Questions
1. You have just finished a 25-page paper that you have written using Emacs.The file containing...

1. You have just finished a 25-page paper that you have written using Emacs.The file containing the paper is called /assignments/data_sources.After your instructor has briefly looked at the paper, she recommends that you change all instances of the ref- erence “data is” to “data are” before you submit it.Which of the following com- mands can you use to locate these references in the file for a quick assessment of how much you have to change?

a. find - i 'data is' /assignments/data_sources

b. test /assignments/data_sources "data is"

c. grep "data is" /assignments/data_sources

d. scan -t data is /assignments/data_sources

2. You are interested in determining the number of words in your /assignments/ data_sources file mentioned in Question 1.Which of the following commands should you use?

a. wc -w /assignments/data_sources

b. wc -m /assignments/data_sources

c. counter /assignments/data_sources

d. counter -c /assignments/data_sources

3. Which of the following are examples of manipulation and transformation commands? (Choose all that apply.)

a. sed

b. pr

c. join

d. Paste

4. Which of the following is true of the pipe operator? (Choose all that apply.)

a. Only one pipe operator can be used on a single command line.

b. It is used to perform division on the results of a numerical command operator.

c. It is used instead of the colon (:) for entering multiple commands

d. It redirects the output of one command to the input of another command.

5. Because the data was formatted the same in two inventory files, you decided to com- bine their contents into one file. Now you want to determine if there are duplicate entries on consecutive lines in the new file.Which of the following commands enables you to find the duplicate entries?

a. dup

b. pr

c. uniq

d. Cat

6. Your friend is using the command comm entryfile, but is getting an error message. What is the problem? (Choose all that apply.)

a. entryfile contains only numbers, but the comm command must be used on a file with text.

b. It is necessary to use either the -m or -t option with the comm command.

c. entryfile is too long, because the comm command can only be used on a file under

100 KB in size.

d. It is necessary to specify two files when you use the comm command.

7. Your boss is trying to import the customers file into her spreadsheet program, but the data goes into the spreadsheet incorrectly.This is because the fields are separated by dashes (-) and the spreadsheet program requires the fields to be separated by colons (:).Which of the following commands can you use to convert the

customers file?

a. replace - : customers

b. tr "-" ":" < customers

c. sed %- %: > customers

d. cat -r -/: customers

8. How can you link multiple files to manipulate the data in those files?

a. with a linker

b. with a project field

c. with a common or key field

d. with an operator entry

9. While in the Bash shell, you have written a simple script file and now want to execute the script.Which of the following commands enables you to run the script?

a. sh

b. go

c. ex

d. !!

10. You are using the grep command, but it is only searching through files in your imme- diate home directory.What option enables you to search through subdirectories below your home directory?

a. -s

b. --sub

c. -c

d. -r

11. Your software has a bug in that it enables you to create a vendors file in which there are duplicate entries of vendors.Which of the following methods enables you to remove the duplicate vendors in this text file?

a. Sortthefileandthenusethecommcommandtoremovetheduplicates,inputtingthe result into the same file.

b. Sort the file in reverse order and then use the dump command to remove the duplicates.

c. Sort the file and then use the uniq command to remove the duplicates, inputting the result in a new file.

d. Reverse sort the file, use the join command, and output the results back into the vendors file.

12. Each time you list the files in your home directory, the output scrolls by so fast you can’t read it.Which of the following enables you to view the output one screen at a time?

a. cat -pause

b. ls -l | more

c. window ls -a

d. dir < display

13. You are creating a file to send over the Internet via a satellite connection that only allows you to send files under 250 KB.Which of the following commands enables you to determine the number of bytes in the file before you try to send it?

a. cat -s

b. tr -b

c. counter -k

d. wc -c

14. In the command sed -f fixit notes > instructions, what is “fixit”?

a. a script file

b. an operator

c. a function

d. a formatting interpreter

15. When you design a record layout, you should do which of the following? (Choose all that apply.)

a. identify each field by data type

b. plan to delimit fields using a dash

c. identify each field by name

d. store only fields relevant to the record’s purpose

16. What sed command option enables you to append new text to a file?

a. p

b. -n

c. a\

d. |add

17. Your boss has two salary scale files, salary and salary1, and wants to compare their contents side by side to see if there are any differences in the files.Which of the fol- lowing commands should he use?

a. diff -S salary > salary1

b. comm salary salary1

c. uniq salary < salary1

d. sed --comp salary salary1

18. When you use the pr command how can you limit the output to only a screen full of text to view. (Choose all that apply.)

a. Maximize your terminal window to hold 24 lines.

b. Pipe the output into more.

c. Use the -l 23 option.

d. Pipe the less command into the more command.

19. When you use the Awk printf capability, what does the dollar sign ($) represent?

a. a field size limit

b. a multiplier

c. a command to put text in lowercase

d. a data field

20. Your boss is trying to delete the word “difficult” as it appears in a text file containing his speech about motivation.The name of the file is motivate.When he decides to use the tr command to delete this word, it instead deletes characters throughout the text.Which of the following commands is he likely to have used?

a. tr -d "difficult" < motivate

b. tr difficult motivate

c. tr -o 'difficult' > motivate

d. tr --eliminate difficult motivate

21. When you enter the command grep Linux /info/Linux_ features | head, what is the maximum number of lines that will be displayed?

a. 24 lines

b. 23 lines

c. 15 lines

d. 10 lines

22. List four examples of selection commands.

23. What is the general format for using the pipe operator?

24. Briefly explain what you can accomplish with the sed command.

25. You want to create a file of your friends’ and relatives’ names, addresses, telephone numbers, and other information.When you mention this to your sister-in-law, she recommends having separate fields for the first, middle, and last names. Briefly explain why this is a good idea.

In: Computer Science

Lab 12 - If y cn rd ths, y cn b a gd prgrmmr. In this...

Lab 12 - If y cn rd ths, y cn b a gd prgrmmr.

In this lab, you will explore String manipulation by removing characters from Strings. Even with many characters removed, it is still possible too get the meaning. While this isn’t exactly lossy compression, it does show you that even with information removed, you can still understand what you are looking at even if the quality is not the same.

Step 0: Constant

Create a public static final String called VOWELS at the topic of your class. Initialize it to “aeiouAEIOU”. You will use this later.

Step 1: lettersAndWhitespaceOnly(String)

For this method, you will take in a message, and keep only letters and whitespace. Everything else (numbers, punctuation, etc) will be removed. So for example

String value = lettersAndWhitespaceOnly("The number 42 is a number that is popular due to Hitchhikers Guide to the Galaxy.")

would set value equal to

"The number  is a number that is popular due to Hitchhikers Guide to the Galaxy"

While

String value = lettersAndWhitespaceOnly("!@!(*&(*&)!(!x*@)9191828101")

would set the value equal to

"x"

Writing lettersAndWhitespaceOnly

For this method, we already gave you the method stub, so you will only need to write a loop.

To help the loop conditions are from 0 to the length of the String, so as follows:

for(int i = 0; i < message.length(); i++) {
   // do something here
}

You will then want to check the character at that location, to see if it is a letter or whitespace and if it is, add it too the return string.

Some helpful methods are:

  • .charAt(index)
  • Character.isWhitespace(char)
  • Character.isLetter(char)
  • Zybooks Chapter on Character

Step 2: removeWhiteSpace(String)

For this method, you will take in a message, and remove all whitespace from the message. Imeanwecanallreadwithoutwhitespace - ok, let’s try that again. We can all read without whitespace.

In either case, this is a nice warm up, that will help for the other methods.

Writing removeWhiteSpace(String)

You will start off with a very similar loop as the last method, and instead of looking for whitespace and letters - you will only need to look for whitespace. The difference is:

  • If you find whitespce - DON’T Add it to the return String
  • everything else, add it!

Step 3: hasCharacter(char, String)

This is your first helper method for the lossy compression, and will make it easier to work getting this one right. The goal is to take a character, and check to see if that character is in a group of characters. For example, is x in the AeiOu? You know that it isn’t, so the method should return false.

Start thinking of ways that you can solve this problem, and then you can start writing after you get an idea.

Writing hasCharacter(char, String)

First, you will need to write the method signature. If you look at the comments there is a good spot to add it. The hasCharacter method is a public static method that returns a boolean value. It needs to take in a character and String as parameters in that order. You can call them what you want, but I called my character x and my string group (ok, maybe not the best names for each
)

Second, you will want to go through the String to see if the character from the parameter exists in the String. You can do this either with a loop and charAt, or you can do it with .contains (group.contains()). I found using the built in String method to be easier.

Step 4: stringShortener(String, String)

Next, you will want to find the comments just above the main method - the ones for the 2 parameter stringShortner method. You will work on this one first, and then go back up to the one parameter version.

This method is your lossy compression! (finally!). The goal is to write a method that takes in a String, and removes all characters that show up in the second string passed in. It will keep a character if it is the start of a word (i.e. following a space)

For example

You can be a good programmer, if you can read this.

would return if VOWELS was used as the list of characters to remove

Y cn b a gd prgrmmr, if y cn rd ths.

Writing stringShortener(String, String)

  • First write the method signature. It is a public static method that returns a String, and takes in two String parameters - a message and a group of characters to remove as a String - in that order.

  • You will then need to create an empty String like was created in the first two methods you wrote. This is the same String you will return. Hint: I would compile here, just to make sure it is compiling.

  • Next, loop through the first String (your message), and check to see if the character at position i is in your group of characters to remove. Hint use hasCharacter! If it is NOT in that group, OR if the character before your current location is a space (the tricky part), then you add it to the the rtn string.

It may be easier to ignore the ‘space’ rule, and get it working. You will then want to try it again, figuring out the space condition. Remember, prototype and repeat tirelessly.

Step 5: stringShortener(String)

Now go up into your code that talks about a stringShortener that only takes in 1 parameter. This is your chance to practice method overloading.

The goal is to assume the default group to remove is VOWELS, as really, who needs vowels when you are writing?

Writing stringShortener(String)

  • First write the method signature. It is the same as the other stringShortener, but only has a String messafe as a parameter

  • call stringShortener(String, String) passing in message and VOWELS as your parameter. Return the value returned from that method!

PROVIDED CODE:

public class LossyString {

// ADD CONSTANT HERE


/**
* Keeps both letters and whitespace only. Everything else is removed
* @param message the string that you want to keep letters and whitespace only
* @return the converted string
*/
public static String lettersAndWhitespaceOnly(String message) {
String rtn = "";

// STUDENT CODE HERE
return rtn;
}


/**
* Removes all whitespace from a string
* @param message the string you wish to have space removed
* @return the new string with whitespace removed
*/
public static String removeWhiteSpace(String message) {
String rtn = "";
// STUDENT CODE HERE

return rtn;
}

/**
* hasCharacter(char, String) Helper method for two-parameter {@link #stringShortener(String, String)}.
* This method determines if one character from the source String is included in the characters
* of the String representing all characters to remove. If so, return true.
*
* @param x A character representing one character from the source String.
* @param group A String representing all characters to remove.
* @return A boolean.
*/
//STUDENT CODE HERE


/**
* stringShortener(String) Remove vowels from a string.
* It will use the default {@link #VOWELS} constant variable for the second parameter, as often
* VOWELS removed from words are easy for our mind to replace.
* @param stringToCheck A String representing the String to check for matching characters in.
* @return A new String with matching characters of source String removed.
*/
//STUDENT CODE HERE

/**
* stringShortener(String, String) Remove all characters listed in one String from another String.
* This method does not ignore case and does not remove a character if it is the
* 'start' of a word after a space.
* i.e.
* <pre>
* You can be a good programmer, if you can read this.
*
* Y cn b a gd prgrmmr, if y cn rd ths.
* </pre>
* @param stringToCheck A String representing the String to check for matching characters.
* @param charsToRemove A String representing the String of characters to remove.
* @return A String with characters removed.
* @see #hasCharacter(char, String)
*/
// STUDENT CODE HERE


public static void main(String[] args) {


}

}

In: Computer Science

Chapter 11 Process Analysis and Resource Utilization - Chapter Review Bourbon County Court “Why don’t they...

Chapter 11 Process Analysis and Resource Utilization - Chapter Review

Bourbon County Court

“Why don’t they buy another copying machine for this office? I waste a lot of valuable time fooling with this machine when I could be preparing my legal cases,” noted Mr. H.C. Morris, as he waited in line. The self-service copying machine was located in a small room immediately outside the entrance of the courtroom. Mr. Morris was the county attorney. He often copied his own papers, as did other lawyers, to keep his legal cases and work confidential. This protected the privacy of his clients as well as his professional and personal ideas about the cases.

He also felt awkward at times standing in line with secretaries, clerks of the court, other attorneys, police officers and sheriffs, building permit inspectors, and the dog warden—all trying, he thought, to see what he was copying. The line for the copying machine often extended out into the hallways of the courthouse.

Mr. Morris mentioned his frustration with the copying machine problem to Judge Hamlet and his summer intern, Dot Gifford. Ms. Gifford was home for the summer and working toward a joint MBA/JD degree from a leading university.

“Mr. Morris, there are ways to find out if that one copying machine is adequate to handle the demand. If you can get the Judge to let me analyze the situation, I think I can help out. We had a similar problem at the law school with word processors and at the business school with student lab microcomputers.”

The next week Judge Hamlet gave Dot the go-ahead to work on the copying machine problem. He asked her to write a management report on the problem with recommendations so he could take it to the Bourbon County Board of Supervisors for their approval. The board faced deficit spending last fiscal year, so the tradeoffs between service and cost must be clearly presented to the board.

Dot’s experience with analyzing similar problems at school helped her know what type of information and data was needed. After several weeks of working on this project, she developed the information contained in Exhibits 11.36, 11.37, and 11.38.

Exhibit 11.36

Bourbon County Court—Customer Arrivals Per Hour (These Data Are Available in the Worksheet Bourbon County Court Case Data in MindTap.)

Customer Arrivals in One Hour

Customer Arrivals in One Hour

Customer Arrivals in One Hour

Customer Arrivals in One Hour

Customer Arrivals in One Hour

1

5

11

10

21

3

31

11

41

14

2

9

12

17

22

9

32

8

42

7

3

7

13

18

23

11

33

9

43

4

4

13

14

14

24

10

34

8

44

7

5

7

15

11

25

12

35

6

45

7

6

7

16

16

26

4

36

8

46

2

7

7

17

5

27

8

37

14

47

4

8

11

18

6

28

9

38

12

48

7

9

8

19

8

29

9

39

11

49

2

10

6

20

13

30

9

40

15

50

8

*A sample of customer arrivals at the copying machine was taken for five consecutive nine-hour work days plus five hours on Saturday for a total of fifty observations. The mean arrival rate is 8.92 arrivals per hour.

Exhibit 11.37

Bourbon County Court—Copying Service Times (These Data Are Available in the Worksheet Bourbon County Court Case Data in MindTap.)

Obs.

No.

Hours

per Job

Obs.

No.

Hours

per Job

1

0.0700

26

0.0752

2

0.1253

27

0.0752

3

0.0752

28

0.1002

4

0.2508

29

0.0388

5

0.0226

30

0.0978

6

0.1504

31

0.0752

7

0.0501

32

0.1002

8

0.0250

33

0.0250

9

0.0150

34

0.0752

10

0.2005

35

0.0501

11

0.1253

36

0.0301

12

0.1754

37

0.0752

13

0.0301

38

0.0501

14

0.1002

39

0.0075

15

0.0752

40

0.0602

16

0.3009

41

0.2005

17

0.0752

42

0.0501

18

0.0376

43

0.0150

19

0.0501

44

0.0501

20

0.0226

45

0.0527

21

0.1754

46

0.1203

22

0.0700

47

0.1253

23

0.1253

48

0.1053

24

0.0752

49

0.1253

25

0.2508

50

0.0301

*A sample of customers served at the copying machine was taken for five consecutive nine-hour work days plus five hours on Saturday for a total of fifty observations. The average service time is 0.0917 hours per copying job or 5.499 minutes per job. The equivalent service rate is 10.91 jobs per hour (i.e., ).

Exhibit 11.38

Bourbon County Court—Cost and Customer Mix

Resource Category

Mix of Customers in Line (%)

Cost or Average Direct Wages per Hour

Lease and maintenance cost of copying machine per year @250 days/year

N/A

$18,600

Average hourly copier variable cost (electric, ink, paper, etc.)

N/A

$5/hour

Secretaries

50%

$18.75

Clerks of the court

20%

$22.50

Building inspectors and dog warden

10%

$28.40

Police officers and sheriffs

10%

$30.80

Attorneys

10%

$100.00

*The mix of customers standing in line was collected at the same time as the data in the other case exhibits. Direct wages do include employee benefits but not work opportunity costs or ill-will costs, etc.

Dot was not quite as confident in evaluating this situation as others because the customer mix and associated labor costs seemed more uncertain in the county courthouse. In the law school situation, only secretaries used the word processing terminals; in the business school situation, students were the ones complaining about long waiting times to get on a microcomputer terminal. Moreover, the professor guiding these two past school projects had suggested using queueing models for one project and simulation for the other project. Dot was never clear on how the method of analysis was chosen. Now, she wondered which methodology she should use for the Bourbon County Court situation.

To organize her thinking, Dot listed a few of the questions she needed to address as follows:

  1. Assuming a Poisson arrival distribution and an exponential service time distribution, apply queueing models to the case situation and evaluate the results.

  2. What are the economics of the situation using queueing model analysis?

  3. What are your final recommendations using queueing model analysis.

  4. Advanced Question: Do the customer arrival and service empirical (actual) distributions in the case match the theoretical distributions assumed in queueing models?

In: Accounting

You have been hired as consultants to design and implement a widespread security initiative for a...

You have been hired as consultants to design and implement a widespread security initiative for a rapidly expanding global eCommerce corporation with two websites and locations in New York, Chicago, San Francisco, London, Paris and Johannesburg. Business is good! In the next three months, the corporation will be acquiring another company in a different line of business with plans to offer products for sale online.

Part of your role is to recommend the best way for integrating both environments. However, not much information is available about the IT setup for the company being acquired. The other company might even have a mix of different operating environment – it is unclear since the IT staff in that company is not very communicative.

Some critical staff members in the other company are not happy with the upcoming merger and have sworn to be as uncooperative as possible. In particular, the Network Manager for the other company is a difficult personality – plans have been afoot to fire him but unfortunately he is the only one who knows the network architecture completely and he is not willing to share. You must find out everything about the new environment and propose specifics on how to seamlessly integrate both environments

In the initial conversation with executives of the global company, you realize that the company does not have a security policy. After much discussion, they have agreed that you should come up with a detailed security policy customized for the company.

In a follow-up meeting with the executives and IT staff of the global corporation, you are also assigned the task of identifying two (2) security audit tools (vulnerability/web scanners), two (2) intrusion detection systems and two (2) network firewall products that would be suitable for the global company. You are to test and describe the features of selected security solutions, indicating (a) which you prefer and (b) providing convincing rationale for why you prefer a specific solution in each category. In other words, you are to evaluate two products for each category and recommend one, giving the reasons for your choice.

Salient points: The new corporate acquisition will increase the total number of computers under you IT department’s care to about 60,000 computers and network devices. The exact number is not clear: even the management at the other company is not sure of the number of systems in that network because of the difficulty in finding out the specifics about the company being acquired.

From the little information that has been gleaned from the other company, it appears to run a mixture of a peer-to-peer network and the domain model. Part of the decision you would have to make would be how the integrated environments would be networked: you have been given the discretion to come up with the design and budget (subject to approval, of course) for the overall security initiative, covering (1) the security policy, (2) network audit to determine what devices and data are being protected, (3) seamless integration between the merging companies, (4) recommendation for IDS system(s), (5) recommendations for security audit tools (web/vulnerability scanners) and (6) recommendation for network firewall device(s).   

Deliverables:

The Security Policy Document (You can adapt an Acceptable Use Policy document from www.sans.org)

An eight-page paper in Microsoft Word double-spaced describing how you would go about implementing the overall security initiative for the company, including a budget. Breakdown:

1 page summary of your overall strategy

1 pages of information security-related recommendations for integrating both corporate environments

1 page for the IDS

1 page for the web/vulnerability scanners

1 page for the network firewall device(s)

1 page of your overall conclusions showing demonstrating you grasp of information security best practices and current trends

1 page for budget  

1 page of references

In: Computer Science

You determine the format. I would like you to use some computer application, not pen and...

You determine the format. I would like you to use some computer application, not pen and paper. I would suggest WORD for any analysis comments and EXCEL for any spreadsheet analysis (Horizontal/Vertical) You are analyzing a company from a financial standpoint and comparing them to another company. Make it easy for us to read and understand. Make a recommendation to deal with this company or not based on your analysis. Choose a company from the following public companies. That means they trade their stock on a major stock exchange to anyone. TARGET, COSTCO, MACYS, NORDSTROM, WALLMART, CVS, ALBERTSONS (includes Safeway), AMAZON, OR KOHLS. Go to the company website to get the full financial information. Or just google the company name and 10K. The 10K or the earnings release at the fiscal year end has the financial results. YOU MUST USE A FULL YEAR INCOME STATEMENT. For most you should be able to find the 2019 10K. If not, use the 2018. Look at the Income statement, and balance sheet. If you want to know what the company says about its financial results read the latest financial statement released by the company.

1. Do a Horizontal analysis of the Income Statement and Balance Sheet and a Vertical analysis of the Income Statement using 2019 and 2018 or 2018 and 2017. If you can download into EXCEL that would work great for this. If not, input the numbers into EXCEL or some other spreadsheet program.

2. Tell me a little about the company.What does the company do? What do they sell?Where are they incorporated? Where is their headquarters? Who are their auditors?Who else is in this business? Who are the competitors?Look at their Statement of Cash Flows – did cash go up since last year or down. What caused the largest increases, largest decreases? List the top 3 things causing cash to go up and 3 causing cash to go down.Do the have a positive net income, is it higher than last year? What are the big changes on the income statement from last year?How do they account for inventory – FIFO, LIFO, or Weighted Avg?How do they depreciate their physical assets, straight line or other?Do they have any unearned or deferred revenue?Is their current ratio higher or lower than last year?What is their stock price per share? Is it higher or lower than a year ago?If you could ask the company president 3 questions, what would they be?

3. Choose a second company from the list above. These are all merchandise companies so choose any one you want. Some might have very big differences in their financials because some sell high volume at lower prices and some sell lower volume at higher prices. Analyze the financial results of the 2 companies side by side including the following: (For this, you will need to find the last full year of financial results for your second company, either 2019 or 2018) Current RatioDebt ratio?Quick ratio (to be discussed in class)How much cash do they have? Gross Profit – some don’t calculate it – if so, skip.Profit Margin (Net Income divided by Net Sales or Revenue)Accounts Receivable Turnover, Average days to collect (365/AR turnover)Inventory turnover. How many times in a year do they turn over inventoryWhat is their earnings per share? Or loss?What is their P/E ratio (use a current stock price, like May 15th)If you had the $$$ to invest, which company would you invest in?

In: Accounting

Serenity Spa Vacations Inc. (SSV) is a company that specializes in organizing tours of luxury health...

Serenity Spa Vacations Inc. (SSV) is a company that specializes in organizing tours of luxury health and wellness spas around the world. During the first four years of its business, SSV experienced modest growth. Just over a year ago, however, the company was featured in an exclusive travel magazine. This, coupled with excellent web reviews and favourable word of mouth, fuelled a period of exponential growth that continues to this day. As there are a number of other well-established companies that offer similar services, SSV’s management knows that to continue its success, it must expand its loyal customer base by providing exemplary service and tours while controlling costs.
SSV’s accounting information system (AIS) currently consists of a purchased accounting software package that has only basic features and cannot be upgraded. It is supplemented by various spreadsheets used to track important information, including payroll, spa availability, bookings in progress, client preferences, and customer ratings of the wellness packages sold.
SSV’s vice-president of operations understands that the company’s current AIS is woefully inadequate and must be replaced with one that permits management to better direct the organization’s activities. The vice-president has requested you, CPA, the company’s chief financial officer, investigate the options that are available and make a recommendation as to how to proceed. The vice-president stated that the criteria considered should include cost, reliability, ability to accommodate continuing growth, reducing duplicative data entry, functionality, and compatibility with online purchases by customers.
You have eight people working for you in the accounting department in two locations and as such know that multi-user capabilities over a networked system are a must.
You are well aware of the inadequacies of the current system and the issues they are causing, and have researched various possibilities. You have narrowed the choice down to three options as described below, all of which meet the criteria of compatibility, multi-user functionality, network capability, and reducing duplicative data entry.

‱ Commercial package in the cloud (CPC) — SSV can arrange to access a widely used commercial software package for $2,750 per month based on an 18-month rental agreement. Your research suggests that the software package is very reliable, represents a significant improvement over SSV’s exiting AIS, and includes 100% of the identified “must haves” and about 60% of SSV’s “nice to haves.” Arranging access and uploading existing data take about two weeks. When a cloud-computing solution is used, expanding capacity is easily arranged at an additional cost. Moreover, as the host regularly upgrades the system on an ongoing basis, potential obsolescence isn’t a major factor.

‱ Commercial package purchased (CPP) — SSV can purchase the software package described above for $90,000. Installation of the program and conversion of the existing program will take about six weeks. The expected useful life of the new software is four years. Expanding capacity at a later date is easily accommodated by adding an additional module at a relatively nominal cost.

‱ Custom-built package (CBP) — You received two quotes from software engineers to custom build a system that meets all of SSV’s identified needs. The first engineer, who is very well known and has an excellent track record in building similar systems, quoted a price of $150,000. She suggests that the system will take about one year to build and install. The second engineer, who is new to the industry, promises delivery in six months at a firm cost of $80,000. The expected useful life of the custom-built software is four years. The system can be expanded at a later date; however, the expansion would have to be a customized solution, designed by a software engineer, at a cost that will likely be substantively higher than acquiring additional capacity for the CPP.

Required:
Make a recommendation to the vice president of operations of SSV.

In: Accounting

The purpose of this memo is to provide some additional clarity and expectations regarding the upcoming...

The purpose of this memo is to provide some additional clarity and expectations regarding the upcoming Bookkeeping Project. Background Paddleboard Adventures, Inc. is a local provider of standup paddleboard rentals and clinics. Paddleboard Adventures is a brand new corporation just beginning business in June of 2016. The CEO has ask you to start the companies bookkeeping.

Project Instructions  Open T accounts for all of the accounts on the June 2016 chart of accounts  Post the June Transactions and adjusting entries to the T accounts  Prepare an adjusted trial balance after you have posted all the transactions  Prepare a profit and loss, and balance sheet for the month ending June 30

Submission Instructions: Please prepare the trial balance, profit and loss, and balance sheet in a single word or excel file. Be sure that all three reports have the appropriate 3 line titles. Upload the file to the Moodle website. Notes Unless specifically indicated transactions can be assumed to be in cash. 6/1 Owner invests $20,000 in the business in exchange for common stock 6/2 Business rents a retail space for $1,000 6/3 Business Purchases 10 paddleboard for $7,000 6/4 Business rents 5 paddleboards to customers for $50 each 6/5 Business purchases a trailer for $1,200, cash 6/7 Business offers a paddling clinic and 6 participant pay $100 each for clinic 6/8 Business pays $500 for a new storefront sign 6/9 A check is written for $1200 for insurance 6/10 Customers rent 10 paddleboards for $40 each 6/11 Business pays $250 to sponsor an upcoming paddleboard race 6/12 Owner invests an additional $5,000 in exchange for common stock 6/13 The owner purchases an additional 2 paddleboards specifically for rivers for $2200 6/14 A utility bill is received and paid in the amount of $120 6/15 The shop provides all the boards and delivery for a clinic to a nonprofit that will pay $1,000 at the end of the month 6/16 Business purchases $685 worth of shelving to help organize the equipment 6/17 Business purchases and donates a $100 lifejacket as a prize for the upcoming race 6/18 Customers rent 10 boards for $50 each for the upcoming race and pays cash 6/19 The business owes $200 to the State for various licensing fees pays with a check 6/20 Receive a $500 check from the nonprofit on 6/15 6/21 Business opens a visa card at an area credit union 6/22 Business pays the instructor from 6/7 clinic $200 6/23 Business has to do some wiring and modifications on the trailer that cost $145 (cash) 6/24 Business charges $85 on the new credit card for office supplies 6/25 A check is written for a telephone bill in the amount of $87 Adjusting 6/30 The insurance purchased 6/9 is for 12 months 6/30 Receives the Visa bill with fees and interest of $3 for the month 6/30 Board declares a $125 dividend to be paid later Paddleboard Adventures, Inc. June 2016 Transactions Winter Term BA 211 Assets Cash Accounts Receivable Prepaid Insurance Paddleboards River Paddleboards Trailer Leasehold Improvements Liabilities Visa Card Payable Dividends Payable Accounts Payable Equity Common Stock Dividends Retained Earnings Revenue Rental Income Clinic Income Expenses Marketing Expense Rent Expense Office Supplies Expense Insurance Expense Contract Labor License & Tax Expense Banking Expense Maintenance Expense Utility Expense Charitable Contributions

In: Accounting

TEST YOUR VPNs 1. You have earlier created two VPNs. How do you know your VPNs...

TEST YOUR VPNs 1. You have earlier created two VPNs. How do you know your VPNs are configured correctly? There are several ways you can check whether your VPN is working properly but it is important you use reliable and reputable online tools that give accurate results. Follow the steps below to check VPNs are correctly set up.  Basic IP Address Test a. First, before connecting to your VPN, visit an IP check page, and note the IP address detected. This will be your actual IP address, the one currently assigned to you by your ISP provider and that can be traced back to you personally from your ISP’s user log records. b. Next, connect to your VPN and use the same site to check the detected IP address. The IP address should be different. If it isn’t, something is wrong.  The Extended IP Address Test a. For a more detailed analysis of your connection, conduct a check at IPLeak, first without your VPN enabled and then with it enabled. IPLeak provides rich information about a number of aspects of your connection. Not only will IPLeak display your IP address, but it will detect DNS leaks too.  Testing your VPN for DNS Leaks a. Conduct a check at IPLeak, first without your VPN enabled and then with it enabled. To test whether your VPN suffers DNS leaks, go to: DNSLeak.com’s Test – select ‘Start’ and wait a few seconds for the results. If more than 5 seconds go INFO 2411 2 by, open the link in an Incognito / Private Browsing tab. They also have a IPv6 Leak Test if you want to check that too. You should not see this warning if VPN is enabled. TorGuard’s DNS Test (or go to any page on TorGuard and choose ‘DNS Leak Test’ under the heading ‘TorGuard Links’) b. Hidester select ‘Test’ to check your VPN or proxy for DNS leaks c. IPLeak and scroll down to see the information under the heading ‘DNS Address detection’ or d. DNS leak test and choose either the ‘Standard test’ or ‘Extended test’. If these tests show your ISP’s DNS server, you have a DNS leak. The best VPNs have a DNS Leak protection feature. Check yours.  Connection Drop Protection (Kill Switch) A Kill Switch is an important feature to look for when choosing a VPN because it prevents your IP address from accidentally being leaked should your VPN connection unexpectedly drop. Without a kill switch feature, your computer or device would automatically re-establish the Internet connection with your ISP provider and expose your true IP address and location in the process. If your connection drops and you are not protected with a kill switch, the web sites you visit and connections you make can be monitored, logged and traced back to you through your ISP’s records.  Test your internet traffic is actually going through VPN Download CurrPorts (free). If you see your VPN’s masked IP address in the ‘Remote Address’ column of CurrPort’s display for your relevant app process (for example, Chrome for web browsing), INFO 2411 3 you can be confident that you are making connections through the VPN and that your true IP address is safe.  For each test, take screen shots tabulate the results for without your VPN enabled and then with it enabled. 2. Save your answers in a word document Class Lab 4.docx

In: Computer Science

Assignment 1: LASA 2: Airvalue Airways Strategic Planning Airvalue Airways is a regional carrier whose strategy...

Assignment 1: LASA 2: Airvalue Airways Strategic Planning Airvalue Airways is a regional carrier whose strategy is to expand gradually as they can identify routes that offer an attractive return on the investment necessary to support successful coverage of the route. As part of this expansion, the company is planning to buy a new plane in the upcoming fiscal year. The purchasing department has narrowed the choice down to two models. One is the A220 which is manufactured in Europe. The other plane is the G435 which is built in the United States. The two aircraft have similar profiles. However, the locally-built G435 is significantly more expensive to purchase. The A220 has an expected life of 5 years, will cost $90 million and its use will produce net operating cash inflows of $30 million per year. The G435 has a life of 10 years, will cost $128 million, and its use will produce net operating cash inflows of $25 million per year. Airvalue plans to serve the route for 10 years. When they need to purchase a new A220 at the end of five years, the cost will be $115 million net after allowing for salvage value of the used plane. Net operating cash inflows will remain at $30 million throughout the second five years. At the end of 10 years, salvage value of the G435 and of the second A220 are expected to be about the same at approximately $500,000 each. As the company’s CFO you are to provide the financial analysis that will be considered by the strategic planning executive committee during evaluation of this expansion alternative. Your plan is to use a capital budgeting approach to the analysis in order to best assure that the decision will result in maximization of wealth for the company’s stockholders. You also want to convert the entire committee to the concept that capital budgeting should be used as the main tool for the financial analysis of capital expenditure alternatives. The company uses the historical difference in returns between the S&P 500 and the Treasury bond rates of 7% as their estimated market risk premium. The current yield to maturity on a 10-year Treasury bond is 6.2%. Airvalue Airways’ common-stock equity beta is estimated as 1.40. Airvalue’s capital structure is 58% common stock, 32% preferred stock and 10% long-term debt. An 8.8% after tax cost of debt has been determined and the cost of preferred stock is 12%. Your task is to: Describe for other members of the strategic planning committee the role that capital budgeting should play in corporate strategic management. Explain why the NPV and IRR capital budgeting tools are superior to the accounting rate of return and simple payback techniques for determining the attractiveness of capital investment opportunities. Use the Capital Asset Pricing Model (CAPM) to identify the cost of common stock. Calculate the weighted average cost of capital (WACC) for the firm’s existing capital structure. Calculate the net present value (NPV) for each plane model using the company’s WACC as the hurdle rate. Recommend which plane should be purchased and justify your recommendation. Discuss the need to manage implementation of the project so that the higher returns can be realized. Include the strategic management keys to protecting the project from competitive forces that would erode the earning power of the project and jeopardize realization of the projected rate of return on the investment. To complete this assignment, you must submit a 6-8 page paper that addresses the seven elements of the task as listed above and exhibits your calculations of the cost of common stock, the weighted average cost of capital, and the NPV for each plane along with an explanation of the calculations. The paper must be submitted as a Word document and it must follow APA style guidelines.

In: Finance

Case Study: End of Life Decisions George is a successful attorney in his mid-fifties. He is...

Case Study: End of Life Decisions

George is a successful attorney in his mid-fifties. He is also a legal scholar, holding a teaching post at the local university law school in Oregon. George is also actively involved in his teenage son’s basketball league, coaching regularly for their team. Recently, George has experienced muscle weakness and unresponsive muscle coordination. He was forced to seek medical attention after he fell and injured his hip. After an examination at the local hospital following his fall, the attending physician suspected that George may be showing early symptoms for amyotrophic lateral sclerosis (ALS), a degenerative disease affecting the nerve cells in the brain and spinal cord. The week following the initial examination, further testing revealed a positive diagnosis of ALS.

ALS is progressive and gradually causes motor neuron deterioration and muscle atrophy to the point of complete muscle control loss. There is currently no cure for ALS, and the median life expectancy is between 3 and 4 years, though it is not uncommon for some to live 10 or more years. The progressive muscle atrophy and deterioration of motor neurons leads to the loss of the ability to speak, move, eat, and breathe. However, sight, touch, hearing, taste, and smell are not affected. Patients will be wheelchair bound and eventually need permanent ventilator support to assist with breathing.

George and his family are devastated by the diagnosis. George knows that treatment options only attempt to slow down the degeneration, but the symptoms will eventually come. He will eventually be wheelchair bound and be unable to move, eat, speak, or even breathe on his own.

In contemplating his future life with ALS, George begins to dread the prospect of losing his mobility and even speech. He imagines his life in complete dependence upon others for basic everyday functions and perceives the possibility of eventually degenerating to the point at which he is a prisoner in his own body. Would he be willing to undergo such torture, such loss of his own dignity and power? George thus begins inquiring about the possibility of voluntary euthanasia.

The practice of health care providers at all levels brings you into contact with people from a variety of faiths. This calls for knowledge and understanding of a diversity of faith expressions; for the purpose of this course, the focus will be on the Christian worldview.

Based on "Case Study: End of Life Decisions," the Christian worldview, and the worldview questions presented in the required topic study materials you will complete an ethical analysis of George's situation and his decision from the perspective of the Christian worldview.

Provide a 1,500-2,000-word ethical analysis while answering the following questions:

  1. How would George interpret his suffering in light of the Christian narrative, with an emphasis on the fallenness of the world?
  2. How would George interpret his suffering in light of the Christian narrative, with an emphasis on the hope of resurrection?
  3. As George contemplates life with amyotrophic lateral sclerosis (ALS), how would the Christian worldview inform his view about the value of his life as a person?
  4. What sorts of values and considerations would the Christian worldview focus on in deliberating about whether or not George should opt for euthanasia?
  5. Given the above, what options would be morally justified in the Christian worldview for George and why?
  6. Based on your worldview, what decision would you make if you were in George's situation?

Remember to support your responses with the topic study materials.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

In: Nursing