Questions
Yumi's grandparents presented her with a gift of $20,000 when she was 9 years old to...

Yumi's grandparents presented her with a gift of $20,000 when she was 9 years old to be used for her college education. Over the next 8 years, until she turned 17, Yumi's parents had invested her money in a tax-free account that had yielded interest at the rate of 3.5%/year compounded monthly. Upon turning 17, Yumi now plans to withdraw her funds in equal annual installments over the next 4 years, starting at age 18. If the college fund is expected to earn interest at the rate of 4%/year, compounded annually, what will be the size of each installment? (Assume no interest is accrued from the point she turns 17 until she makes the first withdrawal

In: Finance

JAVASCRIPT: /* Assignment 03: Complete this javascript */ // 1) Declare a variable named myValue //...

JAVASCRIPT:

/* Assignment 03:
Complete this javascript  */

// 1) Declare a variable named myValue
// Assign myValue the value of "Hello, how's it going?"
// Print the value of myValue to the console


// 2) Use the charAt() method to display the letter t
// from the variable myValue in the console


// 3) Use the indexOf() method to display the position of "going"
// from the variable myValue in the console


// 4) Use the slice() method to display "how's it going?"
// from the variable myValue in the console


// 5) Declare a variable named myOtherValue
// Assign myOtherValue the value of "Ok?"
// Use the concat() method on the variable myValue
// to concatenate myValue and myOtherValue
// Specify a new line as the first parameter of concat()
// Print the result to the console


// 6) Declare a variable named myRandom
// Assign myRandom a non-rounded value between 0 and 1 using Math.random()
// Print the result to the console


// 7) Now assign a random value between 1 and 10 to myRandom
// Use Math.floor() and Math.random() to accomplish this
// Print the result to the console


// 8) Print the length of the variable myValue to the console


// 9) Set the contents of the variable myValue to all lowercase
// Find the method to do this on your own
// Print the variable to the console to show it now holds all lowercase


// 10) **Solving a problem!
// Declare a variable named myName and assign it your first name
// Utilize the length property, Math.floor(), Math.random() and charAt()
// methods to write a line of code that will randomly display a character
// from your firstname in the console... refer to the examples of each
// method at w3schools.com and MDN Web Docs

In: Computer Science

1.) What are some tests of a good strategy? How do we know if a company’s...

1.) What are some tests of a good strategy? How do we know if a company’s strategy is working? What are some options for a company if their strategy is not working?

Your answers will be short essays and should be three full paragraphs or longer.

In: Operations Management

Are The Broken Window Theory and Incrementalism similar or different? How? Mention specific examples. 300 words...

Are The Broken Window Theory and Incrementalism similar or different? How? Mention specific examples. 300 words

Incrementalism (Referred to as the slippery slope, incrementalism describes how we unconsciously lower our ethical standards over time through small changes in behavior.)

In: Operations Management

You Be the Consultant "Controlling Employee Theft" (Page 546). Managers at Holt of California, a heavy...

You Be the Consultant "Controlling Employee Theft" (Page 546).

Managers at Holt of California, a heavy equipment dealer based in Pleasant Grove, California, noticed some “unusual” accounting transactions and began to investigate them. Gradually, they discovered that over seven years, their controller, “Stan” (not his real name), who had worked for the company for nine years, had stolen $4.8 million from the company. Stan had used company credit cards, some of which had been issued to former employees, to purchase goods and services, including electronics, cars, airline tickets, landscaping for his home, a country club membership, cosmetic surgery, season tickets to professional sporting events, and online games, for his personal use. In an unusual twist, authorities discovered that Stan had spent $1 million of his employer’s money playing Game of Fortune. To cover his theft, Stan had vendors send bills to his home, where he could alter them, and created a steady stream of false financial reports. Fortunately, Holt was able to survive its employee theft incident, but some entrepreneurs have to close their businesses because employee theft and fraud destroy their cash flow.

Because small businesses often lack the financial and control procedures that large companies impose, they are disproportionately more likely to be victims of employee theft. Small companies are common targets of employee theft because employees, especially long-term employees, know the weaknesses in the company’s systems, procedures, and controls and take advantage when the opportunity presents itself. Indeed, the longer the tenure of an employee who steals, the greater the amount stolen. According to a recent study by the Association of Certified Fraud Examiners, the median theft by perpetrators who had been with a company more than 10 years is $250,000; the median theft for those who stole from a company in their first year of employment is $49,000. One expert cites the following “formula” for employee theft:

Pressure + Rationalization + Opportunity = Employee theft

The only factor in the equation that employers can control is opportunity, which is why entrepreneurs’ money is better spent preventing employee theft than detecting it.

As mentioned earlier, although 64 percent of small businesses report being victims of employee theft, only 16 percent reported the theft to the police. Business owners cite four reasons for failing to report theft by employees: (1) They do not perceive the theft as one warranting any more attention than firing the employee, (2) their attorneys often advise them that the cost in time and energy to prosecute the thief would likely outweigh any benefits, (3) the decision to prosecute is charged with emotion because the employee has worked alongside the owner for many years or is a family member, and (4) they see the police and criminal justice system as ineffective. The median amount stolen among small companies is $150,000, an amount significant enough to threaten the existence of many businesses. Oftentimes, such theft leaves the business in a cash bind from which it is unable to recover. In fact, the U.S. Chamber of Commerce estimates that one-third of all small business bankruptcies result from employee theft. In small businesses, the typical fraud goes on for 18 months before the owner discovers it. Nearly 30 percent of the time, an employee tips off the owner to the theft, twice the percentage of thefts that are discovered by management review (14.5 percent). Seven percent of thefts are discovered by accident.

Many entrepreneurs are shocked to discover that the people who are stealing from their businesses are their most trusted, highly valued employees—the last people they would suspect. In the United States, managers are more likely to steal (43.0 percent) than are employees (30.8 percent), and they cause 2.7 times more damage. The median theft by managers is $173,000, compared to $65,000 by employees. Managers’ thefts also are more difficult to detect, requiring a median of 18 months to detect, compared to 12 months for those that employees commit. The most common red flags that lead to detection are employees living beyond their means, having financial difficulties, having an unusually close association with a company vendor, and being unwilling to share their job duties (for fear of detection).

The most effective way to deal with employee theft is to prevent it. Entrepreneurs can take the following steps to reduce the threat of employee theft:

• Screen potential employees thoroughly. Statistics show that, on average, 1 out of every 38 employees is caught committing employee theft. A business owner’s most useful tool against theft is a thorough pre-employment screening. The best time to weed out prospective criminals is before hiring them.

• Monitor inventory closely. Business owners who fail to keep up-to-date, accurate inventory records are inviting employee theft. When the co-owners of two ice cream stores realized that their employees were stealing, they began to take inventory of their stock twice each day. Once employees knew that controls were in place, the thefts stopped, and profits went up.

• Use technology to discourage theft. A variety of technology tools help business owners minimize losses to employee theft and fraud at very reasonable prices. Simple video camera systems, such as the ones used on the Food Network’s show Restaurant Stakeout, are responsible for nabbing many employee thieves, especially cameras that are focused on checkout stations and cash registers.

• Set up a hotline. One of the most effective tools for minimizing employee theft is to encourage employees to report suspicious activity and give them a mechanism for reporting. Remember that the most common way that managers detect employee theft is by getting tips from other employees.

• Embrace a zero-tolerance policy. When business owners catch an employee thief, the best course of action is to fire the perpetrator and to prosecute. Most owners take the attitude “Resign, return the money, and we'll forget it.” Letting thieves off, however, only encourages them to move on to other businesses where they will steal again.

1. Identify the factors that led Holt of California to become a victim of employee theft and embezzlement. What impact does this crime have on a company’s cash flow and survival?

2. Are small businesses more likely than large ones to be victims of employee theft? Explain.

3. List at least five steps, in addition to the ones described here, that entrepreneurs should take to prevent their businesses from becoming victims of employee theft and embezzlement.

In: Operations Management

Part 2 Accounting policies At a meeting on 16 June 2019, the directors of Swan Ltd...

Part 2

Accounting policies

At a meeting on 16 June 2019, the directors of Swan Ltd decided to change the company’s accounting policy in regard to research and development expenditure. In previous years, research and development expenditure had been capitalized and amortized over 3 years. In line with this policy, $75 000 was capitalized on 1 January 2018. The new policy is to write off all research and development to expense when incurred. During the year ended 30 June 2019, the company spent a further $62 000 on research and development which was capitalized on 1 January 2019. Research and development expenditure is allowable as a deduction for tax purposes when incurred.

Required

Prepare any note disclosures required by AASB 108/IAS 8 in respect of the change in accounting policy. Show all workings.

In: Accounting

1.) Within the framework of the Five-Forces Model of Competition, describe industry conditions that would lead...

1.) Within the framework of the Five-Forces Model of Competition, describe industry conditions that would lead to the highest level of profitability for industry participants. What about the lowest level of profitability? What are the differences between these two conditions?

Your answers will be short essays and should be three full paragraphs or longer.

In: Operations Management

What precipitate forms when aqueous soulutions of Potassium Chloride, Sodium Sulfide, Iron(II) Nitrate are simultaneously mixed?...

What precipitate forms when aqueous soulutions of Potassium Chloride, Sodium Sulfide, Iron(II) Nitrate are simultaneously mixed? Show the molecular and net ionic equation for the reaction.

In: Chemistry

1) a) Derive a relationship between the electric field (E) and electric potential (V) knowing that...

1) a) Derive a relationship between the electric field (E) and electric potential (V) knowing that V is defined as the energy per unit test charge.

b) Based on the above derivation, state an alternate acceptable unit for (E).

In: Physics

Draw Lewis dot structure (CH3)4 NCL A SALT

Draw Lewis dot structure (CH3)4 NCL A SALT

In: Chemistry

Consider the following scenario analysis: Rate of Return Scenario Probability Stocks Bonds Recession 0.20 −4 %...

Consider the following scenario analysis: Rate of Return Scenario Probability Stocks Bonds Recession 0.20 −4 % 19 % Normal economy 0.40 20 % 9 % Boom 0.40 26 % 8 % a. Is it reasonable to assume that Treasury bonds will provide higher returns in recessions than in booms? No Yes b. Calculate the expected rate of return and standard deviation for each investment. (Do not round intermediate calculations. Enter your answers as a percent rounded to 1 decimal place.)

In: Finance

Convert the following binary values to hexadecimal and decimal (1 pt each) Write Hex Numbers as...

Convert the following binary values to hexadecimal and decimal (1 pt each)

Write Hex Numbers as 0x##(ex 0x0A, 0xFF)

Binary

Hexadecimal

Decimal

0001-1011

0x

0000-1000

0000-0100

0000-1001

0001-1111

1001-1001

0111-1010

1100-0010

1110-0101

1000-1010

0011-0100

0001-1001

0100-0011

1111-1111

1110-0111

0001-0010

0100-1000

0100-1110

1001-0001

0110-1100

Name:

Convert the following hexadecimal values to binary and decimal

Write binary numbers as 0000-0000

Hexadecimal

Binary

Decimal

0xf1

0xac

0x56

0x6c

0x32

0x30

0x05

0x28

0xf0

0x07

0x42

0xb9

0x6d

0x2f

0x71

0x0e

0x2d

0xfb

0xba

0x3a

In: Computer Science

I want an abstract about this topic please, not copy-paste from the Internet Synthesized Shaped Beam...

I want an abstract about this topic please, not copy-paste from the Internet

Synthesized Shaped Beam Flat Array Antenna for Digital Beam-Forming Radar Applications, Utilizing Printed Technology.

In: Computer Science

(1 point) A hockey player is to take 3 shots on a certain goalie. The probability...

(1 point) A hockey player is to take 3 shots on a certain goalie. The probability he will score a goal on his first shot is 0.35. If he scores on his first shot, the chance he will score on his second shot increases by 0.1; if he misses, the chance that he scores on his second shot decreases by 0.1. This pattern continues to on his third shot: If the player scores on his second shot, the probability he will score on his third shot increases by another 0.1; should he not score on his second shot, the probability of scoring on the third shot decreases by another 0.1.

A random variable ?X counts the number of goals this hockey player scores.

(a) Complete the probability distribution of ?X below. Use four decimals in each of your entries.

?X 0 1 2 3
?(?=?)P(X=x)

equation editor

Equation Editor

equation editor

Equation Editor

equation editor

Equation Editor

equation editor

Equation Editor


(b) How many goals would you expect this hockey player to score? Enter your answer to four decimals.

?(?)=E(X)=

equation editor

Equation Editor



(c) Compute the standard deviation the random variable ?X. Enter your answer to two decimals.

??(?)=SD(X)=

equation editor

Equation Editor

In: Math

Define the class HotelRoom. The class has the following private data members: the room number (an...

Define the class HotelRoom. The class has the following private data members: the room number (an integer) and daily rate (a double). Include a default constructor as well as a constructor with two parameters to initialize the room number and the room’s daily rate. The class should have get/set functions for all its private data members [20pts]. The constructors and the get/set functions must throw an invalid_argument exception if either one of the parameter values are negative. The exception handler should display the message “Negative Parameter” [20pts]. Include a toString() function that nicely formats and returns a string that displays the information about the hotel room [10pts].

  1. Write a main function to test the class HotelRoom, create a HotelRoom object. Try to set the room rate to an invalid value to generate an exception. Invoke the toSting() function to display the HotelRoom object. [20pts]
  2. Derive the classes GuestRoom form the base class HotelRoom. The GuestRoom has private data fields and public functions:
    1. The private data field capacity (an Integer) that represents the maximum number of guests that can occupy the room. [5pts]
    2. The private data member status (an integer), which represents the number of guests in the room (0 if unoccupied). [5pts]
    3. An integer data field days that represents the number of days the guests occupies the room. [5pts]
    4. Add constructors and get/set functions to the GuestRoom class. The set function for the status data member must throw an out_of_range exception if it tries to set status to value greater than the capacity. [30pts]
    5. The function calculateBill() that returns the amount of guest’s bill. [10pts]
    6. Redefine the function toString() that formats and returns a string containing all pertinent information about the GuestRoom. [15pts]
  3. Derive the classes MeetingRoom form the base class HotelRoom. The class has the following private data filed sand public functions:
    1. A private data field seats, which represents the number of seats in the room. [5pts]
    2. An integer data field status (1 if the room is booked and 0 otherwise). [5pts]
    3. Add constructors and get/set functions to the GuestRoom class. [10pts]
    4. Redefine the function toSting() to format and return a string containing all pertinent information about the MeetingRoom. [20pts]
    5. The function CalculateBill(), which returns the amount of the bill for renting the room for one day. The function calculates the bill as follows: the number of seats multiplied by 10.00, plus 500.00. [20pts]
  4. Write a main function to test the classes GuestRoom and MeetingRoom. Invoke the calculateBills and toStirng() in each of the objects. [40pts]]
  5. Make changes to the HotelRoom class to implement polymorphism. Add a virtual function calculateBill() that returns 0.00 and make the toString() function in the HotelRoom class a virtual function. Write the function displayHotelRoom() that receive a base class type reference as a parameter, then invokes the functions calculateBill() and toString(). The function must return void. [50pts]
  6. From the main function invoke the function displayHotelRoom() three separate times and each time send a HotelRoom, a GuestRoom, and a MeetingRoom type objects. [20pts]

  7. Repeat parts e and f but make appropriate changes in such a way that HotelRoom is turned into an abstract base class. [50pts]

In: Computer Science