Raw DataCountry RiskEconomic FreedomPolitical FreedomUS Exports by country in $ millionsWorld Development Indicators (WDI from World Bank)see cell formulasee cell formulasee cell formulasee cell formulasee cell formulasee cell formulahttp://www.euromoneycountryrisk.com/2009http://www.heritage.org/index/http://www.freedomhouse.org/report-types/freedom-worldhttp://www.census.gov/foreign-trade/balance/YearRow LabelsElectricity production (kWh)Energy use (kg of oil equivalent per capita)GDP growth (annual %)GDP per capita, PPP (current international $)Internet users (per 100 people)Mobile cellular subscriptions (per 100 people)Population, totalRoads, paved (% of total roads)Roads, total network (km)Secure Internet servers (per 1 million people)Telephone linesTrade (% of GDP)Urban populationUrban population (% of total)Imports from US ($millions)counterImports from US ($ / capita)Pol FreedomPol Freedom - Reverse Highest is more freeEcon FreedomCountry Risk (2011 data for all years)Growth in Energy Use (4-year)Paved Roads (Km per million people)Country nameScore valueEconomic assessmentPolitical assessmentStructural assessmentAccess to capitalCredit ratingsDebt indicatorsRow Labels2000200120022003200420052006200720082009Country2000200120022003200420052006200720082009Row Labels20002001200220032004200520062007200820092000Albania4738000000574.98463469647.34254.23050584990.11409734660.96980457423071856391800015268756.62533916531280963.95241.720.9274.53.553.638.552285.2633717205AlbaniaAfghanistan20.932.6727.7427.75000Afghanistan0000000000Afghanistan77665.55555.56Advance Technology Products227395199628178566180208201561216824247071264875270131244707.8557092000Algeria25412000000884.94727503372.20000070355390.42451395960.49170567910.28165483483053382768.9000015259104000176132762.529591725418259228.54659.8861.82285.52.556.840.012346.774336113AlgeriaAlbania38.5541.6339.1144.973.381.884.6Albania53.656.656.856.858.557.860.361.462.463.7Albania4.53.533333333Afghanistan868060.758887150.391516262.153213417.393793495.283664481.6333661508.5929662000Argentina889100000001650.4933604172-0.78899892229114.09488165027.038683086217.56789992853693070929.3999996185215471789420522.404736106933274568.80990.14695.521271.56.57037.351715.3332522818ArgentinaAlgeria40.0149.835.8345.8405.74Algeria56.857.36157.758.153.255.755.456.256.6Algeria5.55.55.55.55.55.55.55.55.55.5Africa10965.92937812119.34312510663.06697810612.56023413202.13801515309.54124218582.83506323425.82088528392.70059124329.4856012000Armenia5958000000651.26436153855.92034.5541067171.30047002240.5684474292307609853338773.91856774832002539.79865.155.7218446343.970ArmeniaAngola38.2245.8935.9329.5432.55.19Angola24.30000043.544.746.947Andorra1111111111Albania20.915.314.89.68787320.09407518.51392527.63123533.96511540.0310648.0185652000Australia2098700000005644.6091473923.951352155426424.19597455446.783825561544.7031796585191530008116011005000040.65350024861670141687.212482.426521777.181.840AustraliaAntigua & Barbuda4.7656.7 ...
According to Davenport (2014) social media and health care are c.docxmakdul
Social media is collaborating with healthcare to meet the needs of providers and patients, and is moving toward using analytics to evaluate its value within healthcare. The document instructs the reader to research areas of social media that could benefit from an analytic model combining data and value-based analytics, then evaluate a resource by discussing five major social media stakeholder roles, whether social media could improve medical practice and provide rationale, and concluding with main points.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
Kirk (2016) identified four data action groups for working with data: data acquisition, data examination, data transformation, and data exploration. Data acquisition involves gathering the raw material.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
This document discusses how cultural deviance theorists view subcultures as having their own value systems that oppose mainstream society's values. It asks how rap culture has perpetuated these subcultural values and promoted violence and crime among young men. It also asks how theorists would explain the persistence and popularity of rap culture given its deviation from conventional norms and values, citing examples from Tupac Shakur and 50 Cent. The document requests a 750-1000 word essay on this topic supported by 3-5 scholarly sources.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
According to Davenport (2014) social media and health care are c.docxmakdul
Social media is collaborating with healthcare to meet the needs of providers and patients, and is moving toward using analytics to evaluate its value within healthcare. The document instructs the reader to research areas of social media that could benefit from an analytic model combining data and value-based analytics, then evaluate a resource by discussing five major social media stakeholder roles, whether social media could improve medical practice and provide rationale, and concluding with main points.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
Kirk (2016) identified four data action groups for working with data: data acquisition, data examination, data transformation, and data exploration. Data acquisition involves gathering the raw material.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
This document discusses how cultural deviance theorists view subcultures as having their own value systems that oppose mainstream society's values. It asks how rap culture has perpetuated these subcultural values and promoted violence and crime among young men. It also asks how theorists would explain the persistence and popularity of rap culture given its deviation from conventional norms and values, citing examples from Tupac Shakur and 50 Cent. The document requests a 750-1000 word essay on this topic supported by 3-5 scholarly sources.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
This document provides an overview of an academic paper performance task intended to assess students' ability to conduct scholarly research, articulate an evidence-based argument, and effectively communicate a conclusion. Specifically, the performance task evaluates students' capacity to generate a focused research question, explore relationships between multiple scholarly works, develop and support their own argument using relevant evidence, and integrate sources while distinguishing their own voice.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
This study examined a problem, used a particular method to do so, and found results that were interpreted. It concluded by recommending future research on the topic.
Abstract IntroductionResearch Paper Find a peer re.docxmakdul
Abstract <>
Introduction<>
Research Paper: Find a peer reviewed article in the following databases provided by the UC Library and write a 600
-word
paper reviewing the literature concerning one of this week’s topics, e.g.
Data Storage in the Cloud, Cloud Storage Device Mechanisms
, Or Collaboration in the Cloud.
with some flow chat.
Preference would be -
Data Storage in the Cloud, Cloud Storage Device Mechanisms
Conclusion <>
References
.
AbstractComputers speak different languages, like people. .docxmakdul
Abstract
Computers speak different languages, like people. Some write data "left-to-right" and others "right-to-left". If a machine can read its own data it tends to encounter no problems but when one computer stores data and a different type tries to read it, that is when a problem occurs. This document aims to present how Endianness is willing to be taken into consideration how Endian specific system inter-operate sharing data without misinterpretation of the value. Endianness describes the location of the most significant byte (MSB) and least significant byte (LSB) of an address in memory and is defined by the CPU architecture implementation of the system. Unfortunately, not all computer systems are designed with constant Endian architecture. The difference in Endian architecture is a difficulty when software or data is shared between computer systems. Little and big endian are two ways of storing multibyte data- type (int, float, etc.). In little endian machines, last byte of binary representation of the multi byte data- type is stored first. On the opposite hand, in big endian machines, first byte of binary representation of the multi byte datatype is stored first. Suppose we write float value to a file on a little-endian machine and transfer this file to a big-endian machine. Unless there is correct transformation, big endian machine will read the file in reverse order. This paper targets on showcasing how CPU-based Endianness raises software issues when reading and writing the data from memory. We will try to reinterpret this information at register/system-level.
Keywords: -
endianness, big-endian, little-endian, most significant byte (MSB), least significant byte (LSB).
Definition of Endianness
: -
Endianness refers to order of bits or bytes within a binary representation of a number. All computers do not store multi-byte value in the same order. The difference in Endian architecture is an issue when software or data is shared between computer systems. An analysis of the computer system and its interfaces will determine the requirements of the Endian implementation of the software. Based on which value is stored first, Endianness can be either big or small, with the adjectives referring to which value is stored first.
Little Endian and Big Endian: -
Endianness illustrates how a 32-bit pattern is held in the four bytes of memory. There are 32 bits in four bytes and 32 bits in the pattern, but a choice has to be made about which byte of memory gets what part of the pattern. There are two ways that computers commonly do this.
Little endian and Big endian are the two ways of storing multibyte data types. Little Endian and Big Endian are also called host byte order and network byte order respectively. In a multibyte data type, right most byte is called least significant byte (LSB) and left most byte is called most significant byte (MSB). In little endian the least significant byte is stored first, while in big endian, most sign.
About half of the paid lobbyists in Washington are former government.docxmakdul
About half of the paid lobbyists in Washington are former government staff members or former members of Congress. Why would interest groups employ such people? Why might some reformers want to limit the ability of interest groups to employ them? On what basis might an interest group argue that such limits are unconstitutional?
.
About Your Signature AssignmentThis signature assignment is desi.docxmakdul
About Your Signature Assignment
This signature assignment is designed to align with specific program student learning outcome(s) in your program. Program Student Learning Outcomes are broad statements that describe what students should know and be able to do upon completion of their degree. The signature assignments may be graded with an automated rubric that allows the University to collect data that can be aggregated across a location or college/school and used for program improvements.
Write
a 1,050-word minimum strategic implementation plan in which you include the following:
Create an implementation plan including:
Objectives
Functional tactics
Action items
Milestones and deadlines
Tasks and task ownership
Resource allocation
Recommend any organizational change management strategies that may enhance successful implementation.
Develop key success factors, budget, and forecasted financials, including a break-even chart.
Create a risk management plan including contingency plans for the identified risks.
.
ABOUT SELF !Textbook Broderick, P.C.& Blewitt, P (2.docxmakdul
ABOUT 'SELF' !
Textbook:
Broderick, P.C.
& Blewitt, P
(2020). The Life Span
(5th ed.).
Pearson.
NO OTHER REFRENCES!
- 10-12 pages
- describing your development as an individual through Erikson’s Theory of Psychosocial Development through at least Stage 5.
- no reference page or abstract.. just cover page!
.
A. Select one of the following communicable diseases that has h.docxmakdul
A. Select
one
of the following communicable diseases that has had an outbreak across international borders:
• influenza
• measles
• respiratory syndrome coronavirus
• meningococcal disease
• HIV/AIDS
• Ebola virus
• hepatitis B
• hepatitis C
• tuberculosis
• Zika virus
B. Describe the outbreak of the disease selected in part A, including
each
of the following:
• name of the disease
• the countries involved
• the date the outbreak was discovered
• the dates the disease reached
each
involved country
1. Analyze the epidemiological determinants and risk factors associated with the outbreak.
2. Discuss the route of transmission of the selected disease.
3. Discuss how an outbreak of the selected disease would impact your community at a systems level (e.g., the functioning of schools, local government, businesses, hospitals).
4. Explain what the reporting protocol would be if an outbreak of the selected disease were to occur in your community.
5. Discuss
two
strategies (e.g., patient education strategies, community education strategies) that you would recommend to prevent an outbreak of the selected disease in your community.
C. Submit a PDF of your score summary from Bentonville that includes
each
of the following completed activities:
• Influenza in Bentonville
• Community Advocacy
• Emergency Response
• Communicable Disease
Note: For an example of how your score sheet should look, refer to the attached "Sample Final Results Report: Influenza in Bentonville."
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions
File name may contain only letters, numbers, spaces, and these symbols: ! - _ . * ' ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
RUBRIC
A:COMMUNICABLE DISEASE
NOT EVIDENT
A communicable disease that has had an outbreak across international borders is not selected.
APPROACHING COMPETENCE
A communicable disease that has had an outbreak across international borders is selected, but the disease is not selected from the given list.
COMPETENT
A communicable disease from the given list is selected.
B:DESCRIPTION OF OUTBREAK
NOT EVIDENT
A description of the disease outbreak is not provided.
APPROACHING COMPETENCE
The description of the disease outbreak is missing one or more of the given points, or the description does not apply to the disease selected in part A.
COMPETENT
The description of the disease outbreak includes each of the given points as they apply to the disease selected in part A.
B1:EPIDEMIOLOGICAL DETERMINANTS AND RISK FACTORS
NOT EVIDENT
An analysis of epidemiological determinants and risk facto.
AAuthorWho created the source What do you know about the author.docxmakdul
A
AuthorWho created the source? What do you know about the author? What is the author's point of view?
P
Place Where & when was the source produced? How might this affect the meaning of the source?
P
Prior KnowledgeBeyond information about the author and the context of its creation, what do you know that would help you further understand the primary source?
A
AudienceFor whom was the source created and how might this affect the reliability of the source?
R
ReasonWhy was this source created at the time it was produced?
T
The Main Idea What point is the source trying to convey?
S
SignificanceWhy is this source important? What inferences can you draw from this document? Ask yourself, "So what?", basically why we should care about the subject being discussed in the primary source?
.
A. Discuss the possible effects of applying risk assessment and ris.docxmakdul
A. Discuss the possible effects of applying risk assessment and risk management in policing pertaining to curtailing departmental and officer misconduct.
B. Briefly, discuss the findings in a study conducted by Donner, Fridell, and Jennings (2016) pertaining to the relationship between self-control and police misconduct. In doing so, discuss Gottfredson and Hirschi's (1990) general theory of crime as it is relative to self-control theory and police misconduct.
C. Briefly, discuss the effectiveness of consent degrees and Section 14141 of the Violent Crime Control and Law Enforcement Act of 1994. In doing so, describe the legal provision which allowed the Department of Justice DOJ to intervene in instances where allegations are made that constitutional policing is not followed as a matter of patterns and practices.
D, Given the complexity of modern arbitration proceedings, do you think that professional legal representation for both unions and employers should be required? Why or why not?
2. Do you agree with the current prohibition of strikes for all public-sector employees? Should the government relax these rules and allow for worker strikes in certain non-essential occupations? Explain your answer.
.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
This document provides an overview of an academic paper performance task intended to assess students' ability to conduct scholarly research, articulate an evidence-based argument, and effectively communicate a conclusion. Specifically, the performance task evaluates students' capacity to generate a focused research question, explore relationships between multiple scholarly works, develop and support their own argument using relevant evidence, and integrate sources while distinguishing their own voice.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
This study examined a problem, used a particular method to do so, and found results that were interpreted. It concluded by recommending future research on the topic.
Abstract IntroductionResearch Paper Find a peer re.docxmakdul
Abstract <>
Introduction<>
Research Paper: Find a peer reviewed article in the following databases provided by the UC Library and write a 600
-word
paper reviewing the literature concerning one of this week’s topics, e.g.
Data Storage in the Cloud, Cloud Storage Device Mechanisms
, Or Collaboration in the Cloud.
with some flow chat.
Preference would be -
Data Storage in the Cloud, Cloud Storage Device Mechanisms
Conclusion <>
References
.
AbstractComputers speak different languages, like people. .docxmakdul
Abstract
Computers speak different languages, like people. Some write data "left-to-right" and others "right-to-left". If a machine can read its own data it tends to encounter no problems but when one computer stores data and a different type tries to read it, that is when a problem occurs. This document aims to present how Endianness is willing to be taken into consideration how Endian specific system inter-operate sharing data without misinterpretation of the value. Endianness describes the location of the most significant byte (MSB) and least significant byte (LSB) of an address in memory and is defined by the CPU architecture implementation of the system. Unfortunately, not all computer systems are designed with constant Endian architecture. The difference in Endian architecture is a difficulty when software or data is shared between computer systems. Little and big endian are two ways of storing multibyte data- type (int, float, etc.). In little endian machines, last byte of binary representation of the multi byte data- type is stored first. On the opposite hand, in big endian machines, first byte of binary representation of the multi byte datatype is stored first. Suppose we write float value to a file on a little-endian machine and transfer this file to a big-endian machine. Unless there is correct transformation, big endian machine will read the file in reverse order. This paper targets on showcasing how CPU-based Endianness raises software issues when reading and writing the data from memory. We will try to reinterpret this information at register/system-level.
Keywords: -
endianness, big-endian, little-endian, most significant byte (MSB), least significant byte (LSB).
Definition of Endianness
: -
Endianness refers to order of bits or bytes within a binary representation of a number. All computers do not store multi-byte value in the same order. The difference in Endian architecture is an issue when software or data is shared between computer systems. An analysis of the computer system and its interfaces will determine the requirements of the Endian implementation of the software. Based on which value is stored first, Endianness can be either big or small, with the adjectives referring to which value is stored first.
Little Endian and Big Endian: -
Endianness illustrates how a 32-bit pattern is held in the four bytes of memory. There are 32 bits in four bytes and 32 bits in the pattern, but a choice has to be made about which byte of memory gets what part of the pattern. There are two ways that computers commonly do this.
Little endian and Big endian are the two ways of storing multibyte data types. Little Endian and Big Endian are also called host byte order and network byte order respectively. In a multibyte data type, right most byte is called least significant byte (LSB) and left most byte is called most significant byte (MSB). In little endian the least significant byte is stored first, while in big endian, most sign.
About half of the paid lobbyists in Washington are former government.docxmakdul
About half of the paid lobbyists in Washington are former government staff members or former members of Congress. Why would interest groups employ such people? Why might some reformers want to limit the ability of interest groups to employ them? On what basis might an interest group argue that such limits are unconstitutional?
.
About Your Signature AssignmentThis signature assignment is desi.docxmakdul
About Your Signature Assignment
This signature assignment is designed to align with specific program student learning outcome(s) in your program. Program Student Learning Outcomes are broad statements that describe what students should know and be able to do upon completion of their degree. The signature assignments may be graded with an automated rubric that allows the University to collect data that can be aggregated across a location or college/school and used for program improvements.
Write
a 1,050-word minimum strategic implementation plan in which you include the following:
Create an implementation plan including:
Objectives
Functional tactics
Action items
Milestones and deadlines
Tasks and task ownership
Resource allocation
Recommend any organizational change management strategies that may enhance successful implementation.
Develop key success factors, budget, and forecasted financials, including a break-even chart.
Create a risk management plan including contingency plans for the identified risks.
.
ABOUT SELF !Textbook Broderick, P.C.& Blewitt, P (2.docxmakdul
ABOUT 'SELF' !
Textbook:
Broderick, P.C.
& Blewitt, P
(2020). The Life Span
(5th ed.).
Pearson.
NO OTHER REFRENCES!
- 10-12 pages
- describing your development as an individual through Erikson’s Theory of Psychosocial Development through at least Stage 5.
- no reference page or abstract.. just cover page!
.
A. Select one of the following communicable diseases that has h.docxmakdul
A. Select
one
of the following communicable diseases that has had an outbreak across international borders:
• influenza
• measles
• respiratory syndrome coronavirus
• meningococcal disease
• HIV/AIDS
• Ebola virus
• hepatitis B
• hepatitis C
• tuberculosis
• Zika virus
B. Describe the outbreak of the disease selected in part A, including
each
of the following:
• name of the disease
• the countries involved
• the date the outbreak was discovered
• the dates the disease reached
each
involved country
1. Analyze the epidemiological determinants and risk factors associated with the outbreak.
2. Discuss the route of transmission of the selected disease.
3. Discuss how an outbreak of the selected disease would impact your community at a systems level (e.g., the functioning of schools, local government, businesses, hospitals).
4. Explain what the reporting protocol would be if an outbreak of the selected disease were to occur in your community.
5. Discuss
two
strategies (e.g., patient education strategies, community education strategies) that you would recommend to prevent an outbreak of the selected disease in your community.
C. Submit a PDF of your score summary from Bentonville that includes
each
of the following completed activities:
• Influenza in Bentonville
• Community Advocacy
• Emergency Response
• Communicable Disease
Note: For an example of how your score sheet should look, refer to the attached "Sample Final Results Report: Influenza in Bentonville."
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions
File name may contain only letters, numbers, spaces, and these symbols: ! - _ . * ' ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
RUBRIC
A:COMMUNICABLE DISEASE
NOT EVIDENT
A communicable disease that has had an outbreak across international borders is not selected.
APPROACHING COMPETENCE
A communicable disease that has had an outbreak across international borders is selected, but the disease is not selected from the given list.
COMPETENT
A communicable disease from the given list is selected.
B:DESCRIPTION OF OUTBREAK
NOT EVIDENT
A description of the disease outbreak is not provided.
APPROACHING COMPETENCE
The description of the disease outbreak is missing one or more of the given points, or the description does not apply to the disease selected in part A.
COMPETENT
The description of the disease outbreak includes each of the given points as they apply to the disease selected in part A.
B1:EPIDEMIOLOGICAL DETERMINANTS AND RISK FACTORS
NOT EVIDENT
An analysis of epidemiological determinants and risk facto.
AAuthorWho created the source What do you know about the author.docxmakdul
A
AuthorWho created the source? What do you know about the author? What is the author's point of view?
P
Place Where & when was the source produced? How might this affect the meaning of the source?
P
Prior KnowledgeBeyond information about the author and the context of its creation, what do you know that would help you further understand the primary source?
A
AudienceFor whom was the source created and how might this affect the reliability of the source?
R
ReasonWhy was this source created at the time it was produced?
T
The Main Idea What point is the source trying to convey?
S
SignificanceWhy is this source important? What inferences can you draw from this document? Ask yourself, "So what?", basically why we should care about the subject being discussed in the primary source?
.
A. Discuss the possible effects of applying risk assessment and ris.docxmakdul
A. Discuss the possible effects of applying risk assessment and risk management in policing pertaining to curtailing departmental and officer misconduct.
B. Briefly, discuss the findings in a study conducted by Donner, Fridell, and Jennings (2016) pertaining to the relationship between self-control and police misconduct. In doing so, discuss Gottfredson and Hirschi's (1990) general theory of crime as it is relative to self-control theory and police misconduct.
C. Briefly, discuss the effectiveness of consent degrees and Section 14141 of the Violent Crime Control and Law Enforcement Act of 1994. In doing so, describe the legal provision which allowed the Department of Justice DOJ to intervene in instances where allegations are made that constitutional policing is not followed as a matter of patterns and practices.
D, Given the complexity of modern arbitration proceedings, do you think that professional legal representation for both unions and employers should be required? Why or why not?
2. Do you agree with the current prohibition of strikes for all public-sector employees? Should the government relax these rules and allow for worker strikes in certain non-essential occupations? Explain your answer.
.
A. Discuss the possible effects of applying risk assessment and ris.docx
Raw DataCountry RiskEconomic FreedomPolitical FreedomUS Exports by.docx
1. Raw DataCountry RiskEconomic FreedomPolitical FreedomUS
Exports by country in $ millionsWorld Development Indicators
(WDI from World Bank)see cell formulasee cell formulasee cell
formulasee cell formulasee cell formulasee cell
formulahttp://www.euromoneycountryrisk.com/2009http://www.
heritage.org/index/http://www.freedomhouse.org/report-
types/freedom-worldhttp://www.census.gov/foreign-
trade/balance/YearRow LabelsElectricity production
(kWh)Energy use (kg of oil equivalent per capita)GDP growth
(annual %)GDP per capita, PPP (current international $)Internet
users (per 100 people)Mobile cellular subscriptions (per 100
people)Population, totalRoads, paved (% of total roads)Roads,
total network (km)Secure Internet servers (per 1 million
people)Telephone linesTrade (% of GDP)Urban
populationUrban population (% of total)Imports from US
($millions)counterImports from US ($ / capita)Pol FreedomPol
Freedom - Reverse Highest is more freeEcon FreedomCountry
Risk (2011 data for all years)Growth in Energy Use (4-
year)Paved Roads (Km per million people)Country nameScore
valueEconomic assessmentPolitical assessmentStructural
assessmentAccess to capitalCredit ratingsDebt indicatorsRow
Labels2000200120022003200420052006200720082009Country2
000200120022003200420052006200720082009Row
Labels20002001200220032004200520062007200820092000Alb
ania4738000000574.98463469647.34254.23050584990.1140973
4660.96980457423071856391800015268756.625339165312809
63.95241.720.9274.53.553.638.552285.2633717205AlbaniaAfgh
anistan20.932.6727.7427.75000Afghanistan0000000000Afghani
stan77665.55555.56Advance Technology
Products227395199628178566180208201561216824247071264
875270131244707.8557092000Algeria25412000000884.947275
03372.20000070355390.42451395960.49170567910.281654834
83053382768.9000015259104000176132762.529591725418259
228.54659.8861.82285.52.556.840.012346.774336113AlgeriaAl