Questions
In Susan Sontags book " On Photography" chapter 4 The Heroism of Vision explain what she...

In Susan Sontags book " On Photography" chapter 4 The Heroism of Vision explain what she talking about in the chapter, the two most important parts of the essay, the idea behind it and why the essay is important as a whole.

In: Psychology

The Harding Corporation has $50 million of bonds outstanding that were issued at a coupon rate...

The Harding Corporation has $50 million of bonds outstanding that were issued at a coupon rate of 10.25 percent seven years ago. Interest rates have fallen to 9 percent. Preston Alter, the vice-president of finance, does not expect rates to fall any further. The bonds have 18 years left to maturity, and Preston would like to refund the bonds with a new issue of equal amount also having 18 years to maturity. The Harding Corporation has a tax rate of 25 percent. The underwriting cost on the old issue was 2.5 percent of the total bond value. The underwriting cost on the new issue will be 1.8 percent of the total bond value. The original bond indenture contained a five-year protection against a call, with an 8 percent call premium starting in the sixth year and scheduled to decline by one-half percent each year thereafter (Consider the bond to be seven years old for purposes of computing the premium). Use Appendix D. (Round "PV factor" to 3 decimal places.) a. Compute the discount rate. (Round the final answer to 2 decimal places.) Discount rate 6.75 6.75 Correct % b. Calculate the present value of total outflows. (Do not round intermediate calculations. Enter the answers in whole dollars, not in millions. Round the final answer to nearest whole dollar.) Total outflows $ 2812500 2812500 Incorrect c. Calculate the present value of total inflows. (Do not round intermediate calculations. Enter the answers in whole dollars, not in millions. Round the final answer to nearest whole dollar.) Total inflows $ 4801477 4801477 Correct d. Calculate the net present value. (Do not round intermediate calculations. Round the final answer to nearest whole dollar.) Net present value $ 1365193 1365193 Incorrect e. Should the Harding Corporation refund the old issue? Yes No

In: Accounting

give an example of how DEA (data envelopement analysis) can be utilized to improve efficiency and...

give an example of how DEA (data envelopement analysis) can be utilized to improve efficiency and operations in Public Policy or Administration (local, state, or federal) and an example of how it can improve efficiency of Business Management. I need to write a 2 pages report and please no plagiarism.

In: Operations Management

1Write an SQL statement utilizing the WHERE, LIKE, and HAVING clauses that select gender, and the...

1Write an SQL statement utilizing the WHERE, LIKE, and HAVING clauses that select gender, and the email addresses that belong to female users and have an email address that contains a number (0 to 9) within it. Create an alias for the resultant email column name and name it ‘Email Addresses Female With Numbers’

  1. IPV4 (Internet Protocol Version 4) addresses utilize a notation known as the dotted-quad notation. Quad because an IPV4 address is actually a series of 4 numbers separated by a dot (hence dotted quad). Each one of the numbers has a range of 0-255. For example 255.0.65.23 is a valid IPV4 address, and so is 2.2.2.2. However, 2682.586.549.365 is NOT a valid IPV4 address (thank me later for not using IPV6 addresses for this – Google IPV6 and you will see what I mean).

    1. Write an SQL insert statement that will insert 4 rows with invalid IPV4 addresses.

    2. Write an SQL statement that will find all the rows with invalid IPV4 addresses.

      1. To do this you will need to utilize regular expressions. This is the research

        component of the lab.

      2. Regular expression documentation:

        https://dev.mysql.com/doc/refman/5.6/en/regexp.html

      3. You can look up the regular expression, you do not have to write one from scratch, but it is always a good thing to look up the syntax of regular expressions to be able to understand them.

      4. You need to validate that there are 4 numbers separated by dots each with a length of 1-3 (e.g., 999.999.999.999 is considered a valid IP address in your regular expression even though it is not in reality). Validating that there are 4 numbers separated by dots each with a length of 1-3 AND are less than 256 is a little complicated, but I encourage you to take on the challenge.

      5. By now you should see how the query from b can be created in a much cleaner fashion.

In: Computer Science

If you currently own a business or are thinking about starting a business. What are defensive...

If you currently own a business or are thinking about starting a business. What are defensive actions you would take to protect your business against some of the perils over which you have minimal control (taxes, interest rate, etc.)? Please I need a mini essay thanks

In: Finance

In this module, you learned about the components involved in the effective management of operations. This...

In this module, you learned about the components involved in the effective management of operations.

This video case is about Numi Organic which is the tea of choice for high-end restaurants, hotel chains, and cruise lines.

View Numi Organic Tea: The Value Chain, IT, and E-Business (Time: 6:56. This video uses the Amara Toolbar to display captions.) and answer the following questions by providing 1-2 paragraphs for each item:

How does Numi’s relationship with third parties address operations systems elements in areas related to product-mix, capacity, facilities, and layout? What is the benefit of their approach?

Describe the technologies and tools used by Numi in managing performance. Why did the tea maker eventually adopt a more complex information technology system?

In: Operations Management

Describe the emergence and subsequent decline of the political risk analysis industry. Discusses what political risk...

Describe the emergence and subsequent decline of the political risk analysis industry. Discusses what political risk means for multinational firms and various ways in which firms have tried to analyze and grapple with these risks.

In: Operations Management

given pair (a,b) after each unit of time pair (a,b) get changed to (b-a,b+a).you are given...

given pair (a,b) after each unit of time pair (a,b) get changed to (b-a,b+a).you are given the initial value of pair and an integer n and you to print the value of pair at the nth unit of time.

input format:

1.First line:t donating the number of test cases

2.Next t lines:three space-seperated integer a,b and n

output format :

for each test case ,print two integers (mod 10^9 +7) per

line denoting the value of the pair at the n th unit time.

constrains:

1<t< 10^6

0< a<b<10^9

1<n<10^5

sample input :

5

1 3 5

2 3 9  

sample output

4 12

32 48

81920 131072

In: Computer Science

The purpose of this problem is to gain familiarity with stacks and queues. You have three...

The purpose of this problem is to gain familiarity with stacks and queues. You have three jugs that can hold c1, c2, and c3 liters of water, respectively. Initially, jug 1 is full and the other two jugs are empty. You can repeat the following procedure any number of times: Choose two of the jugs and pour the contents of one into the other until either the first is empty or the second is full. Your goal is to end up with exactly d liters in one of the jugs. Make a program called WaterTransfer.java to determine the transfers required to reach the goal. The input is a single line containing four integers between 2 and 100 (inclusive) representing c1, c2, c3, and d. The output is a minimal sequence of jug contents, starting with the initial contents and ending with one of the jugs containing d liters. Each line of the output should consist of 3 integers separated by spaces. If no solution exists, then your program should produce no output.

Good test case: 10 5 3 4 ; from movie ”Die hard: with a vengeance”; seehttps://www.youtube.com/watch?v=6cAbgAaEOVE

For example, if the input is 20 5 3 4t hen a valid output is

20 0 0

15 5 0

15 2 3

18 2 0

18 0 2

13 5 2

13 4 3

There may be other solutions, but none with fewer transfers (6) than this one. (this code should probably use queues)

In: Computer Science

What role will technology and communications play for Nvidia in the future? How will they impact...

What role will technology and communications play for Nvidia in the future? How will they impact society?

In: Operations Management

Reflect on how we can apply the positive leadership model to higher education? What does it...

Reflect on how we can apply the positive leadership model to higher education? What does it mean to be a positive leader? What are alternative approaches and why is a positive leader the most appropriate for higher education?

In: Psychology

T/F: A function may not execute every line of code in the function if it returns...

T/F: A function may not execute every line of code in the function if it returns a value to the user before getting to the remaining lines.

A. True
B. False

In: Computer Science

Two social issues that Lyndon b johnson remarks that theorists might explain as social disorganization and...

Two social issues that Lyndon b johnson remarks that theorists might explain as social disorganization and identify one accompanying solution he proposes for each of these ?

In: Psychology

Research the internet and or/other sources and Identify the prominent results that two organizations sustained from...

Research the internet and or/other sources and Identify the prominent results that two organizations sustained from implementing a strategy that tied incentives directly to strategy execution. Explain why you believe they were able to do so.

In: Operations Management

Design a Java Animal class (assuming in Animal.java file) and a sub class of Animal named...

Design a Java Animal class (assuming in Animal.java file) and a sub class of Animal named Cat (assuming in Cat.java file).

The Animal class has the following protected instance variables:

boolean vegetarian, String eatings, int numOfLegs and the following public instance methods:

constructor without parameters: initialize all of the instance variables to some default values

constructor with parameters: initialize all of the instance variables to the arguments

SetAnimal: assign arguments to all of the instance variables

Three “Get” methods which retrieve the respective values of the instance variables

toString: Returns the animal’s vegetarian, eatings and numOfLegs information as a string

The Cat class has the following private instance variable:

String color and the following public instance methods:

constructor without parameters: initialize all of the instance variables to some default values, including its super class - Animal’s instance variables

constructor with parameters: initialize all of the instance variables to the arguments, including its super class Animal’s instance variables

SetColor: assign its instance variable to the argument

GetColor: retrieve the color value

overrided toString: Returns the cat’s vegetarian, eatings, numOfLegs and color information as a string

Please write your complete Animal class, Cat class and a driver class as required below

a (35 pts) Write your complete Java code for the Animal class in Animal.java file

b (30 pts) Write your complete Java code for the Cat class in Cat.java file

b (35 pts) Write your test Java class and its main method which will create two Cats instances: e1 and e2, e1 is created with the default constructor, e2 is created with the explicit value constructor. Then update e1 to reset its vegetarian, eatings, numOfLegs and color. Output both cats’ detailed information. The above test Java class should be written in a Java file named testAnimal.java.

In: Computer Science