Describe the types of, and rights attached to, estates in land,
including in your answer a treatment of easements and
restrictive covenants.
In: Operations Management
This HW from my English class but not Psychology. The Prof wants us to give 10 example of extraordinary situations, but I do not understand what is extraordinary situation means. Please explain it and come up with 10 of the extraordinary situations. Thanks.
In: Psychology
What can the use of a long, complex selection process symbolize to job seekers? How do you think this would affect the organization’s ability to attract the best employees?
In: Operations Management
What is the management reserve used for?
In: Operations Management
In: Operations Management
i need to find complexity and cost and runtime for each line of the following c++ code :
// A C++ program for Dijkstra's single source shortest path
algorithm.
// The program is for adjacency matrix representation of the
graph
#include <limits.h>
#include <stdio.h>
// Number of vertices in the graph
#define V 9
// A utility function to find the vertex with minimum distance
value, from
// the set of vertices not yet included in shortest path tree
int minDistance(int dist[], bool sptSet[])
{
// Initialize min value
int min = INT_MAX, min_index;
for (int v = 0; v < V; v++)
if (sptSet[v] == false &&
dist[v] <= min)
min = dist[v],
min_index = v;
return min_index;
}
// A utility function to print the constructed distance
array
void printSolution(int dist[])
{
printf("Vertex \t\t Distance from Source\n");
for (int i = 0; i < V; i++)
printf("%d \t\t %d\n", i,
dist[i]);
}
// Function that implements Dijkstra's single source shortest
path algorithm
// for a graph represented using adjacency matrix
representation
void dijkstra(int graph[V][V], int src)
{
int dist[V]; // The output array. dist[i] will hold
the shortest
// distance from src to i
bool sptSet[V]; // sptSet[i] will be true if vertex
i is included in shortest
// path tree or shortest distance from src to i is
finalized
// Initialize all distances as INFINITE and
stpSet[] as false
for (int i = 0; i < V; i++)
dist[i] = INT_MAX, sptSet[i] =
false;
// Distance of source vertex from itself is always
0
dist[src] = 0;
// Find shortest path for all vertices
for (int count = 0; count < V - 1; count++) {
// Pick the minimum distance vertex
from the set of vertices not
// yet processed. u is always equal
to src in the first iteration.
int u = minDistance(dist,
sptSet);
// Mark the picked vertex as
processed
sptSet[u] = true;
// Update dist value of the
adjacent vertices of the picked vertex.
for (int v = 0; v < V; v++)
// Update
dist[v] only if is not in sptSet, there is an edge from
// u to v, and
total weight of path from src to v through u is
// smaller than
current value of dist[v]
if (!sptSet[v]
&& graph[u][v] && dist[u] != INT_MAX
&& dist[u] + graph[u][v] <
dist[v])
dist[v] = dist[u] + graph[u][v];
}
// print the constructed distance array
printSolution(dist);
}
In: Computer Science
A computer operator at the local data processing center decides to visit work on a Monday evening. She has a key to the outside door, and since there is no key required for the computer room, she simply walks into the computer room. The operator, who is really one of the nation’s most notorious computer programmer/hackers (having been convicted five time for manipulating various firms’ data files), opens the documentation bookcase, located in the corner of the computer room. In the bookcase she finds the procedural documentation, the systems documentation, user manuals, application documentation, and operator manuals. She examines the documentation to understand the payroll program and to find the location of the payroll files. She accesses the information systems library, which is available to all computer operators at all times, accesses the payroll program, reprograms it, and runs a payroll job that creates one electronic funds transfer (to a new account opened by the operator under an assumed name). On Tuesday, the operator transfers the funds to a Swiss bank account and does not show up for work.
Required
Prepare a summary that details any internal controls violated in this situation.
In: Accounting
Do you think that people from Canada and the US are greatly different or generally the same? What are the differences? How would you use the sociological perspectives to measure the differences? What are some implications for you as an international student/immigrant/global citizen? While comparing the two cultures in the North America, have you gained any insight regarding how to perceive other cultures that might seem similar at the first sight?
Include in-text citations and at least 1 reference. Please note using the textbook as a reference is mandatory for this discussion.
In: Psychology
In: Economics
Why is a Performance Measurement Baseline setup?
In: Operations Management
URGENT JAVA
Develop a Java computer program to simulate access control to a system network. The username and password authentication mechanism is used as an access control mechanism in this project. The program needs to authenticate the user with their username and hashed password stored in Access Manager User (AMU) file. To create an Access Manager User file, you need to develop a java program that takes username and password as input and then generates a file containing the username, hashed password, and plaintext password. In real world, the plaintext are not saved in the AMU file. However, you need the username and corresponding plaintext password for testing of your main program. The structure of the AMU file is shown in the appendix. Note that this should be done as a separate program. The main program operates in the following manner. It first prompts the user to enter username and password. After the user enters both username and password, it hashes the password and search the AMU file to verify both the user name and password. If the program verifies the username and password, it returns the message “Access Granted.” If the programcould not verify the username, it returns the message “Access Denied. You are not a registered user.” If the program verifies the username but not the password, it prompts the user to enter the password again. If the user enter the password three times incorrectly, the system locks the user account and gives this message. “You exceeded entering the allowablenumber of incorrect password. Your account is locked. Contact system administrator to unlock your account”
In: Computer Science
Compare and contrast the valuation of a business using discounted cash flow (DCF) and relative valuation (multiples). What elements do you need to know in order to proceed with each methodology? In what cases would you advise against using DCF? Relative valuation? How would a Federal Reserve interest rate increase affect your valuation? Suppose you decided to use DCB. Discuss how you would estimate the risk premium for the company.
In: Finance
Anderson Corp just issued a stock dividend of$2.00 yesterday. The company plans on increasing the dividend by 6% per year for the next 5 years. After which, the dividend will grow at 3% forever. The required rate of return is 10%.
A) Calculate the current price of the stock
B)Calculate what the price of the stock should be in 1 year
C) Calculate the Dividend yield and capital gains yield during the first year.
In: Finance
True or False:
This question has 5 parts:
a) the slope coefficient computed by regressing a particular stock's historical returns on the s&p 500 returns is called beta,the stock's beta with respect to the s&p 500 index; beta is important in finding variance-minimizing hedged portfolis.
b)a swap provides a means for replacing a stream of uncertain and variable payments with a fixed, non-variable payment stream that is certain.
c)the zero-cost collar options trading strategy involves buying a call option and selling a put option on the same stock with the same expiration date, same premium, and a higher strike price than the call option.
d)suppose you go long 10 Eurodollar futures contracts at price of 97. when the futures contracts settle at expiration, 3-month LIBOR is 1%.j ignoring commissions and margin interest, your position results in a $50,000 loss.
e)the current u.s. dollar/Chinese yuan currency spot rate is $0.13 per yuan. the fair value price for the U.S. dollar /Chinese yuan exchange rete for a 2-year forward contract is $0.1408. If the U.S. dollar denominated annual interest rate is 6%, the Chinese yuan-denominated annual interest rate must be 3%.
u can just answer true or false, but if u can simply explain why, It will be better. thank you
In: Finance
In: Operations Management