In: Economics
Gerard grew up in Virginia. One of his colleagues remembers that Gerard was known in school, skilled at his schoolwork and that he liked to play soccer and listen to Opera. The friend also remembers that Gerardâs family was a modest one that can barely satisfy its needs while Gerard was not happy with this type of living. Gerard graduated with an accounting degree from a good college in 1996. He enjoyed the inward mechanisms of accounting systems, and in 2000 he found himself part of Delta Company after his employer, Pioneer manufacturing, was acquired for more than $10 billion. Gerard had an influential role in adopting enterprise resource planning system that replaced the old one in while he was employed at Delta Company. A mistake by his new employer, Pioneer Manufacturing created an opportunity for Gerard to steal company funds.
As a part of the changeover team, Gerard became experienced in all aspects of ERP accounting modules including accounts receivables, accounts payable, fixed assets, financial reporting, journal entries, checks and wire payment processing. I was granted by mistake an authorization to sign and approve checks, along with a co-worker, up to $300,000. I discovered this permission quite by accident some two years after the takeover.
Our accounting department consisted of a manager, assistant manager, accounting controller, and three people whom I supervise. Together with a fellow worker and an associate, I was among those authorized employees who can request checks. The fellow- worker and I also could approve checks. In the accounting department, we shared our passwords with each other so we can finalize the work without any delay in case someone was out of office and the task had to be done immediately. One day, while I was drinking my coffee and thinking, I realized that I can access to one of my colleaguesâ account to request a check and I can then log into my credentials and approve my own request. I went to work every day for the next year tempted by the pot of gold that was there for the taking.
In June 2003, my spouse was pregnant and my yearly eighty thousand dollars salary was not covering my due bills and college loans. I thought that in case I fairly paid off my obligations, at that point we might do very well with my salary coordinating our living costs. I tried my scheme by paying the current due on one of my credit cards that had a title that included the word âUniversal.â Before I left my office late, I logged on as fellow worker and asked for check issuance in the amount of $1,200 to Universal. This check looked typical since we did a lot of transactions with a company that includes the word âUniversalâ in its title. After the check was issued, I sent it with my statement of account to my credit card company, and the company credited my account in the amount of $1,200. After some time, I felt guilty and worried because if I were caught, I would lose my job for stealing $1,200. After one week, I continued repeating the same embezzlement process while changing the amounts till I had settled the whole amount of ninety-five thousand dollars due on my credit card. After my credit card settlement, I was free and clear of all debt, except for the mortgage on our house.
I noticed that one of my checks for $5,555 had apparently gone missing just before Iâd cleared all the charges to the Universal card; it wasnât posted against my credit card account, and it had not cleared the companyâs bank account. I was stressed that something had caused the bank not to prepare the check or that my extortion had been discovered. For a couple of weeks, I anxiously looked at my emails each morning checking the subject lines for words like âexplanation requested.â Each time the phone rang I expected that I would be called for a meeting. At that point at around 10 on a hot late-August morning, I received a mail envelope from our accounts payable department in Chicago. There was the check I had overlooked to put my individual credit card number on the check, and so the card payment processors didnât know whose account to credit. The accounts payable department sent it back to me since they did not know the purpose and the nature of this check.
In the middle of cold winter, the impacts of the panic had worn off, and I began considering around how simple it was to get that $95,000 âbonus. I am thinking of repeating again the fraud although I was not really in need of that money as was the case before. I remembered the missing check scare, and so I now wanted a scheme that bypassed mailing the checks to my credit card company. I registered âSigma Enterpriseâ with our secretary of state, got a federal ID number, and opened a bank account at a major bank with lots of branches in Chicago. I chose Sigma because our company did a lot of business with another company that had Sigma in its name. On a Wednesday afternoon, right before I left for the day, I logged on as associate and requested a check made out for $35,250. I then logged on as myself and approved it. I picked up the check on Thursday and deposited it in Sigmaâs bank account on Saturday morning. The teller treated the transaction like any other routine transaction and handed me the deposit receipt showing that the whole $35,250 was available. Using this method, I stole about $2.1 million in 2004, $1.9 million in 2005, $3.4 million in 2006, and $0.9 million in 2007.
Getting a check was easy because I logged on as fellow worker or associate and requested a check and then I approved the check. The checks were printed overnight, and it was associateâs job to collect the physical checks every day from the company building next door. I had to make sure that associate had the day off the next day because, when associate was away, I was the person who collected the checks. At my desk I would remove the Sigma check from the batch, and all the other checks were mailed off to where they were supposed to go. Normally, I would just wait for associate to take the day off, and Iâd request a Sigma check the day before. If I needed money urgently, Iâd give associate the day off so that I could collect the checks.
For every credit, there has to be a debit, and my debits needed to be hidden somewhere. Our payments were usually for purchases, sales commission expenses, miscellaneous expenses, or an administrative expense. In 2003 and 2004, I hid all the debits in ledger accounts that had a lot of reconciliation activity, making sure that my debit helped the account reconcile to zero. One of my accounting tasks was to record the investment income of our Australian investments in U.S. dollars (USD) in our U.S. accounting records. I was supposed to use the average Australian-dollar-to-USD exchange rate to record the interest income. From 2005 to 2007, I would calculate the real exchange rate, and then I would purposely weaken the Australian dollar by a few basis points to understate the USD value of that income. I was the only person who worked on this task for seven years, and because the accounting system had thousands of journal entries and billions of dollars of transactions, my Sigma checks remained hidden.
Every Sigma check was deposited in my account, and I have to find some explanations and excuses to spend my money without making my spouse and colleagues suspicious. In the beginning, I told my friends and wife that I have a side business where I have many clients and good source of money; at that time, all was convinced because my lifestyle was normal. However, when my lifestyle changed to the ownership of unique luxury cars, travel trips to different cities on business class, I told people that I was a gambler at Vegas and brought with me proofs that I really gambled. The gambling story did not work with my wife especially that my wealth jumped to three million dollars in less than two years. So, I knew that I had to choose either my wife or continue my fraudulent activities. I chose to insulate her from all the acts I committed and I did not want to engage her with any of my dirty actions, so I divorced her.
By mid-2007, my extortion had cooled off, and Iâd as it was taken $1 million so distant that year. An internal audit found that 3 of us in the accounting department had an authorization to approve checks and we were given internal forms that we had to fill them. One morning, the fellow worker and I were discussing this matter with our boss and we all agreed that we must not have approval checks authority since we are much involved in the accounting function. We actually revoked our own check approval authority.
My ex-wife and the fellow worker became friends and she informed him that she was not convinced of the gambling story which raised the suspicion of the fellow worker. The fellow worker went immediately to the office and ran a query about the whole list of 2007 checks that she had approved or requested. She found the Sigma checks which amounted to 0.9 million dollars. On Friday, I was called for a meeting which did not went well and after two days I was arrested by fraud investigators and I told them that I wanted to talk with my attorney
Required:
Answer the following questions:
1. What anti-fraud policies would have Delta Company adopt to prevent such fraudulent activities?
2. Based on your analysis of the case, why the accounting information system controls are important?
3. What are the fraudulent behaviors encountered in the case, and what are the mitigating controls that can be implemented to avoid such fraudulent activities?
4. Suppose that you were assigned to conduct an integrated audit for Delta Company., what are the high-risk areas that you may identify?
In: Accounting
Project 2
This assignment follows the standard form for a project submission.
You need to include an introduction, primary discussion, and
summary. Include graphs, tables, and images, as necessary, to
improve the clarity of your discussion. Your project needs to be
both correct and well written. Communication remains a critical
component of our modern, technological society. A few notes about
format: you MUST use MS Word for your project and use Equation
Editor for all mathematical symbols, e.g. z(t) = sin(t)
+ 1/ln(t)
If you have any questions about the requirements for this project,
ask before you submit.
This project addresses modeling with Ordinary Differential Equations and solutions to those equations. You will solve a problem analytically and program an Improved Eulerâs method numerical solver.
Projects provide you with an opportunity to improve your
Mathematical skills as well as your communication. For this project
you will need to correctly solve the problems and effectively
communicate your ideas and solutions. This assignment will be
evaluated across the areas of
Validity, Readability, and Fluency.
Validity â Validity corresponds to the validity of your arguments.
It addresses the extent to which your method is appropriate, your
calculations are correct, and your analysis is accurate.
Readability â If your written work is not readable it cannot be
assessed. Since the ability to
communicate Mathematics is a focal point for this class, special
attention will be paid to the
readability of your work.
Fluency â Mathematics is a concise and precise language, and we
wish to enhance your fluency.
Therefore, part of every assessment will focus on your ability to
incorporate correct, established notation and terminology into your
written work
Evaluation criteria
Validity
quality methods, correct solutions, proper conclusions, complete
reasoning
Readability organization,
presentation, format, clarity, effectiveness
Fluency
proper notation, proper terminology, appropriate definitions,
conciseness
Project 2: A bead sliding along a rod
A bead is constrained to slide along a rod of length L. The rod
is rotating in a vertical plane with a constant angular speed, W,
about a pivot in the middle of the rod. The pivot allows the
bead to freely slide along the rod, i.e. the pivot does not impede
the movement of the bead. Let r(t) denote the distance of the bead
away from the pivot where r(t) can be positive
or negative.
Equation of Motion
Applying Newtonâs second law provides a balance of forces due to gravity, friction, centripetal acceleration, and linear acceleration. The equation resulting from these forces is
M d2r/dt2 + B dr/dt â mw2r = -mg sin(wt) where m is the mass of the bead, B is the coefficient of viscous damping, w is the constant speed of angular rotation, g = 9.81 m/s2 is the acceleration due to gravity, and r is the distance between the pivot and the bead.The rod is initially horizontal, and the initial conditions for the bead are r(0) = r0 and râ(0) = v0.
Problem 1
Consider the frictionless rod, i.e. B = 0. The equation of
motion becomes m d2r/dt2 - mw2r =
-mg sin (wt) with g = 9.81 m/s2 and a constant angular
speed w.
The rod is initially horizontal, and the initial conditions for the
bead are r(0) = r0 and râ(0) = v0.
A) Analytically solve this initial value problem for r(t)
B) Consider the initial position to be zero, i.e. r0 =
0. Find the initial velocity, v0, that results in a
solution, r(t) , which displays simple harmonic motion, i.e. a
solution that does not tend toward infinity.
C) Explain why any initial velocity besides the one you found in
part B) causes the bead to fly off the rod.
D) Given r(t) displays simple harmonic motion, i.e. part B), find
the minimum required length
of the rod, L, as a function of the angular speed, W.
E) Suppose W = 2, graph the solutions, r(t) , for the initial
conditions given here: r0 = 0 and initial velocities of
v0 = 2.40, 2.45, 2.50, and the initial velocity you
found in part B). Use 0 < t < 5
Problem 2
Consider the frictionless rod, i.e. B = 0. The equation of motion becomes m d2r/dt2 - mw2r = -mg sin (wt) with g = 9.81 m/s2 and a constant angular speed W. The rod is initially horizontal, and the initial conditions for the bead are r(0) = r0 and râ(0) = v0. You will need to write an Improved Euler Method system solver to find r(t) and v(t)
A) Numerically solve for r(t) when W = 2, r0 = 0, and
v0 = 2.40, 2.45, 2.50. Solve in the time interval t E
[0,5] . Use step sizes h = 1/32, 1/128, 1/512 and compare your
results. Also, compare your best numerical answers with your
analytic answers from Problem 1 part E).
B) Numerically solve for r(t) when W = 2, r0 = 0, and
v0 is selected to give simple harmonic motion, i.e.
Problem 1 part B. Use small step sizes, e.g. h = 1/512,
1/2048, 1/8192, etc. Solve for the longest time interval that
provides reasonable values for r(t) . Compare your results to the
analytic solution that gives simple harmonic motion. What does this
demonstrate about numerical solutions?
In: Physics
Enter True of False
1. Software documentation is a support task.
2. If a compromise has to be made in development, software documentation can wait.
3. You have to know beforehand what kind of public the document you are about to produce addresses.
4. It is not better to express an idea in a simple way than risk an intricate, complex formulation.
5. Avoid having as many fields as possible filled in the screen shots that you take, so that your readers donât get confused with information overload.
6. Communication is a key factor in the work of a technical writer.
7. The generic term for software documentation is "technical writing".
8. Every software product should include a ReadMe file with appropriate information.
9. The first thing you should think about when starting to write a manual is how your users are going to use it.
10. Most people read the software manual before using it.
11. The user interface needs to be easy to use even if the user does not have an overall systems understanding.
12. It is a good idea is to include links to a glossary of terms that might be more difficult to understand.
13. Although important, documentation cannot lead to system failure.
14. Managers and software engineers should pay as much attention to documentation and its associated costs as to the development of the software itself.
15. Some of the documents should tell users how to administer the system.
16. For large software projects, it is usually the case that documentation starts
being generated well before the development process begins.
17. Plans, schedules, process quantity documents and organizational and project standards are process documentation.
18. Process documentation describes the product that is being developed.
19. System documentation describes the product from the point of view of the users and managers.
20. Process documentation is produced so that the implementation of the system can be managed.
21. Product documentation is used before the system is operational.
22. Often the principal technical communication documents in a project are working papers.
23. Plans, estimates and schedules are documents which report how resources were used during the process of development.
24. The major characteristic of process documentation is that most of it becomes
outdated.
25. Test schedules are of little value during software evolution.
26. Product documentation is concerned with describing the design of the software
product.
27. System documentation is principally intended for maintenance engineers.
28. Users are responsible for managing the software used by end-users.
29. The functional description of the system outlines the system requirements and
briefly describes the services provided.
30. The system installation document is intended for system users.
31. The introductory manual should present a formal introduction to the system.
32. The system reference manual should describe the system facilities and their
usage.
33. An uncommon system maintenance problem is ensuring that all representations
are kept in step when the system is changed.
34. Document quality is important, but not as important as program quality.
35. Achieving document quality requires management commitment to
document design, standards, and quality assurance processes.
36. The first IEEE standard for user documentation was produced in 1967.
37. It is often a good idea to present two or more differently phrased descriptions of the same thing.
38. Documents should be inspected in the same way as programs.
39. Converting a word processor document to HTML usually produces effective on-line documentation.
40. The three phases of document preparation and associated support facilities are document creation, document polishing, and document editing.
41. A systems analyst should try to learn as much about a system as the user being interviewed.
42. Beginning analysts often overestimate the amount of work that a user performs.
43. System requirements define the functions to be provided by a system.
44. A usability requirement describes the dependability of the system.
45. Prototyping is not a method used in information gathering.
46. The most important step in preparing for an interview is to determine which users should be involved.
47. The most effective interviews are free-form, with no questions prepared in advance.
48. There is no advantage to having more than one project member present when interviewing users.
49. An activity diagram is a type of workflow diagram.
50. One advantage of JAD is that it reduces the requirements definition time.
51. Technical staff does not need to be included in JAD sessions.
52. The purpose of a structured walkthrough is to find problems and errors.
53. Define system requirements is not an activity in the analysis phase.
54. Reviewing existing forms is one of the fact-finding techniques.
55. Researching vendor solutions is not one of the fact-finding techniques.
56. Data flow diagrams are an important object-oriented technique.
57. A data flow is considered data in motion.
58. Details of a system are shown in a context diagram.
59. A level-0 diagram shows a systemâs major processes.
60. In a DFD, it is sometimes possible for a process to have only inputs, but no outputs.
61. Functional decomposition is a non-iterative process.
62. Conservation of inputs and outputs is called balancing.
63. The software requirements specification document is sometimes called a functional specification.
64. The SRS tells the development team what to build.
65. The SRS is not used by the testing team.
66. The SRS can also be used to develop documentation.
67. Project scope is not a section of the SRS.
68. Requirements should be written in passive, not active voice.
69. Ambiguous language leads to verifiable requirements.
70. Redundancy in requirements leads to better maintainability.
In: Computer Science
When selecting colors for slide presentation, which action will enhance readability? A. Using smooth contrast in colors to assist color blind viewers
B. Choosing the color purple will create a sense of
passion
C. Applying black on red makes an object appear closer
D. Selecting colors on opposite side of the color wheel improves
visualization
A nurse is creating a slide presentation and is using a predesigned combination of colors, font style, size, and position of place keepers. The nurse is using a:
A. Lecture support model. B. Content layer.
C. Layout layer.
D. Theme.
A nurse is deciding about whether to create a spreadsheet or a table to present information. The nurse would most likely use a table for which information?
A. Listing benefits and limitations of breast-feeding
B. Monitoring for medication errors
C. Calculating length of stays of surgical clients
D. Documenting quality improvement of client care
A new nurse is learning how to use a spreadsheet and how it differs from word processing. Which action would the nurse most likely identify as specific to spreadsheets?
A. Features used in spreadsheets are different.
B. Programs are bundled with other office software. C. Formula
functions are built into the menu options. D. Windows are used but
icons are not.
A nurse is reading a journal article about information literacy and health literacy and how it connects with critical thinking. Which strategy would the nurse most likely find as a key aspect of critical thinking?
A. Focusing on a single approach for problem solving
B. Using a set of skills for processing and generating information
C. Providing specific answers to questions D. Setting boundaries
for seeking information
A nurse is a student in a doctoral program in nursing practice. The major focus of this program for a nurse being prepared at this level would be to:
A. Conduct nursing research.
B. Evaluate research findings.
C. Use findings to develop evidence-based practice guidelines.D.
Use research findings in clinical practice.
A nurse is working to develop information technology skills. The nurse demonstrates current skills when he or she is able to:
A. Use searching tools.
B. Understand computer networks.
C. Think abstractly.
D. Manipulate information into something new.
When evaluating a website for health information, which question would be important for the nurse to ask to determine the validity of the information?
A. Is the site a for-profit or not-for-profit site?
B. Is the date of the site's last update clearly specified? C. Who
is the author and what are his or her credentials? D. Are there any
potential conflicts of interest?
A nurse is evaluating the information obtained from a search and notes that the majority of information is from reports of expert committees. The nurse interprets this research to be at which level of evidence?
A. Level VII B. Level VI C. Level V D. Level IV
When searching PubMed, the nurse understands that this database uses a search term structure:
A. Based on linear relationship.
B. Using a feedback loop.
C. Employing a hierarchy.
D. Involving a specific to general search.
A nurse is using a mobile device and stores his calendar, contacts, and notes. The nurse understands that this information is stored at which location?
A. ROM
B. RAM
C. Flash memory
D. Compact flash card
A nurse is preparing to do research about heart disease and women using a handheld device. Which uses would be appropriate? Select all that apply.
A. Participating in web-based research surveys B. Storing data for aggregation and analysis C. Recording comments from a focus group
D. Taking photos of changes in status with a treatment E. Searching for evidence-based resources
A group of nurses are creating a database. Which step would the nurses need to do first? A. Determine the data to be collected.
B. Identify the question needing an answer. C. Develop a purpose
for the database.
D. Identify the pieces of data to enter.
When working with a database, a nurse selects data from a set of items that was created to avoid having to type in the entry. The nurse is using a:
A. Field.
B. Relational database. C. Look-up table.
D. Query.
A nurse wants to find information about databases specifically used in nursing. Which query would the nurse use to obtain the narrowest search?
A. Databases or nursing
B. Nursing not databases
C. Nursing and/or databases D. Nursing and databases
A nurse is preparing to create a database. Which aspect would the nurse identify as being the foundation for the database?
A. Table B. Query C. Form D. Report
Various barriers to the adoption of evidence-based practice have been identified. Which would be considered a personal barrier? Select all that apply.
A. Inadequate numbers of staff to participate
B. Difficulty in understanding research statistics C. Lack of
information literacy skills
D. Inaccessibility of resources for searching
E. Perception of unrealistic use of research
When developing a presentation for the unit staff, a nurse manager uses a free personal reference manager. Which actions would the nurse manager be able to take? Select all that apply.
A. Save citations
B. Take notes
C. Create reference lists
D. Hyperlink to files
E. Store information on the Cloud
A nurse is using the Cochrane Library to search for systematic reviews about treatment for hypertension. The nurse understands that systematic reviews help to reduce bias. When reading the review, the nurse notes that the review covers a wide range of databases and search terms. The nurse identifies this as reducing which bias?
A. Selection B. Indexing C. Publishing D. Sampling
In: Nursing
When selecting colors for slide presentation, which action will enhance readability? A. Using smooth contrast in colors to assist color blind viewers
B. Choosing the color purple will create a sense of
passion
C. Applying black on red makes an object appear closer
D. Selecting colors on opposite side of the color wheel improves
visualization
A nurse is creating a slide presentation and is using a predesigned combination of colors, font style, size, and position of place keepers. The nurse is using a:
A. Lecture support model. B. Content layer.
C. Layout layer.
D. Theme.
A nurse is deciding about whether to create a spreadsheet or a table to present information. The nurse would most likely use a table for which information?
A. Listing benefits and limitations of breast-feeding
B. Monitoring for medication errors
C. Calculating length of stays of surgical clients
D. Documenting quality improvement of client care
A new nurse is learning how to use a spreadsheet and how it differs from word processing. Which action would the nurse most likely identify as specific to spreadsheets?
A. Features used in spreadsheets are different.
B. Programs are bundled with other office software. C. Formula
functions are built into the menu options. D. Windows are used but
icons are not.
A nurse is reading a journal article about information literacy and health literacy and how it connects with critical thinking. Which strategy would the nurse most likely find as a key aspect of critical thinking?
A. Focusing on a single approach for problem solving
B. Using a set of skills for processing and generating information
C. Providing specific answers to questions D. Setting boundaries
for seeking information
A nurse is a student in a doctoral program in nursing practice. The major focus of this program for a nurse being prepared at this level would be to:
A. Conduct nursing research.
B. Evaluate research findings.
C. Use findings to develop evidence-based practice guidelines.D.
Use research findings in clinical practice.
A nurse is working to develop information technology skills. The nurse demonstrates current skills when he or she is able to:
A. Use searching tools.
B. Understand computer networks.
C. Think abstractly.
D. Manipulate information into something new.
When evaluating a website for health information, which question would be important for the nurse to ask to determine the validity of the information?
A. Is the site a for-profit or not-for-profit site?
B. Is the date of the site's last update clearly specified? C. Who
is the author and what are his or her credentials? D. Are there any
potential conflicts of interest?
A nurse is evaluating the information obtained from a search and notes that the majority of information is from reports of expert committees. The nurse interprets this research to be at which level of evidence?
A. Level VII B. Level VI C. Level V D. Level IV
When searching PubMed, the nurse understands that this database uses a search term structure:
A. Based on linear relationship.
B. Using a feedback loop.
C. Employing a hierarchy.
D. Involving a specific to general search.
A nurse is using a mobile device and stores his calendar, contacts, and notes. The nurse understands that this information is stored at which location?
A. ROM
B. RAM
C. Flash memory
D. Compact flash card
A nurse is preparing to do research about heart disease and women using a handheld device. Which uses would be appropriate? Select all that apply.
A. Participating in web-based research surveys B. Storing data for aggregation and analysis C. Recording comments from a focus group
D. Taking photos of changes in status with a treatment E. Searching for evidence-based resources
A group of nurses are creating a database. Which step would the nurses need to do first? A. Determine the data to be collected.
B. Identify the question needing an answer. C. Develop a purpose
for the database.
D. Identify the pieces of data to enter.
When working with a database, a nurse selects data from a set of items that was created to avoid having to type in the entry. The nurse is using a:
A. Field.
B. Relational database. C. Look-up table.
D. Query.
A nurse wants to find information about databases specifically used in nursing. Which query would the nurse use to obtain the narrowest search?
A. Databases or nursing
B. Nursing not databases
C. Nursing and/or databases D. Nursing and databases
A nurse is preparing to create a database. Which aspect would the nurse identify as being the foundation for the database?
A. Table B. Query C. Form D. Report
Various barriers to the adoption of evidence-based practice have been identified. Which would be considered a personal barrier? Select all that apply.
A. Inadequate numbers of staff to participate
B. Difficulty in understanding research statistics C. Lack of
information literacy skills
D. Inaccessibility of resources for searching
E. Perception of unrealistic use of research
When developing a presentation for the unit staff, a nurse manager uses a free personal reference manager. Which actions would the nurse manager be able to take? Select all that apply.
A. Save citations
B. Take notes
C. Create reference lists
D. Hyperlink to files
E. Store information on the Cloud
A nurse is using the Cochrane Library to search for systematic reviews about treatment for hypertension. The nurse understands that systematic reviews help to reduce bias. When reading the review, the nurse notes that the review covers a wide range of databases and search terms. The nurse identifies this as reducing which bias?
A. Selection B. Indexing C. Publishing D. Sampling
In: Nursing
Run a regression analysis and find a best model to predict White Speck count from cotton fiber properties given to you. Make sure to show all your steps on how you came up with the best model. Word or text file.
| Harvdate date of cotton | Cotton fiber Length | Cotton fiber Strength | Short fiber content | Cotton fineness | Immature fiber content | Cotton trash count | Cotton dust count | Cotton nep count | y=White Specks |
| 1 | 1.06 | 31.8 | 21.8 | 196 | 6.36 | 75 | 404 | 253 | 17.8 |
| 1 | 1.06 | 31.0 | 21.0 | 197 | 6.05 | 76 | 292 | 247 | 11.6 |
| 1 | 1.07 | 30.3 | 24.0 | 193 | 6.98 | 102 | 390 | 291 | 11.0 |
| 1 | 1.06 | 30.6 | 20.9 | 196 | 6.58 | 49 | 188 | 297 | 10.2 |
| 1 | 1.04 | 31.0 | 25.7 | 195 | 7.24 | 67 | 298 | 262 | 10.6 |
| 1 | 1.05 | 30.5 | 25.0 | 196 | 7.05 | 37 | 181 | 262 | 10.8 |
| 3 | 1.05 | 30.7 | 20.6 | 198 | 6.02 | 63 | 259 | 247 | 11.0 |
| 3 | 1.04 | 30.3 | 20.5 | 199 | 5.93 | 29 | 131 | 220 | 7.6 |
| 3 | 1.05 | 29.5 | 21.0 | 197 | 6.46 | 43 | 194 | 306 | 9.6 |
| 3 | 1.05 | 29.3 | 19.8 | 198 | 6.17 | 31 | 187 | 258 | 6.0 |
| 3 | 1.04 | 30.5 | 21.6 | 199 | 6.62 | 59 | 278 | 310 | 14.0 |
| 3 | 1.05 | 30.2 | 21.9 | 197 | 6.87 | 32 | 172 | 272 | 13.4 |
| 4 | 1.03 | 30.7 | 23.5 | 198 | 6.47 | 88 | 339 | 275 | 14.8 |
| 4 | 1.04 | 30.0 | 20.5 | 194 | 5.92 | 69 | 264 | 236 | 16.4 |
| 4 | 1.03 | 29.5 | 24.9 | 195 | 6.99 | 104 | 382 | 347 | 17.4 |
| 4 | 1.03 | 29.3 | 21.7 | 196 | 7.11 | 72 | 270 | 297 | 16.4 |
| 4 | 1.02 | 29.6 | 22.7 | 196 | 6.64 | 115 | 348 | 270 | 17.2 |
| 4 | 1.01 | 30.6 | 20.7 | 197 | 6.29 | 64 | 270 | 239 | 17.4 |
| 4 | 1.04 | 30.8 | 24.4 | 193 | 6.44 | 118 | 412 | 300 | 25.2 |
| 4 | 1.05 | 30.6 | 24.4 | 197 | 6.77 | 94 | 346 | 298 | 18.8 |
| 4 | 1.04 | 30.0 | 24.1 | 196 | 6.60 | 90 | 323 | 282 | 21.8 |
| 4 | 1.05 | 29.4 | 21.3 | 195 | 6.44 | 83 | 255 | 261 | 18.0 |
| 4 | 1.01 | 29.6 | 22.2 | 196 | 5.95 | 120 | 409 | 227 | 11.4 |
| 4 | 1.02 | 29.9 | 22.6 | 196 | 6.60 | 88 | 311 | 268 | 18.6 |
| 5 | 1.04 | 30.3 | 24.8 | 196 | 7.35 | 91 | 266 | 295 | 19.8 |
| 5 | 1.05 | 29.1 | 23.4 | 196 | 7.08 | 72 | 274 | 291 | 13.4 |
| 5 | 1.03 | 29.3 | 27.0 | 197 | 7.49 | 139 | 514 | 330 | 18.2 |
| 5 | 1.04 | 28.7 | 23.1 | 196 | 7.37 | 71 | 271 | 310 | 17.0 |
| 5 | 1.01 | 29.0 | 23.1 | 196 | 6.81 | 79 | 326 | 284 | 13.2 |
| 5 | 1.00 | 29.2 | 24.4 | 197 | 7.10 | 60 | 272 | 270 | 19.4 |
| 5 | 1.06 | 30.1 | 23.9 | 196 | 7.01 | 142 | 464 | 310 | 19.0 |
| 5 | 1.06 | 29.7 | 22.1 | 197 | 6.61 | 92 | 296 | 268 | 20.4 |
| 5 | 1.04 | 29.8 | 22.6 | 194 | 6.56 | 113 | 347 | 246 | 31.6 |
| 5 | 1.05 | 29.6 | 21.7 | 193 | 6.40 | 120 | 391 | 290 | 18.8 |
| 5 | 1.06 | 29.8 | 21.7 | 195 | 6.75 | 140 | 432 | 285 | 17.2 |
| 5 | 1.06 | 30.2 | 20.1 | 197 | 6.83 | 100 | 351 | 256 | 22.0 |
| 6 | 1.04 | 28.1 | 22.8 | 197 | 6.46 | 65 | 218 | 327 | 25.2 |
| 6 | 1.03 | 28.8 | 23.6 | 199 | 6.43 | 63 | 217 | 247 | 26.6 |
| 6 | 1.03 | 28.8 | 24.4 | 198 | 6.86 | 80 | 294 | 294 | 28.4 |
| 6 | 1.03 | 28.8 | 22.7 | 197 | 7.26 | 61 | 257 | 313 | 16.2 |
| 6 | 1.03 | 28.8 | 23.8 | 197 | 6.56 | 81 | 293 | 313 | 17.4 |
| 6 | 1.01 | 29.0 | 21.6 | 196 | 6.49 | 67 | 262 | 256 | 16.6 |
| 6 | 1.03 | 29.4 | 23.0 | 198 | 6.35 | 80 | 294 | 267 | 22.8 |
| 6 | 1.03 | 29.4 | 23.7 | 197 | 6.49 | 60 | 215 | 267 | 10.0 |
| 6 | 1.05 | 29.3 | 21.1 | 195 | 6.26 | 70 | 241 | 255 | 11.6 |
| 6 | 1.03 | 29.1 | 24.9 | 197 | 6.89 | 70 | 237 | 266 | 13.4 |
| 6 | 1.05 | 28.8 | 22.6 | 199 | 7.09 | 100 | 318 | 321 | 18.2 |
| 6 | 1.04 | 28.7 | 24.0 | 197 | 6.90 | 76 | 261 | 319 | 17.2 |
| 7 | 1.04 | 30.0 | 25.2 | 195 | 7.02 | 85 | 431 | 277 | 21.4 |
| 7 | 1.03 | 28.7 | 23.1 | 193 | 6.44 | 66 | 280 | 322 | 18.6 |
| 7 | 1.04 | 28.8 | 23.0 | 194 | 7.18 | 78 | 376 | 298 | 18.6 |
| 7 | 1.04 | 28.5 | 21.0 | 196 | 6.67 | 56 | 230 | 298 | 16.0 |
| 7 | 1.01 | 28.4 | 22.3 | 195 | 6.36 | 69 | 280 | 262 | 12.0 |
| 7 | 1.03 | 28.7 | 22.1 | 194 | 6.66 | 64 | 257 | 296 | 11.6 |
| 7 | 1.04 | 29.9 | 22.4 | 195 | 6.83 | 103 | 361 | 276 | 17.0 |
| 7 | 1.03 | 29.9 | 21.6 | 194 | 6.34 | 64 | 196 | 237 | 18.4 |
| 7 | 1.04 | 28.3 | 21.3 | 192 | 6.14 | 84 | 251 | 260 | 17.6 |
| 7 | 1.04 | 28.7 | 21.2 | 193 | 5.87 | 81 | 280 | 297 | 22.2 |
| 7 | 1.04 | 29.2 | 22.6 | 193 | 6.25 | 88 | 290 | 291 | 20.4 |
| 7 | 1.04 | 28.4 | 19.9 | 194 | 6.30 | 68 | 212 | 286 | 24.8 |
In: Statistics and Probability
1 )Why, historically, has the soft drink industry been so profitable?
Soft drink plays an important role in the peopleâs daily life. There is no doubt that this industry is profitable. The soft drink can be found in everywhere in the world, and the reasons of its high profit have several aspects.
The first aspect is a little capital investment and material cost. They include that machinery, overhead, labor, and materials. The machinery, overhead, and labor are the basic requirements and for soft drink industry, the levels of these conditions are not very high. So the cost of those is low and reasonable. On the other hand, the manufacturers add the concentrate flavors to the drink and improve peopleâs desire for the soft drink. Of course, the concentrate flavors are not expensive, just like caramel coloring, phosphoric or citric acid, natural flavors and caffeine.
Whatâs more, the marketing channels are increased in a way. People can buy the soft drink in different channels, and they can enjoy the drink everywhere. For example, they can buy them throughvending machines, in fast food chains, in supermarkets or other restaurants. It is convenient for people to solve the thirsty problem so that the soft drink manufacturer can get profits from it.
The last reason is that high consumption needs in the market. The manufacturers increased the advertising budgets for a soft drink. It is easy for people to know that what the soft drink is and the characters of soft drink. The soft drink became a household word in peopleâs life, and everyone knows that they can try the drink with low cost. The increased sales volume makes the soft drink manufacturers get more benefits from the marketing.
2) Compare the economics of the concentrate business to that of the bottling business: Why is the profitability so different?
The reasons for the differences can be explained in these aspects: a barrier to entry; substitutes; suppliers, buyers, rivals, etc. This question can be explained more clearly through giving a metaphor between cola war and real war. In the army, some troopsâ position is at front-line, like sales in cola business. And other troopsâ position is at base or logistic line, like the concentrate business or bottling business in cola-biz. The barrier to entry means quantity advantages and business secret in a way. The barrier to entry is the key to deal with this problem. Another important reason is business secret, the cola formula. Substitutes and rivals are the financial leverage. So it is the second reason why the concentrate industry has higher profitability than the bottling industry because of the interest expense which is from financial leverage. Suppliers and buyers are duopoly and competition market. In conclusion, duopoly even pure monopoly is a real dream for every firm or industry, just on profit margin section. But for consumers, it is a real nightmare.
On the other hand, this question can be explained like this. Concentrate manufacturers had supplier power: they could decide the price of sweeteners. However, bottling manufacturers had the buyersâ poweron bargaining leverage. Concentrate manufacturers still want bottling manufacturers to buy and carry their product. Therefore, although concentrate manufacturers can decide some prices about sweetener costs, they still had to make attractive prices for the bottling manufacturers buy their product.
3) How has the competition between Coke and Pepsi affected the industryâs profits?
The war between the Coke and Pepsi adjusted operations or branding properly to increase theefficiency of deliveries to markets. Advertising budgets increased obviously. Initially, the budget was usedto sales and made Pepsi and Coke knew by consumers, but now after the two giants established, the budgetallocation has shifted to the branding and marketing. It affects sales directly because it influences people tobuy the products.
Therefore, the effects can be summarized in three points. The first key point is vertical integration. Concentrate producer to build a nationwide franchise bottling network, Coke was the first mover and Pepsi followed it. New franchise agreements allowed bottlers to handle the non-cola brands of other concentrate producers. Bottlers could not carry directly competing for brands. The second point is the details of effects on industryâs profits. Throughout the 1980s, the growth of Coke and Pepsi put a squeeze on smaller concentrate producers. Shelf space for small brands declined and shuffled from one owner to another. The third point is acquisition during the Cola Wars. For example, in a five years period, Dr. Pepper was sold several times, Canada Dry twice, Sunkist once, Shasta one, and A&W once. Phillip Morris acquired Seven-UP in 1978 for a big premium, but racked up huge losses in the early 1980s, and then left the CSD business in 1985.
4. Can Coke and Pepsi sustain their profits in the wake of flattening demand and the growing popularity of on-CSDs?
There is no doubt that Coke and Pepsi can sustain their profits in the wake of flattening demand and the growing popularity of on-CSDs. At first, they focus their strength on the local market. They can improve recognition and brand awareness of their products, pay attention to substantial managerial influence in bottling and the distribution network by anchor bottling model and deepen their traditional products as well as introduce a variety of new products. Secondly, the overseas expansion also has an important position. Global soft drink sales growth slowed in the 2000s, but emerging markets such as China, India were still growing rapidly. Therefore, the Giants make a large investment overseas to develop new bottling plants, constructing more distribution channels, sales and marketing efforts as well as product research and development.
Please answer the question by using the above informations.
1) Why, historically, has the soft drink industry been so profitable?
2) Compare the economics of the concentrate business to that of the bottling business: Why is the profitability so different?
3) How has the competition between Coke and Pepsi affected the industryâs profits?
4) Can Coke and Pepsi sustain their profits in the wake of flattening demand and the growing popularity of non-CSDs?
In: Economics
Instructions
Please provide a clear WELL-WRITTEN interpretation for each question.
|
Name |
Variable information |
|
Diabetes |
Diabetes status (Yes, No) |
|
Age |
Age measured in years |
|
Race |
Race of each woman described as White, African American or Others. |
|
Glucose |
Blood glucose level measured in mmol/L |
|
BMI |
Body mass index measured in Kg/m2 |
|
Statins |
Intake of Statins medication to lower the levels of LDL (Yes, No) |
|
Alcohol |
Intake of alcohol (Yes , No) |
|
Smoking |
Smoking cigarettes (Yes, No) |
|
Exercise |
Any type of exercise (i.e. physical activity) routine (Yes, No) |
|
Physical_Activity |
Level of physical activity (Minimum, Moderate and vigorous) |
Objective 1: To assess relationship of body mass index (BMI) and relevant variables using dataset (Homework_EX_1). Data were collected on 2763 female to assess their risk of metabolic conditions. The variable Age, smoking, race, exercise, physical activity, alcohol, glucose, statins and diabetes are included in the given dataset.
Q1. First, determine the relationship between body mass index, BMI (dependent variable) and Blood glucose, glucose only (independent variable).
Q2. First, determine the relationship between body mass index, BMI (dependent variable) and diabetes only (independent variable).
Q3. Next, determine the relationship between body mass index, BMI (dependent variable) and glucose (independent variable) while including Age, diabetes, smoking, alcohol or physical activity variables in the model.
Q4. Now, Compare the fit of the first model in Q1 and the final model in Q3? Does the inclusion of these variables improve the model? Should all of them be included in the model? Explain your reasoning?
Objective 2: To assess relationship of diabetes and relevant variables using dataset (Homework_EX_1). Data were collected on 2763 female to assess their risk of metabolic conditions. The variable Age, smoking, race, exercise, physical activity, alcohol, glucose, statins and body mass index are included in the given dataset.
Q5. To assess relationship between diabetes as dependent variable and other variables as independent variable.
Q6. Use forward LR method and enter method to assess relationship between diabetes as a dependent variable and all other co-variates (Age, blood glucose, race, smoking, alcohol, exercise, physical activity, and body mass index). Also include in the models to assess the following three mentioned interaction terms; body mass index and blood glucose, alcohol and smoking and finally body mass index and physical activity. Which variables and their interaction terms are statistically associated with diabetes and only include Interaction terms which are appropriate? Choose your final model between enter and forward LR method and then perform model diagnostics. How do you interpret the effect size and 95% CI of your final model?
In: Nursing
Note: This problem is for the 2018 tax year.
Beth R. Jordan lives at 2322 Skyview Road, Mesa, AZ 85201. She is a tax accountant with Mesa Manufacturing Company, 1203 Western Avenue, Mesa, AZ 85201 (employer identification number 11-1111111). She also writes computer software programs for tax practitioners and has a part-time tax practice. Beth is single and has no dependents. Beth's birthday is July 4, 1972, and her Social Security number is 123-45-6785. She wants to contribute $3 to the Presidential Election Campaign Fund.
The following information is shown on Beth's Wage and Tax Statement (Form Wâ2) for 2018.
| Line | Description | Amount |
| 1 | Wages, tips, other compensation | $65,000.00 |
| 2 | Federal income tax withheld | 10,500.00 |
| 3 | Social Security wages | 65,000.00 |
| 4 | Social Security tax withheld | 4,030.00 |
| 5 | Medicare wages and tips | 65,000.00 |
| 6 | Medicare tax withheld | 942.50 |
| 15 | State | Arizona |
| 16 | State wages, tips, etc. | 65,000.00 |
| 17 | State income tax withheld | 1,954.00 |
During the year, Beth received interest of $1,300 from Arizona Federal Savings and Loan and $400 from Arizona State Bank. Each financial institution reported the interest income on a Form 1099âINT. She received qualified dividends of $800 from Blue Corporation, $750 from Green Corporation, and $650 from Orange Corporation. Each corporation reported Beth's dividend payments on a Form 1099âDIV.
Beth received a $1,100 income tax refund from the state of Arizona on April 29, 2018. On her 2017 Federal income tax return, she reported total itemized deductions of $8,200, which included $2,200 of state income tax withheld by her employer.
Fees earned from her part-time tax practice in 2018 totaled $3,800. She paid $600 to have the tax returns processed by a computerized tax return service.
On February 8, 2018, Beth bought 500 shares of Gray Corporation common stock for $17.60 a share. On September 12, 2018, Beth sold the stock for $14 a share.
Beth bought a used sport utility vehicle for $6,000 on June 5, 2018. She purchased the vehicle from her brother-in-law, who was unemployed and was in need of cash. On November 2, 2018, she sold the vehicle to a friend for $6,500.
On January 2, 2018, Beth acquired 100 shares of Blue Corporation common stock for $30 a share. She sold the stock on December 19, 2018, for $55 a share. Both stock transactions were reported to Beth on Form 1099âB; basis was not reported to the IRS.
During the year, Beth records revenues of $16,000 from the sale of a software program she developed. Beth incurred the following expenses in connection with her software development business.
| Cost of personal computer | $7,000 |
| Cost of printer | 2,000 |
| Furniture | 3,000 |
| Supplies | 650 |
| Fee paid to computer consultant | 3,500 |
Beth elected to expense the maximum portion of the cost of the computer, printer, and furniture allowed under the provisions of § 179. These items were placed in service on January 15, 2018, and used 100% in her business.
Although her employer suggested that Beth attend a convention on current developments in corporate taxation, Beth was not reimbursed for the travel expenses of $1,420 she incurred in attending the convention. The $1,420 included $200 for the cost of meals.
During the year, Beth paid $300 for prescription medicines and $2,875 for doctor interest to credit card bills and hospital bills. Medical insurance premiums were paid for her by her employer. Beth paid real property taxes of $1,766 on her home. Interest on her home mortgage (Valley National Bank) was $3,845, and interest to credit card companies was $320. Beth contributed $2,080 to various qualifying charities during the year. Professional dues and subscriptions totaled $350.
Beth paid estimated taxes of $1,000.
Required:
Beth is anticipating significant changes in her life in 2019, and she has asked you to estimate her taxable income and tax liability for 2019.
Beth just received word that she has been qualified to adopt a 2-year-old daughter. Beth expects that the adoption will be finalized in 2019 and that she will incur approximately $2,000 of adoption expenses.
In addition, she expects to incur approximately $3,500 of child and dependent care expenses relating to the care of her new daughter, which will enable her to keep her job at Mesa Manufacturing Company. However, with the additional demands on her time because of her daughter, she has decided to discontinue her two part-time jobs (i.e., the part-time tax practice and her software business), and she will cease making estimated income tax payments. Beth expects her interest income to increase from $1,700 to $2,050.
In your computations, assume that all other 2019 income and expenses will be the same as 2018 amounts. There no personal or dependency exemptions allowed in 2019. Medical deductions are subject to a 10% reduction of AGI in 2019. Beth's rate for the child an dependent care credit is 20% and she is entitled to the full child tax credit and adoption credit as well.
Click here to access the 2019 Tax Rate Schedules to use for this part of the problem.
For 2019, determine the following for Beth:
Filing status:
Total gross income: $
Adjusted gross income: $
The greater of total itemized deductions or standard deduction:
$
Taxable income: $
Total tax credits: $
Net tax liability (after credits but before any tax withholdings or
payments):
In: Accounting