Lindsey was recently hired by Swift Ltd. as a junior budget analyst. She is working for the Venture Capital Division and has been given for capital budgeting projects to evaluate. She must give her analysis and recommendation to the capital budgeting committee.
Lindsey has a B.S. in accounting from CWU (2014) and passed the CPA exam (2017). She has been in public accounting for several years. During that time she earned an MBA from Seattle U. She would like to be the CFO of a company someday--maybe Swift Ltd.-- and this is an opportunity to get onto that career track and to prove her ability.
As Lindsey looks over the financial data collected, she is trying to make sense of it all. She already has the most difficult part of the analysis complete -- the estimation of cash flows. Through some internet research and application of finance theory, she has also determined the firmās beta.
Here is the information that Lindsey has accumulated so far:
The Capital Budgeting Projects
She must choose one of the four capital budgeting projects listed below:
Table 1
|
t |
A |
B |
C |
D |
|
0 |
(22,500,000) |
(24,000,000) |
(23,000,000) |
(21,000,000) |
|
1 |
9,600,000 |
7,700,000 |
8,200,000 |
7,500,000 |
|
2 |
9,600,000 |
8,400,000 |
8,200,000 |
6,900,000 |
|
3 |
4,500,000 |
9,800,000 |
6,500,000 |
5,400,000 |
|
4 |
4,500,000 |
4,900,000 |
5,900,000 |
4,500,000 |
|
Risk |
Average |
Average |
High |
Low |
Table 1 shows the expected after-tax operating cash flows for each project. All projects are expected to have a 4 year life. The projects differ in size (the cost of the initial investment), and their cash flow patterns are different. They also differ in risk as indicated in the above table.
The capital budget is $20 million and the projects are mutually exclusive.
Capital Structures
Swift Ltd. has the following capital structure, which is considered to be optimal:
|
Debt |
30% |
|
Preferred Equity |
15% |
|
Common Equity |
55% |
|
100% |
Cost of Capital
Lindsey knows that in order to evaluate the projects she will have to determine the cost of capital for each of them. She has been given the following data, which he believes will be relevant to her task.
(1)The firmās tax rate is 35%.
(2) Swift Ltd. has issued a 8% semi-annual coupon bond with 14 years term to maturity. The current trading price is $960.
(3) The firm has issued some preferred stock which pays an annual 8.5% dividend of $50 par value, and the current market price is $52.
(4) The firmās stock is currently selling for $35 per share. Its last dividend (D0) was $2.00, and dividends are expected to grow at a constant rate of 5%. The current risk free return offered by Treasury security is 2.8%, and the market portfolioās return is 10.80%. Swift Ltd. has a beta of 1.1. For the bond-yield-plus-risk-premium approach, the firm uses a risk premium of 3.5%.
(5) The firm adjusts its project WACC for risk by adding 2.5% to the overall WACC for high-risk projects and subtracting 2.5% for low-risk projects.
Lindsey knows that Swift Ltd. executives have favored IRR in the past for making their capital budgeting decisions. Her professor at Seattle U. said NPV was better than IRR. Her textbook says that MIRR is also better than IRR. She is the new kid on the block and must be prepared to defend her recommendations.
First, however, Lindsey must finish the analysis and write her report. To help begin, she has formulated the following questions:
(1) What is the estimated cost of common equity using the CAPM approach?
(2) What is the estimated cost of common equity using the DCF approach?
(3) What is the estimated cost of common equity using the bond-yield-plus-risk-premium approach?
(4) What is the final estimate for rs?
Table 2
|
A |
B |
C |
D |
|
|
WACC |
||||
|
NPV |
||||
|
IRR |
||||
|
MIRR |
Instructions
1.Your answers should be Word processed, submitted via Canvas.
2.Questions 5, 8, 9, and 11 are discussion questions.
3.Place your numerical solutions in Table 2.
4.Show your steps for calculation questions.
In: Finance
6.13 Lab: Patient Class - process an array of Patient objects
This program will create an array of 100 Patient objects and it will read data from an input file (patient.txt) into this array. Then it will display on the screen the following:
Finally, it writes to another file (patientReport.txt) a table as shown below:
Weight Status Report ==================== === ====== ====== ============= Name Age Height Weight Status ==================== === ====== ====== ============= Jane North 25 66 120 Normal Tim South 64 72 251 Obese . . . ==================== === ====== ====== ============= Number of patients: 5
Assume that a name has at most 20 characters (for formatting). Write several small functions (stand-alone functions). Each function should solve a specific part of the problem.
On each line in the input file there are four items: age, height, weight, and name, as shown below:
25 66 120 Jane North 64 72 251 Tim South
Prompt the user to enter the name of the input file. Generate the name of the output file by adding the word "Report" to the input file's name.
Display the output file's name as shown below:
Report saved in: patientReport.txt
If the user enters the incorrect name for the input file, display the following message and terminate the program:
Input file: patients.txt not found!
Here is a sample output:
Showing patients with the "Underweight" status: Tim South Linda East Paul West Victor Smith Tom Baker Showing patients with the "Overweight" status: none Showing patients with the "Obese" status: none Report saved in: patient1Report.txt
Main.cpp:
#include "Patient.h"
#include <iostream>
#include <iomanip>
#include <fstream>
#include <string>
using namespace std;
const int MAX_SIZE = 100;
/* Write your code here:
declare the function you are going to call in this program
*/
int main()
{
Patient patArr[MAX_SIZE];
int size = 0;
string fileName;
cout << "Please enter the input file's name: ";
cin >> fileName;
cout << endl;
/* Write your code here:
function calls
*/
return 0;
}
/* Write your code here:
function definitions
*/
/*
OUTPUT:
*/
Patient.h:
/*
Specification file for the Patient class
*/
#ifndef PATIENT_H
#define PATIENT_H
#include <string>
using std:: string;
class Patient
{
private:
string name;
double height;
int age;
int weight;
public:
// constructors
Patient();
Patient(string name, int age, double height, int weight);
// setters
void setName(string name);
void setHeight(double height);
void setAge(int age);
void setWeight(int weight);
//getters
string getName() const;
double getHeight() const;
int getAge() const;
int getWeight() const;
// other functions: declare display and weightStatus
void display() const;
string weightStatus() const;
};
#endif
Patient.cpp:
/*
Implementation file for the Patient class.
*/
#include "Patient.h"
#include <iostream>
#include <iomanip>
#include <string>
using namespace std;
/*******
This is the default constructor; it sets everything to 0 or
"".
*/
Patient::Patient()
{
name = "";
height = 0;
age = 0;
weight = 0;
}
/*******
This is an overloaded constructor.
It sets the variables according to the parameters.
*/
Patient::Patient(string name, int age, double height, int
weight)
{
this->name = name;
this->height = height;
this->age = age;
this->weight = weight;
}
void Patient::setName(string name)
{
this->name = name;
}
void Patient::setHeight(double height)
{
this->height = height;
}
void Patient::setAge(int age)
{
this->age = age;
}
void Patient::setWeight(int weight)
{
this->weight = weight;
}
string Patient::getName() const
{
return this->name;
}
double Patient::getHeight() const
{
return this->height;
}
int Patient::getAge() const
{
return this->age;
}
int Patient::getWeight() const
{
return this->weight;
}
/*******
This function displays the member variables
in a neat format.
*/
void Patient::display() const
{
cout << fixed;
cout << " Name: " << getName() << endl;
cout << " Age: " << getAge() << endl;
cout << " Height: " << setprecision(0) <<
getHeight() << " inches" << endl;
cout << " Weight: " << getWeight() << " pounds"
<< endl;
cout << "Weight Status: " << weightStatus() <<
endl;
}
/*******
This function calculates the BMI using the following formula:
BMI = (weight in pounds * 703) / (height in inches)^2
Then, it returns a string reflecting the weight status according to
the BMI:
<18.5 = underweight
18.5 - 24.9 = normal
25 - 29.9 = overweight
>=30 = obese
*/
string Patient::weightStatus() const
{
double bmi;
string stat = "";
if (height > 0)
{
bmi = (getWeight() * 703) / (getHeight() * getHeight());
if (bmi < 18.5)
{
stat = "Underweight";
}
else if (bmi >= 18.5 && bmi <= 24.9)
{
stat = "Normal";
}
else if (bmi >= 25 && bmi <= 29.9)
{
stat = "Overweight";
}
else
{
stat = "Obese";
}
}
return stat;
}
In: Computer Science
Person class
You will implement the Person Class in Visual Studio. A person
object may be associated with multiple accounts. A person initiates
activities (deposits or withdrawal) against an account that is
captured in a transaction object.
A short description of each class member is given below:
Person
Class
Fields
- password : string
Properties
+ «C# property, setter private» IsAuthenticated :
bool
+ «C# property, setter absent» SIN : string
+ «C# property, setter absent» Name : string
Methods
+ «Constructor» Person(name : string, sin :
string)
+ Login(password : string) : void
+ Logout() : void
+ ToString() : string
Fields:
⦠password ā this private string field represents the
password of this person.
(N.B. Password are not normally stored as text but as a hash value.
A hashing function operates on the password and the result is
stored in the field. When a user supplies a password it is passed
through the same hashing function and the result is compared to the
value of the field.).
Properties:
⦠SIN ā this string property represents the sin number
of this person. This getter is public and setter is absent.
⦠IsAuthenticated ā this property is a bool
representing if this person is logged in with the correct password.
This is modified in the Login() and the Logout() methods. This is
an auto-implemented property, and the getter is public and setter
is private
⦠Name ā this property is a string representing the
name of this person. The getter is public and setter is
absent.
Methods:
⦠public Person( string name, string sin ) ā This
public constructor takes two parameters: a string representing the
name of the person and another string representing the SIN of this
person. It does the following:
⦠The method assigns the arguments to the appropriate
fields.
⦠It also sets the password to the first three letters
of the SIN. [use the Substring(start_position, length) method of
the string class]
⦠public void Login( string password ) ā This method
takes a string parameter representing the password and does the
following:
⦠If the argument DOES NOT match the password field, it
does the following:
⦠Sets the IsAuthenticated property to false
⦠Creates an AccountException object using argument
AccountEnum.PASSWORD_INCORRECT
⦠Throws the above exception
⦠If the argument matches the password, it does the
following:
⦠Sets the IsAuthenticated property is set to
true
This method does not display anything
⦠public void Logout( ) ā This is public method does
not take any parameters nor does it return a value.
This method sets the IsAuthenticated property to false
This method does not display anything
⦠public override string ToString( )ā This public
method overrides the same method of the Object class. It returns a
string representing the name of the person and if he is
authenticated or not.
ITransaction interface
You will implement the ITransaction Interface in Visual Studio. The
three sub classes implement this interface.
A short description of each class member is given below:
ITransaction
Interface
Methods
Withdraw(amount : double, person : Person) :
void
Deposit(amount : double, person : Person) : void
Methods:
⦠void Withdraw(double amount, Person person).
⦠void Deposit(double amount, Person person).
Transaction class
You will implement the Transaction Class in Visual Studio. The only
purpose of this class is to capture the data values for each
transaction. A short description of the class members is given
below:
All the properties are public with the setter absent.
Transaction
Class
Properties
+ «C# property, setter absent » AccountNumber :
string
+ «C# property, setter absent» Amount : double
+ «C# property, setter absent» Originator :
Person
+ «C# property, setter absent» Time : DateTime
Methods
+ «Constructor» Transaction(accountNumber : string,
amount : double, endBalance : double, person : Person, time :
DateTime)
+ ToString() : string
Properties:
All the properties are public with the setter absent
⦠AccountNumber ā this property is a string
representing the account number associated with this transaction.
The getter is public and the setter is absent.
⦠Amount ā this property is a double representing the
account of this transaction. The getter is public and the setter is
absent.
⦠Originator ā this property is a Person representing
the person initiating this transaction. The getter is public and
the setter is absent.
⦠Time ā this property is a DateTime (a .NET built-in
type) representing the time associated with this transaction. The
getter is public and the setter is absent.
Methods:
⦠public Transaction( string accountNumber, double
amount, Person person, DateTime time ) ā This public constructor
takes five arguments. It assigns the arguments to the appropriate
fields.
⦠public override string ToString( ) ā This method
overrides the same method of the Object class. It does not take any
parameter and it returns a string representing the account number,
name of the person, the amount and the time that this transition
was completed. [you may use ToShortTimeString() method of the
DateTime class]. You must include the word Deposit or Withdraw in
the output.
A better type would have been a struct instead of a class.
ExceptionEnum enum
You will implement this enum in Visual Studio. There are seven
members:
ACCOUNT_DOES_NOT_EXIST,
CREDIT_LIMIT_HAS_BEEN_EXCEEDED,
NAME_NOT_ASSOCIATED_WITH_ACCOUNT,
NO_OVERDRAFT,
PASSWORD_INCORRECT,
USER_DOES_NOT_EXIST,
USER_NOT_LOGGED_IN
The members are self-explanatory.
AccountException class
You will implement the AccountException Class in Visual Studio.
This inherits from the Exception Class to provide a custom
exception object for this application. It consists of seven strings
and two constructors:
AccountException
Class
ā Exception
Fields
Properties
Methods
+ «Constructor» AccountException(reason :
ExceptionEnum)
Fields:
There are no fields
Properties:
There are no properties
Methods:
⦠AccountException( ExceptionEnum reason )ā this public
constructor simply invokes the base constructor with an appropriate
argument. Use the ToString() of the enum type.
In: Computer Science
In: Economics
Gerard grew up in Virginia. One of his colleagues remembers that Gerard was known in school, skilled at his schoolwork and that he liked to play soccer and listen to Opera. The friend also remembers that Gerardās family was a modest one that can barely satisfy its needs while Gerard was not happy with this type of living. Gerard graduated with an accounting degree from a good college in 1996. He enjoyed the inward mechanisms of accounting systems, and in 2000 he found himself part of Delta Company after his employer, Pioneer manufacturing, was acquired for more than $10 billion. Gerard had an influential role in adopting enterprise resource planning system that replaced the old one in while he was employed at Delta Company. A mistake by his new employer, Pioneer Manufacturing created an opportunity for Gerard to steal company funds.
As a part of the changeover team, Gerard became experienced in all aspects of ERP accounting modules including accounts receivables, accounts payable, fixed assets, financial reporting, journal entries, checks and wire payment processing. I was granted by mistake an authorization to sign and approve checks, along with a co-worker, up to $300,000. I discovered this permission quite by accident some two years after the takeover.
Our accounting department consisted of a manager, assistant manager, accounting controller, and three people whom I supervise. Together with a fellow worker and an associate, I was among those authorized employees who can request checks. The fellow- worker and I also could approve checks. In the accounting department, we shared our passwords with each other so we can finalize the work without any delay in case someone was out of office and the task had to be done immediately. One day, while I was drinking my coffee and thinking, I realized that I can access to one of my colleaguesā account to request a check and I can then log into my credentials and approve my own request. I went to work every day for the next year tempted by the pot of gold that was there for the taking.
In June 2003, my spouse was pregnant and my yearly eighty thousand dollars salary was not covering my due bills and college loans. I thought that in case I fairly paid off my obligations, at that point we might do very well with my salary coordinating our living costs. I tried my scheme by paying the current due on one of my credit cards that had a title that included the word āUniversal.ā Before I left my office late, I logged on as fellow worker and asked for check issuance in the amount of $1,200 to Universal. This check looked typical since we did a lot of transactions with a company that includes the word āUniversalā in its title. After the check was issued, I sent it with my statement of account to my credit card company, and the company credited my account in the amount of $1,200. After some time, I felt guilty and worried because if I were caught, I would lose my job for stealing $1,200. After one week, I continued repeating the same embezzlement process while changing the amounts till I had settled the whole amount of ninety-five thousand dollars due on my credit card. After my credit card settlement, I was free and clear of all debt, except for the mortgage on our house.
I noticed that one of my checks for $5,555 had apparently gone missing just before Iād cleared all the charges to the Universal card; it wasnāt posted against my credit card account, and it had not cleared the companyās bank account. I was stressed that something had caused the bank not to prepare the check or that my extortion had been discovered. For a couple of weeks, I anxiously looked at my emails each morning checking the subject lines for words like āexplanation requested.ā Each time the phone rang I expected that I would be called for a meeting. At that point at around 10 on a hot late-August morning, I received a mail envelope from our accounts payable department in Chicago. There was the check I had overlooked to put my individual credit card number on the check, and so the card payment processors didnāt know whose account to credit. The accounts payable department sent it back to me since they did not know the purpose and the nature of this check.
In the middle of cold winter, the impacts of the panic had worn off, and I began considering around how simple it was to get that $95,000 ābonus. I am thinking of repeating again the fraud although I was not really in need of that money as was the case before. I remembered the missing check scare, and so I now wanted a scheme that bypassed mailing the checks to my credit card company. I registered āSigma Enterpriseā with our secretary of state, got a federal ID number, and opened a bank account at a major bank with lots of branches in Chicago. I chose Sigma because our company did a lot of business with another company that had Sigma in its name. On a Wednesday afternoon, right before I left for the day, I logged on as associate and requested a check made out for $35,250. I then logged on as myself and approved it. I picked up the check on Thursday and deposited it in Sigmaās bank account on Saturday morning. The teller treated the transaction like any other routine transaction and handed me the deposit receipt showing that the whole $35,250 was available. Using this method, I stole about $2.1 million in 2004, $1.9 million in 2005, $3.4 million in 2006, and $0.9 million in 2007.
Getting a check was easy because I logged on as fellow worker or associate and requested a check and then I approved the check. The checks were printed overnight, and it was associateās job to collect the physical checks every day from the company building next door. I had to make sure that associate had the day off the next day because, when associate was away, I was the person who collected the checks. At my desk I would remove the Sigma check from the batch, and all the other checks were mailed off to where they were supposed to go. Normally, I would just wait for associate to take the day off, and Iād request a Sigma check the day before. If I needed money urgently, Iād give associate the day off so that I could collect the checks.
For every credit, there has to be a debit, and my debits needed to be hidden somewhere. Our payments were usually for purchases, sales commission expenses, miscellaneous expenses, or an administrative expense. In 2003 and 2004, I hid all the debits in ledger accounts that had a lot of reconciliation activity, making sure that my debit helped the account reconcile to zero. One of my accounting tasks was to record the investment income of our Australian investments in U.S. dollars (USD) in our U.S. accounting records. I was supposed to use the average Australian-dollar-to-USD exchange rate to record the interest income. From 2005 to 2007, I would calculate the real exchange rate, and then I would purposely weaken the Australian dollar by a few basis points to understate the USD value of that income. I was the only person who worked on this task for seven years, and because the accounting system had thousands of journal entries and billions of dollars of transactions, my Sigma checks remained hidden.
Every Sigma check was deposited in my account, and I have to find some explanations and excuses to spend my money without making my spouse and colleagues suspicious. In the beginning, I told my friends and wife that I have a side business where I have many clients and good source of money; at that time, all was convinced because my lifestyle was normal. However, when my lifestyle changed to the ownership of unique luxury cars, travel trips to different cities on business class, I told people that I was a gambler at Vegas and brought with me proofs that I really gambled. The gambling story did not work with my wife especially that my wealth jumped to three million dollars in less than two years. So, I knew that I had to choose either my wife or continue my fraudulent activities. I chose to insulate her from all the acts I committed and I did not want to engage her with any of my dirty actions, so I divorced her.
By mid-2007, my extortion had cooled off, and Iād as it was taken $1 million so distant that year. An internal audit found that 3 of us in the accounting department had an authorization to approve checks and we were given internal forms that we had to fill them. One morning, the fellow worker and I were discussing this matter with our boss and we all agreed that we must not have approval checks authority since we are much involved in the accounting function. We actually revoked our own check approval authority.
My ex-wife and the fellow worker became friends and she informed him that she was not convinced of the gambling story which raised the suspicion of the fellow worker. The fellow worker went immediately to the office and ran a query about the whole list of 2007 checks that she had approved or requested. She found the Sigma checks which amounted to 0.9 million dollars. On Friday, I was called for a meeting which did not went well and after two days I was arrested by fraud investigators and I told them that I wanted to talk with my attorney
Required:
Answer the following questions:
1. What anti-fraud policies would have Delta Company adopt to prevent such fraudulent activities?
2. Based on your analysis of the case, why the accounting information system controls are important?
3. What are the fraudulent behaviors encountered in the case, and what are the mitigating controls that can be implemented to avoid such fraudulent activities?
4. Suppose that you were assigned to conduct an integrated audit for Delta Company., what are the high-risk areas that you may identify?
In: Accounting
Project 2
This assignment follows the standard form for a project submission.
You need to include an introduction, primary discussion, and
summary. Include graphs, tables, and images, as necessary, to
improve the clarity of your discussion. Your project needs to be
both correct and well written. Communication remains a critical
component of our modern, technological society. A few notes about
format: you MUST use MS Word for your project and use Equation
Editor for all mathematical symbols, e.g. z(t) = sin(t)
+ 1/ln(t)
If you have any questions about the requirements for this project,
ask before you submit.
This project addresses modeling with Ordinary Differential Equations and solutions to those equations. You will solve a problem analytically and program an Improved Eulerās method numerical solver.
Projects provide you with an opportunity to improve your
Mathematical skills as well as your communication. For this project
you will need to correctly solve the problems and effectively
communicate your ideas and solutions. This assignment will be
evaluated across the areas of
Validity, Readability, and Fluency.
Validity ā Validity corresponds to the validity of your arguments.
It addresses the extent to which your method is appropriate, your
calculations are correct, and your analysis is accurate.
Readability ā If your written work is not readable it cannot be
assessed. Since the ability to
communicate Mathematics is a focal point for this class, special
attention will be paid to the
readability of your work.
Fluency ā Mathematics is a concise and precise language, and we
wish to enhance your fluency.
Therefore, part of every assessment will focus on your ability to
incorporate correct, established notation and terminology into your
written work
Evaluation criteria
Validity
quality methods, correct solutions, proper conclusions, complete
reasoning
Readability organization,
presentation, format, clarity, effectiveness
Fluency
proper notation, proper terminology, appropriate definitions,
conciseness
Project 2: A bead sliding along a rod
A bead is constrained to slide along a rod of length L. The rod
is rotating in a vertical plane with a constant angular speed, W,
about a pivot in the middle of the rod. The pivot allows the
bead to freely slide along the rod, i.e. the pivot does not impede
the movement of the bead. Let r(t) denote the distance of the bead
away from the pivot where r(t) can be positive
or negative.
Equation of Motion
Applying Newtonās second law provides a balance of forces due to gravity, friction, centripetal acceleration, and linear acceleration. The equation resulting from these forces is
M d2r/dt2 + B dr/dt ā mw2r = -mg sin(wt) where m is the mass of the bead, B is the coefficient of viscous damping, w is the constant speed of angular rotation, g = 9.81 m/s2 is the acceleration due to gravity, and r is the distance between the pivot and the bead.The rod is initially horizontal, and the initial conditions for the bead are r(0) = r0 and rā(0) = v0.
Problem 1
Consider the frictionless rod, i.e. B = 0. The equation of
motion becomes m d2r/dt2 - mw2r =
-mg sin (wt) with g = 9.81 m/s2 and a constant angular
speed w.
The rod is initially horizontal, and the initial conditions for the
bead are r(0) = r0 and rā(0) = v0.
A) Analytically solve this initial value problem for r(t)
B) Consider the initial position to be zero, i.e. r0 =
0. Find the initial velocity, v0, that results in a
solution, r(t) , which displays simple harmonic motion, i.e. a
solution that does not tend toward infinity.
C) Explain why any initial velocity besides the one you found in
part B) causes the bead to fly off the rod.
D) Given r(t) displays simple harmonic motion, i.e. part B), find
the minimum required length
of the rod, L, as a function of the angular speed, W.
E) Suppose W = 2, graph the solutions, r(t) , for the initial
conditions given here: r0 = 0 and initial velocities of
v0 = 2.40, 2.45, 2.50, and the initial velocity you
found in part B). Use 0 < t < 5
Problem 2
Consider the frictionless rod, i.e. B = 0. The equation of motion becomes m d2r/dt2 - mw2r = -mg sin (wt) with g = 9.81 m/s2 and a constant angular speed W. The rod is initially horizontal, and the initial conditions for the bead are r(0) = r0 and rā(0) = v0. You will need to write an Improved Euler Method system solver to find r(t) and v(t)
A) Numerically solve for r(t) when W = 2, r0 = 0, and
v0 = 2.40, 2.45, 2.50. Solve in the time interval t E
[0,5] . Use step sizes h = 1/32, 1/128, 1/512 and compare your
results. Also, compare your best numerical answers with your
analytic answers from Problem 1 part E).
B) Numerically solve for r(t) when W = 2, r0 = 0, and
v0 is selected to give simple harmonic motion, i.e.
Problem 1 part B. Use small step sizes, e.g. h = 1/512,
1/2048, 1/8192, etc. Solve for the longest time interval that
provides reasonable values for r(t) . Compare your results to the
analytic solution that gives simple harmonic motion. What does this
demonstrate about numerical solutions?
In: Physics
Enter True of False
1. Software documentation is a support task.
2. If a compromise has to be made in development, software documentation can wait.
3. You have to know beforehand what kind of public the document you are about to produce addresses.
4. It is not better to express an idea in a simple way than risk an intricate, complex formulation.
5. Avoid having as many fields as possible filled in the screen shots that you take, so that your readers donāt get confused with information overload.
6. Communication is a key factor in the work of a technical writer.
7. The generic term for software documentation is "technical writing".
8. Every software product should include a ReadMe file with appropriate information.
9. The first thing you should think about when starting to write a manual is how your users are going to use it.
10. Most people read the software manual before using it.
11. The user interface needs to be easy to use even if the user does not have an overall systems understanding.
12. It is a good idea is to include links to a glossary of terms that might be more difficult to understand.
13. Although important, documentation cannot lead to system failure.
14. Managers and software engineers should pay as much attention to documentation and its associated costs as to the development of the software itself.
15. Some of the documents should tell users how to administer the system.
16. For large software projects, it is usually the case that documentation starts
being generated well before the development process begins.
17. Plans, schedules, process quantity documents and organizational and project standards are process documentation.
18. Process documentation describes the product that is being developed.
19. System documentation describes the product from the point of view of the users and managers.
20. Process documentation is produced so that the implementation of the system can be managed.
21. Product documentation is used before the system is operational.
22. Often the principal technical communication documents in a project are working papers.
23. Plans, estimates and schedules are documents which report how resources were used during the process of development.
24. The major characteristic of process documentation is that most of it becomes
outdated.
25. Test schedules are of little value during software evolution.
26. Product documentation is concerned with describing the design of the software
product.
27. System documentation is principally intended for maintenance engineers.
28. Users are responsible for managing the software used by end-users.
29. The functional description of the system outlines the system requirements and
briefly describes the services provided.
30. The system installation document is intended for system users.
31. The introductory manual should present a formal introduction to the system.
32. The system reference manual should describe the system facilities and their
usage.
33. An uncommon system maintenance problem is ensuring that all representations
are kept in step when the system is changed.
34. Document quality is important, but not as important as program quality.
35. Achieving document quality requires management commitment to
document design, standards, and quality assurance processes.
36. The first IEEE standard for user documentation was produced in 1967.
37. It is often a good idea to present two or more differently phrased descriptions of the same thing.
38. Documents should be inspected in the same way as programs.
39. Converting a word processor document to HTML usually produces effective on-line documentation.
40. The three phases of document preparation and associated support facilities are document creation, document polishing, and document editing.
41. A systems analyst should try to learn as much about a system as the user being interviewed.
42. Beginning analysts often overestimate the amount of work that a user performs.
43. System requirements define the functions to be provided by a system.
44. A usability requirement describes the dependability of the system.
45. Prototyping is not a method used in information gathering.
46. The most important step in preparing for an interview is to determine which users should be involved.
47. The most effective interviews are free-form, with no questions prepared in advance.
48. There is no advantage to having more than one project member present when interviewing users.
49. An activity diagram is a type of workflow diagram.
50. One advantage of JAD is that it reduces the requirements definition time.
51. Technical staff does not need to be included in JAD sessions.
52. The purpose of a structured walkthrough is to find problems and errors.
53. Define system requirements is not an activity in the analysis phase.
54. Reviewing existing forms is one of the fact-finding techniques.
55. Researching vendor solutions is not one of the fact-finding techniques.
56. Data flow diagrams are an important object-oriented technique.
57. A data flow is considered data in motion.
58. Details of a system are shown in a context diagram.
59. A level-0 diagram shows a systemās major processes.
60. In a DFD, it is sometimes possible for a process to have only inputs, but no outputs.
61. Functional decomposition is a non-iterative process.
62. Conservation of inputs and outputs is called balancing.
63. The software requirements specification document is sometimes called a functional specification.
64. The SRS tells the development team what to build.
65. The SRS is not used by the testing team.
66. The SRS can also be used to develop documentation.
67. Project scope is not a section of the SRS.
68. Requirements should be written in passive, not active voice.
69. Ambiguous language leads to verifiable requirements.
70. Redundancy in requirements leads to better maintainability.
In: Computer Science
When selecting colors for slide presentation, which action will enhance readability? A. Using smooth contrast in colors to assist color blind viewers
B. Choosing the color purple will create a sense of
passion
C. Applying black on red makes an object appear closer
D. Selecting colors on opposite side of the color wheel improves
visualization
A nurse is creating a slide presentation and is using a predesigned combination of colors, font style, size, and position of place keepers. The nurse is using a:
A. Lecture support model. B. Content layer.
C. Layout layer.
D. Theme.
A nurse is deciding about whether to create a spreadsheet or a table to present information. The nurse would most likely use a table for which information?
A. Listing benefits and limitations of breast-feeding
B. Monitoring for medication errors
C. Calculating length of stays of surgical clients
D. Documenting quality improvement of client care
A new nurse is learning how to use a spreadsheet and how it differs from word processing. Which action would the nurse most likely identify as specific to spreadsheets?
A. Features used in spreadsheets are different.
B. Programs are bundled with other office software. C. Formula
functions are built into the menu options. D. Windows are used but
icons are not.
A nurse is reading a journal article about information literacy and health literacy and how it connects with critical thinking. Which strategy would the nurse most likely find as a key aspect of critical thinking?
A. Focusing on a single approach for problem solving
B. Using a set of skills for processing and generating information
C. Providing specific answers to questions D. Setting boundaries
for seeking information
A nurse is a student in a doctoral program in nursing practice. The major focus of this program for a nurse being prepared at this level would be to:
A. Conduct nursing research.
B. Evaluate research findings.
C. Use findings to develop evidence-based practice guidelines.D.
Use research findings in clinical practice.
A nurse is working to develop information technology skills. The nurse demonstrates current skills when he or she is able to:
A. Use searching tools.
B. Understand computer networks.
C. Think abstractly.
D. Manipulate information into something new.
When evaluating a website for health information, which question would be important for the nurse to ask to determine the validity of the information?
A. Is the site a for-profit or not-for-profit site?
B. Is the date of the site's last update clearly specified? C. Who
is the author and what are his or her credentials? D. Are there any
potential conflicts of interest?
A nurse is evaluating the information obtained from a search and notes that the majority of information is from reports of expert committees. The nurse interprets this research to be at which level of evidence?
A. Level VII B. Level VI C. Level V D. Level IV
When searching PubMed, the nurse understands that this database uses a search term structure:
A. Based on linear relationship.
B. Using a feedback loop.
C. Employing a hierarchy.
D. Involving a specific to general search.
A nurse is using a mobile device and stores his calendar, contacts, and notes. The nurse understands that this information is stored at which location?
A. ROM
B. RAM
C. Flash memory
D. Compact flash card
A nurse is preparing to do research about heart disease and women using a handheld device. Which uses would be appropriate? Select all that apply.
A. Participating in web-based research surveys B. Storing data for aggregation and analysis C. Recording comments from a focus group
D. Taking photos of changes in status with a treatment E. Searching for evidence-based resources
A group of nurses are creating a database. Which step would the nurses need to do first? A. Determine the data to be collected.
B. Identify the question needing an answer. C. Develop a purpose
for the database.
D. Identify the pieces of data to enter.
When working with a database, a nurse selects data from a set of items that was created to avoid having to type in the entry. The nurse is using a:
A. Field.
B. Relational database. C. Look-up table.
D. Query.
A nurse wants to find information about databases specifically used in nursing. Which query would the nurse use to obtain the narrowest search?
A. Databases or nursing
B. Nursing not databases
C. Nursing and/or databases D. Nursing and databases
A nurse is preparing to create a database. Which aspect would the nurse identify as being the foundation for the database?
A. Table B. Query C. Form D. Report
Various barriers to the adoption of evidence-based practice have been identified. Which would be considered a personal barrier? Select all that apply.
A. Inadequate numbers of staff to participate
B. Difficulty in understanding research statistics C. Lack of
information literacy skills
D. Inaccessibility of resources for searching
E. Perception of unrealistic use of research
When developing a presentation for the unit staff, a nurse manager uses a free personal reference manager. Which actions would the nurse manager be able to take? Select all that apply.
A. Save citations
B. Take notes
C. Create reference lists
D. Hyperlink to files
E. Store information on the Cloud
A nurse is using the Cochrane Library to search for systematic reviews about treatment for hypertension. The nurse understands that systematic reviews help to reduce bias. When reading the review, the nurse notes that the review covers a wide range of databases and search terms. The nurse identifies this as reducing which bias?
A. Selection B. Indexing C. Publishing D. Sampling
In: Nursing
When selecting colors for slide presentation, which action will enhance readability? A. Using smooth contrast in colors to assist color blind viewers
B. Choosing the color purple will create a sense of
passion
C. Applying black on red makes an object appear closer
D. Selecting colors on opposite side of the color wheel improves
visualization
A nurse is creating a slide presentation and is using a predesigned combination of colors, font style, size, and position of place keepers. The nurse is using a:
A. Lecture support model. B. Content layer.
C. Layout layer.
D. Theme.
A nurse is deciding about whether to create a spreadsheet or a table to present information. The nurse would most likely use a table for which information?
A. Listing benefits and limitations of breast-feeding
B. Monitoring for medication errors
C. Calculating length of stays of surgical clients
D. Documenting quality improvement of client care
A new nurse is learning how to use a spreadsheet and how it differs from word processing. Which action would the nurse most likely identify as specific to spreadsheets?
A. Features used in spreadsheets are different.
B. Programs are bundled with other office software. C. Formula
functions are built into the menu options. D. Windows are used but
icons are not.
A nurse is reading a journal article about information literacy and health literacy and how it connects with critical thinking. Which strategy would the nurse most likely find as a key aspect of critical thinking?
A. Focusing on a single approach for problem solving
B. Using a set of skills for processing and generating information
C. Providing specific answers to questions D. Setting boundaries
for seeking information
A nurse is a student in a doctoral program in nursing practice. The major focus of this program for a nurse being prepared at this level would be to:
A. Conduct nursing research.
B. Evaluate research findings.
C. Use findings to develop evidence-based practice guidelines.D.
Use research findings in clinical practice.
A nurse is working to develop information technology skills. The nurse demonstrates current skills when he or she is able to:
A. Use searching tools.
B. Understand computer networks.
C. Think abstractly.
D. Manipulate information into something new.
When evaluating a website for health information, which question would be important for the nurse to ask to determine the validity of the information?
A. Is the site a for-profit or not-for-profit site?
B. Is the date of the site's last update clearly specified? C. Who
is the author and what are his or her credentials? D. Are there any
potential conflicts of interest?
A nurse is evaluating the information obtained from a search and notes that the majority of information is from reports of expert committees. The nurse interprets this research to be at which level of evidence?
A. Level VII B. Level VI C. Level V D. Level IV
When searching PubMed, the nurse understands that this database uses a search term structure:
A. Based on linear relationship.
B. Using a feedback loop.
C. Employing a hierarchy.
D. Involving a specific to general search.
A nurse is using a mobile device and stores his calendar, contacts, and notes. The nurse understands that this information is stored at which location?
A. ROM
B. RAM
C. Flash memory
D. Compact flash card
A nurse is preparing to do research about heart disease and women using a handheld device. Which uses would be appropriate? Select all that apply.
A. Participating in web-based research surveys B. Storing data for aggregation and analysis C. Recording comments from a focus group
D. Taking photos of changes in status with a treatment E. Searching for evidence-based resources
A group of nurses are creating a database. Which step would the nurses need to do first? A. Determine the data to be collected.
B. Identify the question needing an answer. C. Develop a purpose
for the database.
D. Identify the pieces of data to enter.
When working with a database, a nurse selects data from a set of items that was created to avoid having to type in the entry. The nurse is using a:
A. Field.
B. Relational database. C. Look-up table.
D. Query.
A nurse wants to find information about databases specifically used in nursing. Which query would the nurse use to obtain the narrowest search?
A. Databases or nursing
B. Nursing not databases
C. Nursing and/or databases D. Nursing and databases
A nurse is preparing to create a database. Which aspect would the nurse identify as being the foundation for the database?
A. Table B. Query C. Form D. Report
Various barriers to the adoption of evidence-based practice have been identified. Which would be considered a personal barrier? Select all that apply.
A. Inadequate numbers of staff to participate
B. Difficulty in understanding research statistics C. Lack of
information literacy skills
D. Inaccessibility of resources for searching
E. Perception of unrealistic use of research
When developing a presentation for the unit staff, a nurse manager uses a free personal reference manager. Which actions would the nurse manager be able to take? Select all that apply.
A. Save citations
B. Take notes
C. Create reference lists
D. Hyperlink to files
E. Store information on the Cloud
A nurse is using the Cochrane Library to search for systematic reviews about treatment for hypertension. The nurse understands that systematic reviews help to reduce bias. When reading the review, the nurse notes that the review covers a wide range of databases and search terms. The nurse identifies this as reducing which bias?
A. Selection B. Indexing C. Publishing D. Sampling
In: Nursing
Run a regression analysis and find a best model to predict White Speck count from cotton fiber properties given to you. Make sure to show all your steps on how you came up with the best model. Word or text file.
| Harvdate date of cotton | Cotton fiber Length | Cotton fiber Strength | Short fiber content | Cotton fineness | Immature fiber content | Cotton trash count | Cotton dust count | Cotton nep count | y=White Specks |
| 1 | 1.06 | 31.8 | 21.8 | 196 | 6.36 | 75 | 404 | 253 | 17.8 |
| 1 | 1.06 | 31.0 | 21.0 | 197 | 6.05 | 76 | 292 | 247 | 11.6 |
| 1 | 1.07 | 30.3 | 24.0 | 193 | 6.98 | 102 | 390 | 291 | 11.0 |
| 1 | 1.06 | 30.6 | 20.9 | 196 | 6.58 | 49 | 188 | 297 | 10.2 |
| 1 | 1.04 | 31.0 | 25.7 | 195 | 7.24 | 67 | 298 | 262 | 10.6 |
| 1 | 1.05 | 30.5 | 25.0 | 196 | 7.05 | 37 | 181 | 262 | 10.8 |
| 3 | 1.05 | 30.7 | 20.6 | 198 | 6.02 | 63 | 259 | 247 | 11.0 |
| 3 | 1.04 | 30.3 | 20.5 | 199 | 5.93 | 29 | 131 | 220 | 7.6 |
| 3 | 1.05 | 29.5 | 21.0 | 197 | 6.46 | 43 | 194 | 306 | 9.6 |
| 3 | 1.05 | 29.3 | 19.8 | 198 | 6.17 | 31 | 187 | 258 | 6.0 |
| 3 | 1.04 | 30.5 | 21.6 | 199 | 6.62 | 59 | 278 | 310 | 14.0 |
| 3 | 1.05 | 30.2 | 21.9 | 197 | 6.87 | 32 | 172 | 272 | 13.4 |
| 4 | 1.03 | 30.7 | 23.5 | 198 | 6.47 | 88 | 339 | 275 | 14.8 |
| 4 | 1.04 | 30.0 | 20.5 | 194 | 5.92 | 69 | 264 | 236 | 16.4 |
| 4 | 1.03 | 29.5 | 24.9 | 195 | 6.99 | 104 | 382 | 347 | 17.4 |
| 4 | 1.03 | 29.3 | 21.7 | 196 | 7.11 | 72 | 270 | 297 | 16.4 |
| 4 | 1.02 | 29.6 | 22.7 | 196 | 6.64 | 115 | 348 | 270 | 17.2 |
| 4 | 1.01 | 30.6 | 20.7 | 197 | 6.29 | 64 | 270 | 239 | 17.4 |
| 4 | 1.04 | 30.8 | 24.4 | 193 | 6.44 | 118 | 412 | 300 | 25.2 |
| 4 | 1.05 | 30.6 | 24.4 | 197 | 6.77 | 94 | 346 | 298 | 18.8 |
| 4 | 1.04 | 30.0 | 24.1 | 196 | 6.60 | 90 | 323 | 282 | 21.8 |
| 4 | 1.05 | 29.4 | 21.3 | 195 | 6.44 | 83 | 255 | 261 | 18.0 |
| 4 | 1.01 | 29.6 | 22.2 | 196 | 5.95 | 120 | 409 | 227 | 11.4 |
| 4 | 1.02 | 29.9 | 22.6 | 196 | 6.60 | 88 | 311 | 268 | 18.6 |
| 5 | 1.04 | 30.3 | 24.8 | 196 | 7.35 | 91 | 266 | 295 | 19.8 |
| 5 | 1.05 | 29.1 | 23.4 | 196 | 7.08 | 72 | 274 | 291 | 13.4 |
| 5 | 1.03 | 29.3 | 27.0 | 197 | 7.49 | 139 | 514 | 330 | 18.2 |
| 5 | 1.04 | 28.7 | 23.1 | 196 | 7.37 | 71 | 271 | 310 | 17.0 |
| 5 | 1.01 | 29.0 | 23.1 | 196 | 6.81 | 79 | 326 | 284 | 13.2 |
| 5 | 1.00 | 29.2 | 24.4 | 197 | 7.10 | 60 | 272 | 270 | 19.4 |
| 5 | 1.06 | 30.1 | 23.9 | 196 | 7.01 | 142 | 464 | 310 | 19.0 |
| 5 | 1.06 | 29.7 | 22.1 | 197 | 6.61 | 92 | 296 | 268 | 20.4 |
| 5 | 1.04 | 29.8 | 22.6 | 194 | 6.56 | 113 | 347 | 246 | 31.6 |
| 5 | 1.05 | 29.6 | 21.7 | 193 | 6.40 | 120 | 391 | 290 | 18.8 |
| 5 | 1.06 | 29.8 | 21.7 | 195 | 6.75 | 140 | 432 | 285 | 17.2 |
| 5 | 1.06 | 30.2 | 20.1 | 197 | 6.83 | 100 | 351 | 256 | 22.0 |
| 6 | 1.04 | 28.1 | 22.8 | 197 | 6.46 | 65 | 218 | 327 | 25.2 |
| 6 | 1.03 | 28.8 | 23.6 | 199 | 6.43 | 63 | 217 | 247 | 26.6 |
| 6 | 1.03 | 28.8 | 24.4 | 198 | 6.86 | 80 | 294 | 294 | 28.4 |
| 6 | 1.03 | 28.8 | 22.7 | 197 | 7.26 | 61 | 257 | 313 | 16.2 |
| 6 | 1.03 | 28.8 | 23.8 | 197 | 6.56 | 81 | 293 | 313 | 17.4 |
| 6 | 1.01 | 29.0 | 21.6 | 196 | 6.49 | 67 | 262 | 256 | 16.6 |
| 6 | 1.03 | 29.4 | 23.0 | 198 | 6.35 | 80 | 294 | 267 | 22.8 |
| 6 | 1.03 | 29.4 | 23.7 | 197 | 6.49 | 60 | 215 | 267 | 10.0 |
| 6 | 1.05 | 29.3 | 21.1 | 195 | 6.26 | 70 | 241 | 255 | 11.6 |
| 6 | 1.03 | 29.1 | 24.9 | 197 | 6.89 | 70 | 237 | 266 | 13.4 |
| 6 | 1.05 | 28.8 | 22.6 | 199 | 7.09 | 100 | 318 | 321 | 18.2 |
| 6 | 1.04 | 28.7 | 24.0 | 197 | 6.90 | 76 | 261 | 319 | 17.2 |
| 7 | 1.04 | 30.0 | 25.2 | 195 | 7.02 | 85 | 431 | 277 | 21.4 |
| 7 | 1.03 | 28.7 | 23.1 | 193 | 6.44 | 66 | 280 | 322 | 18.6 |
| 7 | 1.04 | 28.8 | 23.0 | 194 | 7.18 | 78 | 376 | 298 | 18.6 |
| 7 | 1.04 | 28.5 | 21.0 | 196 | 6.67 | 56 | 230 | 298 | 16.0 |
| 7 | 1.01 | 28.4 | 22.3 | 195 | 6.36 | 69 | 280 | 262 | 12.0 |
| 7 | 1.03 | 28.7 | 22.1 | 194 | 6.66 | 64 | 257 | 296 | 11.6 |
| 7 | 1.04 | 29.9 | 22.4 | 195 | 6.83 | 103 | 361 | 276 | 17.0 |
| 7 | 1.03 | 29.9 | 21.6 | 194 | 6.34 | 64 | 196 | 237 | 18.4 |
| 7 | 1.04 | 28.3 | 21.3 | 192 | 6.14 | 84 | 251 | 260 | 17.6 |
| 7 | 1.04 | 28.7 | 21.2 | 193 | 5.87 | 81 | 280 | 297 | 22.2 |
| 7 | 1.04 | 29.2 | 22.6 | 193 | 6.25 | 88 | 290 | 291 | 20.4 |
| 7 | 1.04 | 28.4 | 19.9 | 194 | 6.30 | 68 | 212 | 286 | 24.8 |
In: Statistics and Probability