For this discussion forum, conduct research on a current news event that has something to do with diversity in the workplace or in society at large. (Current means within the last 30 - 45 days.) Your current event can be about anything related to diversity, including positive stories of people doing good things. Diversityinc.com is a great source. You can also google and search using "diversity" + "news" and you will find an endless supply of news stories. Make sure the site you use is a reputable source. (Do not use information obtained from a blog.) Post a summary of the article and give us your opinion about the relevance of the article. Discuss how the issue is related to our class. Provide a link to the article so others can access the article and read it if they choose.
In: Psychology
Suppose your selected company(choose one of the two) just paid a dividend of $ 2.20 per share. The dividend are to calculate the share's expected return. You observe that the risk-free rate of return on us treasuries is 2% p.a, the market risk premium is 7 % and the company's equity has a current beta of 1.285. what is the market value of the company's shares? Compare the actual closing price of your selected company's share on the balance sheet date. Why might the actual share price differ from the calculated price? explain. I choose Woolworth ltd in australia and the other company is Wesfarmers Ltd
In: Finance
Convert this C++ code to Java code
this code is to encrypt and decrypt strings of characters using Caesar cipher
please attach samples run of the code
#include <iostream>
#include <stdio.h>
#include <ctype.h>
#include <stdlib.h>
#include <string>
#define MAX_SIZE 200
void encrypt_str(char xyz[], int key); // Function prototype for
the function to encrypt the input string.
void decrypt_str(char xyz[], int key); // Function prototype for
the function to decrypt the encrypted string.
using namespace std;
int main()
{
char input_str[MAX_SIZE];
int shift = 6; // This is the Caesar encryption key... You can
change it to whatever value you wish!
system("cls"); // System call to clear the console screen!
cout<<"\nEnter the string to be encrypted :\t";
gets(input_str); // Getting the user to input the string to be
encrypted!
cout<<"\nOriginal string:\t" << input_str;
// Function call to encrypt the input string
encrypt_str(input_str, shift);
return 0;
}
// Function Definition for the function to encrypt the input
string
void encrypt_str(char xyz[], int key){
char crypted_str[MAX_SIZE]; // To store the resulting string
int k=0; // For indexing purpose
char str;
while(xyz[k] !='\0') // Processing each character of the string
until the "end of line" character is met
{
str = toupper(xyz[k]); // Remove "toupper" from this line if you
don't wish to see the
// result string in Uppercase...
if(str != ' ') str += key;
{
if(str > 'z') str -=26;
{
crypted_str[k] = str;
k++;
}
}
}
crypted_str[k]='\0';
cout << "\nEncrypted string is:\t" << crypted_str; //
Displaying the Crypted String
// Function call to decrypt the encrypted string
decrypt_str(crypted_str, key);
}
// Function Definition for the function to decrypt the encrypted
string.
void decrypt_str(char xyz[], int key){
char decrypted_str[MAX_SIZE];
char str;
int k=0;
while(xyz[k] !='\0')
{
str = xyz[k];
if(str != ' ') str -= key;
{
if(str < 'A' && str !=' ') str += 26;
{
decrypted_str[k] = str;
k++;
}
}
}
decrypted_str[k]='\0';
cout << "\n Decrypted string is:\t" <<
decrypted_str;
}
In: Computer Science
Write a program that performs a merge-sort algorithm without
using a recursion. Only using pointers.
C++ programming language; #include<iostream>
In: Computer Science
In: Economics
3. Public Key Cryptography involves the use of two keys: a public key and a private key. Explain the use of each key
In: Computer Science
Kepler-1625b is the name of a planet found outside our
solar system. Its mass is 3180x larger than Earth and its radius is
9x larger than Earth
(a) What is the gravitational acceleration (little g) on the
surface of this planet?
(b) This planet may have a moon. If it has the same mass of Earth
what is the gravitational force between the planet and moon? If the
moon orbits 400,000 km away how fast does it orbit?
In: Physics
Frederick Taylor is most famous for:
Question 18 options:
|
Standardization of work |
|
|
Time studies |
|
|
Productivity reports |
|
|
Motion studies |
Question 19 (5 points)
The company that relies on computer and telecommunications technologies instead of physical presence for communication between employees is a:
Question 19 options:
|
Learning organization |
|
|
Social organization |
|
|
Service organization |
|
|
Virtual organization |
Question 20 (5 points)
Strategy is the concept of how an organization will achieve its objectives; therefore strategic management is
Question 20 options:
|
knowledge that helps in the development and implementation of strategies. |
|
|
the social source of influence that is used to inspire action taken by others |
|
|
the process that helps the organization in the development of strategies |
|
|
the purpose of developing strategies in an organization |
In: Operations Management
A 0.550 kg metal cylinder is placed inside the top of a plastic tube, the lower end of which is sealed off by an adjustable plunger, and comes to rest some distance above the plunger. The plastic tube has an inner radius of 7.41 mm, and is frictionless. Neither the plunger nor the metal cylinder allow any air to flow around them. If the plunger is suddenly pushed upwards, increasing the pressure between the plunger and the metal cylinder by a factor of 2.55, what is the initial acceleration of the metal cylinder? Assume the pressure outside of the tube is 1.00 atm.
In: Physics
How does the company deal with conflict and negotiation?
In: Operations Management
whats the impact od social media during recruiting also what benefit job hunters get from these social media during job hunting?
In: Operations Management
Programing language C++
In this exercise you will explore the performance difference between sequential search and binary search. To do so write a program that performs the following tasks:
Prompt the user for a file containing 100,000 unsorted integers
Read those integers into an array
Prompt the user for a search item
Search for that item (using sequential search) and report the number of comparisons required.
Sort the array. Note that this might take a few minutes.
Search for that item again (using binary search) and report the number of comparisons required.
You will need to modify both of the search functions to report the number of comparisons that were made during the search.
Use your program and the file of 100,000 integers provided here to answer the six questions in the quiz.
In: Computer Science
Activity 3: How does injection attack occur? (30 minutes)
Assume the web server includes the following code
sqlString = “select USERID from USER where USERID = ` $userId ` and PWD = ` $password `”
result = GetQueryResult(sqlString)
if(result = “”) then
userHasBeenAuthenticated = False
else
userHasBeenAuthenticated = True
end if
Here, $userId and $password are the values submitted by the user, and the query statement provides the quotation marks that set it as a literal string.
Critical Thinking Question
In: Computer Science
Properly poised and magnificently coiffed, Michelle entertains the room. After taking one last spoonful of soup, she politely excuses herself from the dinner table and retreats to the bathroom. Uncovering a toothbrush concealed in her purse, she pushes the toothbrush down her throat and gags. With this behavior, Michelle conceals much more than a toothbrush.
Patterns of mental illness might be concealed all too well by external variables, such as a successful lifestyle, a well-groomed appearance, or a dynamic personality. At times, those suffering with mental illness may be able to control external variables, thus hiding any signs and symptoms. As a result, the differentiation between mental health and mental illness is not always so clear. As a future professional in the field of psychology, you must consider how mental health differs from mental illness for an accurate diagnosis on the basis of the DSM.
For this Discussion, consider the different ways to conceptualize mental health and mental illness in the field of psychology. Think about how this conceptualization may influence your assessment and diagnosis of a client.
With these thoughts in mind:
A brief explanation of the different ways in which mental health and mental illness may be conceptualized in the field of psychology. Then explain at least two ways in which this conceptualization may influence your assessment and diagnosis of a client. Provide examples based on current literature and Learning Resources.
Resources
· Paris, J. (2015). The intelligent clinician’s guide to the DSM-5 (2nd ed.). New York, NY: Oxford University Press. Retrieved from the Walden Library.
Chapter 2, “The History of Diagnosis in Psychiatry”
Chapter 4, “What Is (and Is Not) a Mental Disorder”
· Bonanno, G. A. (2004). Loss, trauma, and human resilience:
Have we underestimated the human capacity to thrive after extremely
aversive events? American Psychologist, 59(1),
20–28.
Retrieved from the Walden Library databases.
· Davydov, D. M., Stewart, R., Ritchie, K., & Chaudieu, I.
(2010). Resilience and mental health. Clinical Psychology
Review, 30(5), 479–495.
Retrieved from the Walden Library databases.
· Payton, A. R. (2009). Mental health, mental illness, and
psychological distress: Same continuum or distinct phenomena?
Journal of Health and Social Behavior, 50(2),
213–227.
Retrieved from the Walden Library databases.
· Pierre, J. M. (2012). Mental illness and mental health: Is the glass half empty or half full? Canadian Journal of Psychiatry, 57(11), 651–658. Retrieved from the Walden Library databases.
In: Psychology
In: Psychology