Questions
Python Practice Sample:   Write code to replace every occurrence of THE or the with ### and...

Python Practice Sample:  

Write code to replace every occurrence of THE or the with ### and every word ending with the letter s to end with a $. Print the resulting text four words per line (and any remaining words from each paragraph on the last one of each paragraph)

"The modern business world goes way beyond the balance sheet. Whether your passion is finance or fashion, economics or the environment, you need an education built for business. At Bentley, we understand this. Sure, we started as an accounting school. But over the past 100 years, the business world has changed and we have too. Today, your classmates are dreaming of Silicon Valley or Washington D.C., just as often as Wall Street"

In: Computer Science

Employees want to be mobile, having the ability to move from their desks to meetings and...

Employees want to be mobile, having the ability to move from their desks to meetings and back again. How do you ensure that the data they are accessing follows the rules for CIA? In a 500- to 750-word essay, develop a plan for securing an enterprise level wireless network, such as the private WGCUSECURE WiFi Network used here on campus. Make sure to address the following: Which wireless security options would you deploy, preventing typical wireless attack vectors? Should you use a layered security approach? Why? Describe the strategy for your design. Include a network diagram. Use Microsoft Visio or online network diagraming tools, as identified in the required readings to visualize your design.

In: Computer Science

Please enter your response to both questions posed below. Subject : Computer And Network Security Total...

Please enter your response to both questions posed below.

Subject : Computer And Network Security

Total word count must be 250 to 300 words in your posting. (20 points)

Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater each. (5 points each)

Please provide references for your original postings in APA format.

  1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently?
  2. What policies govern your behavior currently, in school, work, or in other organizations? Are those policies enforced/followed? Why or why not?

In: Computer Science

Reference: Public Relations, Engagement, Conversation, Influence, Transparency and Trust. By: Tom Kelleher 1. Explain the importance...

Reference: Public Relations, Engagement, Conversation, Influence, Transparency and Trust. By: Tom Kelleher

1. Explain the importance of the First Amendment to PR.

2. What basic guidelines of copyright law should public relations professionals know about?

3. Discuss how traditional media, social media, and offline word of mouth interact in the spread of crisis information.

4. Describe how issues management can prevent or lessen the impact of crises.

5. Consumer activists are very vocal about the misdeeds of corporations. How should a company react to charges and allegations from activist groups such as PETA? As a public relations professional, which factors would go into your decision making if faced with this situation?

In: Operations Management

Assignment: Sustainability Concepts: Ecological health : Regeneration of ecosystem services is essential for sustainability. Equity/Ethics :...

Assignment:

Sustainability Concepts:

Ecological health : Regeneration of ecosystem services is essential for sustainability.

Equity/Ethics : Ethics serves to guide human endeavor and is not just a topic for philosophy.

Interdependence : The interdependence of humanenvironmental systems is a condition of life.

Limits/Scale : Ecological limits and social ties should inform the scale of human activity.

Think of a recent purchase you have made that is relatively costly. Do not select food items. In light of what you have learned about sustainability, externalized costs, and the mission and core values of the social work profession, would you make the same decision to purchase this product if you had a second chance to decide? Why or why not?

175-200 WORD COUNT

In: Psychology

Create a Packet Tracer file that completes the required steps below. After you have added the...

Create a Packet Tracer file that completes the required steps below.

After you have added the switches, add the following devices and wire accordingly.

Device

Interface

To

PC1-A

F0

Switch 1

F0/1

PC1-B

F0

Switch 1

F0/5

Configure the following information on the computers:

Device

IP

Subnet

PC1-A

172.16.30.3

255.255.255.0

PC1-B

172.16.30.4

255.255.255.0

Configure the following items:

  • Set passwords for the Console and VTY 0 4 lines.
  • The password should be set for login and the password should be "Pa$$word#1".
  • Set an enable password that is "P@ssw0rd#2".
  • Set a banner that is appropriate.
  • Set the hostname as appropriate.
  • Enable the service for securing passwords.

In: Computer Science

Write a C program that reads a file and reports how many lines, words, and characters...

Write a C program that reads a file and reports how many lines, words, and characters appear in it. For the purpose of this program, a word consists of a consecutive sequence of any characters except white space characters. For example, if the file lear.txt contains the following passage from King Lear,

Poor naked wretches, wheresoe’er you are,

That bide the pelting of this pitiless storm,

How shall your houseless haeds and unfed sides,

Your loop’d and window’d raggedness, defend you

From seasons such as these? O, I have ta’en

Too little care of this!

Your program should be able to generate the following sample run:

File: lear.txt

Lines: 6

Words: 43

Chars: 210

In: Computer Science

Use Google to search for online storage services or cloud backup. Look for an article or...

Use Google to search for online storage services or cloud backup. Look for an article or post that describes available services for remote backups. List two services and locate additional information about each, including how to enroll, costs to use, known security risks or breaches and customer reviews. Find articles that describe how companies are adopting online storage services and locate statistics about how many currently are doing so as well as predictions. Have you ever used an online storage service for backup or data recovery? If so, describe the experience. Submit your findings in a brief 250 word essay. Identify at least one URL used as a research source.

In: Computer Science

Just wondering about the definitions and usage of these three terms. To my understanding so far,...

Just wondering about the definitions and usage of these three terms.

To my understanding so far, "covariant" and "form-invariant" are used when referring to physical laws, and these words are synonyms?

"Invariant" on the other hand refers to physical quantities?

Would you ever use "invariant" when talking about a law? I ask as I'm slightly confused over a sentence in my undergrad modern physics textbook:

"In general, Newton's laws must be replaced by Einstein's relativistic laws...which hold for all speeds and are invariant, as are all physical laws, under the Lorentz transformations." [emphasis added]

~ Serway, Moses & Moyer. Modern Physics, 3rd ed.

Did they just use the wrong word?

In: Physics

Question 5 (20 marks) (a) (b) TLT company has $720 million in common stock outstanding. Its...

Question 5

(a)











(b)



TLT company has $720 million in common stock outstanding. Its cost of equity is 12%. Moreover, TLT has $360 million in 6% coupon rate bonds outstanding. The bond is currently sold at par. There are no taxes in the country in which TLT company operates.

i. Calculate the weighted average cost of capital (WACC) of TLT.

ii. TLT has decided to issue $180 million in common stock and use the proceeds to buy back its bonds. According to the Modigliani & Miller (M&M) propositions, what are the TLT’s new WACC and new cost of equity?

Critically discuss the importance of dividend clientele effect to the firm value. (word limit: 150 words)

In: Finance