, and characters when user enter statements as input. A word is any sequence of non-white-space characters.
Have the program continue until end-of-file. Make sure that your program works for the case of several white space characters in a row. The character count should also include white space characters.
Example of the user input could be the statement below:
You're traveling through
another dimension;
a dimension not only
of sight and sound,
but of mind.
In: Computer Science
Lab-3A One-way Conditional Branching
Write MIPS assembly code to prompt and read an integer value X, and to calculate and display |X|.
Example Input/Output
Enter an integer X : 14
The absolute value is 14
Enter an integer X: -14
The absolute value is 14
Submit a single word document with the:
~MIPS code and screenshots showing:
~ ML code & Registers before execution
~ Input/Output console with at least three test data
(should cover all partitions – one positive number, one negative number, and zero)
In: Computer Science
Problem: Your boss Lilly Riley wants to purchase devices such as tablets or laptop/tablet combination for the 10 Field Sales Employees. The company would like the Field Sales Employees to be more accessible and have the ability to respond to customers more efficiently and in a timely manner. Ms. Riley has asked you to research the purchase of a device that will meet the needs of these employees. You will need to convince Ms. Riley that your tablet solution is the best solution for this group of employees. In order to persuade Ms. Riley to purchase your solution, you will need to research different devices and software that meet the needs of the Field Sales Employees. The following criteria should be considered. Ms. Riley is on a tight budget but wants the best solution.
Cost - $600 per unit, apps and accessories – device will need to access the organizations warehouse inventory application which does have a mobile interface.
Connectivity - WIFI and 4G data plan. Include the cost of data plan for each device.
Processor - Processing speed must be powerful/fast enough to multitask
Display - Easy to read and use
Size - Device must be readable and practical
Accessories - Chargers, cases, etc.
Warranty - 2 years or more
Dual Cameras - Front and rear facing for Skyping or Facetime, taking photos of items in the field
Operating System - Apple, Android, Windows
Software Available - Apps, productivity software such as word processing , spreadsheets, browsers etc.
Any costs associated should be included in the costs for the devices.
She has given you a budget of $600 dollars for each unit. There are ten Field Sales Employees. You will need to research vendor websites and evaluate and select an appropriate device using the minimum requirements listed above. Since Ms. Riley has stated that the device should also have 4G capability, you will need to consider the cost of the data plan. The data plan should be included in your analysis but is outside the $600 for each device. However, the total expense for 4G support should be included in your analysis.
The point is to get the most for the money you have allocated for the device and Ms. Riley to purchase your recommended solution.
Use appropriate persuasive techniques and memo etiquette. Be sure to use a memo format. Save your persuasive memo to a word processing file that can be read in a Word format.
In: Operations Management
Please write a python code for the following. Use dictionaries and list comprehensions to implement the functions defined below. You are expected to re-use these functions in implementing other functions in the file. Include a triple-quoted string at the bottom displaying your output.
Here is the starter outline for the homework:
g.
def big_words(text, min_length=10):
""" Return a list of big words whose length is at least min_length """
return []
h.
def common_words(text, min_frequency=10):
""" Return words occurring at least min_frequency times
as a list of (word, count) pairs """
return []
i.
def most_common_big_word(text, min_word_size=5):
""" Returns the most common BIG word and its frequency
as a tuple. A big word is defined as having a
length >= min_word_size """
return ("some_big_word", 1000)
j.
def avg_word_length(text):
""" Returns the average length (number of letters) of the words in text """
return 0.0
gettysburg_address = """
Four score and seven years ago our fathers brought forthon this continent, a new nation, conceived in Liberty,and dedicated to the proposition that all men are createdequal. Now we are engaged in a great civil war, testingwhether that nation, or any nation so conceived and sodedicated, can long endure. We are met on a greatbattlefield of that war. We have come to dedicate aportion of that field, as a final resting place forthose who here gave their lives that that nation mightlive. It is altogether fitting and proper that we shoulddo this. But, in a larger sense, we can not dedicate, wecan not consecrate, we can not hallow this ground.The brave men, living and dead, who struggled here,have consecrated it, far above our poor power to addor detract. The world will little note, nor longremember what we say here, but it can never forget whatthey did here. It is for us the living, rather, to bededicated here to the unfinished work which they whofought here have thus far so nobly advanced. It israther for us to be here dedicated to the great taskremaining before us—that from these honored dead wetake increased devotion to that cause for which theygave the last full measure of devotion that we herehighly resolve that these dead shall not have died invain that this nation, under God, shall have a newbirth of freedom and that government of the people, bythe people, for the people, shall not perish from theearth.
"""
In: Computer Science
In: Psychology
Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by modern standards.
The first approach is called the Caesar Cipher, and is a simple “substitution cipher” where characters in a message are replaced by a substitute character.
The second approach, due to Giovan Battista Bellaso (b 1505, d 1581), uses a key word, where each character in the word specifies the offset for the corresponding character in the message, with the key word wrapping around as needed.
⦁ Using loops
⦁ String and character processing
⦁ ASCII codes
⦁ Data Manager class – CryptoManager.java
⦁ Implement each of the methods specified in this file.
This version as provided will print error messages in the console,
because they are just the skeletons.
⦁ Each of the methods are static, so there is no need
to create an instance of the Data Manager.
⦁ Document each of your methods with a simple
description and document the class with a simple description and
your name using in-line comments (//…). (Just a short sentence
fragment will suffice for each documentation string.)
⦁ The methods are described below.
⦁ public static boolean stringInBounds (String
plainText);
This method determines if a string is within the
allowable bounds of ASCII codes according to the LOWER_BOUND and
UPPER_BOUND characters. The parameter plainText is the string to be
encrypted. The method returns true if all characters are within the
allowable bounds, false if any character is outside.
⦁ public static String encryptCaesar(String plainText,
int key);
This method encrypts a string according to the Caesar Cipher. The
integer key specifies an offset and each character in plainText is
replaced by the character the specified distance away from it. The
parameter plainText is an uppercase string to be encrypted. The
parameter key is an integer that specifies the offset of each
character. The method returns the encrypted string.
⦁ public static String decryptCaesar(String
encryptedText, int key);
This method decrypts a string according to the Caesar Cipher. The
integer key specifies an offset and each character in encryptedText
is replaced by the character "offset" characters before it. This is
the inverse of the encryptCaesar method. The parameter
encryptedText is the encrypted string to be decrypted, and key is
the integer used to encrypt the original text. The method returns
the original plain text string.
⦁ public static String encryptBellaso(String plainText,
String bellasoStr);
This method encrypts a string according to the Bellaso Cipher. Each
character in plainText is offset according to the ASCII value of
the corresponding character in bellasoStr, which is repeated to
correspond to the length of plaintext. The method returns the
encrypted string.
⦁ public static String decryptBellaso(String
encryptedText, String bellasoStr);
This method decrypts a string according to the Bellaso Cipher. Each
character in encryptedText is replaced by the character
corresponding to the character in bellasoStr, which is repeated to
correspond to the length of plainText. This is the inverse of the
encryptBellaso method. The parameter encryptedText is the encrypted
string to be decrypted, and bellasoStr is the string used to
encrypt the original text. The method returns the original plain
text string.
⦁ Add additional methods if you wish to make your logic
easier to follow.
⦁
⦁ GUI Driver class – (provided)
⦁ A Graphical User Interface (GUI) is provided. Be sure
that the GUI will compile and run with your methods. The GUI will
not compile if your method headers in CryptoManager.java are not
exactly in the format specified. When you first run the
application, your methods will all throw exceptions, which will be
caught by the GUI and printed out in the console.
⦁ Do not modify the GUI.
⦁ The GUI takes care of capitalizing your input
strings.
⦁
⦁ JUnit Test/Test Driver
⦁ Once your methods are implemented, run the test
driver. Ensure that the driver file results in the following
output, as shown in RED (of course the output will not be in red
when you run the test driver):
⦁ "THIS TEST SHOULD SUCCEED" Is it in bounds?
true
⦁ "THIS TEST THAT SHOULD FAIL BECAUSE { IS OUTSIDE THE
RANGE" Is it in bounds? false
⦁ "This test should fail because of lowercase letters"
Is it in bounds? false
⦁ Caesar cipher of "THIS IS ANOTHER TEST" should return
"WKLV#LV#DQRWKHU#WHVW": WKLV#LV#DQRWKHU#WHVW
⦁ Bellaso cipher of "THIS IS ANOTHER TEST" should
return "WU\VR9F#N!RF88U-'HED": WU\VR9F#N!RF88U-'HED
⦁ Caesar decryption of "WKLV#LV#DQRWKHU#WHVW" should
return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁ Bellaso decryption of "WU\VR9F#N!RF88U-'HED" should
return "THIS IS ANOTHER TEST": THIS IS ANOTHER TEST
⦁ Run the JUnit test file (provided). Ensure that the
JUnit tests all succeed.
⦁ Include CryptoGFATest.java and CryptoManagerTest.java
with the rest of your submission.
The first approach is called the Caesar Cipher, and is a simple
“substitution cipher” where characters in a message are replaced by
a substitute character. The substitution is done according to an
integer key which specifies the offset of the substituting
characters. For example, the string ABC with a key of 3 would be
replaced by DEF.
If the key is greater than the range of characters we want to
consider, we “wrap around” by subtracting the range from the key
until the key is within the desired range. For example, if we have
a range from space (‘ ‘) to ‘_’ (i.e., ASCII 32 to ASCII 95), and
the key is 120, we note that 120 is outside the range. So we
subtract 95-32+1=64 from 120, giving 56, which in ASCII is the
character ‘8’. If the key is even higher, we can subtract the range
from the key over and over until the key is within the desired
range.
Since our specified range does not include lower-case letters, the
GUI (provided) will change strings to upper case. You can find the
ASCII table at http://www.asciitable.com/, or many other places on
the Internet.
The second approach, due to Giovan Battista Bellaso (b 1505, d
1581), uses a key word, where each character in the word specifies
the offset for the corresponding character in the message, with the
key word wrapping around as needed.
So for the string ABCDEFG and the key word CMSC, the key word is
first extended to the length of the string, i.e., CMSCCMS. Then A
is replaced by ‘A’ offset by ’C’, i.e., ASCII 65+67=132. The range
of the characters is also specified, and again we’ll say ‘ ‘ to ‘_’
(i.e., ASCII 32 to ASCII 95). The range is then 95-32+1=64. In our
example, the offset is “wrapped” by reducing 132 by the range until
it is the allowable range. 132 is adjusted to 132-64=68, or
character ‘D’ in the encrypted phase. Then the same logic is
applied to the second letter of the plain text ‘B’ shifted by the
second letter of the key word ‘M’. This results in the character
‘O’ as the second letter in the encrypted phase, and so on. In each
approach, if the resulting integer is greater than 95 (the top of
our range), the integer is “wrapped around” so that it stays within
the specified range. The result is “DOVGHSZ”.
Your program will implement several methods that are specified in
the file “CryptoManager.java”. A Graphical User Interface is
provided, as well as a test file, that you should use to make sure
your methods work correctly. Be sure to follow the naming exactly,
as the tests will not work otherwise.
There are several features of Java that we have not yet covered in
class. Just follow the syntax specified in this document and in the
file CryptoManager.java. First, the required methods are “static”,
which just means that they are available from the class even if an
instance has not been created. To call a static method, for
example, “public static void myMethod();” the syntax is
CryptoManager.myMethod();. Another feature that may be useful in
this project is the method charAt(i) on a string, which returns a
character at position i of a string (zero-based). So
“thisString”.charAt(3); would return the char ‘s’.
Notes:
⦁ Proper naming conventions: All constants, except 0
and 1, should be named. Constant names should be all upper-case,
variable names should begin in lower case, but subsequent words
should be in title case. Variable and method names should be
descriptive of the role of the variable or method. Single letter
names should be avoided.
Indentation: It must be consistent throughout the program and must
reflect the control structure
In: Computer Science
Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.
What happens if the growth is constant, and g > rs? Will many stocks have g > rs?
In: Finance
Robert Campbell and Carol Morris are senior vice-presidents of the Mutual of Chicago Insurance Company. They are co-directors of the company’s pension fund management division. A major new client has requested that Mutual of Chicago present an investment seminar to illustrate the stock valuation process. As a result, Campbell and Morris have asked you to analyze the Bon Temps Company, an employment agency that supplies word processor operators and computer programmers to businesses with temporarily heavy workloads. You are to answer the following questions.
What is a constant growth stock? How do you value a constant growth stock?
In: Finance
|
Arrange the following items in the appropriate income statement and balance sheet formats. Determine in which of these two documents each of these items belongs, then include all appropriate items in outlines of an income statement and balance sheet. Prepare your response as a Word document. |
||
|
|
|
In: Accounting