Questions
1.       The social learning theory of Bandura emphasizes the importance of observing and modeling the behaviors,...

1.       The social learning theory of Bandura emphasizes the importance of observing and modeling the behaviors, attitudes, and emotional reactions of others. Since most behavior is learned through observing others, we store this information for future guidance and actions. When answering the questions below, identify how and when social learning was part of the experience.   

1.       Identify skills you believe you possess.   

•             Communication

•             Ability to Work Under Pressure

•             Decision Making

•             Time Management

•             Self-motivation

•             Conflict Resolution

•             Leadership

•             Adaptability

•             Teamwork

•             Creativity

•             Responsible

•             Able to Operate Under Pressure

•             Efficient

•             Computer and Internet Skills

•             Verbal Communication

•             Organizational Skills

•             Multi-tasking

•             Time Management


1.       capabilities Choose a job posting in an area of interest and analyze it, with a focus on the workplace required of the candidate.


1.       The skills that match are the skills you can use to market yourself and set yourself apart from other job applicants.

2.       Determine which of the skills are most important to you. Write how you will verbally describe these skills during a future job interview.

3.       Create a Word document with your list of skills and a description of how you will verbally communicate them in an interview and an elevator speech. (An elevator speech is a brief summary.)

In: Psychology

I have a product I need to market in the Kingdom of Saudi Arabia I wrote...

I have a product I need to market in the Kingdom of Saudi Arabia I wrote most of the main points but it remains only for me:

  1. Marketing Mix (4 P’s ) Analysis

Describe each of the 4Ps of your chosen company.

Product or Service

Identify the product or service by what it is, who will buy it, how much they will pay for it and how much it will cost for the company to produce it, why a consumer demand exists for your product, and where the product sits in comparison to similar products/services now available.

Place

Identify the location of the business, why it is located there (strategic, competitive, economic objectives), the expected methods of distribution, and timing objectives.

Promotion

Describe the type of promotional methods that will be used. Identify techniques such as word of mouth, personal selling, direct marketing, sales promotion etc. television, radio, social media and newspaper ads.

Price

The prices of the products or services that reflects the overall company strategy. Should be competitive as well as a reflection of the quality, costs and profit margin.

Here is the description of the product I want to market for:

Mechanical is a relationship from Germany, who bargains in gadgets things. Here as a propelling chief, my thing is an electronic gadget called Eris and Gallelio, this contraption is utilized to give intuition. Here, I will extend the business in Saudi Arabia, subsequently, to this a showing plan is required.

In: Operations Management

At the end of the lab, you will be asked to respond to the following in...

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft Word document:

Describe what information was contained in the logs and what value they might have in a security investigation.

Address the following in your response:

  • Think about the challenges of getting all the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings?
  • What are the risks associated with logging too little data or not auditing the correct events?
  • What are the risks associated with logging too many events?
  • When the default configuration is to create audit logs, what impact can this have on security incident investigations?
  • This was just a single domain with 2 systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?
  • Considera cloud-hosted Infrastructure as a Service (IaaS) environment with many new, Internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment?

Finally, conclude this week's assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

In: Computer Science

Your task is to determine the WACC for a healthcare organization. Your deliverable is a brief...

Your task is to determine the WACC for a healthcare organization. Your deliverable is a brief report in which you state your determination of WACC, describe and justify how you determined the number, and provide a relevant discussion of your findings. Chapter 7 covers the basic concepts of WACC. Refer to the WACC formula at the bottom of page 341: WACC = Kd(1-t)(D / V) + Ke(E/V) Company HCA Healthcare (Stock Ticker Symbol: HCA) Assumptions: HCA has a cost of debt of 6%, a corporate tax rate of 40%, and a debt weight of 60%. HCA has a cost of equity of 11.4% and an equity weight of 40%.

Submit the following: Write a 350- to 700-word report that contains the following elements:

• Your calculated WACC. Describe how you used the assumptions to calculate the WACC.

• What does HCA’s WACC indicate? How could decision makers use this information?

• How would an increase in equity or debt impact the WACC?

• US corporate tax rates were reduced to 21% starting in 2018. Recalculate your WACC based on the new tax rates. Describe the impact of changes in corporate tax rates on HCA’s WACC. • Is a higher WACC good or bad? Support your answer.

Include the math used for your calculations.

In: Finance

(3) Implement the getNumOfNonWSCharacters() method. getNumOfNonWSCharacters() has a string as a parameter and returns the number...


(3) Implement the getNumOfNonWSCharacters() method. getNumOfNonWSCharacters() has a string as a parameter and returns the number of characters in the string, excluding all whitespace. Call getNumOfNonWSCharacters() in the main() method. (4 pts)

Ex:

Enter a sample text:

We'll continue our quest in space. There will be more shuttle flights and more shuttle crews and, yes, more volunteers, more civilians, more teachers in space. Nothing ends here; our hopes and our journeys continue!

You entered: We'll continue our quest in space. There will be more shuttle flights and more shuttle crews and, yes, more volunteers, more civilians, more teachers in space. Nothing ends here; our hopes and our journeys continue!

MENU

c - Number of non-whitespace characters

w - Number of words

f - Find text

r - Replace all !'s

s - Shorten spaces

q - Quit

Choose an option:

c

Number of non-whitespace characters: 181


Implement the getNumOfWords() method. getNumOfWords() has a string as a parameter and returns the number of words in the string. Hint: Words end when a space is reached except for the last word in a sentence. Call getNumOfWords() in the main() method. (3 pts)

Ex:

Number of words: 35

ANSWER IN JAVA more coming

In: Computer Science

After reading Chapter 9 of the textbook, discuss the following questions to the best of your...

After reading Chapter 9 of the textbook, discuss the following questions to the best of your abilities:

-Let's pretend that you recently moved from Italy to the United States. How can you adjust to a new society and connect to people in a different community?

-In your own words, state what does “living in a diverse world” mean to you?

-Name two positive effects and two negative effects of using communication technology.

-Define “prejudice” and name three causes of prejudice.

-Describe why “I” statements are so important to successful communication with a close friend or partner.

Important notice: Your professor will consider these elements when assessing the quality and level of student participation.

Submit initial post(s) early in the session and subsequent responses to the posts of other learners at timely intervals throughout the duration of the session. The goal is to have a dynamic discussion around the topic that lasts throughout the entire session.

Your original post should be within a range of 75-100 words. If a post does not meet the minimum word count of 75, your professor will not count it toward your grade.

Your subsequent contributions responding to a classmate should have 50 to 100 words.

Book: Keys to Success Quick by Carol Carter, Joyce Bishop, Sarah Lyman Karvirts

In: Psychology

Select 3 different sized (order lg lg n, lg n, n, n lg n, n2 ,...

Select 3 different sized (order lg lg n, lg n, n, n lg n, n2 , n3 , nk , cn , n!) algorithms to code using a compiler of choice (VB, C++, Java, , etc…). An example would be an algorithm to search for a number in a list of n numbers → (n), and a second algorithm to sort a list of numbers using a bubble sort → (n2 ). You could also choose to just calculate a open form expression like 1 + 2 + 3 + 4 + 5 + 6 + … n for a size n algorithm. Once the algorithms are coded and working (10pts. will be awarded on complexity/substance of algorithms), add a timer to the crucial section of the code that will correspond to the  analysis. I have included some sample Java and C++ timer code below that should work. Show me the programs running/working with the time elapsed outputted for a run. 5pts. Run and time the three algorithms for n = 10, 100, 1000, 10000, etc… and chart the different times on a column, bar, or line chart. Turn in a word processed report listing the three algorithms code and the charts displaying the timed results of the runs. 5pts. Use long (16 bit) in Java and long long (16 bit) in C++ for your variables to avoid a memory problem.

In: Computer Science

Writing a caesar cipher in ARM assembly. INSTRUCTIONS: Step 1: The first thing you should do...

Writing a caesar cipher in ARM assembly.

INSTRUCTIONS:

Step 1:
    The first thing you should do is modify the case conversion program String.s (provided)
    Instead of subtracting 32 from all numbers you want to add a constant number which we will call the key.
    Assume that all input will be lowercase. 
    So it'll look like this,
        k = 2;
        letter = 'a';
        newletter = k+letter;
    Above is pseudocode and ABOVE NOT ASSEMBLY CODE DO NOT COPY.
    Use bl puts to show that everything is working correctly.
    You should hard code the plaintext in the assembly file.
Step 2:
    If the key + letter is bigger is 'z' then you have to subtract 26.
    If the key + letter is less than 'a' then you have to add 26.

STRING.S

.text
.global main

main:
    ldr r4,=string

get_another_byte:
    ldrb r5,[r4]

    cmp r5,#'a'
#    blt keep_going
#    cmp r5,#'z'
#    bgt keep_going

    subeq r5,#32
    strbge r5,[r4]

keep_going:
    add r4,#1
    cmp r5,#0
    bne get_another_byte

    ldr r0,=temp
    str lr,[r0]

    ldr r0,=string
    bl puts

    ldr r0,=temp
    ldr lr,[r0]

    bx lr

.data

string:
.asciz "This is a string"


temp:
    .word 0

In: Computer Science

The World Bank is considering an application from the country of Equatoria for a large dam...

The World Bank is considering an application from the country of Equatoria for a large dam project. In order to build this dam, villagers from an entire village will need to be relocated. In addition, there will be some watershed damage and ecological losses due to habitat destruction. Monetary costs and benefits for the dam project are given as follows:

Construction costs: $650 million at the beginning of the first year of the project. Construction costs for the start of the second year of the project will be 12% higher than the first year costs, and at the start of year 3 (the final year of construction) the costs will be 15% higher than the first year costs. Operating costs: $75 million/year (starting in year 3); and then increase to $80 million/year from year 8 onward Hydropower generated: 4 billion kilowatt hours/year (available from year 3) Price of electricity: $0.08/kilowatt hour Irrigation water available from the dam: 20 billion litres/year (available from year 3) Price of water: $0.008/litre Agricultural production lost from flooded lands: $54 million/year (loss from year 2)

Forestry production lost from flooded lands: $28 million/year (loss from year 2) Note: 1 billion = 1000 million  

You, as a consultant have been approached by the World Bank to carry out an analysis from which you will provide your recommendations.  

Your tasks: A. Calculate the NPV and the B/C using a real discount rate of 4.6%. Set up a basic template to complete your CBA. Put the variables in the clearly labeled cells above your Large Dam Project. Since we are given agricultural and forestry production losses, if we incorporate these we are automatically creating a ‘withwithout project’ analysis. Next complete your Large Dam Project with clearly labelled columns. Do this by creating formulae using your variables in the cells above. Always use formulae linked back to the data cells above so that if you wish to change a data cell value (for a sensitivity analysis) then all your calculations will automatically

2  

change. Once you have created a formula in one cell of a column you should be able to drag down so that it accurately duplicates the formula right down the column. To do the analysis I want you to complete the columns initially for 10 years of the project. However, we can assume that once built this dam will remain in place indefinitely. So to extend the analysis to cover the long term, follow these instructions:  

i) Underneath Yr 10 put Yr 11 to infinity (11 – infinity).

ii) Since the last few years have the same Net Cash Flow (NCF) and we do not have any further information, we can assume that the future NCFs will remain the same. This means that we can calculate the future NCFs based on these last NCFs and use the formula for a perpetuity that states: PV of all future expected cashflows = NCF/discount rate, (this effectively capitalizes the future NCFs)

iii) To create the formula for this in the NCF cell for yrs 11 – infinity (in your NCF column), use the NCF cell in year 9 and divide this value by the discount rate cell. (Use the year 9 NCF rather than the one in year 10, because you will shortly be changing the NCF entry in year 10). You have now calculated the PV of all future NCFs, to the beginning of year 11 (as this is the beginning point of yrs11-infinity).

iv) But you want your final PV to be today (year 0) not year 11. Remember that the beginning of year 11 is the same as the end of year 10, so now you can add this cell containing the large value for (NCF/disc. rate) into your calculation for the year 10 NCF. v) Your final column is where you calculate the PV(NCF)s – i.e. the PV of each entry in your NCF column.  

vi) Finally, sum your PV(NCF) column and this sum will give you your NPV. vii) Similarly, for your B/C you will need to calculate the PV(future Costs) and PV(future Bens) in a similar manner (as you did for the NCF) for years 11 – infinity. This is so that you capture all future streams of costs and also of benefits. Then finally calculate the NPV(Costs) and NPV(Benefits) so that you can use these to calculate your B/C.  

Also begin a Word doc. and for Part A. give the NPV(Large Dam) and also the B/C(Large Dam).

B. Now consider an alternative project: several smaller dams constructed to avoid flooding significant agricultural land or forested areas. For this project, total construction costs are exactly half the costs of the large dam project, while operating costs are two-thirds those of the large dam. Power and irrigation benefits are also half as much as those for the large dam. Agricultural land and forests are not affected and the project incurs no ecological or resettlement costs.  

(i) Calculate the NPV of this Smaller Dams Project using the discount rate of 4.6%. You already have all the variables set up (for the Large Dam project) so do not create new cells but work from the original cells. Conduct your analysis for the Smaller Dams Project on a new table beneath that for the Large Dam Project (using some or all the same columns). Label the Small Dams Project clearly (all on the one sheet of your spreadsheet file – this makes marking easier). Include the years 11 – infinity in your Small Dams analysis in exactly the same way as you did for the Large Dam project.

On your Word doc. for B.

(i) give the NPV(Smaller Dams).

(ii) Now you are to compare both projects under different discount rates. Set up a table with a column containing various discount rates, another column for the NPV for the Large Dam Project and a third column for the NPV for the Small Dams Project. Complete the table and use it to draw a graph that shows the changing NPVs plotted against the discount rate, for both projects on the one graph. Make sure your graph is properly labelled and has an appropriate title that contains your name. On your Word doc. for B (ii) if your decision regarding the two different dam projects were to be based solely on the CBAs calculated thus far, give the range of discount rates for which you would choose the Large Dam Project over the Smaller Dams Project, and vice versa.

(iii) For just the Large Dam Project, carry out this sensitivity analysis: Suppose the amount of hydropower generated was overestimated, and instead 3.2 billion kilowatt hours/year were generated and in addition, the price of electricity was $0.06/kilowatt hour and the price of water was $0.005/litre. Make these changes and make a note of the new NPV and B/C, and then return your analysis to its original numbers for handing in.

On your Word doc. for B

(iii), for the Large Dam Project give the NPV and B/C under this sensitivity analysis. In a sentence what would you say about this? Also explain what the B/C is predicting regarding our investment

C. Finally, in your Word document you are to evaluate the two projects, the Large Dam project (originally, before the sensitivity analysis) and the Smaller Dams project individually and then make comparison between the two. Your evaluation should include a discussion on the costs and benefits not quantified in your spreadsheet analyses. In this discussion make recommendations as to how you could incorporate these costs and benefits into your spreadsheet analysis. Conclude this analysis by giving your final recommendations to the World Bank. 600words

In: Finance

In C++: This is the problem: [(1)] A palindrome is a string that reads the same...

In C++:

This is the problem:

[(1)] A palindrome is a string that reads the same forwards as backwards. Using only a fixed number of stacks and queues, the stack and queue ADT functions, and a fixed number of int and char variables, write an algorithm to determine if a string is a palindrome. Assume that the string is read from standard input one character at a time. The algorithm should output true or false as appropriate

[(2)] Let Q be a non-empty queue, and let S be an empty stack. Using only the stack and queue ADT functions and a single element variable X, write an algorithm to reverse the order of the elements in Q.

[(3)] Use singly linked lists to implement integers of unlimited size. Each node of the list should store one digit of the integer. You should implement addition, subtraction, multiplication, and exponentiation operations. Limit exponents to be positive integers. What is the asymptotic running time for each of your operations, expressed in terms of the number of digits for the two operands of each function?

[(4)] Implement a program that can input an expression in postfix notation and output its value.

I need number 3 completed.

This is the code:

#include <iostream>

#include <string.h>

#include <stack>

#include <queue>

#include <string>

#include <bits/stdc++.h>

using namespace std;

// Stack type

struct Stack

{

int top;

unsigned capacity;

int* array;

};

// Stack Operations

struct Stack* createStack( unsigned capacity )

{

struct Stack* stack = (struct Stack*) malloc(sizeof(struct Stack));

if (!stack) return NULL;

stack->top = -1;

stack->capacity = capacity;

stack->array = (int*) malloc(stack->capacity * sizeof(int));

if (!stack->array) return NULL;

return stack;

}

int isEmpty(struct Stack* stack)

{

return stack->top == -1 ;

}

char peek(struct Stack* stack)

{

return stack->array[stack->top];

}

char pop(struct Stack* stack)

{

if (!isEmpty(stack))

return stack->array[stack->top--] ;

return '$';

}

void push(struct Stack* stack, char op)

{

stack->array[++stack->top] = op;

}

// The main function that returns value of a given postfix expression

int evaluatePostfix(char* exp)

{

// Create a stack of capacity equal to expression size

struct Stack* stack = createStack(strlen(exp));

int i;

// See if stack was created successfully

if (!stack) return -1;

// Scan all characters one by one

for (i = 0; exp[i]; ++i)

{

// If the scanned character is an operand (number here),

// push it to the stack.

if (isdigit(exp[i]))

push(stack, exp[i] - '0');

// If the scanned character is an operator, pop two

// elements from stack apply the operator

else

{

int val1 = pop(stack);

int val2 = pop(stack);

switch (exp[i])

{

case '+': push(stack, val2 + val1); break;

case '-': push(stack, val2 - val1); break;

case '*': push(stack, val2 * val1); break;

case '/': push(stack, val2/val1); break;

}

}

}

return pop(stack);

}

// Utility function to print the queue

void Print(queue<int>& Q)

{

while (!Q.empty()) {

cout << Q.front() << " ";

Q.pop();

}

}

// Function to reverse the queue

void reverseQueue(queue<int>& Q)

{

stack<int> S;

while (!Q.empty()) {

S.push(Q.front());

Q.pop();

}

while (!S.empty()) {

Q.push(S.top());

S.pop();

}

}

void convertTosmall(string& str)

{

int length = str.length();

for (int i = 0; i < length; i++) {

int c = str[i];

if (isupper(c))

str[i] = tolower(c);

}

return;

}

string removeSpaces(string& word) {

string newWord;

for (int i = 0; i < word.length(); i++) {

if (word[i] != ' ') {

newWord += word[i];

}

}

return newWord;

}

int main()

{

while( true )

{

std::string letters;

std::cout << "Please enter a string (Enter - exit): ";

std::getline( std::cin, letters );

convertTosmall(letters);

letters = removeSpaces(letters);

if ( letters.empty() ) break;

std::stack<char>

s( std::stack<char>::container_type( letters.begin(), letters.end() ) );

std::queue<char>

q( std::queue<char>::container_type( letters.begin(), letters.end() ) );

while ( !s.empty() && s.top() == q.front() )

{

s.pop();

q.pop();

}

if ( s.empty() ) std::cout << "The string is a palindrome" << std::endl;

else std::cout << "The string is not a palindrome" << std::endl;

}

queue<int> Q;

Q.push(10);

Q.push(20);

Q.push(30);

Q.push(40);

Q.push(50);

Q.push(60);

Q.push(70);

Q.push(80);

Q.push(90);

Q.push(100);

reverseQueue(Q);

Print(Q);

char exp[] = "231*+9-";

cout<<"\npostfix evaluation: "<< evaluatePostfix(exp);

cout<<"\n"<<endl;

return 0;

}

In: Computer Science