Questions
Two years ago, when the market rate was 5%, your company purchased a fixed asset for...

Two years ago, when the market rate was 5%, your company purchased a fixed asset for $50,000. Starting a year after the purchase, fixed asset started to bring in $20,000 annual revenue with annual costs of $8,000. The expected lifetime of the asset is 8 years. You obtained your second cash flow today and due to the changes in the market, you will need to update your revenue, costs, as well as the interest rate.
Going forward, annual revenue will drop by 40% and annual costs will go up by 20%.

a) Assuming that the market rate is still 5% for now and the coming 6 years, if you could sell the asset today at $13,000, should you?
b) Assuming that market rate is now 1% and is expected to stay at 1% for the coming 6 years, then, would you sell the fixed asset at $13,000 today?

In: Finance

1.Logical equivalence of two English statements. Define the following propositions: j: Sally got the job. l:...

1.Logical equivalence of two English statements.

Define the following propositions:

  • j: Sally got the job.
  • l: Sally was late for her interview
  • r: Sally updated her resume.

Express each pair of sentences using a logical expression. Then prove whether the two expressions are logically equivalent.

(a)

If Sally did not get the job, then she was late for interview or did not update her resume.
If Sally updated her resume and was not late for her interview, then she got the job.

(b)

If Sally got the job then she was not late for her interview.
If Sally did not get the job, then she was late for her interview.

(c)

If Sally updated her resume or she was not late for her interview, then she got the job.
If Sally got the job, then she updated her resume and was not late for her interview.

can you please provide a truth table for each?

In: Advanced Math

Definitions: subject: In the context of access control, an entity capable of accessing objects object: In...

Definitions:

subject: In the context of access control, an entity capable of accessing objects

object: In the context of access control, a resource to which access is controlled.

role-based access control: Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.

Consider a private organization's information system where local restaurant health grades are processed and stored. Only authorized individuals such as those from the food quality department can update these health grades.

a) List three subjects in this system and identify their roles.

b) List three objects in this system and provide a description of what is stored in each object.

c) Assuming the system uses role-based access control, discuss the three constraints (mutually exclusive roles, cardinality, and prerequisite roles) that should be considered.

In: Computer Science

Brief Exercise 15-17 Lessor; effect on earnings; Type B lease At January 1, 2016, Café Med...

Brief Exercise 15-17 Lessor; effect on earnings; Type B lease

At January 1, 2016, Café Med leased restaurant equipment from Crescent Corporation under a Eight-year lease agreement. The lease agreement specifies annual payments of $35,000 beginning January 1, 2016, the beginning of the lease, and at each December 31 thereafter through 2023. The equipment was acquired recently by Crescent at a cost of $185,000 (its fair value) and was expected to have a useful life of 12 years with no residual value. The company seeks a 8% return on its lease investments. Assume that the risks and rewards of ownership are deemed not to have been transferred to the lessee.

Respond to the question with the presumption that the guidance provided by the proposed Accounting Standards Update is being applied.

What will be the effect of the lease on Crescent’s (lessor’s) earnings for the first year (ignore taxes)?

In: Accounting

1. Dictionaries and Lists. a) Implement a list of student dictionaries containing the following data: name:...

1. Dictionaries and Lists.

a) Implement a list of student dictionaries containing the following data:

name: Andy, classes: ET580 MA471 ET574

name: Tim, classes: ET574 MA441 ET575

name: Diane, classes: MA441 MA471 ET574

name: Lucy, classes: ET574 ET575 MA471

name: Steven, classes: ET574 MA441 ET580

b) Implement a dictionary of courses and set each courses enrollment to 0: ET580: 0 ET574: 0 ET575: 0 MA441: 0 MA471: 0

c) Use a loop and if statements to read class data from the list of students and update the enrollment for each course.

d) Print the updated list of courses. If the above steps are done correctly your output should match the output example.

Output Example

ET580 2 ET575 2 ET574 5 MA441 3 MA471 3

In: Computer Science

Silica has been a recognized hazard for many years, yet it took OSHA many years to...

Silica has been a recognized hazard for many years, yet it took OSHA many years to update its standards. Why do you think it takes the Agency so long to change its regulations?

Do you think that OSHA has been effective in reducing injuries and illnesses through current standard setting process?

Should OSHA regulations be applied in operations across the world?

Should international workers that are employed by the same U.S. company or part of its supply chain, should they be afforded the same protections as those U.S. workers who are covered by the new silica standard?

What do you think? Should a company require all divisions regardless of location to comply with OSHA standards, like silica in construction? Should companies also require that their trading partners conform to OSHA standards?

In: Operations Management

A Corporation with a BYOD policy is very concerned about issues that may arise from data...

A Corporation with a BYOD policy is very concerned about issues that may arise from data ownership. The corporation is investigating a new MDM solution and has gathered the following requirements as part of the requirements Gathering phase:

  • each device must be issued a secure token of trust from the corporate pki

  • all corporate applications and local that I must be able to be deleted from essential console

  • cloud storage and backup application must be restricted from the device

  • devices must be on the latest OS version within three weeks of an OS release

Which of the following should be preachers in the new MDM solution to meet these requirements? Select 2

  1.   Application based containerization

  2. Enforced full device encryption

  3. mandatory acceptance of scep system

  4. sideloaded application prevention

  5. biometric requirement to unlock device

  6. over the air update restriction

In: Computer Science

Create a UEmployee class that contains member variables for the university employee name and salary. The...

Create a UEmployee class that contains member variables for the university employee name and salary. The UEmployee class should contain member methods for returning the employee name and salary. Create Faculty and Staff classes that inherit the UEmployee class. The Faculty class should include members for storing and returning the department name. The Staff class should include members for storing and returning the job title. Write a runner program that creates one instance of each class and prints all of the data for each object.

Note: For PreferredCustomer, add a public void method named makePurchase, which has one double value as its parameter. It's function is to add the parameter to the internal amount spent variable for the PreferredCustomer; and it will need to update the discount if this PreferredCustomer has reached a new rewards tier. Make sure your runner makes purchases that changes, and displays, new discounts for PreferredCustomers.

In: Computer Science

You are converting your network to an IP addressing scheme. You assign a junior administrator the...

  1. You are converting your network to an IP addressing scheme. You assign a junior administrator the task of assigning addresses to your network hosts from the IP address range 202.17.68.0-202.17.68.255. He states that he used every one of the 256 addresses in the range. Which devices on the network will be unable to communicate with other network devices?
  1. Routers are protocol dependent at which OSI model layer?
  1. You are the network administrator for a large, global internetwork. You must update routing information for all network routers. Which TCP/IP protocol will allow you remote command prompt access to the network routers?
  1. Which TCP/IP protocol allows ISPs and corporate networks to support more hosts than they have available addresses?
  1. Why can a single HTTP server handle thousands of requests per hour?
  1. List three basic Telnet commands.

In: Computer Science

It is Microsoft Patch Tuesday and you are going to have patches automatically applied via Windows...

It is Microsoft Patch Tuesday and you are going to have patches automatically applied via Windows Server Update Services to the production servers. You have successfully tested them in a test environment and you are ready to have them applied to the production Microsoft Server Farm. Write an e-mail using the following requirements: 1) Informing users and application owners about the updates to these windows servers and when they will be applied. 2) Recommendation on what they should do before the patches have been applied 3) Recommendation on what they should do after the patching has been completed (to ensure that their applications are not impacted by the patching). 3) Assure them that the patches have been adequately tested in the Quality Assurance (QA) environment. 4) Tell them what they should do if errors are encountered, who they should inform and how it should be reported.

In: Computer Science