this there any way to shorten the line of code. Right now it about 300 line of code is there anyway to shorten it to 200 or so line of code?
import java.awt.*;
import java.awt.Color;
import java.awt.Desktop;
import java.awt.Font;
import java.awt.event.*;
import java.net.URL;
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.FileReader;
import java.io.FileWriter;
import javax.swing.JCheckBox;
import javax.swing.JColorChooser;
import javax.swing.JFileChooser;
import javax.swing.JFrame;
import javax.swing.JMenu;
import javax.swing.JMenuBar;
import javax.swing.JMenuItem;
import javax.swing.JOptionPane;
import javax.swing.JRadioButton;
import javax.swing.JScrollPane;
import javax.swing.JTextArea;
import javax.swing.KeyStroke;
//MyMenuFrame will use Jframe with actionlistener
class MyMenuFrame extends JFrame implements ActionListener{
//creating the main menu items
JMenu menuEdit = new JMenu("Edit");
JMenu menuPrint = new JMenu("Print");
JMenu mnFile = new JMenu("File");
JMenu menuHelp = new JMenu("Help");
//creating the submenu items here because we are gonna use these
across the code
JRadioButton subMenuItem1 = new JRadioButton("Times New
Roman");
JRadioButton subMenuItem2 = new JRadioButton("Arial");
JRadioButton subMenuItem3 = new JRadioButton("Serif");
JCheckBox subMenuItem4 = new JCheckBox("Bold");
JCheckBox subMenuItem5 = new JCheckBox("Italic");
//provide scrollable view of a component
JScrollPane scrollPane;
//creating notePadArea for notepad to input the text
JTextArea notePadArea;
public MyMenuFrame() {
//setting the border layout for JFrame
this.setLayout(new BorderLayout());
// create menu bar named menuBar
JMenuBar menuBar = new JMenuBar();
this.setJMenuBar(menuBar);//adding the menubar to JFrame
// create File menu
mnFile.setMnemonic(KeyEvent.VK_F);//Alt+F
menuBar.add(mnFile);//adding the menufile
// create Open menu item
JMenuItem mntmOpen = new JMenuItem("Open");//creating the Open menu
mntmOpen.setMnemonic(KeyEvent.VK_O);//Alt+O command
mntmOpen.setActionCommand("open");//when the command equals to 'open' then the corresponding action will be performed
mntmOpen.setAccelerator(KeyStroke.getKeyStroke('O', KeyEvent.CTRL_DOWN_MASK));//respond when user clicks Ctrl+O
mntmOpen.addActionListener(this);//adding actionLister to the Menu Option Open
// create Save menu item
JMenuItem mntmSave = new JMenuItem("Save");//creating the Save menu
mntmSave.setMnemonic(KeyEvent.VK_S);//Alt+S command
mntmSave.setActionCommand("save");//when the command equals to 'save' then the corresponding action will be performed
mntmSave.setAccelerator(KeyStroke.getKeyStroke('S', KeyEvent.CTRL_DOWN_MASK));//respond when user clicks Ctrl+S
mntmSave.addActionListener(this);//adding actionLister to the Menu Option Save
// create Exit menu item
JMenuItem mntmExit = new JMenuItem("Exit");//creating the Exit menu
mntmExit.setMnemonic(KeyEvent.VK_X);//Alt+X command
mntmExit.setActionCommand("exit");//when the command equals to 'exit' then the corresponding action will be performed
mntmExit.setAccelerator(KeyStroke.getKeyStroke('X', KeyEvent.CTRL_DOWN_MASK));//respond when user clicks Ctrl+X
mntmExit.addActionListener(this);//adding actionLister to the Menu Option Exit
// add open, save and exit menu to menu-bar
mnFile.add(mntmOpen);
mnFile.addSeparator();//adding separator between open and save
mnFile.add(mntmSave);
mnFile.addSeparator();//adding separator between save and exit
mnFile.add(mntmExit);
// create Edit menu
menuEdit.setMnemonic(KeyEvent.VK_E);//creating shortcut menu when user press Alt+E
menuBar.add(menuEdit);//adding the Edit to the menubar
JMenu submenu1 = new JMenu("Color");//creating the new menu
which comes under Edit
submenu1.setMnemonic(KeyEvent.VK_C);//creating shortcut menu when
user press Alt+C
JMenuItem menuItem0 = new JMenuItem("Change Color");//creating
submenu item called change color
menuItem0.setAccelerator(KeyStroke.getKeyStroke('C',
KeyEvent.CTRL_DOWN_MASK));//it responds when user click
Ctrl+C
menuItem0.setActionCommand("color");//setting the command used to
call the correcponding action when user click this
menuItem0.addActionListener(this);//adding actionlistener
submenu1.add(menuItem0);//adding this menu item to submenu
menuEdit.add(submenu1);//adding this submenu to editmenu
menuEdit.addSeparator();//creating separator between Color and
Font
ActionListener sm1 = new ActionListener() {
public void actionPerformed(ActionEvent actionEvent) {
subMenuItem1.setSelected(true);
subMenuItem2.setSelected(false);
subMenuItem3.setSelected(false);
notePadArea.setFont(new Font("Times New Roman", Font.PLAIN,
20));
}
};
ActionListener sm2 = new ActionListener() {
public void actionPerformed(ActionEvent actionEvent) {
subMenuItem2.setSelected(true);
subMenuItem1.setSelected(false);
subMenuItem3.setSelected(false);
notePadArea.setFont(new Font("Arial", Font.PLAIN, 20));
}
};
ActionListener sm3 = new ActionListener() {
public void actionPerformed(ActionEvent actionEvent) {
subMenuItem3.setSelected(true);
subMenuItem2.setSelected(false);
subMenuItem1.setSelected(false);
notePadArea.setFont(new Font("Serif", Font.PLAIN, 20));
}
};
JMenu submenu = new JMenu("Font");//creating the new menu which
comes under Edit
submenu.setMnemonic(KeyEvent.VK_F);//creating shortcut menu when
user press Alt+F
subMenuItem1.setMnemonic(KeyEvent.VK_T);//creating shortcut menu
when user press Alt+T for Times New Roman
subMenuItem1.setActionCommand("times_new_roman");//setting the
command used to call the correcponding action when user click
this
subMenuItem1.addActionListener(sm1);//adding actionlistener
submenu.add(subMenuItem1);//adding to the submenu
subMenuItem2.setMnemonic(KeyEvent.VK_A);//creating shortcut key
Alt+A
subMenuItem2.setActionCommand("arial");//respond when the command
equals to arial
subMenuItem2.addActionListener(sm2);//adding action listener
submenu.add(subMenuItem2);//adding it to the submenu
subMenuItem3.setMnemonic(KeyEvent.VK_S);
subMenuItem3.setActionCommand("serif");
subMenuItem3.addActionListener(sm3);
submenu.add(subMenuItem3);
submenu.addSeparator();
subMenuItem4.setMnemonic(KeyEvent.VK_B);
subMenuItem4.setActionCommand("bold");
subMenuItem4.addActionListener(this);
submenu.add(subMenuItem4);
subMenuItem5.setMnemonic(KeyEvent.VK_I);
subMenuItem5.setActionCommand("italic");
subMenuItem5.addActionListener(this);
submenu.add(subMenuItem5);
menuEdit.add(submenu);
// create Print menu
menuPrint.setMnemonic(KeyEvent.VK_P);
menuBar.add(menuPrint);
JMenuItem menuItemPrint = new JMenuItem("Send To Printer");
menuItemPrint.setAccelerator(KeyStroke.getKeyStroke('P', KeyEvent.CTRL_DOWN_MASK));
menuItemPrint.setActionCommand("print");
menuItemPrint.addActionListener(this);
menuPrint.add(menuItemPrint);
// create Help menu
menuHelp.setMnemonic(KeyEvent.VK_H);
menuBar.add(menuHelp);
JMenuItem menuItemHelp = new JMenuItem("About");
menuItemHelp.setAccelerator(KeyStroke.getKeyStroke('A', KeyEvent.CTRL_DOWN_MASK));
menuItemHelp.setActionCommand("about");
menuItemHelp.addActionListener(this);
JMenuItem menuItemVisitHomePage = new JMenuItem("Visit Home Page");
menuItemVisitHomePage.setAccelerator(KeyStroke.getKeyStroke('V', KeyEvent.CTRL_DOWN_MASK));
menuItemVisitHomePage.setActionCommand("visithomepage");
menuItemVisitHomePage.addActionListener(this);
menuHelp.add(menuItemHelp);
menuHelp.addSeparator();
menuHelp.add(menuItemVisitHomePage);
notePadArea = new JTextArea();
// set no word wrap
notePadArea.setWrapStyleWord(false);
// create scrollable pane
scrollPane = new JScrollPane(notePadArea, JScrollPane.VERTICAL_SCROLLBAR_ALWAYS , JScrollPane.HORIZONTAL_SCROLLBAR_NEVER);
this.add(scrollPane,BorderLayout.CENTER);
}
@Override
public void actionPerformed(ActionEvent e) {
if(e.getActionCommand().equals("exit")) {
System.exit(0);
}else if (e.getActionCommand().equals("open")) {
JFileChooser file = new JFileChooser();
String fileName = "";//initial filename was empty
// show open file dialog
if (file.showOpenDialog(this) == JFileChooser.APPROVE_OPTION) {
fileName = file.getSelectedFile().getAbsolutePath();
} else {
return;
}
try(BufferedReader bufferedReader = new BufferedReader(new FileReader(fileName));) {
// load file content into text area
StringBuffer stringBuffer = new StringBuffer();//creating a string buffer for reading data from file
String lines = "";//for reading the lines from the selecting file
while((lines = bufferedReader.readLine() ) != null) {//it'll read untill the file ends
stringBuffer.append(lines).append("\n");//for every line read insert new line in stringBuffer
}
bufferedReader.close();//after reading of file done, the bufferedReader will be close
notePadArea.setText(stringBuffer.toString());//converting the read text to string and inserting this text into textArea
} catch (Exception error1) {//if any exception occures
System.out.println(error1.toString());//convert the expection into string and print it
}
} else if (e.getActionCommand().equals("save")) {//if the user click the save command then the file will gonna saved
JFileChooser file = new JFileChooser();//creating the file
chooser
String fileName = "";//initial file name is empty
// show open file dialog
if (file.showSaveDialog(this) == JFileChooser.APPROVE_OPTION) {//if the user select file and clicks OK button
fileName = file.getSelectedFile().getAbsolutePath();
} else {//other wise will be closed
return;
}
try(BufferedWriter bufferedWriter = new BufferedWriter(new FileWriter(fileName));) {
// write editor's content to selected file.
bufferedWriter.write(notePadArea.getText());//get the text
entered in textarea
bufferedWriter.flush();//clear the writer
} catch(Exception ex1) {}
} else if (e.getActionCommand().equals("color")) {
Color select_color = JColorChooser.showDialog(this, "Select a
color", Color.RED);
notePadArea.setForeground(select_color);
} else if (e.getActionCommand().equals("times_new_roman"))
{
if(subMenuItem1.isSelected())
notePadArea.setFont(new Font("Times New Roman", Font.PLAIN,
20));
} else if (e.getActionCommand().equals("arial")) {
if(subMenuItem2.isSelected())
notePadArea.setFont(new Font("Arial", Font.PLAIN, 20));
} else if (e.getActionCommand().equals("serif")) {
if(subMenuItem3.isSelected())
notePadArea.setFont(new Font("Serif", Font.PLAIN, 20));
} else if (e.getActionCommand().equals("bold")) {
if(subMenuItem4.isSelected()){
if(subMenuItem5.isSelected()){
notePadArea.setFont(new Font("Serif", Font.BOLD+Font.ITALIC,
20));
}else{
notePadArea.setFont(new Font("Serif", Font.BOLD, 20));
}
}else{
if(!subMenuItem5.isSelected())
notePadArea.setFont(new Font("Serif", Font.PLAIN, 20));
}
} else if (e.getActionCommand().equals("italic")) {
if(subMenuItem5.isSelected()){
if(subMenuItem4.isSelected()){
notePadArea.setFont(new Font("Serif", Font.BOLD+Font.ITALIC,
20));
}else{
notePadArea.setFont(new Font("Serif", Font.ITALIC, 20));
}
}else{
if(!subMenuItem4.isSelected())
notePadArea.setFont(new Font("Serif", Font.PLAIN, 20));
}
} else if (e.getActionCommand().equals("print")) {
int output = JOptionPane.showConfirmDialog(this, "Do you want to
print the File","Confirmation", JOptionPane.YES_NO_OPTION);
if(output==0){
JOptionPane.showMessageDialog(this, "The file is successfully
printed","Confirmation", JOptionPane.INFORMATION_MESSAGE);
}
} else if (e.getActionCommand().equals("changecolor")){
System.out.println("Color clicked");
}
else if (e.getActionCommand().equals("about")) {
JOptionPane.showMessageDialog(this, "This software is developed in 2019\nVersion is 1.0","About", JOptionPane.INFORMATION_MESSAGE);
} else if (e.getActionCommand().equals("visithomepage")) {
openWebpage("http://www.microsoft.com");
}
}
private void openWebpage (String urlString) {
try {
Desktop.getDesktop().browse(new URL(urlString).toURI());
}
catch (Exception e) {
e.printStackTrace();
}
}
}
import javax.swing.JFrame;
public class MyMenuFrameTest {
public static void main(String[] args) {
MyMenuFrame frame = new MyMenuFrame();
frame.setTitle("MyNotepad");
//for the title of the box
frame.setSize(600, 400);
//for the size of the box
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
frame.setVisible(true);
}
}
In: Computer Science
In this discussion, you are the IT manager for a four-year university in New Orleans, Louisiana. The IT department supports the computer network requirements for over 6,000 students, 300 faculty members, and 200 staff members – plus a conference network for distinguished guests. See Exploration 2 for tips on how to complete this discussion.
Instructions
Exploration 2:
The first task in risk management is to identify the possible risks based on location, use of Internet services, the sensitivity of the data, and the other business factors that affect the network.
Once you have a list of possible and probable emergencies, did you include a few that rarely happen, but are catastrophic to the business when they occur? These include hurricanes, tornadoes, floods due to plumbing failures or natural disasters, fire, ransomware, rootkit attacks, and more. Why do we care about location? We rarely experience hurricanes in Denver, Colorado, but we need to plan for them if our network is in Florida.
The relationship between the likelihood that a threat will occur and the impact is called Risk Exposure (RE). How often will these problems occur? When they occur, how much will it cost to address them? Our goal is to list the risks and classify them so we can prioritize them by their impact. If it is hard to assess them using specific numbers, use a scale from low, moderate, or high for probability and for impact.
The most likely candidates and the most costly problems feature prominently in our additional Emergency Action Plan sections. The plan may use brief scenarios to describe the situation, followed by what to do, who to contact, and how to evaluate the next steps to get the network back online. For example, one solution might address several risks and support a variety of use case scenarios. Cloud storage backups help to ensure data integrity in the event of equipment failure, accidental misuse, intentional internal misuse, cybersecurity threats, and to avoid a loss of data during a mass disaster.
The process of documenting a risk management and IT Disaster Recovery Plan includes listing all of the existing equipment and where the resources are located. If we cannot find it, we will struggle to fix it. Next, do we have a data backup plan (DHS, n.d.)? How do we backup the data servers and where do we store the backups? How do we handle duplicate backups and where is our off-site storage? For data backup recovery strategies, how do we access the off-site storage and cloud resources?
In the event that the IT team is no longer able to respond, we need documentation that describes the equipment, the resources, their locations, and how to bring them back online.
A common problem that IT faced in the past was the inability to restore data from backups. It is wise to test the ability to restore data from backups and to periodically assess the quality of the backups. A periodic simulation of the possible problems, as well as an audit of the Emergency Action Plan, the actions, and the countermeasures recommended in it increases the likelihood of recovering quickly from problems and restoring the network.
Identifying who to contact helps us satisfy company and federal requirements for the protection and use of data. The EAP also supports later efforts to define the budget needed to prevent risks. Lastly, it is not feasible to prevent every risk, so the EAP also helps us to document how we plan to address risks when they occur.
Common questions that we ask involve use cases based on realistic scenarios. How do we shut down network services in the event of a fire or a flood without endangering our IT team? How do we safely restore communications and network services after a power outage? Who do we contact during a disaster?
A failure to plan for emergencies may lead to a costly disruption in business services and could put the organization out of business
THAT IS EXPLORATION 2 ^ THERE IS NO NEED FOR MORE INFORMATION. YOU DON'T EVEN NEED EXPLORATION TO TO BREAK DOWN THE ACTION PLAN. THIS IS ALL THE POSSIBLE INFORMATION GIVIN ON THIS ASSIGNMENT, THERE IS NOT A NEED FOR MORE.
In: Operations Management
Keith Hamilton is employed as an airline pilot for Flyby Airlines in Las Vegas, Nevada. Jennifer is employed as a teacher’s assistant at Small World Elementary School, in Henderson, Nevada. Keith and Jennifer live in a home they purchased this year. Keith and Jennifer have three children who lived with them all year, Joshua (17), Danielle (14), and Sara (10). Keith and Jennifer provided the following personal information: Keith and Jennifer do not want to contribute to the presidential election campaign. Keith and Jennifer do not claim itemized deductions. Keith and Jennifer live at 3678 Blue Sky Drive, Henderson, Nevada 89052. Keith’s birthday is 10/12/1970 and his Social Security number is 535-22-4466. Jennifer’s birthday is 7/16/1973 and her Social Security number is 535-44-2255. Joshua’s birthday is 6/30/1998 and his Social Security number is 454-54-5454. Danielle’s birthday is 8/12/2001 and her Social Security number is 343-43-4343. Sara’s birthday is 5/13/2005 and her Social Security number is 232-32-3232. Page C-1 Keith received the following Form W-2 for 2015 from Flyby Airlines.
During 2015, Keith and Jennifer received $550 in interest from Las Vegas municipal bonds, $1,070 interest from U.S. Treasury bonds, and $65 from their savings account at SCD Credit Union. Keith and Jennifer are joint owners of the Las Vegas city bonds and the U.S. Treasury bonds. They have a joint savings account at SCD Credit Union. Page C-2 On January 21, 2015, Jennifer was involved in a car accident. Because the other driver was at fault, the other driver’s insurance company paid Jennifer $1,350 for medical expenses relating to her injuries from the accident and $300 for emotional distress from the accident. She received payment on March 15, 2015. Keith’s father died on November 15, 2014. Keith received a $100,000 death benefit from his father’s life insurance policy on February 8, 2015. On February 15, 2015, Keith hurt his arm on a family skiing trip in Utah and was unable to fly for two weeks. He received $4,000 for disability pay from his disability insurance policy. He received the check on March 2, 2015. Flyby Airlines paid $600 in premiums on this policy during 2015. The disability insurance policy premiums are paid for by Flyby Airlines as a fully taxable fringe benefit to Keith (the premiums paid on his behalf are included in Keith’s compensation amount on his W-2). Jennifer’s grandmother died on March 10, 2015, leaving Jennifer with an inheritance of $30,000. (She received the inheritance on May 12, 2015.) Flyby Airlines had space available on its Long Island, New York, flight and provided Keith, Jennifer, and their three children with free flights so they could attend the funeral. The value of the ticket for each passenger was $600. On April 1, 2015, Jennifer slipped in the Small World Elementary lunchroom and injured her back. Jennifer received $1,200 in worker’s compensation benefits because her work-related injury caused her to miss two weeks of work. She also received a $2,645 reimbursement for medical expenses from the health insurance company. Small World Elementary pays the premiums for Jennifer’s health insurance policy as a nontaxable fringe benefit. On May 17, 2015, Keith and Jennifer received a federal income tax refund of $975 from their 2014 federal income tax return. On June 5, 2015, Keith and Jennifer sold their home in Henderson, Nevada, for $510,000 (net of commissions). Keith and Jennifer purchased the home 11 years ago for $470,000. On July 12, 2015, they bought a new home for $675,000. On July 25, 2015, Keith’s aunt Beatrice gave Keith $18,000 because she wanted to let everyone know that Keith is her favorite nephew. On September 29, 2015, Jennifer won an iPad valued at $500 in a raffle at the annual fair held at Joshua’s high school. Keith and Jennifer have qualifying insurance for purposes of the the Affordable Care Act (ACA).
What would line 42 (exemptions) be on the Form 1040? Where do I record retirement contributions from W-2? Thanks!
In: Accounting
Data for Sale
Want a list of 3,877 charity donors in Detroit? You can buy it from USAData for $465.24 through USAData’s Web site, which is linked to large databases maintained by Acxiom and Dun & Bradstreet, anyone with a credit card can buy marketing lists of consumers broken down by location, demographics, and interests. The College Board sells data on graduating high school seniors to 1,700 colleges and universities for 28 cents per student. These businesses are entirely legal. Also selling data are businesses that obtain credit card and cell phone records illegally and sell to private investigators and law enforcement. The buying and selling of personal data has become a multibillion dollar business that’s growing by leaps and bounds. Unlike banks or companies selling credit reports, these private data brokers are largely unregulated.
There has been little or no federal or state oversight of how they collect, maintain, and sell their data. But they have been allowed to flourish because there is such a huge market for personal information and they provide useful services for insurance companies, banks, employers, and federal, state, and local government agencies. For example, the Internal Revenue Service and departments of Homeland Security, Justice, and State paid data brokers $30 million in 2005 for data used in law enforcement and counterterrorism.
The Internal Revenue Service signed a five-year $200 milllion deal to access ChoicePoint’s databases to locate assets of delinquent taxpayers. After the September 11, 2001 terrorist attacks, ChoicePoint helped the U.S. government screen candidates for the new federally controlled airport security workforce.
ChoicePoint is one of the largest data brokers, with more than 5,000 employees serving businesses of all sizes as well as federal, state, and local governments. In 2004, ChoicePoint performed more than seven million background checks. It pocesses thousands of credit card transactions every second. ChoicePoint builds its vast repository of personal data through an extensive network of contractors who gather bits of information from public filings, financial-services firms, phone directories, and loan application forms. The contractors use police departments, school districts, the department of motor vehicles, and local courts to fill their caches. All of the information is public and legal.
ChoicePoint possesses 19 billion records containing personal
information on the vast majority of American adult consumers.
According to Daniel J. Solove, associate professor of law at George
Washington University, the company has collected
information on nearly every adult American and “these are dossiers
that J. Edgar Hoover would be envious of.”
The downside to the massive databases maintained by ChoicePoint
and other data brokers is the threat they pose to personal privacy
and social well being. The quality of the data they maintain can be
unreliable, causing people to lose their jobs and
their savings. In one case, Boston Market fired an employee after
receiving a background check from ChoicePoint that showed felony
convictions. However, the report had been wrong. In another, a
retired GE assembly-line worker was charged a higher insurance
premium because another person’s driving record, with multiple
accidents, had been added to his ChoicePoint file.
ChoicePoint came under fire in early 2005 for selling information on 145,000 customers to criminals posing as legitimate businesses. The criminals then used the identities of some of individuals on whom ChoicePoint maintained data to open fraudulent credit card accounts.
Since then ChoicePoint curtailed the sale of products that contain sensitive data, such as social security and driver’s license ID numbers, and limited access by small businesses, including private investigators, collection agencies, and non-bank financial institutions. ChoicePoint also implemented more stringent processes to verify customer authenticity.
Marc Rotenberg of the Electronic Privacy Information Center in Washington, D.C., believes that the ChoicePoint case is a clear demonstration that self-regulation does not work in the information business and that more comprehensive laws are needed. California, 22 other states, and New York City have passed laws requiring companies to inform customers when their personal data files have been compromised. More than a dozen data security bills were introduced in Congress in 2006 and some type of federal data security and privacy legislation will likely result. Privacy advocates are hoping for a broad federal law with a uniform set of standards for privacy protection practices.
1) Discuss the issues raised by data brokers in the context of management, organization, and technology factors.
2) Use a professional code of ethics to recommend solutions to the issues in 2.
In: Computer Science
Data for Sale
Want a list of 3,877 charity donors in Detroit? You can buy it from USAData for $465.24 through USAData’s Web site, which is linked to large databases maintained by Acxiom and Dun & Bradstreet, anyone with a credit card can buy marketing lists of consumers broken down by location, demographics, and interests. The College Board sells data on graduating high school seniors to 1,700 colleges and universities for 28 cents per student. These businesses are entirely legal. Also selling data are businesses that obtain credit card and cell phone records illegally and sell to private investigators and law enforcement. The buying and selling of personal data has become a multibillion dollar business that’s growing by leaps and bounds. Unlike banks or companies selling credit reports, these private data brokers are largely unregulated.
There has been little or no federal or state oversight of how they collect, maintain, and sell their data. But they have been allowed to flourish because there is such a huge market for personal information and they provide useful services for insurance companies, banks, employers, and federal, state, and local government agencies. For example, the Internal Revenue Service and departments of Homeland Security, Justice, and State paid data brokers $30 million in 2005 for data used in law enforcement and counterterrorism.
The Internal Revenue Service signed a five-year $200 milllion deal to access ChoicePoint’s databases to locate assets of delinquent taxpayers. After the September 11, 2001 terrorist attacks, ChoicePoint helped the U.S. government screen candidates for the new federally controlled airport security workforce.
ChoicePoint is one of the largest data brokers, with more than 5,000 employees serving businesses of all sizes as well as federal, state, and local governments. In 2004, ChoicePoint performed more than seven million background checks. It pocesses thousands of credit card transactions every second. ChoicePoint builds its vast repository of personal data through an extensive network of contractors who gather bits of information from public filings, financial-services firms, phone directories, and loan application forms. The contractors use police departments, school districts, the department of motor vehicles, and local courts to fill their caches. All of the information is public and legal.
ChoicePoint possesses 19 billion records containing personal
information on the vast majority of American adult consumers.
According to Daniel J. Solove, associate professor of law at George
Washington University, the company has collected
information on nearly every adult American and “these are dossiers
that J. Edgar Hoover would be envious of.”
The downside to the massive databases maintained by ChoicePoint
and other data brokers is the threat they pose to personal privacy
and social well being. The quality of the data they maintain can be
unreliable, causing people to lose their jobs and
their savings. In one case, Boston Market fired an employee after
receiving a background check from ChoicePoint that showed felony
convictions. However, the report had been wrong. In another, a
retired GE assembly-line worker was charged a higher insurance
premium because another person’s driving record, with multiple
accidents, had been added to his ChoicePoint file.
ChoicePoint came under fire in early 2005 for selling information on 145,000 customers to criminals posing as legitimate businesses. The criminals then used the identities of some of individuals on whom ChoicePoint maintained data to open fraudulent credit card accounts.
Since then ChoicePoint curtailed the sale of products that contain sensitive data, such as social security and driver’s license ID numbers, and limited access by small businesses, including private investigators, collection agencies, and non-bank financial institutions. ChoicePoint also implemented more stringent processes to verify customer authenticity.
Marc Rotenberg of the Electronic Privacy Information Center in Washington, D.C., believes that the ChoicePoint case is a clear demonstration that self-regulation does not work in the information business and that more comprehensive laws are needed. California, 22 other states, and New York City have passed laws requiring companies to inform customers when their personal data files have been compromised. More than a dozen data security bills were introduced in Congress in 2006 and some type of federal data security and privacy legislation will likely result. Privacy advocates are hoping for a broad federal law with a uniform set of standards for privacy protection practices.
Argue the ethical dilemma raised by data brokers, based on an ethical theory of your choice.
In: Computer Science
Lois Quam
Founder, Tysvar, LLC
After accompanying Will Steger on a trip to Norway and the Arctic Circle, Lois Quam's interest in global climate change was sparked. There she witnessed firsthand the astonishing changes in the polar ice masses and the resulting impact on wildlife. Inspired by Steger's call for action to reduce global climate change, in 2009 Lois Quam left Piper Jaffray, a leading international investment bank, to become the founder and CEO of Tysvar, LLC, a privately held, Minnesota-based New Green Economy and health care reform incubator. In 2010, Quam was selected by President Barack Obama to head the Global Health Initiative. This case is a retrospective of her executive experience at Tysvar.
“I'm focused on ways to finding solutions to really significant problems and taking those ideas to full potential,” Quam said. “I want to bring the green economy to reality in a way that is much broader than financing. I want to focus on areas where I can make the most difference bringing the green economy to scale.”
Tysvar works with investors who can create the change they wish to see in the world rather than simply reacting to events as they unfold. The company is a strategic advisor and incubator of ideas, organizations, and people working to facilitate and build the New Green Economy (NGE) to scale. Tysvar's goal is to contribute to a viable, profitable, and socially responsible industry of sustainability, clean technology, and renewable energy sources.
Conscientiously working to play their part to create a more sustainable world for the next generation, Tysvar's efforts include new creation of NGE industries, jobs, and investment opportunities, contributing to building NGE public policy frameworks, trade for import/export of clean technologies, and renewable energy sources around the world.
“We stand on the brink of a very exciting time in the world,” according to Quam. The interest in developing renewable energy sources to replace dwindling fossil fuel supplies and reduce carbon dioxide emissions is worldwide. “It is a very difficult time in the financial markets right now to do this, but that will change. Good companies will find ways to get things done.”
“I am an optimist about our future,” said Quam, “Which is why I started Tysvar. The challenges we face from climate change are immense, but so are our capabilities, and the rewards and benefits to humanity are even greater in the New Green Economy.”
Lois Quam named her company after the hometown of her grandfather, Nels Quam. Tysvar is a majestically beautiful area in western Norway which is becoming a clean technology hub as part of Norway's growing NGE leadership and will soon be the site of the world's largest off-shore wind farm.
Lois Quam has continually worked for a better tomorrow. In 2005, Quam was named Norwegian American of the Year. She believes there is much to learn from Norway: From balancing work and life, allowing parents to fully participate in the economy while still being active parents, to how successfully Norway is immersing itself in new energy technologies such as wind and biomass. As an arctic oil producing nation with a carbon tax since 1993, Norway has reinvested its oil wealth to become a world leader in renewable energy.
Internationally recognized as a visionary and leader on universal health-care reform and the emerging NGE, Lois Quam embodies the skill sets needed to succeed in this new economy. Named in 2006 by Fortune magazine as one of America's “50 Most Powerful Women,” Quam has worked as head of Strategic Investments, Green Economy & Health at Piper Jaffray, a leading international investment bank; served as president and CEO of the Public and Senior Markets segment at UnitedHealth Group, a $30 billion division she helped create and run; chaired the Minnesota Health Care Access Commission, which led to legislation that brought health insurance to tens of thousands of Minnesotans; and served as a senior advisor to Hillary Clinton's task force on health-care reform. She graduated magna laude from Macalester College in St. Paul and went on to attend the University of Oxford as a Rhodes Scholar, earning a master's degree in philosophy, politics, and economics.
Lois Quam believes the New Green Economy will produce high quality jobs, improve our national security via less dependence on foreign fuels, and prevent the most damaging consequence of all: irreversible and diminishing climate change. She and Tysvar are committed to establishing universal health-care reform in America. They believe universal health care is the answer for dependable, affordable health care for all Americans and that it is necessary to help rebuild the American economy and restore American competitiveness worldwide.
Recognizing this, President Obama recently appointed Quam executive director of the State Department's Global Health Initiative. This $63 billion project will help developing countries improve their health care systems, with a special emphasis on women, children, and newborns. In accepting this position, Quam decided to step down as CEO of the company she founded and hand leadership to Norwegian Terje Mikalsen, co-founder and former chairman of Norsk Data.
“Although we are sad to see Lois leave the firm, Tysvar will continue to follow through on her vision to help bring the new green economy to scale and make quality health care affordable and accessible to everyone,” Mikalsen said on Tysvar's Web site. “We wish Lois all the best as she assumes her new position at the State Department. Her vision and leadership will help improve health care delivery and access for millions of people around the world.”
On Earth Day Lois Quam gave a speech at the University of St. Thomas on the emerging opportunities in the NGE after which she said, “I enjoyed sharing …how we can all use these key capabilities as a platform for doing something you love. Imagine: helping to build the NGE with a purposeful passion. It doesn't get much better than that!”
In another speech she illustrated her philosophy:
The change required to combat climate change and conserve biodiversity will create a change in business and society similar to the Industrial Revolution. The new energy realities require nothing short of an energy revolution, a thorough retooling of our energy economy in ways that match up with the realities of the 21st century. It will affect every aspect of daily life and business, creating an immense set of opportunities for investors, businesses and individuals.
For investors, there are highly diverse and immense opportunities to create and scale new sources of energy, adapt our current methods of production and improve daily life in ways that drive down global warming emissions.
It will also create unprecedented depth and breadth of opportunities for businesses and investors…. clean energy will always be in strong demand …the world will always have massive energy needs, and they will always have to be balanced against the needs of the environment …the clean energy industry is fueled by the laws of nature—and there is no force as powerful or promising.
Think about what we can achieve working together at this conference and as a region …and think about the time sometime in the future when our work is reaching critical mass, when our environment is safer and our energy is cleaner, when we too will have our eureka moments, our moments of life-changing and world-changing discovery.
The answering should be from your own words.
1. How does Lois Quam use emotions and moods in her
speeches to convey her viewpoint? Cite examples to support your
statements.
2. Based on what you have learned about Lois Quam,
create hypotheses about the attitudes of her colleagues at Tysvar
while using the three basic components of attitudes in your
theories.
3. Take a moment to research the Global Health
Initiative. Why do you believe LoisQuam waschosen to lead this
program?
4. Research question: Search news reports, Web sites,
and blogs to find out more information on Tysvar. How is the
company faring in its quest to make the world cleaner and safer for
future generations? What implications might that have on Tysvar's
employees, their attitudes, and job satisfaction?
In: Operations Management
Item 6
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The study of learning derives from essentially two sources. Because learning involves the acquisition of knowledge, the first concerns the nature of knowledge and how we come to know things.... The second source in which modern learning theory is rooted concerns the nature and representation of mental life. References: |
Driscoll (2000) concludes that "the study of learning derives from essentially two sources... The first concerns the nature of knowledge and how we come to know things.... The second ... concerns the nature and representation of mental life" (p. 10).
|
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
The game-based laboratory was vastly different from their expectations and experiences of a typical laboratory; this might have resulted in the students being disconnected from the learning aspect of the game. However, the students' comments suggested that their discomfort with the video game was due to the fact that they did not perceive that a video game could really be educational. The game became a disruption to their traditional ways of science learning and interfered with how they perceived the learning experience. This perspective is potentially problematic as it suggests that pedagogical disruptions such as video games that are designed to be powerful learning tools simply may not work for all students. References: |
Since a game-based laboratory provides a virtual environment with different experiences than in a real lab, students may fail to connect these virtual experiences to real lab experiences. Student and teacher beliefs that games are entertainment tools, not educational tools, may minimize the potential of video games intended to help students learn science. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
But what are reasonable outcomes of the influence of global processes on education? While the question of how global processes influence all aspects of education (and who controls these forces) is multidimensional and not completely testable, there appear to be some theories of globalization as it relates to education that can be empirically examined. References: |
Rutkowski and Rutkowski (2009) ask "what are reasonable outcomes of the influence of global processes on education?" (p. 138). This question is not entirely testable and has multiple dimensions but theories of globalization's impact on education exist and provide means of empirical analysis. References: |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version (written in 2002) |
|
The technological tools available today for creating computer-based learning materials are incredibly more powerful than those introduced just a few years ago. We can make our own movies with camcorders in our homes; we can publish our own books. Soon teachers and students will be able to use computer-video technology to produce their own learning materials. All it takes is time, know-how, and some funds. References: |
Frick (1991) claimed that computers would become so powerful that K-12 educators and students would be able to produce their own multimedia and Web-based learning materials. He predicted that teachers and students would soon be able to use computer-video technology to produce their own learning materials. All it would require is time, know-how, and some funds.
|
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button.
|
Original Source Material |
Student Version |
|
It is helpful to think in terms of two basic kinds of change: piecemeal and systemic. Piecemeal change leaves the structure of a system unchanged. It often involves finding better ways to meet the same needs, such as using an analogy to help your students learn the science concepts you taught in an otherwise similar manner last year. In contrast, systemic change entails modifying the structure of a system, usually in response to new needs. References: |
Reiguleth (1999) mentions two different kinds of change: Piecemeal and Systemic change. Systemic change entails modifying the structure of a system, in order to meet new needs. In contrast, piecemeal change leaves the structure of a system unchanged. For example, new innovations instead of traditional methods could be used to engage students in learning. |
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
In: Operations Management
Frightened by the recession and the credit crisis that produced it, the nation’s mainstream economists are embracing public spending to repair the damage — even those who have long resisted a significant government role in a market system.
But there is not much agreement yet on what type of spending would produce the best results, or what mix of spending and tax cuts.
“We have spent so many years thinking that discretionary fiscal policy was a bad idea, that we have not figured out the right things to do to cure a recession that is scaring all of us,” said Alan J. Auerbach, an economist at the University of California, Berkeley, referring to the mix of public spending and tax cuts known as fiscal policy.
Hundreds of economists who gathered here for the annual meeting of the American Economic Association seemed to acknowledge that a profound shift had occurred
At their last annual meeting, ideas about using public spending as a way to get out of a recession or about government taking a role to enhance a market system were relegated to progressives. The mainstream was skeptical or downright hostile to such suggestions. This time, virtually everyone voiced their support, returning to a way of thinking that had gone out of fashion in the 1970s.
“The new enthusiasm for fiscal stimulus, and particularly government spending, represents a huge evolution in mainstream thinking,” said Janet Yellen, president of the Federal Reserve Bank of San Francisco. She added that the shift was likely to last for as long as the profession is dominated by men and women living through this downturn.
The few sessions that dealt with fiscal policy were packed with economists, mostly from academia. Nearly all argued that public spending can be more effective than tax cuts in getting out of a bad recession. Still, they said the present crisis required, as a tonic, a mix of the two, and they debated what that mix should be, just as President-elect Obama’s transition team is now doing.
Their proposals were all over the lot. But at the formal sessions and in more than a dozen interviews, many said that once the recession ended, the nation should not go back to the system that held sway from Ronald Reagan’s election in 1980 to the present crisis. It was one in which taxes, regulation and public spending were minimized.
For Peter Gottschalk, a labor economist at Boston College, who earned his Ph.D. in 1973, the transition has not been easy. Keynesian economics, with its emphasis on a government role in the marketplace, was losing its grip when he started his career. Indeed, the present upheaval has been outside the theoretical boundaries of mainstream economics as practiced for a generation by most of the nation’s economists.
“Our models are built on the assumption that on average people behave rationally and they do the right thing,” Mr. Gottschalk said, “but this time people did very much the wrong thing. It’s like thinking you have a disease under control and then being hit with a new strain of it.”
Since the 1970s, the Federal Reserve has dealt with recessions by lowering interest rates, thus reviving demand by making it less expensive to borrow and to spend. But this time, the credit system is broken, and those who can borrow at relatively low rates are reluctant to spend. That shifts the burden of lifting the economy to fiscal policy, namely the $600 billion to $800 billion mix of tax cuts and spending that the Obama administration and Congress are likely to agree on early this year.
Nearly every economist who spoke here agreed that a dollar invested in, say, a new transit system or in bridge repair is spent and respent more efficiently than a dollar that comes to a household in a tax cut. A bigger percentage of the latter is saved, they said. There was concern, however, that the nation lacked enough “shovel ready” projects that could be ramped up quickly, generating jobs.
What is more, the economists did not agree on the best projects to pursue. As Mr. Auerbach pointed out, after a generation of ignoring public spending in their research, the nation’s mainstream economists lacked the expertise to help guide the process. “We have not figured out the right course of action,” he said.
There were plenty of proposals at the three-day convention. Some argued for a big investment in broadband. Others proposed recruiting young people for two-year stints weather-stripping and upgrading privately owned and public buildings. Still others argued that government should step up subsidies for basic research and product innovation
And Daniel J. B. Mitchell, a professor emeritus at the University of California, Los Angeles, proposed that Washington channel money to cities with the proviso that they purchase municipal buses from General Motors, which makes them, or yellow school buses. The Ford Motor Company manufactures the school bus chassis.
“That is a better fiscal stimulus than to bail out the auto companies,” Mr. Mitchell said.
No one illustrated the conversion to fiscal stimulus more vividly than Martin Feldstein, a Harvard economist and a well-known conservative who served for a time as a top economic adviser to President Reagan. In a paper, Mr. Feldstein noted that the usual method of reviving the economy — lower interest rates — was failing to work because of “a dysfunctional credit market.”
That left fiscal stimulus to offset what he described as a decline of $400 billion a year in consumer spending. “While good tax policy can contribute to ending the recession, the heavy lifting will have to be done by increased government spending,” Mr. Feldstein said.
He pushed for big spending, carried out quickly. Among his proposals: replace depleted military supplies and equipment and step up financing for “useful research.” He also said that the shortage of “shovel ready” projects should not be a deterrent in a recession that is likely to last long enough to plan and execute new projects.
“It is of course possible that the planned surge in government spending will fail,” Mr. Feldstein said. But he expressed the “hope that the new program of fiscal spending in combination with mortgage market reforms will be sufficient to return the economy to full employment.”
I need answers for Questions 2-4 please:
Read the article: Economists Warm to Government Spending but Debate Its Form (see above.) and then answer the questions below.
Question 1 Explain what is meant by the multiplier principle
Question 2 Explain the reasons why there has been a shift in the thinking of many leading economists about the merits of fiscal policy.
Question 3 Using aggregate supply and demand diagrams, examine the factors that determine the size of the multiplier effect following an increase in government spending.
Question 4 Assess whether an increase in government spending and taxation by equivalent amounts will leave national income unchanged?
In: Economics
Photochronograph Corporation (PC) manufactures time series photographic equipment. It is currently at its target debt−equity ratio of .80. It’s considering building a new $50 million manufacturing facility. This new plant is expected to generate aftertax cash flows of $6.2 million in perpetuity. The company raises all equity from outside financing. There are three financing options: 1. A new issue of common stock: The flotation costs of the new common stock would be 8 percent of the amount raised. The required return on the company’s new equity is 14 percent. 2. A new issue of 20-year bonds: The flotation costs of the new bonds would be 4 percent of the proceeds. If the company issues these new bonds at an annual coupon rate of 8 percent, they will sell at par. 3. Increased use of accounts payable financing: Because this financing is part of the company’s ongoing daily business, it has no flotation costs, and the company assigns it a cost that is the same as the overall firm WACC. Management has a target ratio of accounts payable to long-term debt of .15. (Assume there is no difference between the pretax and aftertax accounts payable cost.) What is the NPV of the new plant? Assume that PC has a 35 percent tax rate. (Enter your answer in dollars, not millions of dollars, i.e. 1,234,567. Do not round intermediate calculations and round your final answer to the nearest whole dollar amount.)
In: Finance
|
Photochronograph Corporation (PC) manufactures time series photographic equipment. It is currently at its target debt?equity ratio of .85. It’s considering building a new $55 million manufacturing facility. This new plant is expected to generate aftertax cash flows of $6.7 million in perpetuity. The company raises all equity from outside financing. There are three financing options: |
| 1. |
A new issue of common stock: The flotation costs of the new common stock would be 8.5 percent of the amount raised. The required return on the company’s new equity is 13 percent. |
| 2. |
A new issue of 20-year bonds: The flotation costs of the new bonds would be 4.0 percent of the proceeds. If the company issues these new bonds at an annual coupon rate of 7 percent, they will sell at par. |
| 3. |
Increased use of accounts payable financing: Because this financing is part of the company’s ongoing daily business, it has no flotation costs, and the company assigns it a cost that is the same as the overall firm WACC. Management has a target ratio of accounts payable to long-term debt of .20. (Assume there is no difference between the pretax and aftertax accounts payable cost.) |
|
What is the NPV of the new plant? Assume that PC has a 40 percent tax rate. (Enter your answer in dollars, not millions of dollars, e.g. 1,234,567. Do not round intermediate calculations and round your final answer to the nearest whole dollar amount, e.g., 32.) |
In: Finance