Questions
Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security...

Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security Officer (CISO). How does each phase, its deliverables and the personnel involved relate to the requirements of the CISO?

PLEASE DO NOT PROVIDE ANSWERS ALREADY GIVEN. NO PLAGIARISM, PLEASE!

In: Computer Science

suppose that you have data on many (say 1,000) randomly selected employed country's  residents. FURTHER DETAILS GIVEN...

suppose that you have data on many (say 1,000) randomly selected employed country's  residents. FURTHER DETAILS GIVEN IN THE END OF THE QUESTIONS

a) Explain how you would test whether, holding everything else constant, females earn less than males.

b) Explain how you would measure the payoff to someone becoming bilingual if her mother tongue is i) French, ii) English.

c) Does including both X3 and X4 in this regression model have the potential to show any "problems" when estimating your regression model? Explain. Would eliminating one of them potentially cause other problems? Explain

d) Can you use this model to test if the influence of on-the-job experience is greater for males than females? Why or why not? If not, how would you need to change the model to test whether the influence of on the job experience is greater for males than females?

FURTHER DETAILS:

Consider the following linear regression model "explaining" salaries in the Country:

Y = β0 + β1X1 + β2X2 + β3X3 + β4X4 + β5D1 + β6D2 + β7D3 + µ

where: Y = salary,

X1 = years of education,

X2 = innate ability (proxied by IQ test results)

X3 = years of on the job experience

X4 = age

D1 = a dummy variable for gender (= 1 for males, 0 for females)

D2 = 1 for uni-lingual French speakers

D3 = 1 for uni-lingual English speakers

In: Math

Q3: Conduct a five forces analysis of the social media industry. Where do we, the public...

Q3: Conduct a five forces analysis of the social media industry. Where do we, the public who use social media products, fit? Are we consumers or suppliers (or its workers)?

We often think of ourselves as consumers of Facebook, Google, Instagram and other Internet services. In reality, we are also their suppliers – or more accurately, their workers.

The book is Strategic Corporate Social Responsibility CSR chapter#9

In: Operations Management

If a bank has a Liquidity Coverage Ratio of 104%, and HQLA of $45,650,000, how much...

If a bank has a Liquidity Coverage Ratio of 104%, and HQLA of $45,650,000, how much does the bank expect to run off in cash flow during the next 30 days?

Ans: ________________________

A bank has an NSFR of 178%. How much more stable capital does the bank have compared to its RSF, if the required amount is $1.673 billion?   Ans: _______________________________

In: Finance

Hi! I wrote two function to get count cluster of char in a string , charFreq(),...

Hi! I wrote two function to get count cluster of char in a string , charFreq(), and an other one which iterate through a vector line by line looking for last element on each line, last(). The problem is, after appending all chars in a string and try to count clusters of values in that string, I get seg fault. I feel like my logic behind is ok, but I am not sure what I did wrong. Can someone help and tell me where are my errors. Also, all computation are done on txt file.

-----------------------------------------------------------------------------:c++ program

#include <iostream>

#include <string>

#include <vector>

#include <algorithm>

#include <fstream>

using namespace std;

//func to check frequency of a char in a string

void charFreq(string& Mystring){

int w = 1;

vector<int> count; //store all freq int into a vector

for(int i = 0; i <= Mystring.length(); i++){

if(Mystring.at(i)== Mystring.at(i+1))//if two adjacent value are the same increment my w: aaa = 3a

{

w++;

count[i]=w;

}

}

//print out all int charFreq.

for(int x = 0; x < count.size()-1; x++){

cout << count[x]<<" ";

}

}

void printArray(vector<string> array) {

for (int i = 0; i < array.size() - 1; ++i)

cout << array[i] << endl;

}

//iterate through vector looking for last char and append all chars into one string

string last(vector<string>& line){

char w;

string x;

string y = " ";

for(int i = 0; line.size(); i++){

w = x.at(x.length()-1);//find last char in a string

y += w;//append my char to a string

}

return y;//return entire string of appended chars

}


int main(int argc, char *argv[])

{

string i;

string input_line;

vector<string> value;

ifstream infile("Freq.txt");

if (infile.is_open())

{

while (getline(infile, input_line))

{

for (int i = 0; i < input_line.size(); i++)

{

value.push_back(input_line);//push individual input_line into vector value

charFreq(input_line);

printArray(value);

last(value);

}

}

infile.close();

}

return 0;

}

------------------------------------------------------------------------------------------------Freq.txt file

there!Hi

!Hi there

Adios

Hi there!

diosA

e!Hi ther

ere!Hi th

here!Hi t

i there!H

iosAd

osAdi

re!Hi the

sAdio

---------------------------------output

1i 1e 1s 1!.........................1o

In: Computer Science

what are the elements of the company value chain (Micheal Porter) and how do they differ...

what are the elements of the company value chain (Micheal Porter) and how do they differ from the elements of an industry value chain? Which approach in your opinion, is better suited to analyzing a company's strengths, weaknesses, and opportunities?

In: Operations Management

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital...

7) Steinway has expected earnings before interest and taxes of $1,360,000, an unlevered cost of capital of 9.8 percent, and a tax rate of 25 percent. The company has $1,200,000 of debt that carries a 6.4 percent coupon. The debt is selling at par value. Assume the firm maintains this debt amount forever. What is the interest tax shield of the firm in a given year? What is the value of the firm?

A)$18,900 and $10,475,216

B)$18,600 and $10,475,216

C)$18,600 and $11,328,410

D)$19,200 and $11,328,410

E)$19,200 and $10,708,163

8)Yankee Company is currently an all equity firm. Its current cost of equity is 10.4 percent and the tax rate is 25 percent. The firm has 1,700,000 shares of stock outstanding with a market price of $46 a share. The firm is considering capital restructuring that allows $12 million of debt with a coupon rate of 6.4 percent. The debt will be sold at par value and the proceeds will be used to repurchase shares. What is the value per share after the recapitalization? (Hint: You need to determine the total value of equity after recapitalization that accounts for the PV of interest tax shield and the number of shares outstanding after repurchased)

A)$49.27

B)$48.08

C)$47.15

D)$46.50

E)$50.33

In: Finance

Part 2 – Scripting Goals:  Write a bash script  Use linux shell commands within...

Part 2 – Scripting
Goals:
 Write a bash script
 Use linux shell commands within your script
 Provide user feedback
 Use loops
 Use conditionals
Remember to use chmod +x to make your file executable!
Each script is 5 points in the Specifications portion of the rubric. Don’t forget to maintain good standards and comments.
Script 1 – Echo-back some information
Write a script name hello.sh that will take the user’s first name as a command line argument and say hello!
Use Case: ./hello.sh Bob
Output: Hello Bob, I am a BASH script!
Script 2 – Make a Backup Folder
Write a short script named bakThatUp.sh this script will make a backup of a folder given through the command line. This script should take in two parameters, but have multiple options use If-Statements to make it work.
Use Cases:
./bakThatUp.sh Archive
o Creates a backup folder named Archive_bak with all contents
./backThatUp.sh –t Archive
o Creates a backup folder named with a date stamp (using +%F) and the name:
 2018-08-04_Archive
 date +%F gives the appropriate date stamp
./backThatUp.sh Archive –t
o Same result as above
./backThatUp.sh Archive ArchiveBackUpFolder
o Creates a backup folder named ArchiveBackUpFolder with all contents

In: Computer Science

It all began at a small bridal shower at Margaret River when Max brought some wine...

It all began at a small bridal shower at Margaret River when Max brought some wine from Woodstown Wines Pty Ltd. Had he known the wine he purchased had plastic corks, he would not have bought that brand! Usually, after removing the wire cage, a firm twist is all that is needed to start easing the stopper out. That day was different. Max twisted, pushed up with his thumbs, twisted with all his strength and the stopper did not budge. There were no instructions or warnings on the bottle. Anna, the chief bridesmaid advised that usually all local manufacturers provide instructions on the bottle for the consumers who are unfamiliar with the type of wine and the removal of its cap. Max spent almost ten minutes giving it his best shot. Being unfamiliar with the plastic stopper, he turned the bottle up to see why the stopper did not come out. All of a sudden, the stopper discharged from the bottle into his eye and injured him.

What does Max need to establish in order to succeed in an action of negligence against Woodstown Wines Pty Ltd? Your response should consider and apply all the essential elements in proving a case in negligence, the remedies applicable if successful, and any defences that might be available to the defendant. You should consider the relevant legal rules, principles, tests, guidelines and propositions applicable under the common law and do not consider any matters beyond the law of negligence. Give full reasons for your answer and cite relevant case authorities wherever possible.

In: Operations Management

1. create a class called ArrayStack that is a generic class. Create a main program to...

1. create a class called ArrayStack that is a generic class. Create a main program to read in one input file and print out the file in reverse order by pushing each item on the stack and popping each item off to print it. The two input files are: tinyTale.txt and numbers.txt. Rules: You cannot inherit the StackofStrings class.

2. Using your new ArrayStack, create a new class called RArrayStack. To do this, you need

a) remove the capacity parameter from the constructor and create the array with 8 as the starting size

b) create a new method called resize that takes a parameter (capacity)

c) change push() to check for length of array. If it is at the limit then call resize to increase it to twice the size Use the same main program from 1 and the two input files to test out your program. RULE: You cannot use ArrayList – you must use a primitive Java arrays.

  

import java.util.Iterator;
import java.util.NoSuchElementException;

public class StackOfStrings implements Iterable<String> {
private String[] a; // holds the items
private int N; // number of items in stack

// create an empty stack with given capacity
public StackOfStrings(int capacity) {
a = new String[capacity];
N = 0;
}

public boolean isEmpty() {
return N == 0;
}
  
public boolean isFull() {
return N == a.length;   
}
  
public void push(String item) {
a[N++] = item;
}
  
public String pop() {
return a[--N];
}
  
public String peek() {
return a[N-1];
}
  
public Iterator<String> iterator() {
return new ReverseArrayIterator();
}

public class ReverseArrayIterator implements Iterator<String> {
private int i = N-1;

public boolean hasNext() {
return i >= 0;
}

public String next() {
if (!hasNext()) throw new NoSuchElementException();
return a[i--];
}

public void remove() {
throw new UnsupportedOperationException();
}
}
}

Numbers.txt

20
7
99
88
1
2
3
4
30
16
19
50
55
60
61
6
68
28
32
--------------------------------------------------------------

tinyTale.txt

it was the best of times it was the worst of times
it was the age of wisdom it was the age of foolishness
it was the epoch of belief it was the epoch of incredulity
it was the season of light it was the season of darkness
it was the spring of hope it was the winter of despair

In: Computer Science

Project Name: URLEncoder Target Platform: Console Programming Language: C# A Uniform Resource Identifier (URI) (Links to...

Project Name: URLEncoder Target Platform: Console Programming Language: C# A Uniform Resource Identifier (URI) (Links to an external site.) is a string of characters designed for unambiguous identification of resources and extensibility via the URI scheme. The most common form of URI is the Uniform Resource Locator (URL) (Links to an external site.), frequently referred to informally as a web address. A user has a need to generate URLs for files they are storing on a server. The purpose of this program is to generate the URL string so the user doesn’t have to type it out. The program asks the user for several pieces of information and then uses it to generate the URL string and presents it in the Console where the user can copy it. This is being done so the user doesn’t have to type out the URL and helps avoid mistakes from typing and from the use of invalid characters in a URL. The following is the format for a URL that is to be generated by the program. https://companyserver.com/content/[project_name]/files/[activity_name]/[activity_name]Report.pdf (Links to an external site.) The [project_name] and [activity_name] are placeholders for pieces of information that go in the string. The [ ] do not get included in the string. They surround an identifier for the piece of information and are not part of the content. So, if [project_name] is “DesignLab” and [activity_name] is “Furnishings” then the URL is to be https://companyserver.com/content/DesignLab/files/Furnishings/FurnishingsReport.pdf (Links to an external site.) There are a couple of rules that have to be adhered to when creating URLs. No spaces are allowed in URLs. So, if [project_name] is “Design Lab” it can’t be included as-is in the URL. Spaces in URLs must be replaced with “%20”. The URL can contain “Design%20Lab”. If a space is present in the user input it must be converted to “%20”. Note: spaces can also be replaced with a +, but for this assignment spaces are to be converted to “%20”. In addition to spaces, there are other characters that may not be placed in URLs. The HTML URL Encoding Reference (Links to an external site.) from w3schools shows how characters that aren’t allowed in a URL can be converted to a %[number] value that can be in the URL. control characters: these are ASCII coded characters 00–1F and 7F hexadecimal delimiter characters: < > # % and " If a control character appears in the content provided by the user, the user is to be given feedback that the input is invalid because it contains a control character and they are to be asked to provide a different input. If a delimiter appears in the content provided by the user, the delimiter character is to be converted into its %[number] URL encoded format. For example, < is to be encoded as “%3C” and > is to be encoded as “%3E”. The values for the other characters can be found in the documentation provided above. There are some other characters that are reserved for use in some parts of the URL. They may not be allowed in one part of the URL even if they are allowed in other parts. These characters are also to be converted to their URL encoded format using %[number]. The following characters are reserved within a query component, have special meaning within a URL, and are to be converted. ; / ? : @ & = + $ , The following list of characters are not disallowed, but they may cause problems. They should also be converted to their URL encoded format. { } | \ ^ [ ] ` The following is an example to illustrate the application of the rules. Project Name: Design Lab Activity Name: Network>Implementation Result URL: https://companyserver.com/content/Design%20Lab/files/Network%3EImplementation/Network%3EImplementationReport.pdf (Links to an external site.) Your application, when run, is to prompt the user for the Project Name and the Activity Name. If the input is invalid, the user should be re-prompted for the input with a feedback message. After the input is successfully received, the URL string is to be created based on the rules above and presented to the user in the Console. After the URL is presented, the user is to be prompted if they want to create another URL. If they do, prompt them again for input. If not, exit the program. Please do in visual studios 2019.

In: Computer Science

1. Suppose the market value of risky and risk free bonds is initially $850 with a...

1. Suppose the market value of risky and risk free bonds is initially $850 with a corresponding return of 17.6 %, illustratively discuss the probable reaction of bond buyers and sellers when corporate bonds become riskier to such an extent that the market value of corporate bonds falls to $800 with a corresponding 25% rate of return. If the response of buyers causes the price of risk-free bonds to rise to$900 with a corresponding 11.1 % rate of return, derive the risk premium.

In: Finance

Stack Time Limit : 1 sec, Memory Limit : 131072 KB English / Japanese   Reverse Polish...

Stack

Time Limit : 1 sec, Memory Limit : 131072 KB
English / Japanese  

Reverse Polish notation is a notation where every operator follows all of its operands. For example, an expression (1+2)*(5+4) in the conventional Polish notation can be represented as 1 2 + 5 4 + * in the Reverse Polish notation. One of advantages of the Reverse Polish notation is that it is parenthesis-free.

Write a program which reads an expression in the Reverse Polish notation and prints the computational result.

An expression in the Reverse Polish notation is calculated using a stack. To evaluate the expression, the program should read symbols in order. If the symbol is an operand, the corresponding value should be pushed into the stack. On the other hand, if the symbols is an operator, the program should pop two elements from the stack, perform the corresponding operations, then push the result in to the stack. The program should repeat this operations.

Input

An expression is given in a line. Two consequtive symbols (operand or operator) are separated by a space character.

You can assume that +, - and * are given as the operator and an operand is a positive integer less than 106

Output

Print the computational result in a line.

Constraints

2 ≤ the number of operands in the expression ≤ 100
1 ≤ the number of operators in the expression ≤ 99
-1 × 109 ≤ values in the stack ≤ 109

Sample Input 1

1 2 +

Sample Output 1

3

Sample Input 2

1 2 + 3 4 - *

Sample Output 2

-3

USE JAVA

In: Computer Science

1. Calcium oxalate monohydrate, CaC2O4•H2O, is stable up to ~100˚C, but will release the incorporated water...

1. Calcium oxalate monohydrate, CaC2O4•H2O, is stable up to ~100˚C, but will release the incorporated water molecule when heated to 300˚C, according to the following reaction:

CaC2O4•H2O(s) → CaC2O4(s) + H2O(g)

If a 4.1754 g sample of calcium oxalate monohydrate is heated to 300˚C, what should be the mass (g) of the resulting calcium oxalate?

2. An unknown sample of ore with a mass of 506.1 g is allowed to react with excess magnesium and ammonia, NH3, in order to analyze for phosphate, PO43-, according to the following precipitation reaction:

2PO43-(aq) + 2Mg2+(aq) + 2NH3(aq) + 2H2O(l) → Mg2(P2O7)(s) + 2NH3(aq) + 2OH-(aq) + H2O(l)

After the precipitated Mg2(P2O7) is carefully rinsed and dried, the mass is determined to be 0.09870 mg.
Assuming all phosphorous originally present in the ore was in the form of phosphate, what was the original mass (μg) of phosphorous in the ore sample?

3. An unknown organic compound was produced by students in the O-chem lab. According to their records, this compound should only contain carbon and hydrogen atoms. A combustion analysis is performed on the sample.

When 0.1727 g of the sample is burned in the presence of excess oxygen, the magnesium perchlorate cartridge increases 0.24889 g and the ascarite cartridge increases 0.53094 g.

What is the percent C (w/w) in the sample?

4. What is the percent H (w/w) in the sample?

5. What is the empirical formula for the unknown compound?

In: Chemistry

Problem Description Students in Computer Information Systems (CIS) department at a local university are required to...

Problem Description Students in Computer Information Systems (CIS) department at a local university are required to do some group-projects in their classes because their instructors believe the skills and competence to work as an effective team are important to assure a successful IT project. Group project helps IT students apply system design knowledge, solve real world business problems, enhance learning effective team skills, improve students’ business communication skills, and serve back to the community. In order to ensure an effective and functional group, each group has 3-4 members and a team leader is elected. The team makes a project plan based on the project activities. The team communication format is also decided. During the semester, students are asked to do multiple self- and peer- assessment based on the provided rubrics. The rubrics for the self- and peer assessment were developed based on previous studies and department faculty brain-storming. The primary focus of self- and peer- assessment is on the learning process of team skills. It should be used to enhancing team skill development. It can also be used as a reference or supplementary documents when faculty evaluates the final project. Nevertheless, due to the current paper-based instrument and manual process of administering the assessment, collecting the forms, data re-entry, calculation, and analysis, it is tedious and time-consuming for faculty members to implement the assessment, and it is difficulty for students to get an instant feedback from previous stage to improve their group performance. To address this issue, Dr. Larry Henson, a software engineering professor, decides to ask his students to design an online tool that can collect group peer evaluation data, do analysis, and generate reports. To have a better understanding of the functions and requirements of the peer-evaluation system, the faculty in the department had a meeting. Following is a summary of the meeting minutes. FacA: The system should allow Faculty assign students to different project teams. The same student in different class may participate in different project teams. FacB: The system should allow users to login with different roles such as faculty, students, and administrator. FacC: The system should allow a Faculty manages project teams for each class the faculty is teaching. FacD: The system may also be adopted by faculty in other departments as well as CIS faculty because some program core courses are offered by other departments. It is good to specify a system administrator. The administrator can manage faculty, classes, students, and rubric information. FacE: Students can do both self- and team-based peer assessments based on the specified rubrics. FacF: Students are allowed to view the assessment done by the team members so that they get instant feedback to improve their performance. FacG: The assessment should include both close-ended and open-ended questions. For instance, students are allowed to make comments upon assessing other team members FacH: The system should automatically generate different reports such as the average at the level of individual, team, and class. FacI: Students are also allowed to make comments upon assessments were done by other members. FacJ: All students comments should be reviewed and approved before exposed to other members. Understand the problem and define the scope of the project by 1) Identify functional requirements; 2) Identify domain classes and do domain model; 3) create a glossary or dictionary of the domain objects and give definition for each of them.

In: Computer Science