Questions
For this discussion forum, conduct research on a current news event that has something to do...

For this discussion forum, conduct research on a current news event that has something to do with diversity in the workplace or in society at large. (Current means within the last 30 - 45 days.) Your current event can be about anything related to diversity, including positive stories of people doing good things. Diversityinc.com is a great source. You can also google and search using "diversity" + "news" and you will find an endless supply of news stories. Make sure the site you use is a reputable source. (Do not use information obtained from a blog.) Post a summary of the article and give us your opinion about the relevance of the article. Discuss how the issue is related to our class. Provide a link to the article so others can access the article and read it if they choose.

In: Psychology

Suppose your selected company(choose one of the two) just paid a dividend of $ 2.20 per...

Suppose your selected company(choose one of the two) just paid a dividend of $ 2.20 per share. The dividend are to calculate the share's expected return. You observe that the risk-free rate of return on us treasuries is 2% p.a, the market risk premium is 7 % and the company's equity has a current beta of 1.285. what is the market value of the company's shares? Compare the actual closing price of your selected company's share on the balance sheet date. Why might the actual share price differ from the calculated price? explain. I choose Woolworth ltd in australia and the other company is Wesfarmers Ltd

In: Finance

Convert this C++ code to Java code this code is to encrypt and decrypt strings of...

Convert this C++ code to Java code

this code is to encrypt and decrypt strings of characters using Caesar cipher

please attach samples run of the code

#include <iostream>
#include <stdio.h>
#include <ctype.h>
#include <stdlib.h>
#include <string>

#define MAX_SIZE 200

void encrypt_str(char xyz[], int key); // Function prototype for the function to encrypt the input string.
void decrypt_str(char xyz[], int key); // Function prototype for the function to decrypt the encrypted string.

using namespace std;

int main()
{
char input_str[MAX_SIZE];
int shift = 6; // This is the Caesar encryption key... You can change it to whatever value you wish!

system("cls"); // System call to clear the console screen!


cout<<"\nEnter the string to be encrypted :\t";
gets(input_str); // Getting the user to input the string to be encrypted!

cout<<"\nOriginal string:\t" << input_str;

// Function call to encrypt the input string
encrypt_str(input_str, shift);

return 0;
}


// Function Definition for the function to encrypt the input string


void encrypt_str(char xyz[], int key){
char crypted_str[MAX_SIZE]; // To store the resulting string
int k=0; // For indexing purpose
char str;

while(xyz[k] !='\0') // Processing each character of the string until the "end of line" character is met
{
str = toupper(xyz[k]); // Remove "toupper" from this line if you don't wish to see the
// result string in Uppercase...
if(str != ' ') str += key;
{
if(str > 'z') str -=26;
{
crypted_str[k] = str;
k++;
}
}
}
crypted_str[k]='\0';
cout << "\nEncrypted string is:\t" << crypted_str; // Displaying the Crypted String

// Function call to decrypt the encrypted string
decrypt_str(crypted_str, key);
}

// Function Definition for the function to decrypt the encrypted string.
void decrypt_str(char xyz[], int key){
char decrypted_str[MAX_SIZE];
char str;
int k=0;
while(xyz[k] !='\0')
{
str = xyz[k];
if(str != ' ') str -= key;
{
if(str < 'A' && str !=' ') str += 26;
{
decrypted_str[k] = str;
k++;
}
}
}
decrypted_str[k]='\0';
cout << "\n Decrypted string is:\t" << decrypted_str;
}

In: Computer Science

Write a program that performs a merge-sort algorithm without using a recursion. Only using pointers. C++...

Write a program that performs a merge-sort algorithm without using a recursion. Only using pointers.
C++ programming language; #include<iostream>

In: Computer Science

What are the expected labor market affect of assets-testing eligibility for disability insurance benefits?

What are the expected labor market affect of assets-testing eligibility for disability insurance benefits?

In: Economics

3. Public Key Cryptography involves the use of two keys: a public key and a private...

3. Public Key Cryptography involves the use of two keys: a public key and a private key. Explain the use of each key

In: Computer Science

Kepler-1625b is the name of a planet found outside our solar system. Its mass is 3180x...

Kepler-1625b is the name of a planet found outside our solar system. Its mass is 3180x larger than Earth and its radius is 9x larger than Earth
(a) What is the gravitational acceleration (little g) on the surface of this planet?
(b) This planet may have a moon. If it has the same mass of Earth what is the gravitational force between the planet and moon? If the moon orbits 400,000 km away how fast does it orbit?

In: Physics

Frederick Taylor is most famous for: Question 18 options: Standardization of work Time studies Productivity reports...

Frederick Taylor is most famous for:

Question 18 options:

Standardization of work

Time studies

Productivity reports

Motion studies

Question 19 (5 points)

The company that relies on computer and telecommunications technologies instead of physical presence for communication between employees is a:

Question 19 options:

Learning organization

Social organization

Service organization

Virtual organization

Question 20 (5 points)

Strategy is the concept of how an organization will achieve its objectives; therefore strategic management is

Question 20 options:

knowledge that helps in the development and implementation of strategies.

the social source of influence that is used to inspire action taken by others

the process that helps the organization in the development of strategies

the purpose of developing strategies in an organization

In: Operations Management

A 0.550 kg metal cylinder is placed inside the top of a plastic tube, the lower...

A 0.550 kg metal cylinder is placed inside the top of a plastic tube, the lower end of which is sealed off by an adjustable plunger, and comes to rest some distance above the plunger. The plastic tube has an inner radius of 7.41 mm, and is frictionless. Neither the plunger nor the metal cylinder allow any air to flow around them. If the plunger is suddenly pushed upwards, increasing the pressure between the plunger and the metal cylinder by a factor of 2.55, what is the initial acceleration of the metal cylinder? Assume the pressure outside of the tube is 1.00 atm.

In: Physics

How does the company deal with conflict and negotiation?  

How does the company deal with conflict and negotiation?  

In: Operations Management

whats the impact od social media during recruiting also what benefit job hunters get from these...

whats the impact od social media during recruiting also what benefit job hunters get from these social media during job hunting?

In: Operations Management

Programing language C++ In this exercise you will explore the performance difference between sequential search and...

Programing language C++

In this exercise you will explore the performance difference between sequential search and binary search. To do so write a program that performs the following tasks:

Prompt the user for a file containing 100,000 unsorted integers

Read those integers into an array

Prompt the user for a search item

Search for that item (using sequential search) and report the number of comparisons required.

Sort the array. Note that this might take a few minutes.

Search for that item again (using binary search) and report the number of comparisons required.

You will need to modify both of the search functions to report the number of comparisons that were made during the search.

Use your program and the file of 100,000 integers provided here to answer the six questions in the quiz.

In: Computer Science

Activity 3: How does injection attack occur? (30 minutes) Assume the web server includes the following...

Activity 3: How does injection attack occur? (30 minutes)

Assume the web server includes the following code

sqlString = “select USERID from USER where USERID = ` $userId ` and PWD = ` $password `”

result = GetQueryResult(sqlString)

if(result = “”) then

     userHasBeenAuthenticated = False

else

     userHasBeenAuthenticated = True

end if

Here, $userId and $password are the values submitted by the user, and the query statement provides the quotation marks that set it as a literal string.

Critical Thinking Question

  1. If a user enters UTC as userId and chattanooga’ as password, what is the constructed SQL statement which is also the value of sqlString from the above code?
  1. Will the constructed SQL be executed? Why and Why not?

  1. After enter UTC as userId and chattanooga’ you may observe different system responses: a) the SQL parser find the extra quote mark and aborts with a syntax error and return server error, or b) email address is unknown or We don't recognize your email address. This distinction will be very useful when trying to guess the structure of the query. Which one means that user input is not being sanitized properly and that the application is ripe for exploitation?
  1. What is the resulting SQL query statement if a user enters User ID as ` OR ``=` and Password as `OR ``=`? What is the result of this query or what is the value of sqlString? Does this input allow user to log in? And why or Why not?
  1. What is the resulting SQL query statement if a user enters User ID as ` OR ``=`` -- and Password as abc? What is the result of this query or what is the value of sqlString? Does this input allow user to log in? And why or Why not?

  1. Explain why the case in question 7 and 8 construct injection attacks.

In: Computer Science

Properly poised and magnificently coiffed, Michelle entertains the room. After taking one last spoonful of soup,...

Properly poised and magnificently coiffed, Michelle entertains the room. After taking one last spoonful of soup, she politely excuses herself from the dinner table and retreats to the bathroom. Uncovering a toothbrush concealed in her purse, she pushes the toothbrush down her throat and gags. With this behavior, Michelle conceals much more than a toothbrush.

Patterns of mental illness might be concealed all too well by external variables, such as a successful lifestyle, a well-groomed appearance, or a dynamic personality. At times, those suffering with mental illness may be able to control external variables, thus hiding any signs and symptoms. As a result, the differentiation between mental health and mental illness is not always so clear. As a future professional in the field of psychology, you must consider how mental health differs from mental illness for an accurate diagnosis on the basis of the DSM.

For this Discussion, consider the different ways to conceptualize mental health and mental illness in the field of psychology. Think about how this conceptualization may influence your assessment and diagnosis of a client.

With these thoughts in mind:

A brief explanation of the different ways in which mental health and mental illness may be conceptualized in the field of psychology. Then explain at least two ways in which this conceptualization may influence your assessment and diagnosis of a client. Provide examples based on current literature and Learning Resources.

Resources

· Paris, J. (2015). The intelligent clinician’s guide to the DSM-5 (2nd ed.). New York, NY: Oxford University Press. Retrieved from the Walden Library.

Chapter 2, “The History of Diagnosis in Psychiatry”

Chapter 4, “What Is (and Is Not) a Mental Disorder”

· Bonanno, G. A. (2004). Loss, trauma, and human resilience: Have we underestimated the human capacity to thrive after extremely aversive events? American Psychologist, 59(1), 20–28.
Retrieved from the Walden Library databases.

· Davydov, D. M., Stewart, R., Ritchie, K., & Chaudieu, I. (2010). Resilience and mental health. Clinical Psychology Review, 30(5), 479–495.
Retrieved from the Walden Library databases.

· Payton, A. R. (2009). Mental health, mental illness, and psychological distress: Same continuum or distinct phenomena? Journal of Health and Social Behavior, 50(2), 213–227.
Retrieved from the Walden Library databases.

· Pierre, J. M. (2012). Mental illness and mental health: Is the glass half empty or half full? Canadian Journal of Psychiatry, 57(11), 651–658. Retrieved from the Walden Library databases.

In: Psychology

How has the legacy of Nazism and World War II shaped the cultural and ideological development...

How has the legacy of Nazism and World War II shaped the cultural and ideological development of the German people?

In: Psychology