Professor Al Gorithum has the following grading policy:
Al likes to round each student's grade according to these rules:
For example, grade=84 will be rounded to 85 but grade=29 will not be rounded because the rounding would result in a number that is less than 40.
Given the initial grade value for each of Al's students, write code to automate the rounding process.
Detailed Description
What to submit:
In: Computer Science
Develop a marketing plan for an existing or a fictitious company that plans to launch kefir chocolate.
This marketing plan should include these parts specifically; product, target market, price, place, promotion and SWOT Analysis of the product.
The parts in the below should be explained deeply.
Product: What is your product? Why do you think this idea would work in Turkey? Provide a 1-sentence mission statement as the producer/marketer of this offering. What is your competitive advantage with 1 sentence?
Target Market: Who is your target market, give a detailed account of your target market; who are they? What bases of segmentation are you using and why? State at least 2 different segmentation criteria that you prefer to use. Refer to the segmentation strategies
Price: What is your pricing strategy? Why are you using this pricing strategy?
Place: Where will you sell your product and why? Will you use direct or indirect channels?
Promotion: Hypothetically, create a marketing communications campaign for this product.What promotion (communication) mix elements will you use and why? Where (what media) will you use to communicate your product? Explain why you’ve chosen this particular media type.
SWOT Analysis:Make a SWOT analysis for your product/service. Write 3 strengths, 3 weaknesses, 2 opportunities, and 2 threats.If you only write one word and do not provide any explanation next to it, I won’t be able to understand what you think.
Please write clearly
In: Operations Management
Question 4
ROST Corporation is a manufacturer of a variety of kitchen
utensils. In order to improve the quality of existing products, the
production manager of the company proposes to replace a machine
used in the molding process. As a financial manager of the company,
you are responsible for assessing the feasibility of this project.
After a preliminary study, it is estimated that the new project
will generate additional sales revenue of $310,200 in each of the
next four years. It is known that the company faces a marginal tax
of 26% and wants a 17% required rate of return. In addition, the
company employs the straight-line method to compute its
depreciation. To finance the project, the company would have to
borrow $1,200,000 at 10% interest from its bank. Other findings of
the study are presented as follows:
Old Machine New Machine Initial purchase price $1,120,000 $960,000
Tax life 20 years 4 years Age 16 years 0 years Expected salvage
value $0 $0 Current market value $224,000 N.A. Annual cash expense
$360,000 $380,000 (a)
(b)
(c)
Determine the annual after-tax cash flows associated with this
project.
Determine whether you would accept or reject the project if the net
present value rule is used.
Without doing any calculation, how would you reply to your boss if
he told you to evaluate this project by the internal rate of return
rule rather than the net present value rule? (word limit: 150
words)
In: Finance
Introduction to the Problem
Design an Amazon Virtual Private Cloud (VPC):
"Scenario: You have a small business with a website that is hosted on an Amazon Elastic Compute Cloud (Amazon EC2) instance. You have customer data that is stored on a backend database that you want to keep private. You want to use Amazon VPC to set up a VPC that meets the following requirements:
• Your web server and database server must be in separate subnets.
• The first address of your network must be 10.0.0.0. Each subnet must have 256 total IPv4 addresses.
• Your customers must always be able to access your web server.
• Your database server must be able to access the internet to make patch updates.
• Your architecture must be highly available and use at least one custom firewall layer."
For the Program Level Assessment, short summary report using the following criteria:
Define the Problem
re-state the problem you are asked to solve and detail all relevant findings and recommendations.
Identify Strategies
Explain how your VPC design meets requirements in scenario.
Propose Solutions
How you can improve or change your design using additional services learned in class.
Evaluate Outcomes
Briefly explain how your design and propose solutions meets at least two of the pillars of AWS Well-Architected Framework.
Submit a Word Document
Using the section headers above, provide responses for each and summary report.
In: Computer Science
Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.
Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card
In: Computer Science
Instructions:
In your first reflective learning assignment on Personal Leadership Development, you will answer the following 2 questions.
Always use the title that you have been given. Do stick to the word count.
Use the title: Reflecting on My Personal Leadership Values and Vision
EXAMPLE:
Here’s a personal leadership vision built on the inputs from our sample person. From other assessments this person has completed, we know she is a “yellow” on the CVF. She prefers to act in the mentor and facilitator roles. Her Rokeach values results indicate that her top three terminal values are freedom, self-respect and, wisdom. Her top three instrumental values are ambitious, intellectual and responsible. Below is the first draft of her leadership vision:
“I am authentically engaged. Integrity and learning matter - always. I want to grow and grow others. I will make a difference.”
In: Operations Management
Review Question 9 in Chapter 12 of the textbook.
The Company you work for is in the process of determining whether to have an information security audit (ISA) performed. Even though the Company is not (yet) required to have an ISA for compliance purposes with laws, rules, and/or regulations, they are very aware of the benefits such audit can provide. However, they also know how pricy these specialized audits are. Would you be inclined to advise your Company go through such type of audit, yes or no? Explain your position.
Response parameters:
The initial post should be between 250 and 350 words
The initial post must demonstrate effective communication skills and analysis that is thoughtful and objective
You must support your responses by searching beyond the chapter (i.e., IT literature and/or any other valid external source). Include examples, as appropriate, to evidence your case point
Use APA formatting (including working web links) to cite all of your sources
Plagiarism
You are expected to write primarily in your own voice, using paraphrase, summary, and synthesis techniques when integrating information from class and outside sources. Use an author’s exact words only when the language is especially vivid, unique, or needed for technical accuracy. Failure to do so may result in charges of Academic Dishonesty.
Overusing an author’s exact words, such as including block quotations to meet word counts, may lead your readers to conclude that you lack appropriate comprehension of the subject matter or that you are neither an original thinker nor a skillful writer.
In: Operations Management
double_vowels
|
Given a string, return a copy of the string with all of the vowels doubled. Consider the five letters 'aeiou' as vowels.
middle_hash
|
In: Computer Science
Now we want to display which error was thrown in our voting program.
Add the appropriate code to the try/except statement so the
exception is displayed.
Run the program and, when prompted, enter the word 'old' so your
output matches the output under Desired Output.
# Set the variable
age = input("What is your age?")
# Insert a try/except statement
# here when you convert the input
# to a number using int()
try:
age = int(age)
if age >= 18:
print("Go vote!")
except:
print("Please enter a valid age!")
Output :
invalid literal for int() with base 10: 'old'
Please enter a valid age!
We're still working with pie. Now we want to use the finally clause to display a message no matter what happens with our code.
Add the appropriate code to the try/except statement so that the
message "Enjoy your pie!" is displayed regardless of the error
caught (or not caught).
Run the program and, when prompted, enter the number 3 so your
output matches the output under Desired Output.
# Get Input
pieces = input("How many pieces of pie do you want? ")
# Attempt to convert to integer
try:
percentage = 1/int(pieces)
except ValueError:
print("You need to enter a number!")
except:
print("Something went wrong!")
else:
print("You get", format(percentage, ".2%"), "of the pie!")
Output:
Enjoy your pie!
You get 33.33% of the pie!
both problems are python
In: Computer Science
A foundation of operations in both manufacturing and service environments is vital in order to drive inefficiencies and examine ways to achieve greater supply chain integration with suppliers and customers. In this assignment, you will compare one manufacturing and one service driven company through creating visual representations of how the product or service is created and delivered, accompanied by a written summary. Select two companies of interest, one manufacturing company (e.g., a shoe company) and one service company (e.g., a technical support company). Provide a brief summary of each company including compelling evidence illustrating the company is either a manufacturing or a service company. Avoid selecting a company that could be arguably both. Manufacturing Research the manufacturing process for the selected company. Create a manufacturing process map. Explain the elements of infrastructure for the manufacturing company using flow charts and be sure to provide a key. Cite three to five sources to support your process map. Service Research the service process for the selected company. Create a service process map. Explain the elements of infrastructure for the service company using flow charts and be sure to provide a key. Cite three to five sources to support your process map. Summary Provide a 750-word summary describing the differences and similarities between manufacturing and service environments. For each company, identify if customer-introduced variability is available. If not, how would you implement flexibility for customer-introduced variability?
Please no Elkay examples and can you make the flow chart bigger.
In: Operations Management