Questions
Conduct a financial analysis of water system operation for the City of Smallville over the next...

Conduct a financial analysis of water system operation for the City of Smallville over the next ten years. Use the data below.   If you lack data, make assumptions or ask for it. Analyze O&M, capital costs and cash flows. The water system currently serves 100,000 people and is to be expanded to handle a population influx of 5% per year for the next ten years. Land use is mixed residential and commercial, but no industry. Base your estimates on residential demands and assume that commercial water use adds 15% to the residential use. You expand the system to accommodate growth and simultaneously maintain and renew the existing system during the period. The system is currently 15 years old and has depreciated on a 30-year depreciation cycle at 3.33% per year on a straight-line basis.

Your system expansion will be staged so that half is built now and half in five years. When you also invest in system renewal to overcome depreciation, the investments would be added to the costs of system expansion. System renewal is governed by the rule that current system value must not fall below 50% of replacement value.

You will take a loan for the first part of the construction and issue bonds for the next increment (in five years). You may vary from this if you choose different capital financing vehicles.   Loans are “revolving loans” and come from an infrastructure bank. Annual loan payments begin in one year and continue for ten years. Recommend how to finance the expansion and renewal with funding from plant investment fees, water use fees, sales tax revenues, and property tax revenues. Commercial property has 25% of the assessed valuation of the residential property.

Current population

100,000 (33,333 households)

Rate of population growth

5% per year for ten years; 0% after that.

Per capita water usage (average)

150 gpcd

Land Use

Mixed residential and commercial.

Planning horizon for capital improvements

10 years to meet demands; 30 yrs for system life

Plant investment fee

$5,000 per house connection

Current water fees

$2.50/1000 gal

Property tax dedicated to water system improvements

0.8 mills

Assessed valuation residential (market value * 0.2)

$980 million

Sales tax dedicated to water system

0.8%

Current anticipated taxable sales

$800 million per year

Interest rate on loan (due in ten years)

8%

Interest rate on bonds (use 20 year life)

6%

Projected inflation rate

0%

Capital cost of new or replacement system

$3,000 for each new person

Current value of existing system (average age15 years)

Replacement value less 15 years depreciation

Capital improvement goal

System value not below 50% of replacement

Depreciation of assets

3.33% per year

O&M cost

$50 per capita per year

1. Set up a spreadsheet and forecast cash flows for the next fifteen years.

2. Schedule for capital improvements (the capital improvement program)

In: Accounting

Reusable Passwords The most common authentication credential is the reusable password, which is a string of...

Reusable Passwords The most common authentication credential is the reusable password, which is a string of characters that a user types to gain access to the resources associated with a certain username (account) on a computer. These are called reusable passwords because the user types the password each time he or she needs access to the resource. Unfortunately, the reusable password is the weakest form of authentication, and it is appropriate only for the least sensitive assets.Ease of Use and Low Cost: The popularity of password authentication is hardly surprising. For users, passwords are familiar and relatively easy to use. For corporate IT departments, passwords add no cost because operating systems and many applications have built-in password authentication.Dictionary Attacks The main problem with passwords is that most users pick very weak passwords. To break into a host by guessing and trying passwords, hackers often use password dictionaries. These are lists of passwords likely to succeed. Running through a password dictionary to see if a password is accepted for a username is called a dictionary attack. Password dictionaries typically have three types of entries: a list of common password, the words in standard dictionaries, and hybrid versions of words such as capitalizing the first letter and adding a digit at the end. If a password is in one of these dictionaries, the attacker may have to try a fewthousand passwords, but this will only take seconds. No password that is in a cracker dictionary is adequately strong, no matter how long it is. Fortunately, good passwords cannot be broken by dictionary attacks. Good passwords have two characteristics. First, they are complex. It is essential to have a mix of upper and lower case letters that does not have a regular pattern such as alternating uppercase letters lowercase letters. It is also good—and some would say necessary—to include non-letter keyboard characters such as the digits (0 through 9) and other special characters (&, #./,?, etc.). If a password is complex, it can only be cracked by a brute-force attack, in which the cracker first tries all combinations of one character passwords, all combinations of two-character passwords, andso forth, until the attacker finds one that works. Complexity is not enough, however. Complex passwords must also be long. For short complex passwords, brute force attacks will still succeed. Beyond about 10 or 12 characters, however, there are too many combinations to try in a reasonable period of time.Overall, while long complex passwords can defeat determined attacks, most users select passwords that can be cracked with dictionary attacks. Reusable passwords are no longer appropriate in an era when password cracking programs can reveal most passwords in seconds or minutes. Passwords are only useful for non-sensitive assets.

1.Discuss and explain the types of passwords are susceptible to dictionary attacks?[5marks]

2.Can a password that can be broken by a dictionary attack be adequately strong if it is very long?Justify your answer. [5marks]

3.Explain the types of passwords can be broken only by brute-force attacks.[5marks]

4.What are the characteristics of passwords that are safe from even brute-force attacks?[5marks]

5.Discuss why is it undesirable to use reusable passwords for anything but the least sensitive assets

In: Computer Science

A) If an economy is in a steady state with no population growth or technological change...

A) If an economy is in a steady state with no population growth or technological change and the marginal product of capital is greater than the depreciation rate:

steady-state consumption per worker would be higher in a steady state with a higher saving rate.

steady-state consumption per worker would be higher in a steady state with a lower saving rate.

the depreciation rate should be decreased to achieve the Golden Rule level of consumption per worker.

the economy is following the Golden Rule.

B)Which of the following would raise the measured level of investment in the national income accounts?

I purchased shares in Zoom Inc. at the beginning of the pandemic.

Mary buys a pizza for lunch.

Sam buys a house that was built 100 years ago.

Tesla produces cars that are not sold this year.

George saves part of his income in a saving account.

C)In the Solow growth model, a country with a population growth rate of 3%, no technological growth, and depreciation rate 4%, will exhibit a steady state growth rate in output per worker of:

0%

-1%

3%

4%

7%

D)Which of the following policies were not adopted by the government in an attempt to reduce the natural rate of unemployment?

unemployment insurance

public retraining programs

government employment agencies

a bonus program for unemployment insurance claimants who found jobs quickly

E)In the Solow model, if Indonesia lowers its population growth rate, this will ____ the steady state level of output per person,and ____ the steady state growth rate in total output (not per person).

raise, not change

raise, raise

lower, raise

not change, raise

raise, lower

In: Economics

1.A space force service member finds himself floating 100 m from the ship in a training...

1.A space force service member finds himself floating 100 m from the ship in a training exercise where the drill instructor threw him out of the ship at 1 m/s. He is equipped with a shotgun that is built to work in space. The slug has a mass of 30 grams. He knows from the D.I.s’ safety brief that conservation of momentum and Newton’s third law of motion states if he shoots in the opposite direction he wants to go, he will move in the opposite direction. If his mass including spacesuit is 150 Kg and he has a 3.5 kg shotgun (Including ammo), what is the minimum speed of the slug to get him back to the ship? [12 gauge Mossberg 500 muzzle velocity is around 470 m/s] Is this velocity the space force member needs reasonable?

2. One solution to “artificial gravity” is to have space force service members on the inside of a rotating drum spinning on its axis at a constant rate. In micro gravity the human body does not do well for long periods of time. Muscle atrophy, bone loss, cataract... If the diameter of the space station is 800 m, how many revolutions per minute are needed for the “artificial gravity” acceleration to be 9.80 m/s2? (b) If the space station is a waiting area for space force members going to Mars, it might be desirable to simulate the acceleration due to gravity on the Martian surface is 3.70 m/s2. How many revolutions per minute are needed in this case?

In: Physics

Real-World Case 21.2 A woman was found unresponsive on a desert highway and brought to the...

Real-World Case 21.2

A woman was found unresponsive on a desert highway and brought to the emergency room of a local hospital. After five days in a coma, the woman awoke and did not know her name, where she was from, her history, or have any recollection of her past. She was given the name Jane Brown and eventually released from the hospital. After many years working with social service agencies, she built a new life but never regained memories of her past. Eventually, she graduated from college, moved to the Pacific Northwest, married, and had two sets of twins one year apart. One day a man recognized her as a missing woman from Arizona and contacted authorities. The police notified Ms. Brown of her past life and informed her she has family members who want to meet her. With the hope of remembering her past, she met with them. With the case receiving national news coverage and attention, the local hospital noticed a marked increase in the number of people requesting access the health records of Ms. Brown and her children.

Summarize the case in a few words.

1. What are the ethical issues associated with this case?

2. Identify a few things the hospital can do to prevent the unethical behavior.

3, Discuss Ms. Brown's potential ethical cultural shock by learning who she was and meeting family and friends who she does not remember. Think in terms of religion and cultural bias or prejudices.

In: Nursing

Need assistance responding to this discussion post in personal opinion. You’ll find that managers are also...

Need assistance responding to this discussion post in personal opinion.

You’ll find that managers are also the shareholder or the owner of a company. In these cases, the shareholders interests line up with the goal of the firm. Technically, what benefits the company would also benefit the shareholder. You’ll also see that when the shareholder or owner is not playing the manager role, there’s a disconnect between both the shareholder and manager’s interest (Stout, 2002). The manager usually would make decisions based off of what will benefit him instead of the firm’s success. An example of this would be when a manager is spending the corporate credit card to buy non-business uses of an event. This lack of connect between the shareholder and manager’s interest is called agency problem. The unnecessary use of non-business purpose on the company’s credit card or expense can decrease the profitability of that firm. Poor performing companies have been built to take extensive defense against takeovers. When a takeover defense is made, this action triggers the defenses. When a takeover takes places, management are usually first to exit their roles in the firm. What usually increases the agency problem is putting in place a takeover defense that are not related to managerial packages. For example, continuance of underperforming will not be resulting in job loss or security. Therefore, managers are more than likely to put themselves first in this type of companies. These managers in takeover defense firms would have to put in the extra work for lower pay and also avoid such actions that can be damaging to the company.

In: Finance

Below is a quote from Dr. Badu Sarkodie (Director, Public Health of the Ghana Health Service) in a response to a question of where Ghana is on the curve on the COVID-19 curve

Below is a quote from Dr. Badu Sarkodie (Director, Public Health of the Ghana Health Service) in a response to a question of where Ghana is on the curve on the COVID-19 curve, during the ministry of information press briefing on 5th May, 2020 “…The best way to assess this curve is to use the daily case incidence. Thus, everyday how many cases we do record and put them on a chart and then clearly you get the case load being built, reach its peak and get to a decline and finally to zero. The next best proxy data for this should be the date for onset for symptoms. If you do not have that, the next line will be the date the various people reported to the facility (i.e. the date they were seen at the facility). The next to that will be the date the sample was taken. If you look how Ghana started attacking the virus, waiting not to chase the virus but to face it directly, by doing enhance contact tracing, there are a lot of people that we tested without they having symptoms. Therefore, if we were using the daily case incidence with onset of symptoms, then we will have a challenge. So clearly the best data we are using for this bell-shaped curve is the data for the date samples were tested….” (a) State the three occurrences for measuring incidence of illness stated in the quote above. [3 marks] (b) (i) State the measure of occurrences that are being used to measure incidence of COVID-19 in Ghana according to the quote above. [3 marks] (ii) Why is this measure preferred to the other measures of occurrence? [4 marks]

In: Biology

Write a program in C language 1- Define a struct for students with the aforementioned attributes,...

Write a program in C language

1- Define a struct for students with the aforementioned attributes, test it by populating one
initialized struct variable with arbitrary input and take screenshots of the
output.

2- For each student, struct add an array of
number grades for a class the students are enrolled in such as S E 185. Then
write functions which find the max, average, and minimum score for a specified
assignment identified by a number, for example, Assignment 0 will be found at
index 0 of each student.
Create a new struct called university with the following attributes: university
name, an array of struct students, built year, and location. Create some random
students and assign those students to an arbitrary university. Create three
different universities with different students

3- Create a struct pointer variable for a student. You can initialize a struct pointer
variable in a similar way to a primitive variable type pointer initialization. We are
going to do some simple pointer to struct accesses. This part can be
counterintuitive and confusing so make sure you take your time on this part. The
difference between accessing structs and pointer structs is the notation used to
access the inherent attributes of the struct. To access an attribute of a pointer
struct, we use “->” and we do it as follows: Suppose we have a pointer struct
called menu that has attributes food and drink. We can access an attribute like
this: menu -> drink or menu -> food. Your task for this problem of the lab is to
initialize some pointer structs for students and populate them using pointer
notation.

In: Computer Science

Urban owns a valuable 10 acre plot of property which he wants to divide in half...

Urban owns a valuable 10 acre plot of property which he wants to divide in half (into two 5 acre parcels) and sell one of the halves. He tells Lovie that he can build 100 apartments on one of the halves, and specifically describes where the property lines would be (“It goes out to that tree, then to the water, then back…”). Lovie agrees to buy half from Urban, “as is” and they arrange to have the land surveyed. Urban was present when the survey was done and saw where stakes were pounded into the ground to mark the property boundary lines. Urban didn’t like where the lot lines were set because he would have been forced to keep a less valuable part of the property that was partially under water because of wetlands. After the surveyor left, and while Lovie was not present, Urban went onto the property and, without consent, moved the stakes marking the lot lines to make them MUCH more favorable to him. As a result, Lovie got less usable and valuable property than he bargained for and less than he was told he would get. Because of the wetlands on the property with the “revised” lot lines (as changed by Urban), there was no way Lovie could have built 100 apartments on the property. Can Lovie sue Urban? If so, under what legal theory? Identify the relevant theory (s) and analyze it, i.e. apply the theory to the facts and tell me who wins (and why).

In: Operations Management

Need assistance responding to this discussion post in personal opinion. You’ll find that managers are also...

Need assistance responding to this discussion post in personal opinion.

You’ll find that managers are also the shareholder or the owner of a company. In these cases, the shareholders interests line up with the goal of the firm. Technically, what benefits the company would also benefit the shareholder. You’ll also see that when the shareholder or owner is not playing the manager role, there’s a disconnect between both the shareholder and manager’s interest (Stout, 2002). The manager usually would make decisions based off of what will benefit him instead of the firm’s success. An example of this would be when a manager is spending the corporate credit card to buy non-business uses of an event. This lack of connect between the shareholder and manager’s interest is called agency problem. The unnecessary use of non-business purpose on the company’s credit card or expense can decrease the profitability of that firm.

Poor performing companies have been built to take extensive defense against takeovers. When a takeover defense is made, this action triggers the defenses. When a takeover takes places, management are usually first to exit their roles in the firm. What usually increases the agency problem is putting in place a takeover defense that are not related to managerial packages. For example, continuance of underperforming will not be resulting in job loss or security. Therefore, managers are more than likely to put themselves first in this type of companies. These managers in takeover defense firms would have to put in the extra work for lower pay and also avoid such actions that can be damaging to the company.

In: Finance