Questions
What were the motivations of operators in rolling out ISDN systems?

What were the motivations of operators in rolling out ISDN systems?

In: Computer Science

COVID19 has impacted different individuals in varying ways. Much of this has little to do on...

COVID19 has impacted different individuals in varying ways. Much of this has little to do on differing genetics of the body and more to do with social aspects. After learning about social determinants of health please pick three social determinants and explain how they might help or hinder a person who becomes infected by COVID19.

In: Nursing

You must evaluate a proposal to buy a new milling machine. The base price is $165,000,...

You must evaluate a proposal to buy a new milling machine. The base price is $165,000, and shipping and installation costs would add another $12,000. The machine falls into the MACRS 3-year class, and it would be sold after 3 years for $82,500. The applicable depreciation rates are 33%, 45%, 15%, and 7%. The machine would require a $8,000 increase in net operating working capital (increased inventory less increased accounts payable). There would be no effect on revenues, but pretax labor costs would decline by $31,000 per year. The marginal tax rate is 35%, and the WACC is 13%. Also, the firm spent $5,000 last year investigating the feasibility of using the machine.

  1. How should the $5,000 spent last year be handled?
    1. The cost of research is an incremental cash flow and should be included in the analysis.
    2. Only the tax effect of the research expenses should be included in the analysis.
    3. Last year's expenditure should be treated as a terminal cash flow and dealt with at the end of the project's life. Hence, it should not be included in the initial investment outlay.
    4. Last year's expenditure is considered as an opportunity cost and does not represent an incremental cash flow. Hence, it should not be included in the analysis.
    5. Last year's expenditure is considered as a sunk cost and does not represent an incremental cash flow. Hence, it should not be included in the analysis
  2. What is the initial investment outlay for the machine for capital budgeting purposes, that is, what is the Year 0 project cash flow? Round your answer to the nearest cent.

  3. What are the project's annual cash flows during Years 1, 2, and 3? Round your answer to the nearest cent. Do not round your intermediate calculations.

    Year 1 $

    Year 2 $

    Year 3 $

  4. Should the machine be purchased?

In: Finance

What are the different types of goals in conflict? How do they overlap and influence each...

What are the different types of goals in conflict? How do they overlap and influence each other? What is the most effective way to clarify or collaborate on setting goals?

In: Psychology

Write a program in C to grade an n-question multiple-choice exam (for n between 5 and...

Write a program in C to grade an n-question multiple-choice exam (for n between 5 and 20) and provide feedback about the most frequently missed questions. Your program will use a function scan_exam_data to scan and store the exam data in an appropriate data structurer. Use file redirection to input data – do not use fopen() in your code. The first line of input contains the number of students. Second line is number of questions on the exam followed by a space and then an n-character string of the correct answers. Each of the lines that follow contain an integer student ID followed by a space and then the student answers.


Sample Input

3

5 dbbac

111 dabac

102 dcbdc

251 dbbac


Your program then uses a function analyze_data to calculate each student’s score as a percentage and the number of each missed questions in the exam. A function print_data will be called to produce an output, containing the answer key, each student’s ID, each student’s score as a percentage, and information about how many students missed each question.


Sample Output

Exam Report

Students 3

Question 1 2 3 4 5

Answer d b b a c

ID Score(%)

111 80

102 60

251 100

Question 1 2 3 4 5

Missed by 0 2 0 1 0


Error checking
You will have to perform some error checks while the program is being running. However, these error checks will not cause the program to terminate – except if you have a corrupted file. Your program should print error messages when appropriate. Here is a list that need to be checked: Illegal inputs like the number of questions must be between 5-20 and key answers must be lower-case letters.

In: Computer Science

Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is...

Plan, Develop and Manage a Security Policy

Background:

Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record’ a secure online summary of an individual’s health information. The system is available to all Australians, My Health Record is an electronic summary of an individual’s key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems.

The ‘My Health Record’ is driven by the need for the Health Industry to continue a process of reform to drive efficiencies into the health care system, improve the quality of patient care, whilst reducing several issues that were apparent from the lack of important information that is shared about patients e.g. reducing the rate of hospital admissions due to issues with prescribed medications. This reform is critical to address the escalating costs of healthcare that become unsustainable in the medium to long term.

Individuals will control what goes into their My Health Record, and who is allowed to access it. An individual’s My Health Record allows them and their doctors, hospitals and other healthcare providers to view and share the individual’s health information to provide the best possible care.

The 'My Health Record' is used by various staff such as System Administrator, Doctor, Nurse, Pathologist and Patient. In order to convey and demonstrate the rules and regulations to the users of this system, Commonwealth Government of Australia needs a security policy.

You are employed as the Security Advisor for the organisation. The task that is handed to you by the Chief Information Officer now is to create, develop and manage "System Access Security Policy" for atleast any 3 users of the system.

Plan a Security Policy

  • Identify and explain the role of planning for security policy.
  • Identify and discuss the best strategic planning for security policy.
  • Explain the resources planning required for security policy.
  • Anything else you think is reasonable to place into a Plan for Security Policy based on what you have learnt.

Develop a Security Policy

  • Define the intent and rationale of the policy.
  • Any definitions which are used through out the document.
  • Responsibilities of individuals i.e. those who enforce the guideline.
  • Scope of the policy i.e. who and what it effects.
  • Anything else you think is reasonable to place into a Develop for Security Policy based on what you have learnt.

Manage a Security Policy

  • Describe how to monitor policy.
  • Explain how to control policy.
  • Identify and explain the major outcome of policy.
  • Explain how do you update policy time to time.
  • Anything else you think is reasonable to place into a Manage for Security Policy based on what you have learnt.

Conclusion.

In: Computer Science

Language Assembly ( required) Write and test a function, drawshape. The function has 2 parameters, the...

Language Assembly ( required)

Write and test a function, drawshape. The function has 2 parameters, the shape's character and the length of the shape's longest line.

draw shape(1, x) looks displays

x

x

draw shape(2, y) displays

yy

y

yy

draw shape(3, z) displays

zzz

zz

z

zz

zzz

and so on.

In: Computer Science

Highway 65, Inc., is going to elect six board members next month. Betty Brown owns 16.8...

Highway 65, Inc., is going to elect six board members next month. Betty Brown owns 16.8 percent of the total shares outstanding. a. What percentage of stock is needed to have one of her friends elected under the cumulative voting rule? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) b. What percentage of stock is needed to have one of her friends elected under the staggered cumulative voting rule under which shareholders vote on two board member(s) at a time? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

In: Finance

The market price of a stock is $21.98 and it is expected to pay a dividend...

The market price of a stock is $21.98 and it is expected to pay a dividend of $1.59 next year. The required rate of return is 11.86%. What is the expected growth rate of the dividend?

Answer format: Percentage Round to: 2 decimal places (Example: 9.24%, % sign required. Will accept decimal format rounded to 4 decimal places (ex: 0.0924))

In: Finance

Can I get some simple pseudocode (simple descriptions as exampled in top italicized line) added to...

Can I get some simple pseudocode (simple descriptions as exampled in top italicized line) added to this small section of Java code? Thumbs up always left for answers!

-------------------------------------------------------------------------------------------------------

// Check to see if two bags are equals.

   public boolean equals(LinkedBag<T> aBag) {
       boolean result = false; // result of comparison of bags

       if (this.numberOfEntries == aBag.numberOfEntries) {
           if (numberOfEntries == 0) {
               return true;
           }
           int i = 0, j = 0;
           Node scout = firstNode;
           Node retrieve = aBag.firstNode;
           while ((i < numberOfEntries) && (scout != null)) {
               while ((j < aBag.numberOfEntries) && (retrieve != null)) {
                   if (scout.data.equals(retrieve.data)) {
                       int freq1 = this.getFrequencyOf(scout.data);
                       int freq2 = this.getFrequencyOf(retrieve.data);
                       if (freq1 == freq2) {
                           result = true;
                       } else {
                           result = false;
                       }
                   } // end if
                   retrieve = retrieve.next;
                   j++;
               }
               scout = scout.next;
               i++;
           } // end while
       } else {
           result = false;
       }

       return result;
   } // end equals

//Duplicate all the items in a bag.

   public boolean duplicateAll() {
       boolean success = true;

       Node scout = firstNode;
       int i = 0;
       while (i < numberOfEntries) {
           Node temp = new Node(scout.data, firstNode);
           firstNode = temp;
           scout = scout.next;
           i++;
       }
       numberOfEntries *= 2;

       return success;
   } // end duplicateAll

// Remove all duplicate items from a bag

   public void removeDuplicates() {
       System.out.print("Initial > ");
       System.out.println(this.toString());
       LinkedBag<T> newBag = new LinkedBag<T>();

       if (numberOfEntries == 0) {
           return; // Do nothing
       }

// Create filler values to avoid null pointer
       for (int k = 0; k < numberOfEntries; k++) {

           newBag.add((T) "_");
       }

       Node scout = firstNode;
       Node replace = newBag.firstNode;

       int i = 0;
       while ((i < numberOfEntries) && (scout != null)) {
           int j = 0;
           while ((j < numberOfEntries) && (replace != null)) {
               if (newBag.contains(scout.data)) {
                   break;
               } else {
                   replace.data = scout.data;
                   replace = replace.next;
                   j++;
               }
           }
           if (scout != null) {
               scout = scout.next;
               i++;
           }

       }

// Remove filler values
       Node newScout = newBag.firstNode;
       while (newBag.contains((T) "_")) {
           newBag.remove((T) "_");
       }

       this.firstNode = newBag.firstNode;
       this.numberOfEntries = newBag.numberOfEntries;

       System.out.print("Final > ");
       System.out.println(toString());

       return;
   }
}

In: Computer Science

c++. please read this task carefully. First, try given examples of input to your code, if...

c++. please read this task carefully.

First, try given examples of input to your code, if it works, then send it here.

Create structure Applicants with following fields:

struct applicants{

int id;

string name;

string surname;

int subject1,subject2,subject3,selectedSubject;

string specialCase;

int total; };

SpecialCase (if applicant has "Awardee of Olympiads", then this field is "true", otherwise "false").

Do not forget that all "Awardees of Olympiads" will gain grants automatically.
If the total points are same your algorithm have to choose an applicant with higher SelectedSubject (even with SpecialCase)
Assuming that you have only K grants to distribute.

Note: You have to design your program using structures and functions.


Input:
First line contains M(total amount of applicant) and K(amount of grants that have to be distributed) (0 < M < 1001) and (1<=K<=M).
Then N lines are provided in format described above.


Output:
K lines sorted by total points( Total Points = Subject1 + Subject2 + Subject3 + SelectedSubject ) in format:
ID Name Surname Total_sum_of_points

example of input:

(There can be any inputs, it's just one of an examples)

(No means that they are not "Awardee of Olympiads")

10 5
1 Kimmy Marrow 12 23 4 14 NO
2 Baythen Mcclay 6 6 19 3 NO
3 Christen Stew 11 7 3 5 NO
4 Plein Phillip 15 19 8 4 NO
5 Beist Constant 15 3 17 11 NO
6 Sam Said 7 17 18 1 NO
7 Maclay Istan 5 5 16 17 NO
8 Sara Agit 15 17 24 18 YES
9 Nicolya Kim 24 12 23 23 NO
10 Neit Dimond 22 1 18 7 YES

Output:

9 Nicolya Kim 82
8 Sara Agit 74
1 Kimmy Marrow 53
10 Neit Dimond 48
5 Beist Constant 46

 

In: Computer Science

This needs to be in Python and each code needs to be separated. Design a class...

This needs to be in Python and each code needs to be separated.

Design a class for a fast food restaurant meals that should have 3 attributes; Meal Type (e.g., Burger, Salad, Taco, Pizza); Meal size (e.g., small, medium, large); Meal Drink (e.g., Coke, Dr. Pepper, Fanta); and 2 methods to set and get the attributes.

Write a program that ask the user to input the meal type, meal size, and meal drinks. This data should be stored as the object's attributes. Use the object's accessor methods to retrieve the meal type, meal size, and meal drinks and display them as the output.

In: Computer Science

On a network with an IP address of 158.234.28.72 and a subnet mask of 255.248.0.0 what...

On a network with an IP address of 158.234.28.72 and a subnet mask of 255.248.0.0 what is the network ID and the broadcast address? Show your calculations.

In: Computer Science

A pension fund manager is considering three mutual funds. The first is a stock fund, the...

A pension fund manager is considering three mutual funds. The first is a stock fund, the second is a long-term government and corporate bond fund, and the third is a T-bill money market fund that yields a rate of 8%.

The probability distribution of the risky funds is as follows: Expected Return Standard Deviation Stock fund (S) 17 % 35 % Bond fund (B) 14 18 The correlation between the fund returns is 0.09. a-1. What are the investment proportions in the minimum-variance portfolio of the two risky funds. (Do not round intermediate calculations. Enter your answers as decimals rounded to 4 places.) a-2. What is the expected value and standard deviation of its rate of return? (Do not round intermediate calculations. Enter your answers as decimals rounded to 4 places.)

In: Finance

Complete the following sentence with the correct term. A manager with many direct subordinates has a...

Complete the following sentence with the correct term.

A manager with many direct subordinates has a wider __________(Options:span of management/accountability/authority/responsibility) than does a manager with only a few subordinates.

___________(Staff authority/Accountability/Work specialization/span of management) is involved when your manager reviews your performance and evaluates your outcomes.

Management at Work

Bricks ‘n’ Bats makes children’s toys. The CEO is reorganizing the company to adjust to several changes in the environment. One is the increasing sales of toys online instead of in brick-and-mortar stores. Another is a trend toward less gender orientation in the marketing of toys, as evidenced by Target’s decision to stop labeling many children’s products as for boys or for girls. Yet another change is parents’ growing preference for toys that allow their children to build or make unique creations as well as for educational toys that teach science, math, and other topics. As the CEO considers various organizational structures, he hires you as an expert consultant.

Answer the question posed by the CEO of Bricks ‘n’ Bats.

“Where would it make sense for managers to have wide spans of control?” Check all that apply.

In shipping, where most employees are very experienced and highly trained

In manufacturing, where most employees perform similar tasks that don’t change much over time

In logistics, where employees need to coordinate with several other areas to do their work

In marketing, where most employees and contractors work out of their homes located across the country

Management at Work

Brian, Cedric, Daesun, Nick, and Jake are wool blanket makers, all of whom perform the following steps each year:

1. Raise and take care of sheep
2. Shear sheep to obtain pounds of wool
3. Prepare wool to be turned into blankets
4. Weave blankets
5. Bring blankets to market for sale

Suppose Brian proposes that—instead of each man performing all five tasks—they divide the tasks so that Brian raises and takes care of all the sheep, Cedric shears the sheep to obtain the wool, Daesun prepares the wool to be turned into blankets, Nick makes the blankets, and Jake brings the blankets to market for sale.

The men agree to this proposal and find that specialization yields both positive and negative outcomes.

In the following table, indicate which of the following outcomes reflect likely benefits and which reflect possible drawbacks of the men’s new work structure.

Outcome

Benefit

Drawback

If it used to take each man 4 hours to monitor one fifth of the sheep, it now takes Brian less than 20 hours to monitor all the sheep.
The workers may focus on their own needs and not understand or be concerned with the needs of the four workers doing different jobs.

In: Operations Management