Yumi's grandparents presented her with a gift of $20,000 when she was 9 years old to be used for her college education. Over the next 8 years, until she turned 17, Yumi's parents had invested her money in a tax-free account that had yielded interest at the rate of 3.5%/year compounded monthly. Upon turning 17, Yumi now plans to withdraw her funds in equal annual installments over the next 4 years, starting at age 18. If the college fund is expected to earn interest at the rate of 4%/year, compounded annually, what will be the size of each installment? (Assume no interest is accrued from the point she turns 17 until she makes the first withdrawal
In: Finance
JAVASCRIPT: /* Assignment 03: Complete this javascript */ // 1) Declare a variable named myValue // Assign myValue the value of "Hello, how's it going?" // Print the value of myValue to the console // 2) Use the charAt() method to display the letter t // from the variable myValue in the console // 3) Use the indexOf() method to display the position of "going" // from the variable myValue in the console // 4) Use the slice() method to display "how's it going?" // from the variable myValue in the console // 5) Declare a variable named myOtherValue // Assign myOtherValue the value of "Ok?" // Use the concat() method on the variable myValue // to concatenate myValue and myOtherValue // Specify a new line as the first parameter of concat() // Print the result to the console // 6) Declare a variable named myRandom // Assign myRandom a non-rounded value between 0 and 1 using Math.random() // Print the result to the console // 7) Now assign a random value between 1 and 10 to myRandom // Use Math.floor() and Math.random() to accomplish this // Print the result to the console // 8) Print the length of the variable myValue to the console // 9) Set the contents of the variable myValue to all lowercase // Find the method to do this on your own // Print the variable to the console to show it now holds all lowercase // 10) **Solving a problem! // Declare a variable named myName and assign it your first name // Utilize the length property, Math.floor(), Math.random() and charAt() // methods to write a line of code that will randomly display a character // from your firstname in the console... refer to the examples of each // method at w3schools.com and MDN Web Docs
In: Computer Science
1.) What are some tests of a good strategy? How do we know if a company’s strategy is working? What are some options for a company if their strategy is not working?
Your answers will be short essays and should be three full paragraphs or longer.
In: Operations Management
Are The Broken Window Theory and Incrementalism similar or different? How? Mention specific examples. 300 words
Incrementalism (Referred to as the slippery slope, incrementalism describes how we unconsciously lower our ethical standards over time through small changes in behavior.)
In: Operations Management
You Be the Consultant "Controlling Employee Theft" (Page 546).
Managers at Holt of California, a heavy equipment dealer based in Pleasant Grove, California, noticed some “unusual” accounting transactions and began to investigate them. Gradually, they discovered that over seven years, their controller, “Stan” (not his real name), who had worked for the company for nine years, had stolen $4.8 million from the company. Stan had used company credit cards, some of which had been issued to former employees, to purchase goods and services, including electronics, cars, airline tickets, landscaping for his home, a country club membership, cosmetic surgery, season tickets to professional sporting events, and online games, for his personal use. In an unusual twist, authorities discovered that Stan had spent $1 million of his employer’s money playing Game of Fortune. To cover his theft, Stan had vendors send bills to his home, where he could alter them, and created a steady stream of false financial reports. Fortunately, Holt was able to survive its employee theft incident, but some entrepreneurs have to close their businesses because employee theft and fraud destroy their cash flow.
Because small businesses often lack the financial and control procedures that large companies impose, they are disproportionately more likely to be victims of employee theft. Small companies are common targets of employee theft because employees, especially long-term employees, know the weaknesses in the company’s systems, procedures, and controls and take advantage when the opportunity presents itself. Indeed, the longer the tenure of an employee who steals, the greater the amount stolen. According to a recent study by the Association of Certified Fraud Examiners, the median theft by perpetrators who had been with a company more than 10 years is $250,000; the median theft for those who stole from a company in their first year of employment is $49,000. One expert cites the following “formula” for employee theft:
Pressure + Rationalization + Opportunity = Employee theft
The only factor in the equation that employers can control is opportunity, which is why entrepreneurs’ money is better spent preventing employee theft than detecting it.
As mentioned earlier, although 64 percent of small businesses report being victims of employee theft, only 16 percent reported the theft to the police. Business owners cite four reasons for failing to report theft by employees: (1) They do not perceive the theft as one warranting any more attention than firing the employee, (2) their attorneys often advise them that the cost in time and energy to prosecute the thief would likely outweigh any benefits, (3) the decision to prosecute is charged with emotion because the employee has worked alongside the owner for many years or is a family member, and (4) they see the police and criminal justice system as ineffective. The median amount stolen among small companies is $150,000, an amount significant enough to threaten the existence of many businesses. Oftentimes, such theft leaves the business in a cash bind from which it is unable to recover. In fact, the U.S. Chamber of Commerce estimates that one-third of all small business bankruptcies result from employee theft. In small businesses, the typical fraud goes on for 18 months before the owner discovers it. Nearly 30 percent of the time, an employee tips off the owner to the theft, twice the percentage of thefts that are discovered by management review (14.5 percent). Seven percent of thefts are discovered by accident.
Many entrepreneurs are shocked to discover that the people who are stealing from their businesses are their most trusted, highly valued employees—the last people they would suspect. In the United States, managers are more likely to steal (43.0 percent) than are employees (30.8 percent), and they cause 2.7 times more damage. The median theft by managers is $173,000, compared to $65,000 by employees. Managers’ thefts also are more difficult to detect, requiring a median of 18 months to detect, compared to 12 months for those that employees commit. The most common red flags that lead to detection are employees living beyond their means, having financial difficulties, having an unusually close association with a company vendor, and being unwilling to share their job duties (for fear of detection).
The most effective way to deal with employee theft is to prevent it. Entrepreneurs can take the following steps to reduce the threat of employee theft:
• Screen potential employees thoroughly. Statistics show that, on average, 1 out of every 38 employees is caught committing employee theft. A business owner’s most useful tool against theft is a thorough pre-employment screening. The best time to weed out prospective criminals is before hiring them.
• Monitor inventory closely. Business owners who fail to keep up-to-date, accurate inventory records are inviting employee theft. When the co-owners of two ice cream stores realized that their employees were stealing, they began to take inventory of their stock twice each day. Once employees knew that controls were in place, the thefts stopped, and profits went up.
• Use technology to discourage theft. A variety of technology tools help business owners minimize losses to employee theft and fraud at very reasonable prices. Simple video camera systems, such as the ones used on the Food Network’s show Restaurant Stakeout, are responsible for nabbing many employee thieves, especially cameras that are focused on checkout stations and cash registers.
• Set up a hotline. One of the most effective tools for minimizing employee theft is to encourage employees to report suspicious activity and give them a mechanism for reporting. Remember that the most common way that managers detect employee theft is by getting tips from other employees.
• Embrace a zero-tolerance policy. When business owners catch an employee thief, the best course of action is to fire the perpetrator and to prosecute. Most owners take the attitude “Resign, return the money, and we'll forget it.” Letting thieves off, however, only encourages them to move on to other businesses where they will steal again.
1. Identify the factors that led Holt of California to become a victim of employee theft and embezzlement. What impact does this crime have on a company’s cash flow and survival?
2. Are small businesses more likely than large ones to be victims of employee theft? Explain.
3. List at least five steps, in addition to the ones described here, that entrepreneurs should take to prevent their businesses from becoming victims of employee theft and embezzlement.
In: Operations Management
Part 2
Accounting policies
At a meeting on 16 June 2019, the directors of Swan Ltd decided to change the company’s accounting policy in regard to research and development expenditure. In previous years, research and development expenditure had been capitalized and amortized over 3 years. In line with this policy, $75 000 was capitalized on 1 January 2018. The new policy is to write off all research and development to expense when incurred. During the year ended 30 June 2019, the company spent a further $62 000 on research and development which was capitalized on 1 January 2019. Research and development expenditure is allowable as a deduction for tax purposes when incurred.
Required
Prepare any note disclosures required by AASB 108/IAS 8 in respect of the change in accounting policy. Show all workings.
In: Accounting
1.) Within the framework of the Five-Forces Model of Competition, describe industry conditions that would lead to the highest level of profitability for industry participants. What about the lowest level of profitability? What are the differences between these two conditions?
Your answers will be short essays and should be three full paragraphs or longer.
In: Operations Management
What precipitate forms when aqueous soulutions of Potassium Chloride, Sodium Sulfide, Iron(II) Nitrate are simultaneously mixed? Show the molecular and net ionic equation for the reaction.
In: Chemistry
1) a) Derive a relationship between the electric field (E) and electric potential (V) knowing that V is defined as the energy per unit test charge.
b) Based on the above derivation, state an alternate acceptable unit for (E).
In: Physics
Consider the following scenario analysis: Rate of Return Scenario Probability Stocks Bonds Recession 0.20 −4 % 19 % Normal economy 0.40 20 % 9 % Boom 0.40 26 % 8 % a. Is it reasonable to assume that Treasury bonds will provide higher returns in recessions than in booms? No Yes b. Calculate the expected rate of return and standard deviation for each investment. (Do not round intermediate calculations. Enter your answers as a percent rounded to 1 decimal place.)
In: Finance
Convert the following binary values to hexadecimal and decimal (1 pt each)
Write Hex Numbers as 0x##(ex 0x0A, 0xFF)
Binary |
Hexadecimal |
Decimal |
0001-1011 |
0x |
|
0000-1000 |
||
0000-0100 |
||
0000-1001 |
||
0001-1111 |
||
1001-1001 |
||
0111-1010 |
||
1100-0010 |
||
1110-0101 |
||
1000-1010 |
||
0011-0100 |
||
0001-1001 |
||
0100-0011 |
||
1111-1111 |
||
1110-0111 |
||
0001-0010 |
||
0100-1000 |
||
0100-1110 |
||
1001-0001 |
||
0110-1100 |
Name:
Convert the following hexadecimal values to binary and decimal
Write binary numbers as 0000-0000
Hexadecimal |
Binary |
Decimal |
0xf1 |
||
0xac |
||
0x56 |
||
0x6c |
||
0x32 |
||
0x30 |
||
0x05 |
||
0x28 |
||
0xf0 |
||
0x07 |
||
0x42 |
||
0xb9 |
||
0x6d |
||
0x2f |
||
0x71 |
||
0x0e |
||
0x2d |
||
0xfb |
||
0xba |
||
0x3a |
In: Computer Science
I want an abstract about this topic please, not copy-paste from the Internet
Synthesized Shaped Beam Flat Array Antenna for Digital Beam-Forming Radar Applications, Utilizing Printed Technology.
In: Computer Science
(1 point) A hockey player is to take 3 shots on a certain
goalie. The probability he will score a goal on his first shot is
0.35. If he scores on his first shot, the chance he will score on
his second shot increases by 0.1; if he misses, the chance that he
scores on his second shot decreases by 0.1. This pattern continues
to on his third shot: If the player scores on his second shot, the
probability he will score on his third shot increases by another
0.1; should he not score on his second shot, the probability of
scoring on the third shot decreases by another
0.1.
A random variable ?X counts the number of goals this hockey player
scores.
(a) Complete the probability distribution of ?X
below. Use four decimals in each of your entries.
?X | 0 | 1 | 2 | 3 |
?(?=?)P(X=x) |
equation editor Equation Editor |
equation editor Equation Editor |
equation editor Equation Editor |
equation editor Equation Editor |
(b) How many goals would you expect this hockey
player to score? Enter your answer to four decimals.
?(?)=E(X)=
equation editor
Equation Editor
(c) Compute the standard deviation the random
variable ?X. Enter your answer to two decimals.
??(?)=SD(X)=
equation editor
Equation Editor
In: Math
Define the class HotelRoom. The class has the following private data members: the room number (an integer) and daily rate (a double). Include a default constructor as well as a constructor with two parameters to initialize the room number and the room’s daily rate. The class should have get/set functions for all its private data members [20pts]. The constructors and the get/set functions must throw an invalid_argument exception if either one of the parameter values are negative. The exception handler should display the message “Negative Parameter” [20pts]. Include a toString() function that nicely formats and returns a string that displays the information about the hotel room [10pts].
From the main function invoke the function displayHotelRoom() three separate times and each time send a HotelRoom, a GuestRoom, and a MeetingRoom type objects. [20pts]
In: Computer Science