Questions
A recent survey asked: Is it morally wrong for corporations to use tax havens? Its results:...

A recent survey asked: Is it morally wrong for corporations to use tax havens? Its results: Most said yes. See http://environicsresearch.com/insights/nine-ten-canadians-think-morally-wrong-canadian-corporations-use-tax-havens-new-poll/.

Delving deeper into the issue of tax avoidance, you will go beyond the news release. You will examine the polling data, not just the news release. You will round up the news coverage of the survey results. You will gain a sense of the public debates of tax avoidance in Canada. You will learn from relevant studies on tax justice in civil society by think tanks, governments and academics around the world.

Making good use of your research, you will write a 100-word note starting with the following:

It’s morally wrong for Canadian corporations to use tax havens because ….

That is, you will start by completing the sentence and then you will make your most compelling argument in your submission. You only have 100 words so make one compelling argument and make it well.

In: Accounting

In Python Please Samwell Tarly knows that in the world of Westeros, some names are better...

In Python Please
Samwell Tarly knows that in the world of Westeros, some names are better than others. Some like Aegon Targaryen and Tyrion Lannister. He and Citadel believe that a correct name should have the same number of capital letters as words, for example: Bran Stark is correct. Whereas Brienne of Tarth is not. Your task is to help read the books and determine the correct names. Each name is strictly composed of letters and names separated by single spaces. Input Format Several test cases, one per line, each containing the name of a person. No name contains more than 20 words and each word does not contain more than 30 characters. (End of file loop) Constraints (End of file loop)

Output Format For each name, you must print “Correct” if the name is approved, otherwise you must print “No”. Sample Input 0

Robert Baratheon

Daenerys Targaryen

Cersei lannister

Theon Greyjoy

Brienne of Tarth

Arya Stark

Melisandre

Gray worm

Jon snow

Daario NaHaris

In: Computer Science

In the lesson, you were introduced to the difference between data, information, and knowledge. Think of...

  1. In the lesson, you were introduced to the difference between data, information, and knowledge. Think of an example in your life where a number could be described as data, information, and knowledge.
  2. A file won’t open on your friend’s computer, which leads to the inevitable question: “Why do there even need to be different file types, anyway?” How would you respond?
  3. Think about the last business that you purchased a product or a service from. What three types of software might they need? Why would they need them?
  4. If virtual reality becomes commonly used, what are some problems and concerns that might arise?
  5. A family member who hasn’t worked with computers before has decided to change jobs. You’ve been asked to explain some of the basics. You begin by explaining the basic idea of word processing software, spreadsheets, databases, and presentation software. You sense that the following question is coming: “Why so many different things? Why can’t there just be one software that you could use for everything?” How would you answer?

In: Computer Science

13. Describe the basic sequence of events that occurs as an action potential arrives at the...

13. Describe the basic sequence of events that occurs as an action potential arrives at the neuromuscular junction and is transmitted to the muscle cell and leads to a contraction. Explain at the end how relaxation of the muscle takes place (include what happens at the neuromuscular junction and in the muscle fiber. You may use some words multiple times. Fill in the blanks with a complete word or words (no abbreviations) of each step.

1. An action potential arrives at the synaptic bulb of a motor neuron causing the exocytosis of vesicles containing ___

2. ____ diffuses across the synaptic cleft to bind to a receptor on the ___ allowing sodium to influx resulting in an action potential.

3. The action potential will spread down the ___ into the center of the muscle fiber.

4. The excitation cause the release of _____ from the ____ into the sarcoplasm.

5. ____ will bind to ___ causing a conformational change.

6. ____ will move___ off the____ of the protein .

7. The ____ will bind to the ____ forming a ____ .

8. The ____ will ___ pulling the ___ . This is called the___ .

9. ____ will attach to the ___causing it to ___from the____ .

10. __ of__ provides the energy to cause the___ of the ___.

11. _____- write out the whole step

Relaxation.

___ cleaves ___

The ___ re-uptakes the ___

___ recovers the so that ___ can no longer bind.

In: Anatomy and Physiology

How does Wireless Ethernet architecture, prevents the hidden node problem? Ding real time transmission Handshaking after...

  1. How does Wireless Ethernet architecture, prevents the hidden node problem?
    1. Ding real time transmission
    2. Handshaking after transmission of data
    3. Handshaking before transmission of data
    4. Acknowledgement of every packet transmitted

  1. What is the purpose of the Network Address Translation (NAT)?
  1. To divide the network into subnet works
  2. To receive all data sent to private networks
  3. Allow private IP addresses to work
  4. Convert private IP addresses to public IP addresses

  1. The binary number 1011111 is equivalent to which decimal number below
  1. 125
  2. 65
  3. 128
  4. 95

  1. Which word or phrase below best describes a subnet mask
  1. A thing you put on your face
  2. A filter
  3. Creates the IP address for the network
  4. Determines the path of data to the sub-network

  1. The packet by which data is transmitted on ethernet architecture is called a frame. How many bytes is the length of that frame?
    1. 47 – 1500 bytes
    2. 46 – 1500 bits
    3. 46 – 1500 bytes
    4. Too many bytes to count

  1. In ethernet architecture the most common topology used is
    1. Bus
    2. Extended star
    3. Wireless
    4. star

In: Electrical Engineering

You are the Executive Director of Human Resources for the College of New Caledonia. There is...

You are the Executive Director of Human Resources for the College of New Caledonia. There is a global pandemic called COVID-19 causing unprecedented disruption to society, business operations, and global economies. Every one is feeling the impacts and no one is immune to this including your organization CNC. The President of the College of New Caledonia has asked you as the Executive Director of Human Resources to prepare a Human Resources Pandemic Plan for the organizations COVID-19 response. To create a comprehensive plan, you are required to pay particular attention to a few key details that will impact employees.

In your plan, briefly discuss the following topics (and provide your reasoning):

1,Compensation plans for employees - is peoples pay changing as a result of disrupted work?

2.Employee benefits and services plans for employees - is this changing as a result of disrupted work?

3.Health and Safety decisions made to protect employees.

4.Union partners collaboration and communication – what is the plan for how you work with the unions?

5.What will happen if employees are non compliant with recommendations or are not able to work to expected standards?

word limit should be 1500 to 2000

In: Operations Management

The theory of multiple intelligences was developed in 1983 by Dr. Howard Gardner. It states that...

The theory of multiple intelligences was developed in 1983 by Dr. Howard Gardner. It states that the traditional notion of intelligence, based on I.Q. testing, is far too limited. Instead, Dr. Gardner proposes 8 different intelligence to account for a broader range of human potential in children and adults. This intelligence is:

Linguistic intelligence (“word smart”)
Logical-mathematical intelligence (“number/reasoning smart”)
Spatial intelligence (“picture smart”)
Bodily-Kinesthetic intelligence (“body smart”)
Musical intelligence (“music smart”)
Interpersonal intelligence (“people smart”)
Intrapersonal intelligence (“self smart”)
Naturalist intelligence (“nature smart”)
Please address the following questions in your post:

How do you view intelligence? What do you think has influenced your way of understanding an individual’s capabilities?
Which of the above intelligence do you resonate with most and why? Provide instances and examples from your life.
List at least 2 other people that encompass a different type of intelligence than yourself and give examples of how they demonstrate this type of intelligence in their everyday life (work, relationships, school, etc.)

In: Psychology

Step 1 Consider a time when you wanted to buy a certain product but could not...

Step 1 Consider a time when you wanted to buy a certain product but could not find it.

What was your reaction? Why? How did the lack of availability affect your perception of the company and of the product? Did it make you want it more or did it make you frustrated so that you lost interest. Speculate on the supply chain and distribution channel strategy that the company was trying to achieve.

Step 2 Now consider a product that is widely available.

What is your perception of the product and the company? How is your perception influenced by the ubiquity of the product? Speculate on the distribution strategy and goals for the company.

Step 3 Compare and contrast your findings in the first two steps.

How did the availability of the products influence your thoughts and attitude toward the product and the company? Speculate as to whether the companies' distribution strategies have proved effective and served them well.

Step 4 Write your paper.

In addition to discussing each of the questions in Steps 1 and 2, be sure to include the comparison between the two companies and products.

A two-page (500-word), double-spaced paper

In: Operations Management

**Program #2: Working with Generics Implement the following method that returns the maximum element in an...

**Program #2: Working with Generics

Implement the following method that returns the maximum element in an array.

public static <E extends Comparable<E>> E max(E[] list)

What should you do?

     Write a program to test the method above with various types.

Deliverables:

  • There are 2 separate programs to complete. Place them both in the same package.
  • Projects submitted with evidence of plagiarism will be given a score of 0.
  • Java files (source code)
  • Word document should include:
    • Screen snapshots of outputs
    • Lessons Learned
    • Check List

Deliverable format: The above deliverables should be packaged in the following format.

  • lastNameFirstInitial_ProjectXX.doc
  • lastNameFirstInitial_ProjectXX.zip [a compressed folder containing the package that has all files necessary for the program(s) to run]

Unencrypt.java, Permutations.java, and MaxWithGenerics.java

Check List

#

Y/N

Comments

Source java files

Files:

LastNameFirstinitial_Project04.zip

LastNameFirstInitial_Project04.doc

Program compiles

Program runs

Checklist is completed and included in the Documentation

Documentation file:

Comprehensive Test Plan

Screenshots of running program

UML diagram

Lessons Learned

Checklist

In: Computer Science

Using the provided network diagram, write a program in c ++ that finds the shortest path...

Using the provided network diagram, write a program in c ++ that finds the shortest path routing using the Bellman-Ford algorithm. Your program should represent the fact that your node is U. Show how the iterative process generates the routing table for your node. One of the keys to your program will be in determining when the iterative process is done.

Deliverables 1. Provide an output that shows the routing table for your node after each iteration. Add a second table with two columns. One that shows the destination from your node and the second column indicating the number of hops to reach that node. 2. Provide a Word document that explains how your program incorporates the Bellman-Ford algorithm. Ensure you explain how you incorporated the iterative process and determined when the routing table for your node was optimum. You can incorporate your outputs into this document; however, you must identify where in your source code you print the results. 3. Provide a copy of your source code

In: Computer Science