Questions
what are the elements of the company value chain (Micheal Porter) and how do they differ...

what are the elements of the company value chain (Micheal Porter) and how do they differ from the elements of an industry value chain? Which approach in your opinion, is better suited to analyzing a company's strengths, weaknesses, and opportunities?

In: Operations Management

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital...

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital of 9.8 percent, and a tax rate of 25 percent. The company has $1,200,000 of debt that carries a 6.4 percent coupon. The debt is selling at par value. Assume the firm maintains this debt amount forever. What is the interest tax shield of the firm in a given year? What is the value of the firm?

A)$18,900 and $10,475,216

B)$18,600 and $10,475,216

C)$18,600 and $11,328,410

D)$19,200 and $11,328,410

E)$19,200 and $10,708,163

8)Yankee Company is currently an all equity firm. Its current cost of equity is 10.4 percent and the tax rate is 25 percent. The firm has 1,700,000 shares of stock outstanding with a market price of $46 a share. The firm is considering capital restructuring that allows $12 million of debt with a coupon rate of 6.4 percent. The debt will be sold at par value and the proceeds will be used to repurchase shares. What is the value per share after the recapitalization? (Hint: You need to determine the total value of equity after recapitalization that accounts for the PV of interest tax shield and the number of shares outstanding after repurchased)

A)$49.27

B)$48.08

C)$47.15

D)$46.50

E)$50.33

In: Finance

Part 2 – Scripting Goals:  Write a bash script  Use linux shell commands within...

Part 2 – Scripting
Goals:
 Write a bash script
 Use linux shell commands within your script
 Provide user feedback
 Use loops
 Use conditionals
Remember to use chmod +x to make your file executable!
Each script is 5 points in the Specifications portion of the rubric. Don’t forget to maintain good standards and comments.
Script 1 – Echo-back some information
Write a script name hello.sh that will take the user’s first name as a command line argument and say hello!
Use Case: ./hello.sh Bob
Output: Hello Bob, I am a BASH script!
Script 2 – Make a Backup Folder
Write a short script named bakThatUp.sh this script will make a backup of a folder given through the command line. This script should take in two parameters, but have multiple options use If-Statements to make it work.
Use Cases:
./bakThatUp.sh Archive
o Creates a backup folder named Archive_bak with all contents
./backThatUp.sh –t Archive
o Creates a backup folder named with a date stamp (using +%F) and the name:
 2018-08-04_Archive
 date +%F gives the appropriate date stamp
./backThatUp.sh Archive –t
o Same result as above
./backThatUp.sh Archive ArchiveBackUpFolder
o Creates a backup folder named ArchiveBackUpFolder with all contents

In: Computer Science

It all began at a small bridal shower at Margaret River when Max brought some wine...

It all began at a small bridal shower at Margaret River when Max brought some wine from Woodstown Wines Pty Ltd. Had he known the wine he purchased had plastic corks, he would not have bought that brand! Usually, after removing the wire cage, a firm twist is all that is needed to start easing the stopper out. That day was different. Max twisted, pushed up with his thumbs, twisted with all his strength and the stopper did not budge. There were no instructions or warnings on the bottle. Anna, the chief bridesmaid advised that usually all local manufacturers provide instructions on the bottle for the consumers who are unfamiliar with the type of wine and the removal of its cap. Max spent almost ten minutes giving it his best shot. Being unfamiliar with the plastic stopper, he turned the bottle up to see why the stopper did not come out. All of a sudden, the stopper discharged from the bottle into his eye and injured him.

What does Max need to establish in order to succeed in an action of negligence against Woodstown Wines Pty Ltd? Your response should consider and apply all the essential elements in proving a case in negligence, the remedies applicable if successful, and any defences that might be available to the defendant. You should consider the relevant legal rules, principles, tests, guidelines and propositions applicable under the common law and do not consider any matters beyond the law of negligence. Give full reasons for your answer and cite relevant case authorities wherever possible.

In: Operations Management

1. create a class called ArrayStack that is a generic class. Create a main program to...

1. create a class called ArrayStack that is a generic class. Create a main program to read in one input file and print out the file in reverse order by pushing each item on the stack and popping each item off to print it. The two input files are: tinyTale.txt and numbers.txt. Rules: You cannot inherit the StackofStrings class.

2. Using your new ArrayStack, create a new class called RArrayStack. To do this, you need

a) remove the capacity parameter from the constructor and create the array with 8 as the starting size

b) create a new method called resize that takes a parameter (capacity)

c) change push() to check for length of array. If it is at the limit then call resize to increase it to twice the size Use the same main program from 1 and the two input files to test out your program. RULE: You cannot use ArrayList – you must use a primitive Java arrays.

  

import java.util.Iterator;
import java.util.NoSuchElementException;

public class StackOfStrings implements Iterable<String> {
private String[] a; // holds the items
private int N; // number of items in stack

// create an empty stack with given capacity
public StackOfStrings(int capacity) {
a = new String[capacity];
N = 0;
}

public boolean isEmpty() {
return N == 0;
}
  
public boolean isFull() {
return N == a.length;   
}
  
public void push(String item) {
a[N++] = item;
}
  
public String pop() {
return a[--N];
}
  
public String peek() {
return a[N-1];
}
  
public Iterator<String> iterator() {
return new ReverseArrayIterator();
}

public class ReverseArrayIterator implements Iterator<String> {
private int i = N-1;

public boolean hasNext() {
return i >= 0;
}

public String next() {
if (!hasNext()) throw new NoSuchElementException();
return a[i--];
}

public void remove() {
throw new UnsupportedOperationException();
}
}
}

Numbers.txt

20
7
99
88
1
2
3
4
30
16
19
50
55
60
61
6
68
28
32
--------------------------------------------------------------

tinyTale.txt

it was the best of times it was the worst of times
it was the age of wisdom it was the age of foolishness
it was the epoch of belief it was the epoch of incredulity
it was the season of light it was the season of darkness
it was the spring of hope it was the winter of despair

In: Computer Science

Project Name: URLEncoder Target Platform: Console Programming Language: C# A Uniform Resource Identifier (URI) (Links to...

Project Name: URLEncoder Target Platform: Console Programming Language: C# A Uniform Resource Identifier (URI) (Links to an external site.) is a string of characters designed for unambiguous identification of resources and extensibility via the URI scheme. The most common form of URI is the Uniform Resource Locator (URL) (Links to an external site.), frequently referred to informally as a web address. A user has a need to generate URLs for files they are storing on a server. The purpose of this program is to generate the URL string so the user doesn’t have to type it out. The program asks the user for several pieces of information and then uses it to generate the URL string and presents it in the Console where the user can copy it. This is being done so the user doesn’t have to type out the URL and helps avoid mistakes from typing and from the use of invalid characters in a URL. The following is the format for a URL that is to be generated by the program. https://companyserver.com/content/[project_name]/files/[activity_name]/[activity_name]Report.pdf (Links to an external site.) The [project_name] and [activity_name] are placeholders for pieces of information that go in the string. The [ ] do not get included in the string. They surround an identifier for the piece of information and are not part of the content. So, if [project_name] is “DesignLab” and [activity_name] is “Furnishings” then the URL is to be https://companyserver.com/content/DesignLab/files/Furnishings/FurnishingsReport.pdf (Links to an external site.) There are a couple of rules that have to be adhered to when creating URLs. No spaces are allowed in URLs. So, if [project_name] is “Design Lab” it can’t be included as-is in the URL. Spaces in URLs must be replaced with “%20”. The URL can contain “Design%20Lab”. If a space is present in the user input it must be converted to “%20”. Note: spaces can also be replaced with a +, but for this assignment spaces are to be converted to “%20”. In addition to spaces, there are other characters that may not be placed in URLs. The HTML URL Encoding Reference (Links to an external site.) from w3schools shows how characters that aren’t allowed in a URL can be converted to a %[number] value that can be in the URL. control characters: these are ASCII coded characters 00–1F and 7F hexadecimal delimiter characters: < > # % and " If a control character appears in the content provided by the user, the user is to be given feedback that the input is invalid because it contains a control character and they are to be asked to provide a different input. If a delimiter appears in the content provided by the user, the delimiter character is to be converted into its %[number] URL encoded format. For example, < is to be encoded as “%3C” and > is to be encoded as “%3E”. The values for the other characters can be found in the documentation provided above. There are some other characters that are reserved for use in some parts of the URL. They may not be allowed in one part of the URL even if they are allowed in other parts. These characters are also to be converted to their URL encoded format using %[number]. The following characters are reserved within a query component, have special meaning within a URL, and are to be converted. ; / ? : @ & = + $ , The following list of characters are not disallowed, but they may cause problems. They should also be converted to their URL encoded format. { } | \ ^ [ ] ` The following is an example to illustrate the application of the rules. Project Name: Design Lab Activity Name: Network>Implementation Result URL: https://companyserver.com/content/Design%20Lab/files/Network%3EImplementation/Network%3EImplementationReport.pdf (Links to an external site.) Your application, when run, is to prompt the user for the Project Name and the Activity Name. If the input is invalid, the user should be re-prompted for the input with a feedback message. After the input is successfully received, the URL string is to be created based on the rules above and presented to the user in the Console. After the URL is presented, the user is to be prompted if they want to create another URL. If they do, prompt them again for input. If not, exit the program. Please do in visual studios 2019.

In: Computer Science

1. Suppose the market value of risky and risk free bonds is initially $850 with a...

1. Suppose the market value of risky and risk free bonds is initially $850 with a corresponding return of 17.6 %, illustratively discuss the probable reaction of bond buyers and sellers when corporate bonds become riskier to such an extent that the market value of corporate bonds falls to $800 with a corresponding 25% rate of return. If the response of buyers causes the price of risk-free bonds to rise to$900 with a corresponding 11.1 % rate of return, derive the risk premium.

In: Finance

Stack Time Limit : 1 sec, Memory Limit : 131072 KB English / Japanese   Reverse Polish...

Stack

Time Limit : 1 sec, Memory Limit : 131072 KB
English / Japanese  

Reverse Polish notation is a notation where every operator follows all of its operands. For example, an expression (1+2)*(5+4) in the conventional Polish notation can be represented as 1 2 + 5 4 + * in the Reverse Polish notation. One of advantages of the Reverse Polish notation is that it is parenthesis-free.

Write a program which reads an expression in the Reverse Polish notation and prints the computational result.

An expression in the Reverse Polish notation is calculated using a stack. To evaluate the expression, the program should read symbols in order. If the symbol is an operand, the corresponding value should be pushed into the stack. On the other hand, if the symbols is an operator, the program should pop two elements from the stack, perform the corresponding operations, then push the result in to the stack. The program should repeat this operations.

Input

An expression is given in a line. Two consequtive symbols (operand or operator) are separated by a space character.

You can assume that +, - and * are given as the operator and an operand is a positive integer less than 106

Output

Print the computational result in a line.

Constraints

2 ≤ the number of operands in the expression ≤ 100
1 ≤ the number of operators in the expression ≤ 99
-1 × 109 ≤ values in the stack ≤ 109

Sample Input 1

1 2 +

Sample Output 1

3

Sample Input 2

1 2 + 3 4 - *

Sample Output 2

-3

USE JAVA

In: Computer Science

1. Calcium oxalate monohydrate, CaC2O4•H2O, is stable up to ~100˚C, but will release the incorporated water...

1. Calcium oxalate monohydrate, CaC2O4•H2O, is stable up to ~100˚C, but will release the incorporated water molecule when heated to 300˚C, according to the following reaction:

CaC2O4•H2O(s) → CaC2O4(s) + H2O(g)

If a 4.1754 g sample of calcium oxalate monohydrate is heated to 300˚C, what should be the mass (g) of the resulting calcium oxalate?

2. An unknown sample of ore with a mass of 506.1 g is allowed to react with excess magnesium and ammonia, NH3, in order to analyze for phosphate, PO43-, according to the following precipitation reaction:

2PO43-(aq) + 2Mg2+(aq) + 2NH3(aq) + 2H2O(l) → Mg2(P2O7)(s) + 2NH3(aq) + 2OH-(aq) + H2O(l)

After the precipitated Mg2(P2O7) is carefully rinsed and dried, the mass is determined to be 0.09870 mg.
Assuming all phosphorous originally present in the ore was in the form of phosphate, what was the original mass (μg) of phosphorous in the ore sample?

3. An unknown organic compound was produced by students in the O-chem lab. According to their records, this compound should only contain carbon and hydrogen atoms. A combustion analysis is performed on the sample.

When 0.1727 g of the sample is burned in the presence of excess oxygen, the magnesium perchlorate cartridge increases 0.24889 g and the ascarite cartridge increases 0.53094 g.

What is the percent C (w/w) in the sample?

4. What is the percent H (w/w) in the sample?

5. What is the empirical formula for the unknown compound?

In: Chemistry

Problem Description Students in Computer Information Systems (CIS) department at a local university are required to...

Problem Description Students in Computer Information Systems (CIS) department at a local university are required to do some group-projects in their classes because their instructors believe the skills and competence to work as an effective team are important to assure a successful IT project. Group project helps IT students apply system design knowledge, solve real world business problems, enhance learning effective team skills, improve students’ business communication skills, and serve back to the community. In order to ensure an effective and functional group, each group has 3-4 members and a team leader is elected. The team makes a project plan based on the project activities. The team communication format is also decided. During the semester, students are asked to do multiple self- and peer- assessment based on the provided rubrics. The rubrics for the self- and peer assessment were developed based on previous studies and department faculty brain-storming. The primary focus of self- and peer- assessment is on the learning process of team skills. It should be used to enhancing team skill development. It can also be used as a reference or supplementary documents when faculty evaluates the final project. Nevertheless, due to the current paper-based instrument and manual process of administering the assessment, collecting the forms, data re-entry, calculation, and analysis, it is tedious and time-consuming for faculty members to implement the assessment, and it is difficulty for students to get an instant feedback from previous stage to improve their group performance. To address this issue, Dr. Larry Henson, a software engineering professor, decides to ask his students to design an online tool that can collect group peer evaluation data, do analysis, and generate reports. To have a better understanding of the functions and requirements of the peer-evaluation system, the faculty in the department had a meeting. Following is a summary of the meeting minutes. FacA: The system should allow Faculty assign students to different project teams. The same student in different class may participate in different project teams. FacB: The system should allow users to login with different roles such as faculty, students, and administrator. FacC: The system should allow a Faculty manages project teams for each class the faculty is teaching. FacD: The system may also be adopted by faculty in other departments as well as CIS faculty because some program core courses are offered by other departments. It is good to specify a system administrator. The administrator can manage faculty, classes, students, and rubric information. FacE: Students can do both self- and team-based peer assessments based on the specified rubrics. FacF: Students are allowed to view the assessment done by the team members so that they get instant feedback to improve their performance. FacG: The assessment should include both close-ended and open-ended questions. For instance, students are allowed to make comments upon assessing other team members FacH: The system should automatically generate different reports such as the average at the level of individual, team, and class. FacI: Students are also allowed to make comments upon assessments were done by other members. FacJ: All students comments should be reviewed and approved before exposed to other members. Understand the problem and define the scope of the project by 1) Identify functional requirements; 2) Identify domain classes and do domain model; 3) create a glossary or dictionary of the domain objects and give definition for each of them.

In: Computer Science

What were the differences between industrialization in the United States and in Russia?

What were the differences between industrialization in the United States and in Russia?

In: Psychology

There are n processes in a queue. Each process has namei and timei. The round-robin scheduling...

There are n processes in a queue. Each process has namei and timei. The round-robin scheduling handles the processes in order. A round-robin scheduler gives each process a quantum (a time slot) and interrupts the process if it is not completed by then. The process is resumed and moved to the end of the queue, then the scheduler handles the next process in the queue.

For example, we have the following queue with the quantum of 100ms.

A(150) - B(80) - C(200) - D(200)

First, process A is handled for 100ms, then the process is moved to the end of the queue with the remaining time (50ms).

B(80) - C(200) - D(200) - A(50)

Next, process B is handled for 80ms. The process is completed with the time stamp of 180ms and removed from the queue.

C(200) - D(200) - A(50)

Your task is to write a program which simulates the round-robin scheduling.

Input

n q
name1 time1
name2 time2
...
namen timen

In the first line the number of processes n and the quantum q are given separated by a single space.

In the following n lines, names and times for the n processes are given. namei and timei are separated by a single space.

Output

For each process, prints its name and the time the process finished in order.

Constraints

  • 1 ≤ n ≤ 100000
  • 1 ≤ q ≤ 1000
  • 1 ≤ timei ≤ 50000
  • 1 ≤ length of namei ≤ 10
  • 1 ≤ Sum of timei ≤ 1000000

Sample Input 1

5 100
p1 150
p2 80
p3 200
p4 350
p5 20

Sample Output 1

p2 180
p5 400
p1 450
p3 550
p4 800

USE JAVA

In: Computer Science

5)Harpoon is an unlevered firm. It has expected earnings of $570,000 and a market value of...

5)Harpoon is an unlevered firm. It has expected earnings of $570,000 and a market value of equity of $5,020,000. The firm is planning to issue $2,560,000 of debt at 6.4 percent interest and use the proceeds to repurchase shares at their current market value. Ignore taxes. What will be the cost of equity after the repurchase?

A)15.45%

B)15.71%

C)15.90%

D)16.28%

E)16.51%

6)Rockport is an unlevered firm with a total market value of $5,700,000 with 300,000 shares of stock outstanding. The firm has expected EBIT of $420,000 if the economy is normal and $680,000 if the economy booms. The firm is considering a $2,400,000 bond issue with an attached interest rate of 6.2 percent. The bond proceeds will be used to repurchase shares. Ignore taxes. What will the earnings per share be after the repurchase if the economy booms?

A)$3.38

B)$3.29

C)$3.06

D)$2.82

E)$2.67

In: Finance

The Internet is often described as an “Information Super-Highway”. Explain what is meant by this term...

The Internet is often described as an “Information Super-Highway”. Explain what is meant by this term and discuss how it can be used for a monitoring process. Use the example of a Tsunami alert system, while explaining the processes and components which it entails.           QUESTION THAT REQUIRE ANSWER IS: Without software hardware cannot operate. Using the example which is mentioned in above question, explain how the following system software may be useful. Your answer must also include the elements which are included within the brackets. Justify your answers. I. Operating system ( Type of OS and Type of Interface) II. Backup tool ( Type of Back-up and Back-up media) III. File handler (File operations)

In: Computer Science

Task Intro: Password JAVA and JUnit5(UNIT TESTING) Write a method that checks a password. The rules...

Task Intro: Password JAVA and JUnit5(UNIT TESTING)

Write a method that checks a password. The rules for the password are:

- The password must be at least 10 characters.
- The password can only be numbers and letters.
- Password must have at least 3 numbers.
Write a test class(Junit5/Unit testing) that tests the checkPassword method.

Hint: You can (really should) use method from built-in String class:

public boolean matches(String regex)
to check that the current string matches a regular expression. For example, if the variable "password" is the string to be checked, so will the expression.
password.matches("(?:\\D*\\d){3,}.*") 

return true if the string contains at least 3 numbers. Regular expression "^ [a-zA-Z0-9] * $" can be used to check that the password contains only numbers and letters.

Let your solution consist of 4 methods:

checkPassword(string password) [only test this method]
checkPasswordLength(string password) [checkPassword help method]
checkPasswordForAlphanumerics(string password) [checkPassword help method]
checkPasswordForDigitCount(string password) [checkPassword help method]

Intro: Password Criteria

The code is structured and formatted
Your code uses the standard java formatting and naming standard, it is also nicely formatted with the right indentation etc.
Good and descriptive variable names
Your code uses good variable names that describe the damped function, such as "counter" instead of "abc".

The code is logical and understandable

Your code is structured in a logical way so it's easy to understand what you've done and how to solve the problem. It should be easy for others to understand what your code does and how it works.

The solution shows understanding of the problem
You show with your code that you have thought about and understood the problem. It is worth thinking about how you will solve the problem before you actually solve it
The code solves the problem
Your code manages to do what is required in the assignment text, and it does not do unnecessary things either.
Unit tests (Junit5) cover all common use cases
Unit tests for your code check all common ways it can be used, such as the isEven (int number) method being tested with even, odd, negative, and null, reverseString (String text) will be checked with regular string, empty string and zero object, etc.
The code uses Regex and built-in methods
Do not try to reinvent the wheel, it is possible to check the text string for digits with a while / for loop, but using regex and matching function is much easier. There are many websites that help you find regex for what you need, so use them.

In: Computer Science