Questions
Assigned questions: For over two hundred years, white males have been the most powerful group in...

Assigned questions:

For over two hundred years, white males have been the most powerful group in the United States. Through economic exclusions, enforced by laws and reinforced by deep cultural attitudes, there has existed, in effect, a preferential hiring program for white males. In light of that historical reality and the dynamics that remain in our culture, evaluate the contemporary strategy of affirmative action for women and minorities to bring about more fairness in hiring and promotion practices. Draw heavily from the assigned readings and then explain and defend your arguments concerning affirmative action and "reverse discrimination." REMEMBER, YOU MUST USE A THEORY TO SUPPORT YOUR POSITION.

In: Operations Management

Target Market of Microsft Hub 2X o What are the demographic characteristics of your target market?...

Target Market of Microsft Hub 2X

o What are the demographic characteristics of your target market?

o Income level

o Geographic area

o Age

o Gender

o Profession

o Life stage, marital situation

o What are the Psychographic characteristics of your target market?

o Values

o Likes and dislikes

o Priorities

o Religion if it is relevant

o How big is your target market? How many people are there with these characteristics in your target area?

In: Operations Management

1. "A Customer Centric Culture", how is it recommended that you chart your team on a...

1. "A Customer Centric Culture", how is it recommended that you chart your team on a course that focuses on the customer?
2. In Customer service leadership learning, how do you align customer service with company goals, identify and meet customer expectations, cultivate an engaged team, and get the support and resources you need?

In: Operations Management

I need the following code completed: #include <iostream> #include <time.h> #include "CSVparser.hpp" using namespace std; //============================================================================...

I need the following code completed:

#include <iostream>
#include <time.h>

#include "CSVparser.hpp"

using namespace std;

//============================================================================
// Global definitions visible to all methods and classes
//============================================================================

// forward declarations
double strToDouble(string str, char ch);

// define a structure to hold bid information
struct Bid {
string bidId; // unique identifier
string title;
string fund;
double amount;
Bid() {
amount = 0.0;
}
};

// FIXME (1): Internal structure for tree node
struct Node {
   Bid data; Node *left; Node *right;
};

//============================================================================
// Binary Search Tree class definition
//============================================================================

/**
* Define a class containing data members and methods to
* implement a binary search tree
*/
class BinarySearchTree {

private:
Node* root;

void addNode(Node* node, Bid bid);
void inOrder(Node* node);
Node* removeNode(Node* node, string bidId);

public:
BinarySearchTree();
virtual ~BinarySearchTree();
void InOrder();
void Insert(Bid bid);
void Remove(string bidId);
Bid Search(string bidId);
};

/**
* Default constructor
*/
BinarySearchTree::BinarySearchTree() {
// initialize housekeeping variables
}

/**
* Destructor
*/
BinarySearchTree::~BinarySearchTree() {
// recurse from root deleting every node
}

/**
* Traverse the tree in order
*/
void BinarySearchTree::InOrder() {
}
/**
* Insert a bid
*/
void BinarySearchTree::Insert(Bid bid) {
   Node p = Insert(root, bid);
   p->data.bidId = bid.bidId;
   p->data.title = bid.title;
   p->data.fund = bid.fund;
   p->data.amount = bid.amount;
}

/**
* Remove a bid
*/
void BinarySearchTree::Remove(string bidId) {
   deleteNode(root,bidid);
}

/**
* Search for a bid
*/
Bid BinarySearchTree::Search(string bidId) {
// FIXME (3) Implement searching the tree for a bid

   Bid bid;
   if (root == NULL || root->data.bidId == bidId) {
   bid.bidId = bidId;
   bid.title = root->data.title;
   bid.fund = root->data.fund;
   bid.amount = root->data.amount;
   return bid;
   }

   if (root->data.bidId < bidId)
   return search(root->right, bidId);

   return search(root->left, bidId);
return bid;
}

/**
* Add a bid to some node (recursive)
*
* @param node Current node in tree
* @param bid Bid to be added
*/
void BinarySearchTree::addNode(Node* node, Bid bid) {
// FIXME (2b) Implement inserting a bid into the tree
   Node p = insertNode(node, bid);
   p->data.bidId = bid.bidId;
   p->data.title = bid.title;
   p->data.fund = bid.fund;
   p->data.amount = bid.amount;
}
void BinarySearchTree::inOrder(Node* node) {
}
//============================================================================
// Static methods used for testing
//============================================================================

/**
* Display the bid information to the console (std::out)
*
* @param bid struct containing the bid info
*/
void displayBid(Bid bid) {
cout << bid.bidId << ": " << bid.title << " | " << bid.amount << " | "
<< bid.fund << endl;
return;
}

/**
* Load a CSV file containing bids into a container
*
* @param csvPath the path to the CSV file to load
* @return a container holding all the bids read
*/
void loadBids(string csvPath, BinarySearchTree* bst) {
cout << "Loading CSV file " << csvPath << endl;

// initialize the CSV Parser using the given path
csv::Parser file = csv::Parser(csvPath);

// read and display header row - optional
vector<string> header = file.getHeader();
for (auto const& c : header) {
cout << c << " | ";
}
cout << "" << endl;

try {
// loop to read rows of a CSV file
for (unsigned int i = 0; i < file.rowCount(); i++) {

// Create a data structure and add to the collection of bids
Bid bid;
bid.bidId = file[i][1];
bid.title = file[i][0];
bid.fund = file[i][8];
bid.amount = strToDouble(file[i][4], '$');

//cout << "Item: " << bid.title << ", Fund: " << bid.fund << ", Amount: " << bid.amount << endl;

// push this bid to the end
bst->Insert(bid);
}
} catch (csv::Error &e) {
std::cerr << e.what() << std::endl;
}
}

/**
* Simple C function to convert a string to a double
* after stripping out unwanted char
*
* credit: http://stackoverflow.com/a/24875936
*
* @param ch The character to strip out
*/
double strToDouble(string str, char ch) {
str.erase(remove(str.begin(), str.end(), ch), str.end());
return atof(str.c_str());
}

/**
* The one and only main() method
*/
int main(int argc, char* argv[]) {

// process command line arguments
string csvPath, bidKey;
switch (argc) {
case 2:
csvPath = argv[1];
bidKey = "98109";
break;
case 3:
csvPath = argv[1];
bidKey = argv[2];
break;
default:
csvPath = "eBid_Monthly_Sales_Dec_2016.csv";
bidKey = "98109";
}

// Define a timer variable
clock_t ticks;

// Define a binary search tree to hold all bids
BinarySearchTree* bst;

Bid bid;

int choice = 0;
while (choice != 9) {
cout << "Menu:" << endl;
cout << " 1. Load Bids" << endl;
cout << " 2. Display All Bids" << endl;
cout << " 3. Find Bid" << endl;
cout << " 4. Remove Bid" << endl;
cout << " 9. Exit" << endl;
cout << "Enter choice: ";
cin >> choice;

switch (choice) {

case 1:
bst = new BinarySearchTree();

// Initialize a timer variable before loading bids
ticks = clock();

// Complete the method call to load the bids
loadBids(csvPath, bst);

//cout << bst->Size() << " bids read" << endl;

// Calculate elapsed time and display result
ticks = clock() - ticks; // current clock ticks minus starting clock ticks
cout << "time: " << ticks << " clock ticks" << endl;
cout << "time: " << ticks * 1.0 / CLOCKS_PER_SEC << " seconds" << endl;
break;

case 2:
bst->InOrder();
break;

case 3:
ticks = clock();

bid = bst->Search(bidKey);

ticks = clock() - ticks; // current clock ticks minus starting clock ticks

if (!bid.bidId.empty()) {
displayBid(bid);
} else {
   cout << "Bid Id " << bidKey << " not found." << endl;
}

cout << "time: " << ticks << " clock ticks" << endl;
cout << "time: " << ticks * 1.0 / CLOCKS_PER_SEC << " seconds" << endl;

break;

case 4:
bst->Remove(bidKey);
break;
}
}

cout << "Good bye." << endl;

   return 0;
}

In: Computer Science

How does Paivio’s bilingual dual coding theory compare to the hierarchical models?

How does Paivio’s bilingual dual coding theory compare to the hierarchical models?

In: Psychology

The goal of this problem is to design a system to manage a moving company. Customers...

The goal of this problem is to design a system to manage a moving company.

Customers who are planning to move (e.g., moving from a house to another one) call the moving assistant at the company to schedule their moving. The customer provides potential moving dates as well as the moving-from address and moving-to address. The assistant replies with a list of available dates. The customer picks a moving date and time. The assistant then schedules a virtual tour (with a date and time) with the customer (typically within the following 3 days) to provide a more accurate estimate about the moving price.

At the virtual tour date and time, the assistant calls the customer (e.g., via Zoom). The customer shows the major items to be moved. At the end of the virtual tour, the assistant gives the hourly rate, estimated total price, and estimated moving duration (number of hours). The assistant also emails a contract to the customer. If interested, the customer signs the contract and emails it back to the assistant. To validate the contract, the assistant calls the customer back. The customer provides credit card information to pay a deposit. Payment information is sent to the credit card company for authorization. If authorized, a deposit receipt is given to the customer.

At moving date, a crew of the company’s movers starts the actual moving. The head of the moving crew records the start time and share it with the customer. At the end of the moving, the head of the moving crew records the end time and calculates the actual total price. The customer provides credit card information. Payment information is sent to the credit card company for authorization. If authorized, a final receipt is given to the customer.

One week after the moving, the customer receives a survey form by email to evaluate the moving experience. The customer emails back the filled out form.

  1. Give the context level diagram for the “Moving Company System”.
  2. Give Diagram 0. IMPORTANT: in your diagram 0, you are required to have a process named “Manage Virtual Tours” that includes all tasks summarized in the underlined paragraph (see description above). Other processes need also to be included in Diagram 0.
  3. Give the child diagram of the process “Manage Virtual Tours” mentioned in the previous question. IMPORTANT: All processes included in this child diagram should be primitive.

In: Computer Science

Consider the following work breakdown structure: What is the probability of finishing the project at exactly...

Consider the following work breakdown structure: What is the probability of finishing the project at exactly 201 days?

Time Estimates (days)

Activity

Precedes

Optimistic

Most Likely

Pessimistic

Start

A,B

-

-

-

A

C,D

44

50

56

B

D

45

60

75

C

E

42

45

48

D

F

31

40

49

E

F

27

36

39

F

End

58

70

82

1.

0.

0.9.

0.6.

2.5.

In: Operations Management

In glycolysis two ATPs are generated at two different steps in stage two. The creation of...

In glycolysis two ATPs are generated at two different steps in stage two. The creation of ATP from ADP has a free energy change of +30.5 kJ/mol. Explain how this energy barrier is overcome for the metabolic process to proceed through these two steps?

In: Biology

In your opinion, what challenges are presented with a class full of children from diverse backgrounds?...

In your opinion, what challenges are presented with a class full of children from diverse backgrounds? What are the benefits of having a diverse group of students? How can you promote diversity and be sensitive to differences, while still maintaining a cohesive classroom environment?


In: Psychology

Two vectors are given by A= 1.5i+6.6j and B= 7.0i+6.2j. Find (1) (A+B)*B and (2) the...

Two vectors are given by A= 1.5i+6.6j and B= 7.0i+6.2j. Find (1) (A+B)*B and (2) the component of A along the direction of B?

In: Physics

A computer lab has a dozen machines, but at any given time some of them may...

A computer lab has a dozen machines, but at any given time some of them may be out of commission. Usually the problem is something as simple as the operating system locking up, which requires that a staff person reboot the machine and make sure that all the standard settings are correct. Sometimes the problem may be more serious, taking more time to correct. Overall, the repair time for any individual computer is negative exponentially distributed with a mean of thirty minutes. Once a computer is operating, the time until failure is negative exponentially distributed with a mean of ten hours.

a. If there is only one staff person to do the repairs, what is the average number of operating computers in the lab over the long run?

b. If there were two staff people to do the repairs, how much would that same average be?

In: Operations Management

What is the difference between Green IT and Green IS? Discuss TWO recent advancements in development...

What is the difference between Green IT and Green IS? Discuss TWO recent advancements in development of green data centres?

A report that includes answers to the questions on the given topic. The report should have at least two references (if one reference is a website, the other should be a scientific/formal reference).

Format of the report to answer the questions • The report that has answers to the questions of the given topics. • The report should be between 1000 to 1250 words. • The report must use 12pt font, 1.5 spacing, Arial font.

In: Computer Science

Describe FOUR ways a service company can use ethical and sustainable sourcing. Provide an example of...

  1. Describe FOUR ways a service company can use ethical and sustainable sourcing. Provide an example of how this can happen.

In: Operations Management

Using CrypTool2, display the results of encrypting the following plain text using the Caesar Cipher method...

Using CrypTool2, display the results of encrypting the following plain text using the Caesar Cipher method and a left shift value of 3.

MEET YOU AT THE FOOTBALL MATCH

In: Computer Science

why will the introduction of autonumous trucks cause a disruption ?

why will the introduction of autonumous trucks cause a disruption ?

In: Operations Management