Questions
three samples of technical writing (minimum of 1 page each), on the art of communication, how...

three samples of technical writing (minimum of 1 page each), on the art of communication, how to control your emotions and the importance of psychologists. please don't copy and paste from the internet.

In: Psychology

According to the data presented in the textbook, which of the following is the top challenge...

According to the data presented in the textbook, which of the following is the top challenge in improving how mental health issues are addressed in the workplace?

In: Psychology

1. Write a Java program from scratch that meets the following requirements: a. The program is...

1. Write a Java program from scratch that meets the following requirements:

a. The program is in a file called Duplicates.java that defines a class called Duplicates (upper/lower case matters)

b. The program includes a Java method called noDuplicates that takes an array of integers and returns true if all the integers in that array are distinct (i.e., no duplicates). Otherwise it returns false. Make sure the method is public static.

example tests: noDuplicates({}) returns true

noDuplicates({-1, 1}) returns true noDuplicates({4,22,100,99,1,5,7}) returns true

noDuplicates({4,22,100,99,22,5,7}) returns false

c. The program’s main method calls noDuplicates on the above test cases and prints each return value.

2. Write a Java program from scratch that meets the following requirements:

a. The program is in a file called Matching.java that defines a class called Matching.

b. The program includes a Java method called find that takes two Strings and returns an integer. If the second string does not appear in the first string, find returns -1. If the second string appears in the first string, find returns the index of the character where the second string begins in the first string. Make sure the method is public static.

example tests:

find("","") returns 0

find("", "a") returns -1

find("Hello World", "World") returns 6

find("World", "Hello World") returns -1

In: Computer Science

Consider a list called A: A = [-6, 10, 100, 5, -20, 1000, 9, -15] Make...

Consider a list called A:

A = [-6, 10, 100, 5, -20, 1000, 9, -15]

Make a for loop that iterates over A and:

  • If number is negative, print the square of the number.
  • if number is positive but less than or equal to 100, print the number itself.
  • if number is positive but greater than 100, print 0.

In: Computer Science

Pennewell Publishing Inc. (PP) is a zero growth company. It currently has zero debt and its...

Pennewell Publishing Inc. (PP) is a zero growth company. It currently has zero debt and its earnings before interest and taxes (EBIT) are $80,000. PP's current cost of equity is 10%, and its tax rate is 40%. The firm has 10,000 shares of common stock outstanding selling at a price per share of $48.00.

Refer to Exhibit 16.1. Assume that PP is considering changing from its original capital structure to a new capital structure with 35% debt and 65% equity. This results in a weighted average cost of capital equal to 9.4% and a new value of operations of $510,638. Assume PP raises $178,723 in new debt and purchases T-bills to hold until it makes the stock repurchase. What is the stock price per share immediately after issuing the debt but prior to the repurchase?

a.

$45.90

b.

$53.33

c.

$48.12

d.

$58.75

e.

$51.06

Pennewell Publishing Inc. (PP) is a zero growth company. It currently has zero debt and its earnings before interest and taxes (EBIT) are $80,000. PP's current cost of equity is 10%, and its tax rate is 40%. The firm has 10,000 shares of common stock outstanding selling at a price per share of $48.00.

Refer to Exhibit 16.1. PP is considering changing its capital structure to one with 30% debt and 70% equity, based on market values. The debt would have an interest rate of 8%. The new funds would be used to repurchase stock. It is estimated that the increase in risk resulting from the added leverage would cause the required rate of return on equity to rise to 12%. If this plan were carried out, what would be PP's new value of operations?

a.

$484,359

b.

$487,805

c.

$521,173

d.

$560,748

e.

$584,653

In: Finance

Is it only a primate's rank that predicts its stress response? If not, what else is...

  1. Is it only a primate's rank that predicts its stress response? If not, what else is important?
  2. Why is studying dominance hierarchies and stress more complex in humans than in baboons?
  3. What makes living in poverty so stressful?
  4. Explain the role that Sapolsky believes that health care access, risk factors, and feeling poor, play in accounting for the average worse health that people living in poverty experience.

In: Psychology

b. A graduated cylinder contains 45.0mL of water. When a metal rod is submerged into the...

b. A graduated cylinder contains 45.0mL of water. When a metal rod is submerged into the water, the liquid level rises to 50.0mL. What is the volume of the metal rod in cm3? If the metal rod weighed 55.0g, what is the density of the metal rod in g/mL and g/cm3?

c. What is the mass of a substance that has a density of 8.0g/cm3 and a volume of 125cm3?

d. Determine the volume of a substance that has a mass of 750.0g and a density of 2.5g/mL.

e. A student finds that a piece of metal has a mass of 12.54g. When the metal is placed inside a flask that has a volume of 25.00mL, the student finds that 20.54g of water is required to finish filling the flask with the metal in it. If the density of water is 0.9970g/cm3, what is the density of the metal?

In: Chemistry

What did you like best as a preschool teacher, and least, about your last job as...

What did you like best as a preschool teacher, and least, about your last job as a patient observer? What are your strengths and weaknesses?  

In: Psychology

Background / Scenario Attackers have developed many tools over the years to attack and compromise networks....

Background / Scenario
Attackers have developed many tools over the years to attack and compromise networks. These attacks take many forms, but in most cases, they seek to obtain sensitive information, destroy resources, or deny legitimate users access to resources. When network resources are inaccessible, worker productivity can suffer, and business income may be lost.
To understand how to defend a network against attacks, an administrator must identify network vulnerabilities. Specialized security audit software, developed by equipment and software manufacturers, can be used to help identify potential weaknesses. These same tools used by individuals to attack networks can also be used by network professionals to test the ability of a network to mitigate an attack. After the vulnerabilities are discovered, steps can be taken to help protect the network.
This assignment provides a structured research project that is divided into two parts: Researching Network Attacks and Researching Security Audit Tools. Inform your instructor about which network attack(s) and network security audit tool(s) you have chosen to research. This will ensure that a variety of network attacks and vulnerability tools are reported on by the members of the class.
In Part 2, research network security audit tools and attack tools. Investigate one that can be used to identify host or network device vulnerabilities. Create a one-page summary of the tool based on the form included within this lab. Prepare a short (5–10 minute) presentation to give to the class.

You may work in teams of two, with one person reporting on the network attack and the other reporting on the tools. All team members deliver a short overview of their findings. You can use live demonstrations or PowerPoint, to summarize your findings.
Part 1: Researching Network Attacks
Step 1: Research various network attacks.
Step 2: Fill in the following form for the network attack selected.
Name of attack:
Type of attack:
Dates of attacks:
Computers / Organizations affected:
How it works and what it did:
Mitigation options:
References and info links:
Presentation support graphics:

In: Computer Science

In psychology use the term Social Identity Theory to answer these questions and put into a...

In psychology use the term Social Identity Theory to answer these questions and put into a paragraph response! a) describe the media example in enough detail so that I can understand it; b) to define the psychological principles or ideas that are related to the example; and c) to explicitly tie the example to the psychological principle. You may need to write more than the examples below in order to get these points across. In my experience, parts b) and c) give students the most problems. One thing to note about these examples is that in them I: 1) refer to the chapter in which the relevant principles are discussed; and 2) if necessary, provide quotations to help me define terms. If quotations are used, cite the section in which the words appear in the book.

In: Psychology

Stewart invented “Max” a board game similar to “Tic Tac Toe.” In May 2017, Stewart began...

Stewart invented “Max” a board game similar to “Tic Tac Toe.” In May 2017, Stewart began negotiating with Big Board, Inc., to license “Max” for distribution outside the United States. On June 11, 2017, the parties met and orally discussed terms. As compensation, Big Board promised to pay Stewart the amount due from another board game he had developed for Big Board two years ago. On June 26, 2017, Lisa, a Big Board employee, sent Stewart an email titled “Max Deal” that repeated all terms previously discussed and added that they “have been agreed to by Big Board subject to a written contract” and was signed with an electronic signature “Best Regards Lisa”.On July 01, 2017, Stewart emailed Big Board a more formal draft of the terms prepared by his lawyer, which Stewart signed, stating the contract needed to be signed and returned within 10 days but Big Board did not sign or return the contract. Big Board subsequently displayed Max at its pre-Toy Fair in August 2017. After the fair, Big Board sent Stewart an unsigned email saying that it no longer wished to license his game.

Analyze the facts, discuss the applicable law, and reach a logical conclusion as to whether or not there is a legal contract/agreement. Make reasonable assumptions when necessary to complete your analysis. Answer must be no less than 250 words.

BUSINESS LAW

In: Operations Management

[The following information applies to the questions displayed below.] Forten Company, a merchandiser, recently completed its...

[The following information applies to the questions displayed below.]

Forten Company, a merchandiser, recently completed its calendar-year 2017 operations. For the year, (1) all sales are credit sales, (2) all credits to Accounts Receivable reflect cash receipts from customers, (3) all purchases of inventory are on credit, (4) all debits to Accounts Payable reflect cash payments for inventory, and (5) Other Expenses are paid in advance and are initially debited to Prepaid Expenses. The company’s income statement and balance sheets follow.

FORTEN COMPANY
Comparative Balance Sheets
December 31, 2017 and 2016
2017 2016
Assets
Cash $ 79,900 $ 93,500
Accounts receivable 95,970 70,625
Inventory 305,656 271,800
Prepaid expenses 1,410 2,295
Total current assets 482,936 438,220
Equipment 137,500 128,000
Accum. depreciation—Equipment (46,625 ) (56,000 )
Total assets $ 573,811 $ 510,220
Liabilities and Equity
Accounts payable $ 73,141 $ 144,675
Short-term notes payable 16,000 10,000
Total current liabilities 89,141 154,675
Long-term notes payable 55,000 68,750
Total liabilities 144,141 223,425
Equity
Common stock, $5 par value 202,750 170,250
Paid-in capital in excess of par, common stock 57,500 0
Retained earnings 169,420 116,545
Total liabilities and equity $ 573,811 $ 510,220

  

FORTEN COMPANY
Income Statement
For Year Ended December 31, 2017
Sales $ 682,500
Cost of goods sold 305,000
Gross profit 377,500
Operating expenses
Depreciation expense $ 40,750
Other expenses 152,400 193,150
Other gains (losses)
Loss on sale of equipment (25,125 )
Income before taxes 159,225
Income taxes expense 52,250
Net income $ 106,975

Additional Information on Year 2017 Transactions

  1. The loss on the cash sale of equipment was $25,125 (details in b).
  2. Sold equipment costing $106,875, with accumulated depreciation of $50,125, for $31,625 cash.
  3. Purchased equipment costing $116,375 by paying $70,000 cash and signing a long-term note payable for the balance.
  4. Borrowed $6,000 cash by signing a short-term note payable.
  5. Paid $60,125 cash to reduce the long-term notes payable.
  6. Issued 4,500 shares of common stock for $20 cash per share.
  7. Declared and paid cash dividends of $54,100.


Required:
1. Prepare a complete statement of cash flows; report its operating activities using the indirect method. (Amounts to be deducted should be indicated with a minus sign.)
  

In: Accounting

1. To understand the value of records in a programming language, write a small program in...

1. To understand the value of records in a programming language, write a small program in a C-based language that uses an array of structs that store student information, including name, age, GPA as a float, and grade level as a string (e.g., “freshmen, junior, senior” etc.). Also, write the same program in the same language without using structs.

Note: Code and with output screenshots

In: Computer Science

compile a list of three (3) popular Linux/BSD distributions. Try to select distributions that your peers...

compile a list of three (3) popular Linux/BSD distributions. Try to select distributions that your peers have not already posted.

Describe each of the three Linux/BSD distributions and provide a screenshot of each of the distributions.

In: Computer Science

How do we choose the shape of PC sections for a given beam?

How do we choose the shape of PC sections for a given beam?

In: Civil Engineering