In lab you are going to be using drosophila flies with sepia mutations (SE, se) causing brown eyes found on chromosome 3 and apterous mutation (AP, ap) on chromosome 2 causing loss of wings. These are recessive mutations. Red eye is the wild-type phenotype. Assuming you have a female heterozygous at both loci. Draw the chromosomes as they go through meiosis (Make sure you show somatic cell, prophase I, metaphase I, metaphase II, gametes.) Draw all possible gametes. What percentage of each phenotype do you expect? What are all the possible phenotypes and genotypes would you expect? This female mates with a male that is also heterozygous at both loci and they have 1000 progeny.
1. What are all possible phenotypes you could recover?
A. Red eyes and wings OR Red eyes and no wings
B. Red eyes and wings OR Brown eyes and no wings
C. Red eyes and wings OR Brown eyes and wings
D. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings
E. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings OR Brown eyes AND no wings
2. What combination of phenotypes is displayed the most?
A. Red eyes and wings
B. Red eyes and no wings
C. Brown eyes and wings
D. Brown eyes and no wings
3. Out of 1000 progeny how many animals would have the most common combination of phenotypes?
Numeric Answer:
4. What combination of phenotypes is displayed the least?
A. Red eyes and wings
B. Red eyes and no wings
C. Brown eyes and wings
D. Brown eyes and no wings
5. Out of 1000 progeny how many animals would have the least common combination of phenotypes?
Numeric Answer:
6. What is the least probable genotype?
A. SE/se; AP/ap
B. se/se; ap/ap
C. SE/SE; AP/AP
D. SE/se; AP/AP
E. SE/se; ap/ap
7. What is the second least probable genotype?
A. SE/se; AP/ap
B. se/se; ap/ap
C. SE/SE; AP/AP
D. SE/se; AP/AP
E. SE/se; ap/ap
8. What percent of progeny will have the most common genotype?
A. 6.25
B. 12.5
C. 18.75
D. 25
E. None of the Above
9. You find a Red eye fly with wings. What is the probability this fly is homozygous SE/SE?
Word Answer:
10. You find a Red eye fly with wings. What animal could you cross this animal to, in order determine if its homozygous or heterozygous at the SE locus.
A. A Red eyed fly with wings
B. A Red eye fly with or without wings
C. A heterozygous Red eye fly with or without wings
D. A homozygous Red eye fly with or without wings
E. A brown eye fly with or without wings
11. What is the probability that this fly in male?
Word Answer:
In: Biology
Rules for this Assignment:
There are 2 classes required for this project:
Separation of code will be paramount in order to produce a proper and legible file. This will require that you analyse the problem and separate it into multiple tasks. Each task should then be represented by its own function.
The methods you define in the EncryptionProcedures class should be static.
Files to submit
In a properly developed project, all your code should be located in 2 java files, Encryption.java and EncryptionProcedures.java. You will need to submit those 2 files.
Additionally, a WORD document should also be submitted. In this document, you will explain the validity or invalidity of defining the methods in the EncryptionProcedures class as static. (minimum explanation, 5 lines)
Project Description
The goal of the project is to be able to retrieve an input from the console, encrypt it according to specifications that will be described below, and display the result.
The user input can be a single word, or an entire sentence (on a single line).
Specifications
private static final String[] arrPeriodicTableValues = {"h", "he", "li", "be", "b", "c", "n", "o", "f", "ne", "na", "mg", "al", "si", "p", "s", "cl", "ar", "k", "ca", "sc", "ti", "v", "cr", "mn", "fe", "co", "ni", "cu", "zn", "ga", "ge", "as", "se", "br", "kr", "rb", "sr", "y", "zr", "nb", "mo", "tc", "ru", "rh", "pd", "ag", "cd", "in", "sn", "sb", "te", "i", "xe", "cs", "ba", "la", "ce", "pr", "nd", "pm", "sm", "eu", "gd", "tb", "dy", "ho", "er", "tm", "yb", "lu", "hf", "ta", "w", "re", "os", "ir", "pt", "au", "hg", "tl", "pb", "bi", "po", "at", "rn", "fr", "ra", "ac", "th", "pa", "u", "np", "pu", "am", "cm", "bk", "cf", "es", "fm", "md", "no", "lr", "rf", "db", "sg", "bh", "hs", "mt", "ds", "rg", "cn", "nh", "fl", "mc", "lv", "ts", "og"};
The preceding code represents all the elements of the periodic table in the form of an Array. The index of each element can be used to reference its atomic number. This instruction can be included in your code for use in this assignment.
The encryption procedure will be a specific 1 and follow a strict set of rules in order to be properly implemented. The primary method will be called periodicEncrypt.
Here is the overall description of the procedure to follow in order to accomplish a proper encryption in this case:
In: Computer Science
Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality, integrity, or availability, or some combination of the three. In addition, for each item, write a two- or three-sentence paragraph explaining why your answer is correct.
Alex disables Barbara's router by logging in remotely with the manufacturer's default password.
Mallory builds a WiFi jammer using plans she found on the Internet and jams wireless signals over a large part of her apartment building.
Charlene uses a key logger to capture Darla's banking password.
Eve rewrites the magetic stripe on a gift card to change the amount from $10 to $100.
(Adapted from an exercise in Bishop, Matt, Introduction to Computer Security.)
Part 2: Distinguish among vulnerability, exploit, threat, risk, and control mechanism (called "countermeasure" in chapter one of the text) in five brief paragraphs. If you do any research outside the textbook, which you are encouraged to do, be sure to cite your sources. You can see how to do that in An Example of Proper Writing in the "Required Reading" section.
Part 3: Using the tool at http://www.fileformat.info/tool/hash.htm, compute the SHA-256 checksum of the MS-Word file that is your work on this assignment so far, or some similar file if you don't have that one available. Copy the calculated cryptographic hash into Windows Notepad or word processing document to save it temporarily. Now change one character from a capital to a lowercase letter or vice-versa in the original document, re-save, and recompute the the cryptographic hash. Paste the old and new cryptographic hashes into your homework document. Be sure to identify which one is before and which is after.
Using the information from the textbook, explain at least two uses for a cryptographic hash, and explain how the experiment you just performed confirms those uses.
Do some research and explain in a paragraph or so what a "hash collision" is. Be sure to cite your research.
Part 4: Explain in a couple of paragraphs how public key encryption can be used to implement a digital signature. Be sure you are very clear on when a private key is used and when a public key is used.
Part 5: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. Explain why we do we not encrypt the message itself. You can answer this question in one sentence.
Part 6: For each of the following scenarios below, tell what type of encryption is most appropriate and in a sentence or two explain the reasoning for your choice.
Alice wants to send a confidential message to Bill, whom she has never met and who lives in a distant country.
Charlie wants to be sure that no one but he can see the financial and medical records he has stored on his computer.
David needs a way to check that large computer files stored on corporate servers have not been modified.
Eddard uses a "cloud" backup service; he wants to be sure the operators of the service cannot read his files.
Frank needs to send a message to George. The message need not be confidential, but George must be assured that it actually came from Frank.
In: Computer Science
(1 bookmark)
One of the purposes for studying organizational structure is to determine what the authority relationships are, what the tasks are, and who is responsible for carrying out those tasks. The following story illustrates what happens when the delegation of responsibility is not given to the person in charge of a group of subordinates.
Billy Wagner was a born salesman. He had worked for several companies over the years as a successful salesman. Several times he had been named salesman of the year.
Billy foresaw that metal buildings were a new frontier, and he began to sell themâmetal buildings for farms, small businesses, schools, and churches. Billy covered all of Iowa, and he was quite successful in selling the metal buildings. Business was booming so much in Billyâs territory that the metal-building manufacturer and the construction crews were having a problem keeping up with his sales.
To add to the problem, the original manager of the firm (the woman who had hired Billy) resigned and took a job at an airport. Her replacement was full of vim, vigor, and vitality and was determined to get the company rolling again, even though there were some logistical problems that caused the firm to fall further and further behind schedule. After talking to many people (but not Billy) in the firm about the lag in schedule, the new manager finally arrived at a solution. He decided to talk to Billy.
âBilly,â the new manager said confidently, âI know how we can keep up with the schedules. We just need to place a little responsibility in some hands that are strong enough and mature enough to handle it. My investigations have led me to conclude that you can handle this assignment. Now, hereâs the plan. Once you have sold a metal building and the construction contract is signed, you are responsible for seeing that the building is erected by the completion date specified in the contract. Understand?â
Billy Wagner thought a moment. He realized this was the kind of challenge that he had always wantedâsupreme authority over metal-building delivery. To make sure he understood the new manager, Billy wanted to check one minor item.
âI take it that this means that Iâm in charge of the construction crews and can order extra workers and assign overtime as needed, right? And those crews and their straw bosses will know that my word is law, right?â
âHold on,â the manager choked, âYou canât be in charge of the crews.â
Billy wasnât through with this argument. âBoss, if I canât be in charge of the crews and get them moving as I see best, then thereâs no way you can hold me responsible for having those buildings up in time.â
These were not words that the new manager wanted to hear. âNow, Billy, you just have to learn how to get along with those crew chiefs, to work with them, and to be cooperative. You just donât get the point.â
Actually, it was the manager who was not getting the point.
Discussion Questions:
In: Operations Management
In: Accounting
JAVA
use the example and write program
Choose five international source currencies to monitor. Each currency is referenced with a three letter ISO 4217 currency code. For example, the code for the U.S. Dollar currency is USD. Search online for these abbreviations with a search string such as "ISO 4217 Currency Codes." Place these currency codes in a text file.
The following URL is a link to a CSV file that contains the
exchange rate for a given source and target currency. For example,
if the source currency is EUR and the target currency is USD, the
URL is
http://download.finance.yahoo.com/d/quotes.csv?s=EURUSD=X&f=sl1d1t1ba&e=.csv
Read the five source currencies in the text file that you created
in Step 1, dynamically create URLs that are passed to Java Scanner
objects to obtain the exchange rates (to USD) for five source
currencies from Part 1.
Plot the five exchange rates that you found in Step 2 in a JFreeChart bar chart.
BarChart Example the jfreechart example file.
jfreechart Examples, methods.txt File
=======================================================
// BarChart Example
// Source code file LineChart.java
// Create a bar chart using JFreeChart library.
//
// JAR files jcommon-1.0.23.jar and jfreechart-1.0.19.jar
// must be added to project.
import java.io.*;
import org.jfree.data.category.DefaultCategoryDataset;
import org.jfree.chart.ChartFactory;
import org.jfree.chart.plot.PlotOrientation;
import org.jfree.chart.JFreeChart;
import org.jfree.chart.ChartUtilities;
public class BarChart {
public static void main(String[] args) {
try {
// Define data for line chart.
DefaultCategoryDataset barChartDataset =
new DefaultCategoryDataset();
barChartDataset.addValue(1435, "total", "East");
barChartDataset.addValue(978, "total", "North");
barChartDataset.addValue(775, "total",
"South");
barChartDataset.addValue(1659, "total",
"West");
// Define JFreeChart object that creates line chart.
JFreeChart barChartObject = ChartFactory.createBarChart(
"Sales ($1000)", "Region", "Sales", barChartDataset,
PlotOrientation.VERTICAL,
false, // Include legend.
false, // Include tooltips.
false); // Include
URLs.
// Write line chart to a
file.
int imageWidth = 640;
int imageHeight =
480;
File barChart = new
File("sales.png");
ChartUtilities.saveChartAsPNG(
barChart, barChartObject, imageWidth, imageHeight);
}
catch (Exception
i)
{
System.out.println(i);
}
}
}
=======================================================
// LineChart Example
// Source code file LineChart.java
// Create a line chart using JFreeChart library.
//
// JAR files jcommon-1.0.23.jar and jfreechart-1.0.19.jar
// must be added to project.
import java.io.*;
import org.jfree.data.category.DefaultCategoryDataset;
import org.jfree.chart.ChartFactory;
import org.jfree.chart.plot.PlotOrientation;
import org.jfree.chart.JFreeChart;
import org.jfree.chart.ChartUtilities;
public class LineChart {
public static void main(String[] args) {
try {
// Define data for line chart.
DefaultCategoryDataset lineChartDataset =
new DefaultCategoryDataset();
lineChartDataset.addValue(15, "schools", "1970");
lineChartDataset.addValue(30, "schools", "1980");
lineChartDataset.addValue(60, "schools", "1990");
lineChartDataset.addValue(120, "schools", "2000");
lineChartDataset.addValue(240, "schools",
"2010");
// Define JFreeChart object that creates line chart.
JFreeChart lineChartObject = ChartFactory.createLineChart(
"Schools Vs Years", "Year", "Schools Count",
lineChartDataset,
PlotOrientation.VERTICAL,
true, // Include legend.
true, // Include tooltips.
false); // Don't include
URLs.
// Write line chart to a
file.
int imageWidth = 640;
int imageHeight =
480;
File lineChart = new
File("line-chart.png");
ChartUtilities.saveChartAsPNG(
lineChart, lineChartObject, imageWidth, imageHeight);
}
catch (Exception
i)
{
System.out.println(i);
}
}
}
input-output Examples, input-output.txt File
=======================================================
// TestAmtToWords Example
// Source code file TestAmtToWords.java
// Input a double amount < 100.00 and convert it to
// words suitable for using as the amount on a check.
public class TestAmtToWords {
public static void main(String[] args) {
System.out.println(amtToWords(63.45));
System.out.println(amtToWords(18.06));
System.out.println(amtToWords(0.97));
}
public static String amtToWords(double amt) {
// Extract pieces of input.
int dollars = (int) amt;
int tens = dollars / 10;
int ones = dollars % 10;
int cents = (int) Math.round(100 * (amt - dollars));
// Definitions of words for digits.
String[ ] onesWords = {"zero", "one", "two", "three", "four",
"five", "six", "seven", "eight", "nine"};
String[ ] teensWords = {"", "eleven", "twelve", "thirteen",
"fourteen", "fifteen", "sixteen", "seventeen",
"eighteen", "nineteen"};
String[ ] tensWords = {"", "ten", "twenty", "thirty", "forty",
"fifty", "sixty", "seventy", "eighty", "ninety"};
// Declare output variable.
String output = "";
if (dollars <= 9) {
output = onesWords[ones];
}
else if (dollars <= 19) {
output = teensWords[ones];
}
else if (dollars <= 99) {
output = tensWords[tens] + " " + onesWords[ones];
}
else {
output = "Out of range";
}
return output + " and " + cents + "/100";
}
}
=======================================================
// TestScanner Example
// Source code file TestScanner.java
// Test a Scanner object that reads from a string.
// Also include code that uses the String method
// split to do the same thing.
import java.util.Scanner;
public class TestScanner {
public static void main(String[] args) {
Scanner scnr = new Scanner("This is a test.");
scnr.useDelimiter(" ");
while (scnr.hasNext( )) {
String word = scnr.next( );
System.out.println(word);
}
scnr.close( );
System.out.println( );
String s = "This is a test.";
String[ ] fields = s.split(" ");
for(String word : fields) {
System.out.println(word);
}
}
}
=======================================================
// ReadFromWeb Example
// Source code file ReadFromWeb.java
// Read raw HTML lines from input file and
// print them to stdout.
import java.io.IOException;
import java.net.MalformedURLException;
import java.net.URL;
import java.util.Scanner;
public class ReadFromWeb {
public static void main(String[] args)
throws MalformedURLException, IOException {
Scanner in = new Scanner((new URL(
"http://facweb.cdm.depaul.edu/sjost/it313/test.htm")).
openStream( ));
while (in.hasNextLine( )) {
String line = in.nextLine( );
System.out.println(line);
}
in.close( );
}
}
=======================================================
// WriteGreetings Example
// Source code file WriteGreetings.java
// Read names of persons from input file, then write
// greetings to each of them, each in their own
// output file.
import java.io.File;
import java.io.FileNotFoundException;
import java.io.PrintWriter;
import java.util.Scanner;
public class WriteGreetings {
public static void main(String[] args) throws FileNotFoundException {
// Declare PrintWriter reference variable.
PrintWriter pw;
// Write greeting to Larry in greeting.txt output file.
pw = new PrintWriter("greeting.txt");
pw.println("Hello, Larry, how are you?");
pw.close( );
// Write greetings to persons, each in their own
// output file.
Scanner in = new Scanner(new File("names.txt"));
while (in.hasNextLine( )) {
String name = in.nextLine( );
String greeting = "Hello " + name + ", how are you?";
String fileName = name + ".txt";
pw = new PrintWriter(fileName);
pw.println(greeting);
pw.close( );
}
in.close( );
}
}
=======================================================
// UseFileChooser Example
// Source code file UseFileChooser
// Open an output file with a FileChooser dialog.
// Read names and write greetings as in the WriteGreetings Example
import java.io.*;
import java.util.Scanner;
import javax.swing.JFileChooser;
public class UseFileChooser {
public static void main(String[] args) throws FileNotFoundException {
// Open file containing names with FileChooser dialog
JFileChooser chooser = new JFileChooser( );
chooser.showOpenDialog(null);
File fileObj = chooser.getSelectedFile( );
// Read names and write greetings, each in their own file.
Scanner in = new Scanner(fileObj);
while (in.hasNextLine( )) {
String name = in.nextLine( );
String greeting = "Hello " + name + ", how are you?";
PrintWriter pw = new PrintWriter(name + ".txt");
pw.println(greeting);
pw.close( );
}
in.close( );
}
}
In: Computer Science
Document your client's potential advertising budget. Explain the budgeting method you recommend using: How much should you recommend that your client spend on advertising and promotions? Here is a list of ways companies set their marketing budgets.
Percentage of sales. Advertising budget is determined by allocating a percentage of last year's sales anticipated sells for next year or a combination of the two the percentage is usually based on an industry average companies experience in arbitrary figure.
Percentage of profit. Percentage is applied to profit either past years or anticipated.
Unit of sale also called the case rate method. A specific dollar amount is set for each box case Barrel or car introduced use primarily in assessing members of horizontal cool Ops or trade associations.
Competitive parity. Also called the self-defense methods allocates dollars according to the amount spent by Major competitors.
Share of market share of voice. Allocates dollars by maintaining a percentage share of total industry advertising comparable to some what ahead of Desired share of Market. Often use for new product introductions.
Objective task. Also referred to as the budget build up method this method has three steps to finding objectives determining strategy and and eliminating cost to execute that strategy.
Empirical research. Companies determine the most efficient level by running experiential test in different markets with different budgets.
Quantitative mathematical models. Computer-based program developed by Major advertisers and agencies rely on input of sophisticated data history and assumptions.
All available funds. Go-for-broke technique generally used by small firms with limited Capital trying to introduce new products or services.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Target Audience
The intended interest group for this crusade is youthful grown-ups,
of drinking age, particularly between the ages of twenty-one and
thirty-seven. This is the age gathering to be centered around in
this battle. The explanation behind this being, this age gather
needs and needs assortment, and this is the thing that Winery can
offer them with their altogether different and extensive variety of
wines. Additionally, to oblige the age, Winery will target ladies
and men, for ladies drink a great deal of wine. They represent
fifty-nine percent of the wine consumers, yet they spend less on
it. While men represent just forty-one percent in any case, men can
be the greater wine purchaser. One part of the intended interest
group is the general population who live around the Gilroy, South
County zone. These are the general population Winery needs to come
in and drink their wine. The purpose behind this is neighborhood
bolster is colossal and informal publicizing and is pivotal for
this promoting effort, and local people spread the news. The
perfect individual for this promoting effort to impact is a male or
female who is between the ages of twenty-one and thirty-seven who
needs to have the most recent assortment of wine and cherishes to
drink neighborhood wine also enthusiasm for a setting for uncommon
event or potentially wedding occasions. Notwithstanding
facilitating occasions, Winery offers a wedding room with full
shower, secured bar, move zone, DJ territory and that's only the
tip of the iceberg. Winery is situated in a magnificent redwood,
manicured scene, that is tenderly slanting slope shrouded in
flourishing Chardonnay vines that fill in as an amazing foundation
for weddings and comparable occasions as it is to best to catch
those extremely uncommon pledges or event and photographs alike.
Feast, move, and celebrate into the night at Winery under white
Chinese lamps and strings of garden lights while the waitstaff and
Winery family guarantee you have the ideal night. Making the ideal
recollections climate, it's facilitating at your home or The
Winery, Gilroy, CA.
To advertise to the target audience, the best way to get them to see the advertising is through mass media. This is the ideal way to reach the target audience since twenty-one to thirty-seven-year old men and women are using their devices very often throughout the day, best way to reach them is through social media sights like Facebook, Twitter, LinkedIn, and Google. According to the Social Media Examiner research has been done which shows the power and importance of social media sights like Facebook and Twitter when advertising for craft wine. The reason for this being it creates a way for consumers to communicated back and forth with the producer of the wine. With this resource consumers can tell the producer, of the wine, what their experience was, and the producer can give the consumers insight about the wine, thus adding to the consumers interest level. Whitehall Lane Winery, said, âtheyâve hit on a social media formula that reaches beyond the tasting room by: 1) partnering with complementary brands, 2) rewarding loyal fans and 3) educating and telling stories vs. sellingâ (Social Media Examiner, 2013). (Social media) is the most cost-effective resource available. Itâs an enjoyable medium that allows a Winery to interact with the core community of craft wine drinkers who are insatiable in their thirst for both craft wine and information. Using social media websites for advertisement, is a perfect way to have insights on what platform to advertise on analyzing the results of the type of advertisement, how many Impression and Conversions the advertisement made as well as Clicks and Comments to Engagements. In addition to social media platform advertising, Fortino will be utilizing Google AdWords a pay per click method.
Another good way of advertising is on local billboards. Advertising will be placed on billboards around the city of Gilroy, and the surrounding communities, all in an effort to get the local audience interested, for they are the most important customers now. This will get the general public into the winery itself and they can experience the wine and Winery feel first hand and have a good experience. This is important for the third step in the advertising plan, for if the local customers have a good experience then they will want to tell people about it and that is how Winery will get word of mouth advertising to work in Winery benefit.
The third part of the advertising plan is word of mouth advertising. By getting people into Winery and making sure they have a good experience, they will talk about the experience to friends, co-workers, and family, and that is how the knowledge of what has to offer gets out past the local community. This is a free and very powerful way of advertising
By word of mouth advertising, billboards, and multi-media advertising a relationship is built with customers, in which Winery gave them something, a great experience, great wine, a great time, and they in return will help Winery out with some free word of mouth adverting. It cost money to get them into the winery and to buy the wine, but after a happy customer base is built, they can do a big part from an advertising standpoint.
In: Operations Management
Analyze the article
Remember to use the analysis tools in your writing ask yourself after reading the article
âso what?â and âwhy is this important?â
***
Article:
Marketing is important to every businessâ survival, whether itâs for the local business up the street or the mega-corporation that spreads across all continents. Unfortunately, for the former, marketing is often put on the back burner, as a small-business owner has so many other things to deal with.
As a small business, you should start by looking at what your direct competitors are doing in the area. Find out how they are attracting customers and, more importantly, what is and isnât working for them. Itâs time to start or revisit your competitor research. âIf youâre opening a location-based business, like a restaurant, that competitor research might involve visiting other venues in-person to judge quality, service, aesthetics and other factors through which you want to differentiate your own business," Score says. This is also a great time to introduce yourself to other local business owners. On the other hand, if you have an ecommerce business, you will be conducting a lot of the research online.
Make sure to document your findings; you can create a chart to show your strengths and weaknesses alongside your competitors. For instance, you might find that you are the only restaurant in the area who isnât offering a loyalty program to attract customers, it is time to jump on that bandwagon.
An important part of marketing today is developing an online presence. You might think your local restaurant has no benefit of being online, as customers are usually local. To the contrary, you will be able to attract new customers in the area and beyond by being present online. Itâs important to remember that one-third of all mobile searches are related to location and 78 percent of local mobile searches result in offline purchases. You want people to find you online when they are looking for a business in the area, whether thatâs on Google, Facebook, LinkedIn or
From your competitor research (see point #1), you already have an idea of how other businesses in the area are presenting themselves online. Now dig a little deeper, asking questions like: Which businesses show up in Googleâs local pack? Which keywords are often targeted? What social media platforms are they using? What type of online content are they sharing? Take inspiration from your competitors and improve upon their efforts in order to stand out.
An important piece of your online presence is online reviews. Reviews are crucial when it comes to ranking in local searches and acquiring new customers. Research shows that 72 percent say that positive reviews make them trust a local business more. Whatâs more, 92 percent of consumers say that they will use a local business if it has at least a 4-star rating.
Having positive reviews to your business name is an incredibly strong tool, so part of your marketing strategy should be directed toward collecting reviews from current clients. Pick one or multiple platforms that you want to direct people to (e.g. Yelp, Google My Business, Tripadvisor, Facebook). It is important to actively ask your customers to leave reviews to these platforms, as people often need a little nudge to share their opinion. You can ask this in-person, through your website or with the help of a mobile app. Prompt customers at the right time, after they have enjoyed their meal or received their order in the mail. Lastly, donât be discouraged by negative or mediocre reviews; these are valuable insights into what you can do it improve your business.
You donât have to do all the marketing yourself; in fact, one way to get the word out about your business is with local press coverage. We are not talking about getting covered by Forbes or The New York Times, but starting with the media outlets in your area who are always looking to cover local news.
Share your story with different media outlets. Many small businesses have heartfelt origin stories, so craft up a narrative that shows who you are and what your businessâ mission is. You want to be able to supplement this great story with amazing visuals. Professional photos will help you get featured in news stories -- you can also repurpose these photos for your social media profiles! Depending on your industry, you can also put yourself in front of reporters by sending out samples of your product. The most important thing is to make a memorable connection with a few writers and journalists to secure your time in the spotlight.
You donât need to do all the marketing yourself, turn your best customers into brand advocates who will market for you. In fact, word-of-mouth is 10 times as effective as traditional forms of marketing and advertising. So how do you generate that word-of-mouth marketing? You need to exceed your customersâ expectations!
The Missouri Business Development Program states: âAll successful small businesses seem to have an edge. They have found a way to distinguish themselves, to rise above the commercial fray, to put the WOW into their business.â In other words, you need to delight your customers and make them say (or think) WOW. Maybe it is sending them a handwritten postcard or giving them a special gift with purchase. Maybe you have a lifelong warranty or know all your customers by name. Think of the most creative way to surprise your customer and they will not only become loyal customers, they will also spread the word for you.
According to eMarketer, 80 percent of SMB retail professionals report that email marketing is the best marketing tactic for driving customer acquisition and retention. Email marketing is a great way to a build lasting relationship with your customers. But in order to get the full benefits of email marketing, you need to build out a substantial email list first.
Start by setting up a lead magnet. âLead magnets are essentially tempting offers that provide consumers something of value in exchange for their contact information,â says Lyfe Marketing. For local businesses, this might include asking for an email address in to sign up for a VIP loyalty program, or signing up for the email list to receive special discounts.
Once you have an email list, you can create an email marketing strategy. Decide what types of emails you would like to send out, ranging from newsletters and industry-related news to promotions and recommended purchases. The types of emails will depend on the goal you want to achieve, such as improving brand recognition, increasing customer retention or boosting sales.
An app is not just a mobile application, an app is a complete mobile marketing solution. It is a powerful marketing tool if used the right way. You can use an app to draw new customers in by offering mobile ordering or a loyalty program. You can re-engage existing customers by sending out messages with promotions and news about your business. You can set up a lead capture form within the app to start building out your email list. In addition, an app can also help you collect reviews, as you are able to prompt customers to share their opinion on social media, produce online reviews or send a referral.
If you want to get even more creative, you can pull out all the stops with an app launch party. This will, in turn, trigger word-of-mouth and draw more people to your business.
All the above marketing strategies can help small businesses gain new customers and increase repeat business. Many of them also overlap and work together in order to set your business apart from the crowd: adding a âWOW factorâ to your business can trigger positive reviews and, in turn, strengthen your online presence. A new app can help you build an email list, as well as get you local press coverage and so on. These are straightforward and attainable ways to boost your small business marketing.
In: Operations Management
Part A: Simple array algorithms
public class Numbers
{
/**
Computes the number of even and odd values in a given array
@param values an array of integer values
@return an array of length 2 whose 0 entry contains the count
of even elements and whose 1 entry contains the count of odd
values
*/
public static int[] evenOdds(int[] values)
{
// your work here
}
}
Code tester
public class NumbersTester
{
public static void main(String[] args)
{
int[] a = { 1, 2, 3 };
int[] r = Numbers.evenOdds(a);
System.out.println(r[0] + " " + r[1]);
System.out.println("Expected: 1 2");
a[1] = 5;
r = Numbers.evenOdds(a);
System.out.println(r[0] + " " + r[1]);
System.out.println("Expected: 0 3");
a = new int[0];
r = Numbers.evenOdds(a);
System.out.println(r[0] + " " + r[1]);
System.out.println("Expected: 0 0");
}
}
Part B: Removing duplicates
Step1
A common typo is to accidentally duplicate a word, which can be be
rather embarrassing.
Your task is to design and implement a program that removes adjacent duplicates. This class reads a file and puts all words into an ArrayList<String> called words. Your task is to complete the method removeAdjacentDuplicates to remove all adjacent duplicates in words. Develop a plan and write pseudocode for this task. Questions to think about. Scribe: How do you plan to find duplicates? Scribe: What will you do when you find them? Pay special attention to what happens at the beginning or end of the array list. Show your lab instructor your pseudocode before doing the next step.
Step 2
Implement your solution. To test, download and unzip this zip file.
Copy each file into the same directory that
contains your BlueJ project. Do not copy the folder.
You must unzip the zip file. Don't simply move the zip into your BlueJ directory.
Make a Text object on the BlueJ workbench. Right-click and call pick. Pick the file typo.txt. Right-click and call removeAdjacentDuplicates (i.e. your method). Right-click and call explore. . Scribe: Is the duplicate âbeâ removed?
Step 3
Run this tester. Scribe: Did you pass all tests? If not, what did
you do to fix your code?
Driver: In your lab report, paste the correct solution.
Step 4
Now suppose you want to remove all duplicates, whether
adjacent or not. The result will be a list of unique words. For
example, if the array list contains these immortal words
Mary had a little lamb little lamb little lamb Mary had a little lamb whose fleece was white as snow And everywhere that Mary went Mary went Mary went And everywhere that Mary went the lamb was sure to go
you should produce the array list
Mary had a little lamb whose fleece was white as snow And everywhere that went the sure to go
Decide upon an algorithm and write down the pseudocode.
Scribe: Ask yourselves:
Step 5
When you are satisfied that you can implement it, add a method
removeAllDuplicates to the Text class.
Implement the method and test it as described above.
Step 6
Run this tester.
Scribe: Did you pass all tests? If not, what did you do to fix your code
Step 7
Driver: In your lab report, paste the correct solution.
Part C: Swapping
Step 1
Run this program.
The code on lines 20 to 24 is intended to swap neighboring elements. For example,
1 4 9 16 25 36
is supposed to turn into
4 1 16 9 36 25
But as you can see, it doesn't work. Now launch the BlueJ debugger. Put a breakpoint at line 20. Click Step. And then keep clicking Step and observe the program behavior until you can tell why it fails to swap the values.
Tip: To see the contents of the array, double-click on it in the Local Variables pane.
Step 2
Discuss what you learned from observing the program
How you can fix your program so that the swapping actually works? Scribe: What did you decide?
Step 3
Implement your fix and test it.
Driver: Put the fixed code in your lab report.
Part D: More Swapping with Pictures
Step 1
Unzip this file and open the project in BlueJ. Run the program.
Look at the main method in the Lab11D class. Note that a VisualArrayList is exactly like an ArrayList, except it shows you in slow motion what goes on inside.
Step 2
Come up with an algorithm for the following task. We want to swap
the first half and the second half of the array list.
For example, A B C D E F should turn into D E F A B C.
You should assume that the array list has an even number of elements (not necessarily 6).
One solution is to keep removing the element at index 0 and adding it to the back.
A B C D E F B C D E F A C D E F A B D E F A B C
Write pseudocode for this algorithm.
Ask yourselves:
Step 5
Implement your pseudocode and run it.
Driver: Paste the main method into your lab report. Watch how much faster it runs. (This should be pretty obvious since the movement of the array elements takes time.)
Add four more letters and run the program again to double-check that it works with any even number of letters.
Step 3
Implement your pseudocode and run it.
Driver: Paste the main method into your lab report.
Step 4
When you run the code, you will find that there is a lot of
movement in the array. Each call to remove(0) causes n - 1
elements to move, where n is the length of the array. If
n is 100, then you move 99 elements 50 times, (almost 5000
move operations). That's an inefficient way of swapping the first
and second halves.
Come up with a better way in which you swap the elements directly. Hint: How do you swap elements at index1 and index2?
A B C D E F D B C A E F D E C A B F D E F A B C
Write pseudocode for this algorithm.
Ask yourselves (Scribe: record the answers):
In: Computer Science
Which of the following is not a characteristic of the Porifera?
|
channel like openings throughout the body |
||
|
asymmetry |
||
|
vase shaped body |
||
|
organs |
Which statement best explains how adult lancelets differ from adult tunicates?
|
Adult lancelets are parasitic and adult tunicates are not. |
||
|
Adult tunicates swim and adult lancelets do not. |
||
|
Adult tunicates are parasitic and adult lancelets are not. |
||
|
Adult lancelets swim and adult tunicates do not. |
Kathy works at a zoo and cares for amphibians. What is a unique feature of amphibians in comparison to reptiles that would impact upon amphibian care?
|
Amphibians lay hard shelled eggs |
||
|
Amphibians have tails |
||
|
Amphibians undergo metamorphosis |
||
|
Amphibians have scaly skin |
The word chondri in the term Chondrichthyes means the following.
|
bone |
||
|
soft |
||
|
cartilage |
||
|
flexible |
Most biologists agree that animals arose from the following organism
|
a flagellated protist. |
||
|
a ciliated protist. |
||
|
a yeast. |
||
|
fungi. |
Which of the following statements represents the difference between roundworms and flatworms.
|
Roundworms have no nervous system but flatworms do |
||
|
Roundworms are pseudocoelomates but flatworms are acoelomates |
||
|
Flatworms have no nervous system but roundworms do |
||
|
Flatworms have a coelomic cavity but roundworms do not |
The following animal has a body cavity lined completely with tissue:
|
nematode |
||
|
mollusk |
||
|
turbellarian |
||
|
cestode |
Which term explains a lined body cavity derived from mesodermal embryonic tissue?
|
pseudocoelom |
||
|
coelom |
||
|
acoelom |
Which term explains a respiratory tube that conducts air to the tissues in some arthropods, such as insects?
|
pharynx |
||
|
trachea |
||
|
tubules |
||
|
spiracle |
In: Biology