Questions
Time spent using​ e-mail per session is normally​ distributed, with mu equals 7 minutes and sigma...

Time spent using​ e-mail per session is normally​ distributed, with mu equals 7 minutes and sigma equals 2 minutes. Assume that the time spent per session is normally distributed. Complete parts​ (a) through​ (d). If you select a random sample of 200 ​sessions, what is the probability that the sample mean is between 6.8 and 7.2 ​minutes?

In: Math

For this week's blog, you will compose a professional philosophy statement, sometimes referred to as a...

For this week's blog, you will compose a professional philosophy statement, sometimes referred to as a work statement. This can be a valuable document to include with an application or portfolio, but it is also helpful preparation for interview questions.  This statement will be included as part of your final project/e-portfolio that is due in week four (note the duck icon). Your professional philosophy statement should be 250-500 words.

As you consider what to include in your statement, keep in mind the things that employers find valuable; for example: organization, resourcefulness, work ethic, creativity, motivation, perseverance, adaptability, strong written and verbal communication, and so on. You can address technical skills that you possess, but do not overlook “soft” skills like solid time-management and those listed above.  

Do not simply detail your work experience; that is what your resume is for. Instead, the professional philosophy statement should encapsulate your personal perspective or approach to the work you do (or hope to do once you enter your field). What do you bring to the workplace that is unique and which will help you and your colleagues succeed?  

In: Computer Science

Q1: what does the efficient frontier represents? Q2: how do we estimate the return and standard...

Q1: what does the efficient frontier represents?

Q2: how do we estimate the return and standard deviation of a newly built portfolio from analyzing the stocks in that portfolio?

Q3: in the regression equation, what is meant by a regression that has an R-square with 0.95 and how does it compare with a regression with a R-square of 0.30?

Q4: why do we use adjusted beta?

Q5: what is the information ratio and why do we use it?

In: Finance

What in your opinion are the 5 elements that absolutely must to be included in a...

What in your opinion are the 5 elements that absolutely must to be included in a Final Business Idea Presentation?

In: Operations Management

You will implement the MyList ADT according to the following: 1. MyList must implement the List...

You will implement the MyList ADT according to the following:

1. MyList must implement the List interface. It will look something like below:

public class MyList<E> implements List<E> {

... } Note: As said in the class, when implementing an interface, you have to implement each method in it. There are a lot of methods in the List interface. We are going to address this issue below.

2. The initial capacity of MyList must be 2. This is not an ideal initial capacity. A smaller initial

capacity allows us to test out our code more quickly.

3. You must implement the following methods:

@SuppressWarnings("unchecked") public MyList() {

... } public int size() {

... } public boolean isEmpty() {

... } public boolean add(E e) {

... } public void add(int index, E element) {

... } public E get(int index) {

... } public E set(int index, E element) {

... } public E remove(int index) {

... } You can choose to implement any other methods as you need – private or public. For any method you don’t need but is required by the List interface, you can stub them out like below:

public void clear() {

StackTraceElement[] stackTrace =

new Throwable().getStackTrace(); String methodName = stackTrace[0].getMethodName(); throw new UnsupportedOperationException("Method '"

+ methodName + "' not implemented!"); }

4. There is at least one place where you will encounter an avoidable “unchecked” compiler warning. To get a clean compilation, use: @SuppressWarnings("unchecked").

But don’t abuse it for any other places where a warning is avoidable but due to your questionable coding skills.

In: Computer Science

Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security...

Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security Officer (CISO). How does each phase, its deliverables and the personnel involved relate to the requirements of the CISO?

PLEASE DO NOT PROVIDE ANSWERS ALREADY GIVEN. NO PLAGIARISM, PLEASE!

In: Computer Science

suppose that you have data on many (say 1,000) randomly selected employed country's  residents. FURTHER DETAILS GIVEN...

suppose that you have data on many (say 1,000) randomly selected employed country's  residents. FURTHER DETAILS GIVEN IN THE END OF THE QUESTIONS

a) Explain how you would test whether, holding everything else constant, females earn less than males.

b) Explain how you would measure the payoff to someone becoming bilingual if her mother tongue is i) French, ii) English.

c) Does including both X3 and X4 in this regression model have the potential to show any "problems" when estimating your regression model? Explain. Would eliminating one of them potentially cause other problems? Explain

d) Can you use this model to test if the influence of on-the-job experience is greater for males than females? Why or why not? If not, how would you need to change the model to test whether the influence of on the job experience is greater for males than females?

FURTHER DETAILS:

Consider the following linear regression model "explaining" salaries in the Country:

Y = β0 + β1X1 + β2X2 + β3X3 + β4X4 + β5D1 + β6D2 + β7D3 + µ

where: Y = salary,

X1 = years of education,

X2 = innate ability (proxied by IQ test results)

X3 = years of on the job experience

X4 = age

D1 = a dummy variable for gender (= 1 for males, 0 for females)

D2 = 1 for uni-lingual French speakers

D3 = 1 for uni-lingual English speakers

In: Math

Q3: Conduct a five forces analysis of the social media industry. Where do we, the public...

Q3: Conduct a five forces analysis of the social media industry. Where do we, the public who use social media products, fit? Are we consumers or suppliers (or its workers)?

We often think of ourselves as consumers of Facebook, Google, Instagram and other Internet services. In reality, we are also their suppliers – or more accurately, their workers.

The book is Strategic Corporate Social Responsibility CSR chapter#9

In: Operations Management

If a bank has a Liquidity Coverage Ratio of 104%, and HQLA of $45,650,000, how much...

If a bank has a Liquidity Coverage Ratio of 104%, and HQLA of $45,650,000, how much does the bank expect to run off in cash flow during the next 30 days?

Ans: ________________________

A bank has an NSFR of 178%. How much more stable capital does the bank have compared to its RSF, if the required amount is $1.673 billion?   Ans: _______________________________

In: Finance

Hi! I wrote two function to get count cluster of char in a string , charFreq(),...

Hi! I wrote two function to get count cluster of char in a string , charFreq(), and an other one which iterate through a vector line by line looking for last element on each line, last(). The problem is, after appending all chars in a string and try to count clusters of values in that string, I get seg fault. I feel like my logic behind is ok, but I am not sure what I did wrong. Can someone help and tell me where are my errors. Also, all computation are done on txt file.

-----------------------------------------------------------------------------:c++ program

#include <iostream>

#include <string>

#include <vector>

#include <algorithm>

#include <fstream>

using namespace std;

//func to check frequency of a char in a string

void charFreq(string& Mystring){

int w = 1;

vector<int> count; //store all freq int into a vector

for(int i = 0; i <= Mystring.length(); i++){

if(Mystring.at(i)== Mystring.at(i+1))//if two adjacent value are the same increment my w: aaa = 3a

{

w++;

count[i]=w;

}

}

//print out all int charFreq.

for(int x = 0; x < count.size()-1; x++){

cout << count[x]<<" ";

}

}

void printArray(vector<string> array) {

for (int i = 0; i < array.size() - 1; ++i)

cout << array[i] << endl;

}

//iterate through vector looking for last char and append all chars into one string

string last(vector<string>& line){

char w;

string x;

string y = " ";

for(int i = 0; line.size(); i++){

w = x.at(x.length()-1);//find last char in a string

y += w;//append my char to a string

}

return y;//return entire string of appended chars

}


int main(int argc, char *argv[])

{

string i;

string input_line;

vector<string> value;

ifstream infile("Freq.txt");

if (infile.is_open())

{

while (getline(infile, input_line))

{

for (int i = 0; i < input_line.size(); i++)

{

value.push_back(input_line);//push individual input_line into vector value

charFreq(input_line);

printArray(value);

last(value);

}

}

infile.close();

}

return 0;

}

------------------------------------------------------------------------------------------------Freq.txt file

there!Hi

!Hi there

Adios

Hi there!

diosA

e!Hi ther

ere!Hi th

here!Hi t

i there!H

iosAd

osAdi

re!Hi the

sAdio

---------------------------------output

1i 1e 1s 1!.........................1o

In: Computer Science

what are the elements of the company value chain (Micheal Porter) and how do they differ...

what are the elements of the company value chain (Micheal Porter) and how do they differ from the elements of an industry value chain? Which approach in your opinion, is better suited to analyzing a company's strengths, weaknesses, and opportunities?

In: Operations Management

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital...

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital of 9.8 percent, and a tax rate of 25 percent. The company has $1,200,000 of debt that carries a 6.4 percent coupon. The debt is selling at par value. Assume the firm maintains this debt amount forever. What is the interest tax shield of the firm in a given year? What is the value of the firm?

A)$18,900 and $10,475,216

B)$18,600 and $10,475,216

C)$18,600 and $11,328,410

D)$19,200 and $11,328,410

E)$19,200 and $10,708,163

8)Yankee Company is currently an all equity firm. Its current cost of equity is 10.4 percent and the tax rate is 25 percent. The firm has 1,700,000 shares of stock outstanding with a market price of $46 a share. The firm is considering capital restructuring that allows $12 million of debt with a coupon rate of 6.4 percent. The debt will be sold at par value and the proceeds will be used to repurchase shares. What is the value per share after the recapitalization? (Hint: You need to determine the total value of equity after recapitalization that accounts for the PV of interest tax shield and the number of shares outstanding after repurchased)

A)$49.27

B)$48.08

C)$47.15

D)$46.50

E)$50.33

In: Finance

Part 2 – Scripting Goals:  Write a bash script  Use linux shell commands within...

Part 2 – Scripting
Goals:
 Write a bash script
 Use linux shell commands within your script
 Provide user feedback
 Use loops
 Use conditionals
Remember to use chmod +x to make your file executable!
Each script is 5 points in the Specifications portion of the rubric. Don’t forget to maintain good standards and comments.
Script 1 – Echo-back some information
Write a script name hello.sh that will take the user’s first name as a command line argument and say hello!
Use Case: ./hello.sh Bob
Output: Hello Bob, I am a BASH script!
Script 2 – Make a Backup Folder
Write a short script named bakThatUp.sh this script will make a backup of a folder given through the command line. This script should take in two parameters, but have multiple options use If-Statements to make it work.
Use Cases:
./bakThatUp.sh Archive
o Creates a backup folder named Archive_bak with all contents
./backThatUp.sh –t Archive
o Creates a backup folder named with a date stamp (using +%F) and the name:
 2018-08-04_Archive
 date +%F gives the appropriate date stamp
./backThatUp.sh Archive –t
o Same result as above
./backThatUp.sh Archive ArchiveBackUpFolder
o Creates a backup folder named ArchiveBackUpFolder with all contents

In: Computer Science

It all began at a small bridal shower at Margaret River when Max brought some wine...

It all began at a small bridal shower at Margaret River when Max brought some wine from Woodstown Wines Pty Ltd. Had he known the wine he purchased had plastic corks, he would not have bought that brand! Usually, after removing the wire cage, a firm twist is all that is needed to start easing the stopper out. That day was different. Max twisted, pushed up with his thumbs, twisted with all his strength and the stopper did not budge. There were no instructions or warnings on the bottle. Anna, the chief bridesmaid advised that usually all local manufacturers provide instructions on the bottle for the consumers who are unfamiliar with the type of wine and the removal of its cap. Max spent almost ten minutes giving it his best shot. Being unfamiliar with the plastic stopper, he turned the bottle up to see why the stopper did not come out. All of a sudden, the stopper discharged from the bottle into his eye and injured him.

What does Max need to establish in order to succeed in an action of negligence against Woodstown Wines Pty Ltd? Your response should consider and apply all the essential elements in proving a case in negligence, the remedies applicable if successful, and any defences that might be available to the defendant. You should consider the relevant legal rules, principles, tests, guidelines and propositions applicable under the common law and do not consider any matters beyond the law of negligence. Give full reasons for your answer and cite relevant case authorities wherever possible.

In: Operations Management

1. create a class called ArrayStack that is a generic class. Create a main program to...

1. create a class called ArrayStack that is a generic class. Create a main program to read in one input file and print out the file in reverse order by pushing each item on the stack and popping each item off to print it. The two input files are: tinyTale.txt and numbers.txt. Rules: You cannot inherit the StackofStrings class.

2. Using your new ArrayStack, create a new class called RArrayStack. To do this, you need

a) remove the capacity parameter from the constructor and create the array with 8 as the starting size

b) create a new method called resize that takes a parameter (capacity)

c) change push() to check for length of array. If it is at the limit then call resize to increase it to twice the size Use the same main program from 1 and the two input files to test out your program. RULE: You cannot use ArrayList – you must use a primitive Java arrays.

  

import java.util.Iterator;
import java.util.NoSuchElementException;

public class StackOfStrings implements Iterable<String> {
private String[] a; // holds the items
private int N; // number of items in stack

// create an empty stack with given capacity
public StackOfStrings(int capacity) {
a = new String[capacity];
N = 0;
}

public boolean isEmpty() {
return N == 0;
}
  
public boolean isFull() {
return N == a.length;   
}
  
public void push(String item) {
a[N++] = item;
}
  
public String pop() {
return a[--N];
}
  
public String peek() {
return a[N-1];
}
  
public Iterator<String> iterator() {
return new ReverseArrayIterator();
}

public class ReverseArrayIterator implements Iterator<String> {
private int i = N-1;

public boolean hasNext() {
return i >= 0;
}

public String next() {
if (!hasNext()) throw new NoSuchElementException();
return a[i--];
}

public void remove() {
throw new UnsupportedOperationException();
}
}
}

Numbers.txt

20
7
99
88
1
2
3
4
30
16
19
50
55
60
61
6
68
28
32
--------------------------------------------------------------

tinyTale.txt

it was the best of times it was the worst of times
it was the age of wisdom it was the age of foolishness
it was the epoch of belief it was the epoch of incredulity
it was the season of light it was the season of darkness
it was the spring of hope it was the winter of despair

In: Computer Science