· Respond to 3 posts listed below. Advance the conversation; provide a real-world application and experiential examples;
· Conceptually discuss your key [most significant] learning insight or take-away from the selected forum topic comments.
· Responses should be a minimum of 150-250 words, supported by at least one reference outside of the textbook (use academic journals), either supporting or refuting the position of the author of the forum topic response or peer response.
Topic #1: The Cost of Capital
The cost of capital refers to the “cost” a company must incur in order to use funds towards a new project or investment. The funds may come from lenders by borrowing the funds, by financing equity, or by selling bonds or assets. The cost of capital is expressed as an annual interest rate that the company will be charged on the capital funds. Therefore, this is the minimum return a company must be striving for when undertaking a new project, making a purchase, or making an investment. Otherwise, they are simply losing money.
The cost of capital is used as the minimum rate of return that the project must achieve and is also the rate that is used in a discounted cash flow analysis. If the return of future net cash flows on an investment or project are greater than the cost of capital, then the investment or project is worthwhile to the business. For example, if a project generates a return of 20% and the cost of capital was estimated at 15%, then this project has added value to the business.
In addition, the NPV formula can be used to compare multiple projects using different costs of capital. For instance, Project A and Project B compared by using 10%, 15%, and 20% costs of capital. This can allow businesses to see how investing more or less capital would affect the outcome of the NPV. Just as you can compare these different costs of capital, you can also add the element of risk into your calculations by increasing the cost of capital to reflect a riskier project or investment. Very simply put, if investment B is riskier than investment A, then you could compare them with B having a cost of capital at r = 15% and A having a cost of capital at r= 10% - therefore adjusting for one project/investment being riskier than the other.
Interestingly, there has been much discussion and debate over how companies set their cost of capital rates. In the case of large Fortune 500 companies, they spend hundreds of billions of dollars per year. If they miscalculate the cost of capital rate on an investment or project with a difference of even 1%, this could mean a gain or loss of billions of dollars depending on which way the value was incorrectly estimated. For example, if a company plans to invest $52 million dollars into a new project that is estimated to bring in $10.5 million per year over the next seven years, and the company incorrectly estimates the cost of capital by 1%, then you can see by the table below the affect this small percentage pot.
Equity Risk Premium in an Emerging Market Economyiosrjce
The finance literature suggests that in almost any kind of investing, returns would at least have some
relationship with risk-free rate of return (Rf), with investors demanding higher returns for greater risk. Risk-free
asset is regarded as one where the investor knows the expected return with certainty. This leads to the notion of
Equity Risk Premium (ERP), the extra return that, as compensation for the additional borne risk, the investor
earns over the Rf
, typically taken as 91-day Treasury bills (TB) rate of return. While similar studies have been
performed in the past, the applicability of the ERP concept across financial markets and its economic
implications as a risk measure has remained a contentious issue in the field, particular in emerging markets.
The present study seeks to revisit the issue in the Nigerian context based on secondary data spanning 2000-
2011. The statistical analysis based on the capital asset pricing model shows that the country’s Rf proxied by
TBs, had over the years traded at significantly higher levels of return than obtainable from market portfolio,
thus creating a negative ERP phenomenon. The implications of this peculiarity for sustainable wealth creation,
business development and valuation practice, are highlighted. Recent changes in the country’s Administration
makes this study even more relevant, thus, the paper also renews the call for creating a more pro-industry fiscal
policy climate if the national aspiration for sustainable inclusive growth is to be attained.
Equity Risk Premium in an Emerging Market Economyiosrjce
The finance literature suggests that in almost any kind of investing, returns would at least have some
relationship with risk-free rate of return (Rf), with investors demanding higher returns for greater risk. Risk-free
asset is regarded as one where the investor knows the expected return with certainty. This leads to the notion of
Equity Risk Premium (ERP), the extra return that, as compensation for the additional borne risk, the investor
earns over the Rf
, typically taken as 91-day Treasury bills (TB) rate of return. While similar studies have been
performed in the past, the applicability of the ERP concept across financial markets and its economic
implications as a risk measure has remained a contentious issue in the field, particular in emerging markets.
The present study seeks to revisit the issue in the Nigerian context based on secondary data spanning 2000-
2011. The statistical analysis based on the capital asset pricing model shows that the country’s Rf proxied by
TBs, had over the years traded at significantly higher levels of return than obtainable from market portfolio,
thus creating a negative ERP phenomenon. The implications of this peculiarity for sustainable wealth creation,
business development and valuation practice, are highlighted. Recent changes in the country’s Administration
makes this study even more relevant, thus, the paper also renews the call for creating a more pro-industry fiscal
policy climate if the national aspiration for sustainable inclusive growth is to be attained.
Question 1Risk & Return and the CAPM. Based on the following.docxIRESH3
Question 1
Risk & Return and the CAPM.
Based on the following information, calculate the required return based on the CAPM:
Risk Free Rate = 3.5%
Market Return =10%
Beta = 1.08
Question 2
Risk and Return, Coefficient of Variation
Based on the following information, calculate the coefficient of variation and select the best investment based on the risk/reward relationship.
Std Dev.Exp. Return
Company A 7.4 13.2
Company B 11.6 18.9
Question 3
Risk and Return, Coefficient of Variation
Based on the following information, calculate the coefficient of variation and select the best investment based on the risk/reward relationship.
Std Dev.Exp. Return
Company A 10.4 15.2
· Company B 14.6 22.9
Question 4
Measures of Risk.
Address each source of risk that is measured and relate it to two models addressed in this unit.
· Your response should be at least 250 words in length.
BBA 3301, Financial Management 1
UNIT VI STUDY GUIDE
Risk and Return
Learning Objectives
Upon completion of this unit, students should be able to:
1. Explain the risk-reward relationship.
2. Calculate holding period returns.
3. Calculate required returns using the Capital Asset Pricing Model
(CAPM).
4. Calculate the coefficient of variation for varying investments.
5. Decompose sources of risk.
6. Contrast measures of risk.
7. Describe portfolio theory and diversification.
Written Lecture
Whenever a business or individual makes an investment decision, risk must be
considered. This unit focuses entirely on the risk-return relationship, providing
tools for measurement, analysis and decision making.
To begin, the term risk must be defined. From a practical or applied perspective,
risk is the probability of losing some or all of the money invested. In finance, risk
is often associated with volatility of variance in returns (around some average
return). Generally, it is assumed that investments that offer higher returns
involve greater risk. For purposes of this unit, risk is measured through two
primary measures:
Standard Deviation, and
The Beta Coefficient
The rate of return allows an investment's return to be compared with other
investments. For one-year investments, the return on a debt investment is:
k = interest paid / loan amount
The return on a stock investment is calculated by the following equation
k = [D1 + (P1 – P0)] / P0
Where:
D1 = Dividends for the “next” year (on a share of stock)
P1= Price of a share of stock, one period into the future
P0= Price of a share of stock today
The expected return on stock is the return investors feel is most likely to occur
based on current information. Return is influenced by the combination of stock
price (capita ...
Writing a 15 pages final paper, will be discussed in our 1st meeti.docxambersalomon88660
Writing a 15 pages final paper, will be discussed in our 1st meeting.
The final Paper and PowerPoint Presentation: Topic Analysis– 15 to 20 pages in APA format
Choose a topic in IT Project Management for your topic analysis. Email to your instructor a proposal of the topic area you intend to use for your topic analysis. Prepare a summary that identifies the major research threads in your topic. A reference list should be included in the summary. The topic should be relevant to your course material.
The professor will approve the topic of the project during the time when the class meets. E-mail the professor by week 2 with the topic for your final project. Email the professor a draft reference list by week 5. The Final Project will be a research report relevant to the selected topic. Your report will include an evolution of the chosen topic, the problems resolved or will be resolved, and future trends. The paper should have 5-7 academic references for each of these areas (published articles and/or textbook. The paper should be 15 to 20 pages in length and must be presented in the APA style, and is due during the last week of classes.
CHAPTER 14 Raising Equity and Debt Globally
Do what you will, the capital is at hazard. All that can be required of a trustee to invest, is, that he shall conduct himself faithfully and exercise a sound discretion. He is to observe how men of prudence, discretion, and intelligence manage their own affairs, not in regard to speculation, but in regard to the permanent disposition of their funds, considering the probable income, as well as the probable safety of the capital to be invested.
—Prudent Man Rule, Justice Samuel Putnam, 1830.
LEARNING OBJECTIVES
■Design a strategy to source capital equity globally
■Examine the potential differences in the optimal financial structure of the multinational firm compared to that of the domestic firm
■Describe the various financial instruments that can be used to source equity in the global equity markets
■Understand the different forms of foreign listings—depositary receipts—in U.S. markets
■Analyze the unique role private placement enjoys in raising global capital
■Evaluate the different goals and considerations relevant to a firm pursuing foreign equity listing and issuance
■Explore the different structures that can be used to source debt globally
Chapter 13 analyzed why gaining access to global capital markets should lower a firm’s cost of capital, increase its access to capital, and improve the liquidity of its shares by overcoming market segmentation. A firm pursuing this lofty goal, particularly a firm from a segmented or emerging market, must first design a financial strategy that will attract international investors. This involves choosing among alternative paths to access global capital markets.
This chapter focuses on firms that reside in less liquid, segmented, or emerging markets. They are the ones that need to tap liquid and unsegmented markets in order to attain.
The financial theory of investment has been developed by James Duesenberry.
It is also known as the cost of capital theory of investment. The accelerator theories ignore the role of cost of capital in the investment decision by the firm.
They assume that the market rate of interest represents the cost of capital to the firm which does not change the amount of investment it makes. It means that unlimited funds are available to the firm at the market rate of interest. In other words, the supply of funds to the firm is very elastic. In reality, an unlimited supply of funds is not available to the firm in any time period at the market rate of interest.
As more and more funds are required by it for investment spending, the cost of funds (rate of interest) rises.
To finance investment spending, the firm may borrow in the market at whatever interest rate funds are available.
Discount rate for the valuation of your company or startupEquidam
Understanding discount rate: definition, formulas, importance for negotiation and useful sources to find the right one for the valuation of your company or startup.
Read more on: https://www.equidam.com/the-discount-rate-in-the-valuation-of-a-startup/
Curious about your discount rate and valuation? Sign up for free at at https://www.equidam.com/
· · · Must be a foreign film with subtitles· Provide you wit.docxLynellBull52
·
·
· Must be a foreign film with subtitles
· Provide you with a glimpse of what life is like in another culture
· The process of watching this movie or TV show should provide you with a unique cultural experience.
· Watch the movie or TV show that you selected, and use your reactions as part of your response to the following topic:
· Define ethnocentrism. Discuss how ethnocentrism affects individuals and societies.
Write a paper of 2–3 pages addressing the following:
· Provide a comprehensive overview of the concept of ethnocentrism.
· Use your cultural experience of watching the selected movie or TV show to discuss the effect of ethnocentrism on individuals and societies.
· Use any personal experiences that you may have had visiting different countries around the world as part of this paper; however, do not let your personal experiences with other cultures be the focal point of this paper.
· The focal point of the paper is your cultural experience watching the selected movie or TV show and your comprehensive overview of the concept of ethnocentrism.
· Please note that this paper is not intended to be a summary of the movie or TV show.
· This paper is not a book review or overview of the movie or TV show you selected.
· Focus on the cultural observations that you are able to make based on this experience and your discussion of the concept of ethnocentrism.
Please submit your assignment.
The following rubric will be used for grading:
Grading Rubric
Submission addresses content requirements
30%
Evidenced critical thinking and connection to real-world and assignment scenario applicability
40%
Justified ideas and responses by using appropriate examples and references from texts, Web sites, and other references or personal experience
20%
Adherence to assignment deadlines, length requirement, correct spelling and proper grammar, and properly formatted per APA style
10%
For assistance with your assignment, please use your text, Web resources, and all course materials. Please refer to the following multimedia course material(s):
· Unit 2: Social Interaction (Watch It)
· Unit 2: Social Interaction and Group Functioning
· Unit 2: Social Interaction (Answer It)
· Unit 2: Concepts in Sociology
· Unit 2: Social Groups and Organizations
Instructions
You and your teammates are working for a company as members of their management team.
Write a 1,300- to 1,500-word management plan that includes the following:
•Discuss the best methods that the management team can use to problem solve areas under consideration.
•Discuss how judgment is included in these processes.
•Provide an example in your plan.
Sources should include the course text and at least 1 peer-reviewed journal article.
Papers should adhere to APA style.
Problem Solving and Judgment
Everyday we’re faced with making a decision or decisions, some are life changing, and others may be derived from a policy or procedure that has little or no input from the individual that requires a judgment t.
· Identify the stakeholders and how they were affected by Heene.docxLynellBull52
· Identify the stakeholders and how they were affected by Heene's actions?
· 2. What stage of moral reasoning is exhibited by Richard Heene's actions? Do you believe the punishment fit the crime? Why or why not?
· 3. Explain how the cognitive-developmental approach influences one's ability to make ethical judgments.
4. How do you assess at what stage of moral development in Kohlberg's model you reason at in making decisions? Are you satisfied with that stage? Do you believe there are factors or forces preventing you from reasoning at a higher level? If so, what are they?
.
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docxLynellBull52
·
· Re: WEEK ONE - DISCUSSION QUESTION # 2
posted by DONALD DENNIS
Aug 19, 2014, 8:31 AM
Financial statements are crucial documents with details of what the company earns, how they earn, as well as what and how the company spends its money.
The income statement shows figures of profitability of that given company over a period of time. The statements usually include detailed sections of revenue, gains in addition to their expenses and losses. If revenue and gains are greater than expenses and losses, the income statement will show a profit for the company
The balance sheet provides information about the company's financial situation over a period of time. This information is used to make certain business decisions for future projects, plans or general business operations. The balance sheet includes more information than that of the income statement. This information included the company's assets, liabilities, in addition to the stockholders' equity (their investment). The assets should always equal liabilities, plus the stockholders investment(s).
· Comment on Aug 19, 2014, 6:52 PM
Re: WEEK ONE - DISCUSSION QUESTION # 2
posted by Linda Moore
Aug 19, 2014, 6:52 PM
Good! The income statement tells us what we've earned, our sales and expenses, and in the balance sheet we see our assets and liabilities, and owner's equity. The equity will also increase if we have net income and other investments from our owners. Our income statement tells us a lot especially when we compare months over time - we can see trends of expenses and revenues; and analyze what has changed.
Class: Any questions?
· Comment on Aug 20, 2014, 9:13 AM
2 Other Statements
posted by DONALD DENNIS
Aug 20, 2014, 9:13 AM
Other than the income and balance sheets, there are two other documents that are just as important. More about these will be mentioned in this week and class.
Owners equity statement - This shows and explains changes in the retained earnings. Retained earnings are on the balance sheet and will change due to incomes or dividends.
Cash flow statement - A company could be successful, yet lack cash to pay its bills. This will show sources of cash and where cash is being used.
· Comment on Aug 20, 2014, 11:36 AM
Re: 2 Other Statements
posted by Mark Pollack
Aug 20, 2014, 11:36 AM
Donald,
You bring up a great point about the cash flow statement. I was a small business owner in a retail strip center. I cant tell you how many conversations I had with fellow business owners that were struggling to pay there bills; however they showed a profit. The company used the money in various ways other than appropriately such as product that did not sell, decorations, "write-offs" for their home. I do believe that many small businesses fail because they are underfunded and do not use simple accounting principles to determine its health.
Mark
· Comment on Aug 21, 2014, 10:09 AM
Re: 2 Other Statements
posted by DONALD DENNIS
Aug 21, 2014, 10:09 AM
I curre.
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docxLynellBull52
· Week 3 Assignment
Government and Not-For-Profit Accounting
Value of Donated Assets
Which is the proper value to be assigned to certain donated assets? (This is a question for which answers cannot be found in either GASB pronouncements or the text), research is necessary.
A city’s road maintenance department received “donations” of two type of assets:
1. From the county in which the city is located it received earthmoving equipment. The equipment had cost the county $800,000 when it was acquired five years earlier. Accounted for in a county proprietary fund, its book value, net of accumulated depreciation at the time of donation, was $500,000. Its fair market value was $530,000.
2. From the city’s own utility fund (a proprietary fund) it received motor vehicles that had cost the city $400,000 when acquired three years earlier. At the time of transfer, the vehicles were recorded on the utility’s books at $180,000, net of accumulated depreciation. Their fair market value was #225,000.
Write a 1000 word, APA you answer style paper where the following:
1. At what value should the city record in its government-wide financial statements for: (1) the earth-moving equipment, and (2) the motor vehicles?
1. Briefly justify your response, commenting on any apparent inconsistencies in the values assigned to each of the two types of assets.
1. Comment on the significance of the resultant book values for decisions or assessments to be made by statement users.
Myth Clash Paper #1
Zheng Hui
The present paper will discuss how different ancient poets describe the myths. It will compare and Contrast the two versions of the myth of the Cyclops Polyphemus in the Archaic Greek poet Homer’s Odyssey (EH 298-314) and in the Hellenistic poet Theocritus' poem (Idyll 11) (ACM 399-401). It will also elaborate how Roman poet Ovid combine elements from each of these earlier poets’ versions to make his own version of the myth in his poem, the Metamorphoses (OM 374-381). In general, the paper will discuss and analyze the differences and similarities among several versions from different aspects including characters, features, techniques and others.
According to ancient Greek myth, there were three separate tribes of the mythical, one eyed giants known as Cyclops, or Cyclopes. One of them is the Ouranian Cyclopes, who was the offspring of Gaea and Ouranos. Besides, there is also another Cyclops called the mason-Cyclopes, who represents workers in Hephaestus’s forge. The third one is the shepherd-like Cyclopes, who was neighbors of the island-dwelling Polyphemus, who was a son of Poseidon (Weinstock, 2013). Based on the description of the Cyclopes in the ancient Greek myth, one feature that is present in all these Cyclopes is that they had one unique anatomy. In addition, they all had a single round eye in the middle of their foreheads. In fact, the eye, according to the Greek poet Hesiod, is the source of their name.
In Greek, Cyclops means “circle-eye.” These giants .
· Week 10 Assignment 2 Submission
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Click the link above to submit your assignment.
Assignment 2: Critical Thinking
Topic: "People have become overly dependent on technology"
Your paper should present a reasoned, convincing argument for a position on a selected topic.
Write a four to six (4-6) page paper in which you:
1. Follow the five (5) steps of persuasion: establishing credibility, acknowledging the audience’s position, constructing a rationale, transplanting root elements, and asking for a response.
2. Clearly define your position and supporting evidence.
3. Include all the necessary “evidence” for the reader to reach the expected conclusion in each argument in the paper (whether the overriding argument or one contained in an individual paragraph)
4. Ensure that each argument in the paper (whether the overriding argument or one contained in an individual paragraph) is valid and free from both formal and informal fallacies.
5. Include at least four (4) references (sources). At least one (1) of your sources must be obtained from the collection of databases accessible from the Learning Resources Center Web page.
The paper should follow guidelines for clear and effectively organized writing:
• The paper is well-organized, and every explanation is both complete and easy to understand.
• Include an introductory paragraph and concluding paragraph for the paper.
• Main ideas should be addressed in body paragraphs with a topic sentence and supporting sentences.
• Adhere to standard rules of English grammar, punctuation, and mechanics.
• The paper should be checked for spelling and grammatical errors.
Your assignment must:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Create written work utilizing the concepts of critical thinking.
• Use technology and information resources to research issues in critical thinking skills and informal logic.
• Write clearly and concisely about issues in critical thinking using proper writing mechanics.
.
· Write in paragraph format (no lists, bullets, or numbers).· .docxLynellBull52
· Write in paragraph format (no lists, bullets, or numbers).
· Do not re-write the question(s) from the assignment list.
· Ensure that you have a minimum of three (3) paragraphs.
· Each paragraph should be six (6) to eight (8) sentences each.
· Include at least one in-text citation per paragraph that corresponds to the References.
· You need to use and cite at least two (2) references for each submitted assignment, including DBs.
Remember we are in a college-level course. As such, you need to clearly and thoroughly answer every question asked in each project. This will rarely be accomplished with one or two sentences. In addition to providing a basic answer for each question, a quality response will explain:
a. “How” you arrived at your answer(s)
b. “What” facts and sources you reviewed and considered
c.“Why” your response is the best one from all the alternatives
SPE 352N Module 3 Lecture Instructional Strategies for Teaching Students With MR
When thinking about how to instruct students with mental retardation, educators must consider the fact that instructional organization and effective instructional delivery are the keys to success. Instruction is not just done in some sort of haphazard, discovery-learning manner without any particular goals in mind; rather, teachers should be thinking about their students' particular disability and their associated learning characteristics from start to finish.
Three Assumptions To Guide Instructional Delivery
Assumptions in science have to do with laying out ground rules or basic agreements about how something is to be interpreted, discussed, or studied by interested parties; it is much like setting the rules for playing a game. Similarly, teachers need basic assumptions to govern the science and practice of teaching. The first assumption teachers should come to agreement about is that due to the unique learning characteristics of students with mental retardation, instructional procedures that work well for typically developing students may not work as well with this population (Taylor, Richards, & Brady, 2005). The learning characteristics of students with mental retardation will ultimately affect what actual skills will be learned and what educational goals can realistically be attained. So while typically developing students will benefit from the global general education curriculum, the educational goals and specific skills students with mental retardation will focus on will depend heavily on the decisions of an individualized education plan (IEP) team as they consider the unique educational needs and monitor instructional progress over time (Miner & Bates, 1997).
The second assumption teachers of students with mental retardation should adhere to is that instructional progress can only be obtained if that instruction is direct and explicit. The idea that typically developing students do not need precise instruction to make academic gains is losing ground in America because s.
· WEEK 1 Databases and SecurityLesson· Databases and Security.docxLynellBull52
· WEEK 1: Databases and SecurityLesson
· Databases and Security
Databases are in just about everything we use today. When you are performing any task, think to yourself, Does this involve a database in some way?
As a daily process, communication occurs between people by many mediums, but there is no other medium more utilized than the large internetwork of computer systems we know as the Internet. When we look at some of the transactions that are performed on a daily basis, it is highly likely that there is a database involved. For example, if you open a web page to www.google.com and type a keyword in the textbox to search for, this process starts a series of searches through multiple databases. Another example is when searching for a book in the APUS library, this search is conducted using a database of books known as a catalog. so databases play an integral part in our daily lives; they store millions of pieces of data and more is collected each day (Basta, 2012).
In recent years, we find that technology has expanded to the reaches of utilities and production environments. Many of the utilities we come to rely on so heavily, such as gas, oil and electric, have been tied into the networks we use today. This interconnection allows for many new innovations in keeping everything in working order, but at the same time it also presents some very real threats to security. In reality, an intruder could take down an entire electrical grid which would remove power to millions of customers. An article in CIO Insight gives a great perspective on this and other issues in security where databases play such an important role (CIOInsight, 2011).
With the importance of securing the database infrastructure, we need to look at a multilayered approach to security. As can be seen in many security programs, multiple layers allow for strong security because it adds another roadblock that an intruder has to bypass to get to these systems. This same approach leads us to begin with the foundation of security; the CIA Triad. It all begins with the most basic approach, computer security and moves forward from that point on. Below is a detailed description of the components of the CIA Triad from (Basta, 2012):
· Confidentiality: For a system to provide confidentiality, it needs to do two things: ensure that information maintains its privacy by limiting authorized access to resources; block unauthorized access to resources.
· Integrity: This refers to the efforts taken through policy, procedure, and design in order to create and maintain reliable, consistent, and complete information and systems.
· Availability: This refers to the efforts taken through policy, procedures, and design to maintain the accessibility of resources on a network or within a database. These resources include, but are not limited to, data, applications, other databases, computers, servers, applications, files, drives, shares, and network access.
Database Structure, Models and Management
A databa.
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docxLynellBull52
· Unit 4 Citizen Rights
INTRODUCTION
In George Orwell's Animal Farm, the assertion that "all animals are equal but some animals are more equal than others" signals the breakdown of any semblance of a fair society. We have probably all experienced it: a situation where someone who was better connected, more influential, or in a position of power could advance far beyond the position or actions of the common person. On a typical day, this happens in travel, restaurant seating, the selection of a church pew, and the line at the grocery store.
It should not, however, happen in our public services. As citizens, we all have rights, and we all have the same rights. That is the beauty of the United States's democratic government structure, and perhaps one of the most cherished aspects of it. Economic and social diversity aside, when we interact with the government, we expect to receive the same treatment, whether we are a Rockefeller or a plumber. The reality is that this balance of citizen rights is difficult to achieve, because in many cases, those wielding power and influence attempt to trump equity.
TOGGLE DRAWERHIDE FULL INTRODUCTION
Inherent in the concept of citizenship is the exchange wherein citizens give allegiance to a nation and receive protection offered by that nation. Citizens therefore have certain privileges in the eyes of the nation, such as the right to vote, to pay taxes, and to refuse certain actions, such as reciting the Pledge of Allegiance because it refers to God. There are benefits and entitlements that the citizen can demand from the government. These rights are balanced by responsibilities, such as upholding the law, participating in government, and engaging in the same privileges previously mentioned.
In this unit, issues of the middle class, the welfare state, and what constitutes citizenship will be examined based on the concept of citizen rights.
Reference
Orwell, G. (1945). Animal Farm. New York, NY: Harcourt Brace & Company.
SANDRA CISNEROS
Woman Hollering Creek
The day Don Serafín gave Juan Pedro Martínez Sánchez permission to take CleófilasEnriquetaDeLeón Hernández as his bride, across her father’s threshold, over several miles of dirt road and several miles of paved, over one border and beyond to a town en el otrolado—on the other side—already did he divine the morning his daughter would raise her hand over her eyes, look south, and dream of returning to the chores that never ended, six good-for-nothing brothers, and one old man’s complaints.
He had said, after all, in the hubbub of parting: I am your father, I will never abandon you. He had said that, hadn’t he, when he hugged and then let her go. But at the moment Cleófilas was busy looking for Chela, her maid of honor, to fulfill their bouquet conspiracy. She would not remember her father’s parting words until later. I am your father, I will never abandon you.
Only now as a mother did she remember. Now, when she and Juan Pedrito sat by the creek’s edge..
More Related Content
Similar to · Respond to 3 posts listed below. Advance the conversation; provi.docx
Question 1Risk & Return and the CAPM. Based on the following.docxIRESH3
Question 1
Risk & Return and the CAPM.
Based on the following information, calculate the required return based on the CAPM:
Risk Free Rate = 3.5%
Market Return =10%
Beta = 1.08
Question 2
Risk and Return, Coefficient of Variation
Based on the following information, calculate the coefficient of variation and select the best investment based on the risk/reward relationship.
Std Dev.Exp. Return
Company A 7.4 13.2
Company B 11.6 18.9
Question 3
Risk and Return, Coefficient of Variation
Based on the following information, calculate the coefficient of variation and select the best investment based on the risk/reward relationship.
Std Dev.Exp. Return
Company A 10.4 15.2
· Company B 14.6 22.9
Question 4
Measures of Risk.
Address each source of risk that is measured and relate it to two models addressed in this unit.
· Your response should be at least 250 words in length.
BBA 3301, Financial Management 1
UNIT VI STUDY GUIDE
Risk and Return
Learning Objectives
Upon completion of this unit, students should be able to:
1. Explain the risk-reward relationship.
2. Calculate holding period returns.
3. Calculate required returns using the Capital Asset Pricing Model
(CAPM).
4. Calculate the coefficient of variation for varying investments.
5. Decompose sources of risk.
6. Contrast measures of risk.
7. Describe portfolio theory and diversification.
Written Lecture
Whenever a business or individual makes an investment decision, risk must be
considered. This unit focuses entirely on the risk-return relationship, providing
tools for measurement, analysis and decision making.
To begin, the term risk must be defined. From a practical or applied perspective,
risk is the probability of losing some or all of the money invested. In finance, risk
is often associated with volatility of variance in returns (around some average
return). Generally, it is assumed that investments that offer higher returns
involve greater risk. For purposes of this unit, risk is measured through two
primary measures:
Standard Deviation, and
The Beta Coefficient
The rate of return allows an investment's return to be compared with other
investments. For one-year investments, the return on a debt investment is:
k = interest paid / loan amount
The return on a stock investment is calculated by the following equation
k = [D1 + (P1 – P0)] / P0
Where:
D1 = Dividends for the “next” year (on a share of stock)
P1= Price of a share of stock, one period into the future
P0= Price of a share of stock today
The expected return on stock is the return investors feel is most likely to occur
based on current information. Return is influenced by the combination of stock
price (capita ...
Writing a 15 pages final paper, will be discussed in our 1st meeti.docxambersalomon88660
Writing a 15 pages final paper, will be discussed in our 1st meeting.
The final Paper and PowerPoint Presentation: Topic Analysis– 15 to 20 pages in APA format
Choose a topic in IT Project Management for your topic analysis. Email to your instructor a proposal of the topic area you intend to use for your topic analysis. Prepare a summary that identifies the major research threads in your topic. A reference list should be included in the summary. The topic should be relevant to your course material.
The professor will approve the topic of the project during the time when the class meets. E-mail the professor by week 2 with the topic for your final project. Email the professor a draft reference list by week 5. The Final Project will be a research report relevant to the selected topic. Your report will include an evolution of the chosen topic, the problems resolved or will be resolved, and future trends. The paper should have 5-7 academic references for each of these areas (published articles and/or textbook. The paper should be 15 to 20 pages in length and must be presented in the APA style, and is due during the last week of classes.
CHAPTER 14 Raising Equity and Debt Globally
Do what you will, the capital is at hazard. All that can be required of a trustee to invest, is, that he shall conduct himself faithfully and exercise a sound discretion. He is to observe how men of prudence, discretion, and intelligence manage their own affairs, not in regard to speculation, but in regard to the permanent disposition of their funds, considering the probable income, as well as the probable safety of the capital to be invested.
—Prudent Man Rule, Justice Samuel Putnam, 1830.
LEARNING OBJECTIVES
■Design a strategy to source capital equity globally
■Examine the potential differences in the optimal financial structure of the multinational firm compared to that of the domestic firm
■Describe the various financial instruments that can be used to source equity in the global equity markets
■Understand the different forms of foreign listings—depositary receipts—in U.S. markets
■Analyze the unique role private placement enjoys in raising global capital
■Evaluate the different goals and considerations relevant to a firm pursuing foreign equity listing and issuance
■Explore the different structures that can be used to source debt globally
Chapter 13 analyzed why gaining access to global capital markets should lower a firm’s cost of capital, increase its access to capital, and improve the liquidity of its shares by overcoming market segmentation. A firm pursuing this lofty goal, particularly a firm from a segmented or emerging market, must first design a financial strategy that will attract international investors. This involves choosing among alternative paths to access global capital markets.
This chapter focuses on firms that reside in less liquid, segmented, or emerging markets. They are the ones that need to tap liquid and unsegmented markets in order to attain.
The financial theory of investment has been developed by James Duesenberry.
It is also known as the cost of capital theory of investment. The accelerator theories ignore the role of cost of capital in the investment decision by the firm.
They assume that the market rate of interest represents the cost of capital to the firm which does not change the amount of investment it makes. It means that unlimited funds are available to the firm at the market rate of interest. In other words, the supply of funds to the firm is very elastic. In reality, an unlimited supply of funds is not available to the firm in any time period at the market rate of interest.
As more and more funds are required by it for investment spending, the cost of funds (rate of interest) rises.
To finance investment spending, the firm may borrow in the market at whatever interest rate funds are available.
Discount rate for the valuation of your company or startupEquidam
Understanding discount rate: definition, formulas, importance for negotiation and useful sources to find the right one for the valuation of your company or startup.
Read more on: https://www.equidam.com/the-discount-rate-in-the-valuation-of-a-startup/
Curious about your discount rate and valuation? Sign up for free at at https://www.equidam.com/
· · · Must be a foreign film with subtitles· Provide you wit.docxLynellBull52
·
·
· Must be a foreign film with subtitles
· Provide you with a glimpse of what life is like in another culture
· The process of watching this movie or TV show should provide you with a unique cultural experience.
· Watch the movie or TV show that you selected, and use your reactions as part of your response to the following topic:
· Define ethnocentrism. Discuss how ethnocentrism affects individuals and societies.
Write a paper of 2–3 pages addressing the following:
· Provide a comprehensive overview of the concept of ethnocentrism.
· Use your cultural experience of watching the selected movie or TV show to discuss the effect of ethnocentrism on individuals and societies.
· Use any personal experiences that you may have had visiting different countries around the world as part of this paper; however, do not let your personal experiences with other cultures be the focal point of this paper.
· The focal point of the paper is your cultural experience watching the selected movie or TV show and your comprehensive overview of the concept of ethnocentrism.
· Please note that this paper is not intended to be a summary of the movie or TV show.
· This paper is not a book review or overview of the movie or TV show you selected.
· Focus on the cultural observations that you are able to make based on this experience and your discussion of the concept of ethnocentrism.
Please submit your assignment.
The following rubric will be used for grading:
Grading Rubric
Submission addresses content requirements
30%
Evidenced critical thinking and connection to real-world and assignment scenario applicability
40%
Justified ideas and responses by using appropriate examples and references from texts, Web sites, and other references or personal experience
20%
Adherence to assignment deadlines, length requirement, correct spelling and proper grammar, and properly formatted per APA style
10%
For assistance with your assignment, please use your text, Web resources, and all course materials. Please refer to the following multimedia course material(s):
· Unit 2: Social Interaction (Watch It)
· Unit 2: Social Interaction and Group Functioning
· Unit 2: Social Interaction (Answer It)
· Unit 2: Concepts in Sociology
· Unit 2: Social Groups and Organizations
Instructions
You and your teammates are working for a company as members of their management team.
Write a 1,300- to 1,500-word management plan that includes the following:
•Discuss the best methods that the management team can use to problem solve areas under consideration.
•Discuss how judgment is included in these processes.
•Provide an example in your plan.
Sources should include the course text and at least 1 peer-reviewed journal article.
Papers should adhere to APA style.
Problem Solving and Judgment
Everyday we’re faced with making a decision or decisions, some are life changing, and others may be derived from a policy or procedure that has little or no input from the individual that requires a judgment t.
· Identify the stakeholders and how they were affected by Heene.docxLynellBull52
· Identify the stakeholders and how they were affected by Heene's actions?
· 2. What stage of moral reasoning is exhibited by Richard Heene's actions? Do you believe the punishment fit the crime? Why or why not?
· 3. Explain how the cognitive-developmental approach influences one's ability to make ethical judgments.
4. How do you assess at what stage of moral development in Kohlberg's model you reason at in making decisions? Are you satisfied with that stage? Do you believe there are factors or forces preventing you from reasoning at a higher level? If so, what are they?
.
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docxLynellBull52
·
· Re: WEEK ONE - DISCUSSION QUESTION # 2
posted by DONALD DENNIS
Aug 19, 2014, 8:31 AM
Financial statements are crucial documents with details of what the company earns, how they earn, as well as what and how the company spends its money.
The income statement shows figures of profitability of that given company over a period of time. The statements usually include detailed sections of revenue, gains in addition to their expenses and losses. If revenue and gains are greater than expenses and losses, the income statement will show a profit for the company
The balance sheet provides information about the company's financial situation over a period of time. This information is used to make certain business decisions for future projects, plans or general business operations. The balance sheet includes more information than that of the income statement. This information included the company's assets, liabilities, in addition to the stockholders' equity (their investment). The assets should always equal liabilities, plus the stockholders investment(s).
· Comment on Aug 19, 2014, 6:52 PM
Re: WEEK ONE - DISCUSSION QUESTION # 2
posted by Linda Moore
Aug 19, 2014, 6:52 PM
Good! The income statement tells us what we've earned, our sales and expenses, and in the balance sheet we see our assets and liabilities, and owner's equity. The equity will also increase if we have net income and other investments from our owners. Our income statement tells us a lot especially when we compare months over time - we can see trends of expenses and revenues; and analyze what has changed.
Class: Any questions?
· Comment on Aug 20, 2014, 9:13 AM
2 Other Statements
posted by DONALD DENNIS
Aug 20, 2014, 9:13 AM
Other than the income and balance sheets, there are two other documents that are just as important. More about these will be mentioned in this week and class.
Owners equity statement - This shows and explains changes in the retained earnings. Retained earnings are on the balance sheet and will change due to incomes or dividends.
Cash flow statement - A company could be successful, yet lack cash to pay its bills. This will show sources of cash and where cash is being used.
· Comment on Aug 20, 2014, 11:36 AM
Re: 2 Other Statements
posted by Mark Pollack
Aug 20, 2014, 11:36 AM
Donald,
You bring up a great point about the cash flow statement. I was a small business owner in a retail strip center. I cant tell you how many conversations I had with fellow business owners that were struggling to pay there bills; however they showed a profit. The company used the money in various ways other than appropriately such as product that did not sell, decorations, "write-offs" for their home. I do believe that many small businesses fail because they are underfunded and do not use simple accounting principles to determine its health.
Mark
· Comment on Aug 21, 2014, 10:09 AM
Re: 2 Other Statements
posted by DONALD DENNIS
Aug 21, 2014, 10:09 AM
I curre.
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docxLynellBull52
· Week 3 Assignment
Government and Not-For-Profit Accounting
Value of Donated Assets
Which is the proper value to be assigned to certain donated assets? (This is a question for which answers cannot be found in either GASB pronouncements or the text), research is necessary.
A city’s road maintenance department received “donations” of two type of assets:
1. From the county in which the city is located it received earthmoving equipment. The equipment had cost the county $800,000 when it was acquired five years earlier. Accounted for in a county proprietary fund, its book value, net of accumulated depreciation at the time of donation, was $500,000. Its fair market value was $530,000.
2. From the city’s own utility fund (a proprietary fund) it received motor vehicles that had cost the city $400,000 when acquired three years earlier. At the time of transfer, the vehicles were recorded on the utility’s books at $180,000, net of accumulated depreciation. Their fair market value was #225,000.
Write a 1000 word, APA you answer style paper where the following:
1. At what value should the city record in its government-wide financial statements for: (1) the earth-moving equipment, and (2) the motor vehicles?
1. Briefly justify your response, commenting on any apparent inconsistencies in the values assigned to each of the two types of assets.
1. Comment on the significance of the resultant book values for decisions or assessments to be made by statement users.
Myth Clash Paper #1
Zheng Hui
The present paper will discuss how different ancient poets describe the myths. It will compare and Contrast the two versions of the myth of the Cyclops Polyphemus in the Archaic Greek poet Homer’s Odyssey (EH 298-314) and in the Hellenistic poet Theocritus' poem (Idyll 11) (ACM 399-401). It will also elaborate how Roman poet Ovid combine elements from each of these earlier poets’ versions to make his own version of the myth in his poem, the Metamorphoses (OM 374-381). In general, the paper will discuss and analyze the differences and similarities among several versions from different aspects including characters, features, techniques and others.
According to ancient Greek myth, there were three separate tribes of the mythical, one eyed giants known as Cyclops, or Cyclopes. One of them is the Ouranian Cyclopes, who was the offspring of Gaea and Ouranos. Besides, there is also another Cyclops called the mason-Cyclopes, who represents workers in Hephaestus’s forge. The third one is the shepherd-like Cyclopes, who was neighbors of the island-dwelling Polyphemus, who was a son of Poseidon (Weinstock, 2013). Based on the description of the Cyclopes in the ancient Greek myth, one feature that is present in all these Cyclopes is that they had one unique anatomy. In addition, they all had a single round eye in the middle of their foreheads. In fact, the eye, according to the Greek poet Hesiod, is the source of their name.
In Greek, Cyclops means “circle-eye.” These giants .
· Week 10 Assignment 2 Submission
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Click the link above to submit your assignment.
Assignment 2: Critical Thinking
Topic: "People have become overly dependent on technology"
Your paper should present a reasoned, convincing argument for a position on a selected topic.
Write a four to six (4-6) page paper in which you:
1. Follow the five (5) steps of persuasion: establishing credibility, acknowledging the audience’s position, constructing a rationale, transplanting root elements, and asking for a response.
2. Clearly define your position and supporting evidence.
3. Include all the necessary “evidence” for the reader to reach the expected conclusion in each argument in the paper (whether the overriding argument or one contained in an individual paragraph)
4. Ensure that each argument in the paper (whether the overriding argument or one contained in an individual paragraph) is valid and free from both formal and informal fallacies.
5. Include at least four (4) references (sources). At least one (1) of your sources must be obtained from the collection of databases accessible from the Learning Resources Center Web page.
The paper should follow guidelines for clear and effectively organized writing:
• The paper is well-organized, and every explanation is both complete and easy to understand.
• Include an introductory paragraph and concluding paragraph for the paper.
• Main ideas should be addressed in body paragraphs with a topic sentence and supporting sentences.
• Adhere to standard rules of English grammar, punctuation, and mechanics.
• The paper should be checked for spelling and grammatical errors.
Your assignment must:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Create written work utilizing the concepts of critical thinking.
• Use technology and information resources to research issues in critical thinking skills and informal logic.
• Write clearly and concisely about issues in critical thinking using proper writing mechanics.
.
· Write in paragraph format (no lists, bullets, or numbers).· .docxLynellBull52
· Write in paragraph format (no lists, bullets, or numbers).
· Do not re-write the question(s) from the assignment list.
· Ensure that you have a minimum of three (3) paragraphs.
· Each paragraph should be six (6) to eight (8) sentences each.
· Include at least one in-text citation per paragraph that corresponds to the References.
· You need to use and cite at least two (2) references for each submitted assignment, including DBs.
Remember we are in a college-level course. As such, you need to clearly and thoroughly answer every question asked in each project. This will rarely be accomplished with one or two sentences. In addition to providing a basic answer for each question, a quality response will explain:
a. “How” you arrived at your answer(s)
b. “What” facts and sources you reviewed and considered
c.“Why” your response is the best one from all the alternatives
SPE 352N Module 3 Lecture Instructional Strategies for Teaching Students With MR
When thinking about how to instruct students with mental retardation, educators must consider the fact that instructional organization and effective instructional delivery are the keys to success. Instruction is not just done in some sort of haphazard, discovery-learning manner without any particular goals in mind; rather, teachers should be thinking about their students' particular disability and their associated learning characteristics from start to finish.
Three Assumptions To Guide Instructional Delivery
Assumptions in science have to do with laying out ground rules or basic agreements about how something is to be interpreted, discussed, or studied by interested parties; it is much like setting the rules for playing a game. Similarly, teachers need basic assumptions to govern the science and practice of teaching. The first assumption teachers should come to agreement about is that due to the unique learning characteristics of students with mental retardation, instructional procedures that work well for typically developing students may not work as well with this population (Taylor, Richards, & Brady, 2005). The learning characteristics of students with mental retardation will ultimately affect what actual skills will be learned and what educational goals can realistically be attained. So while typically developing students will benefit from the global general education curriculum, the educational goals and specific skills students with mental retardation will focus on will depend heavily on the decisions of an individualized education plan (IEP) team as they consider the unique educational needs and monitor instructional progress over time (Miner & Bates, 1997).
The second assumption teachers of students with mental retardation should adhere to is that instructional progress can only be obtained if that instruction is direct and explicit. The idea that typically developing students do not need precise instruction to make academic gains is losing ground in America because s.
· WEEK 1 Databases and SecurityLesson· Databases and Security.docxLynellBull52
· WEEK 1: Databases and SecurityLesson
· Databases and Security
Databases are in just about everything we use today. When you are performing any task, think to yourself, Does this involve a database in some way?
As a daily process, communication occurs between people by many mediums, but there is no other medium more utilized than the large internetwork of computer systems we know as the Internet. When we look at some of the transactions that are performed on a daily basis, it is highly likely that there is a database involved. For example, if you open a web page to www.google.com and type a keyword in the textbox to search for, this process starts a series of searches through multiple databases. Another example is when searching for a book in the APUS library, this search is conducted using a database of books known as a catalog. so databases play an integral part in our daily lives; they store millions of pieces of data and more is collected each day (Basta, 2012).
In recent years, we find that technology has expanded to the reaches of utilities and production environments. Many of the utilities we come to rely on so heavily, such as gas, oil and electric, have been tied into the networks we use today. This interconnection allows for many new innovations in keeping everything in working order, but at the same time it also presents some very real threats to security. In reality, an intruder could take down an entire electrical grid which would remove power to millions of customers. An article in CIO Insight gives a great perspective on this and other issues in security where databases play such an important role (CIOInsight, 2011).
With the importance of securing the database infrastructure, we need to look at a multilayered approach to security. As can be seen in many security programs, multiple layers allow for strong security because it adds another roadblock that an intruder has to bypass to get to these systems. This same approach leads us to begin with the foundation of security; the CIA Triad. It all begins with the most basic approach, computer security and moves forward from that point on. Below is a detailed description of the components of the CIA Triad from (Basta, 2012):
· Confidentiality: For a system to provide confidentiality, it needs to do two things: ensure that information maintains its privacy by limiting authorized access to resources; block unauthorized access to resources.
· Integrity: This refers to the efforts taken through policy, procedure, and design in order to create and maintain reliable, consistent, and complete information and systems.
· Availability: This refers to the efforts taken through policy, procedures, and design to maintain the accessibility of resources on a network or within a database. These resources include, but are not limited to, data, applications, other databases, computers, servers, applications, files, drives, shares, and network access.
Database Structure, Models and Management
A databa.
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docxLynellBull52
· Unit 4 Citizen Rights
INTRODUCTION
In George Orwell's Animal Farm, the assertion that "all animals are equal but some animals are more equal than others" signals the breakdown of any semblance of a fair society. We have probably all experienced it: a situation where someone who was better connected, more influential, or in a position of power could advance far beyond the position or actions of the common person. On a typical day, this happens in travel, restaurant seating, the selection of a church pew, and the line at the grocery store.
It should not, however, happen in our public services. As citizens, we all have rights, and we all have the same rights. That is the beauty of the United States's democratic government structure, and perhaps one of the most cherished aspects of it. Economic and social diversity aside, when we interact with the government, we expect to receive the same treatment, whether we are a Rockefeller or a plumber. The reality is that this balance of citizen rights is difficult to achieve, because in many cases, those wielding power and influence attempt to trump equity.
TOGGLE DRAWERHIDE FULL INTRODUCTION
Inherent in the concept of citizenship is the exchange wherein citizens give allegiance to a nation and receive protection offered by that nation. Citizens therefore have certain privileges in the eyes of the nation, such as the right to vote, to pay taxes, and to refuse certain actions, such as reciting the Pledge of Allegiance because it refers to God. There are benefits and entitlements that the citizen can demand from the government. These rights are balanced by responsibilities, such as upholding the law, participating in government, and engaging in the same privileges previously mentioned.
In this unit, issues of the middle class, the welfare state, and what constitutes citizenship will be examined based on the concept of citizen rights.
Reference
Orwell, G. (1945). Animal Farm. New York, NY: Harcourt Brace & Company.
SANDRA CISNEROS
Woman Hollering Creek
The day Don Serafín gave Juan Pedro Martínez Sánchez permission to take CleófilasEnriquetaDeLeón Hernández as his bride, across her father’s threshold, over several miles of dirt road and several miles of paved, over one border and beyond to a town en el otrolado—on the other side—already did he divine the morning his daughter would raise her hand over her eyes, look south, and dream of returning to the chores that never ended, six good-for-nothing brothers, and one old man’s complaints.
He had said, after all, in the hubbub of parting: I am your father, I will never abandon you. He had said that, hadn’t he, when he hugged and then let her go. But at the moment Cleófilas was busy looking for Chela, her maid of honor, to fulfill their bouquet conspiracy. She would not remember her father’s parting words until later. I am your father, I will never abandon you.
Only now as a mother did she remember. Now, when she and Juan Pedrito sat by the creek’s edge..
· Unit Interface-User Interaction· Assignment Objectives Em.docxLynellBull52
· Unit: Interface-User Interaction
· Assignment Objectives: Employ appropriate tools and methods for simple, functional, and effective interfaces.
· Deliverable Length: Screenshot or functional application, and a Word document of 1-2 pages
Building on your initial user interface (UI) design mock-up of the organization’s program UI, the interface now needs to present more information to the user. Complete the following for this assignment:
· The interface should present information visually with icons or graphics and text regarding critical issues related to the system, such as the following:
· New orders
· Change in employee status
· Updated pictures
· New products or services offered
· You must add at least 5 critical issue UI design items to your interface. Remember to ensure that these are easily understood by users.
· Submit a screenshot in Word or another functional application.
· Describe the items that you added to your interface design. Be specific with your descriptions, and identify the particular design features along with an explanation of why they are added in the way that they were.
.
· The Victims’ Rights MovementWrite a 2 page paper. Address the.docxLynellBull52
· The Victims’ Rights Movement
Write a 2 page paper. Address the following in your paper:
· Explain how has the victims’ rights movement has affected the criminal justice system and the rights of offenders?
Include a title page and 3-5 references. Only one reference may be from the internet (not Wikipedia).
Paper 2
· Victim Selection
Write a 2 page paper. Address the following in your paper:
· Is the victim selection process different between team serial killers and those who work alone?
· Discuss any differences and or similarities as it relates to motives, methods, and offender history.
· Support your argument. Be sure to cite your resource(s), use APA style formatting.
Include a title page and 3-5 references. Only one reference may be from the internet (not Wikipedia
Paper 3
· Credit Card Crime
In a two to three page paper, please discuss the following: Assume a person accidentally picks up a credit card that is not theirs and uses the card in several instances.
Can the person be charged with multiple violations of a state statute that makes it a crime to "knowingly obtain, possess, use, or transfer a means of identification or financial information of another?" Why or why not? See State vs. Leyda, 138 P.3d 610 (Wash. 2006).
Make sure you format your paper and cite all sources used in this paper appropriately according to APA style guidelines.
.
· Question 1· · How does internal environmental analy.docxLynellBull52
· Question 1
·
·
How does internal environmental analysis help health care organizations sustain competitive advantage? As a health care leader, what are some of the key aspects that you will assess in conducting your own internal environmental analysis?
Question 2
· How does the “value chain” relate to health care organizations? What is the role of the value chain in the strategic planning process?
Question 3
· How can the value chain be used to identify organizational strengths and weaknesses in health care organizations?
· Question 4
·
Read the Perspective 4-3–LEAN Six Sigma on page 140 in your textbook Discuss the Ottawa Ankle Rules as an example of Six Sigma utilization. How was Six Sigma beneficial in this case example? Think about your own health care organization or one which you hope to lead. How might Six Sigma be utilized in your own facility, as our colleagues in Ottawa did a few years ago?
ATT00001
ATT00002
ATT00003
ATT00004
ATT00005
Clarence_Eder_Biography_(Jan_2015) (1).pdf
BIOGRAPHY: CLARENCE L. EDER (January 2015)
Clarence Eder is a retired United States Air Force officer and is currently working as Principal Acquisition
Associate and Senior Systems Engineer for Quantech Services, Inc. in El Segundo, California. He leads a team
of systems engineers and acquisition professionals in the development of strategies and documents to start the
new Air Force Weather Systems Follow-On (WSF) program. Clarence has over 18 years of acquisitions,
engineering, and operational experience in space, intelligence, missile defense, and aircraft programs.
Clarence was raised in Honolulu, Hawaii. He graduated with a Mechanical Engineering degree from the
University of Hawaii and was commissioned into the Air Force in 1996. As a second lieutenant, he was
assigned to Wright-Patterson Air Force Base in Dayton, Ohio. He worked to improve Air Force flying training
systems, and then became a project manager to improve T-37 aircraft engines and A-10 aircraft engines.
In 1999, he was assigned to Space and Missiles Systems Center in Los Angeles, California. He worked as an
Acquisition Support manager to implement Department of Defense (DoD) processes and policies to major space
programs. As a captain, he became a Mission Integration Manager for launch vehicles. He led teams to
integrate Global Positioning System (GPS), weather, and intelligence satellites into the newly acquired $18.8B
Air Force rockets. He also worked Ground systems integration issues.
In 2003, he was assigned to the National Geospatial Intelligence Agency (NGA) in Reston, Virginia to be Chief
of Tactical Imagery Dissemination. He led a team to develop, test, and deploy a $17M imagery system. He
trained Navy Seals and Special Forces deployed worldwide to use the system. As a major, he became a
Contacting Officer Technical Representative (COTR) for the $2B Geoscout program, NG.
· Question 1Question 192 out of 2 pointsWhat file in the.docxLynellBull52
· Question 1Question 19
2 out of 2 points
What file in the etc/ directory contains user’s hashed password?
Selected Answer:
etc/shadow file
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 20
1 out of 2 points
What file and file-field are read by the finger command?
Selected Answer:
Passwd file, it reads user id info like user name phone number and so on
Correct Answer:
[None]
Response Feedback:
gecos field
· Question 21
0 out of 2 points
When a parent process dies, what happens to any child processes that are still running?
Selected Answer:
They Child Processes keep running
Correct Answer:
[None]
Response Feedback:
process becomes child of init
· Question 22
1 out of 2 points
What is the effect of the command: $ killall root (Where root is the root account of the system)
Selected Answer:
It canceles all the Processes that the user
Correct Answer:
[None]
Response Feedback:
shutdown
· Question 23
2 out of 2 points
List 4 shortcomings of root accounts.
Selected Answer:
1- Single Point of failure if compromised
2-The security model is not strong enough for a network
3-High security environments enforce rules that cannot be implemented with traditional UNIX
4- Since some rules are implemented in command code, modification requires rewrite and recompilation
5- Minimal support for auditing
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 24
1 out of 2 points
Write a BASH command that would force the OS into single-user mode.
Selected Answer:
Root should run the init command to change the run level using the letter s or the number 1 for example
Correct Answer:
[None]
Response Feedback:
telinit 1
· Question 25
0 out of 2 points
Explain when it would be necessary to use the non-rewinding interface file of any backup device.
Selected Answer:
To implement permanent changes to the backup device
Correct Answer:
[None]
Response Feedback:
Only if multiple dumps were being made to the same tape drive. Failure to use the non-rewind would cause successive dumps to overwrite each other.
· Question 26
2 out of 2 points
What BASH shell command can send any signal level to a running process?
Selected Answer:
Kill Command
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 27
2 out of 2 points
Which two inter-process signals cannot be caught or blocked?
Selected Answer:
Kill process
Stop Process
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 28
2 out of 2 points
What BASH shell utility allows you to monitor CPU and memory usage?
Selected Answer:
Network Monitoring: Netstat, nethogs, iptraf, iftop
Disk I/O: iotop
CPU/ memory: top, Ps, htop, atop
Correct Answer:
[None]
Response Feedback:
[None Given]
· Question 29
0 out of 2 points
In the file permission listing drwxr-xr-x, what is the file type?
Selected Answer:
.sh
Correct Answer:
[None]
Response Feedback:
directory
· .
· Question 15 out of 5 pointsWhen psychologists discuss .docxLynellBull52
· Question 1
5 out of 5 points
When psychologists discuss fear, anger, sadness, joy, surprise, disgust, and contempt, they are usually describing the:
Answer
Selected Answer:
b.
primary emotions
· Question 2
5 out of 5 points
Studies on sex differences in emotion have found that men are more likely to ruminate about _____________ thoughts whereas women are more likely to ruminate about ____________.
Answer
Selected Answer:
a.
anger; depression
· Question 3
5 out of 5 points
Positive emotions evoke more electrical activity in the __________, and negative emotions evoke more activity in the __________.
Answer
Selected Answer:
c.
left hemisphere; right hemisphere
· Question 4
5 out of 5 points
What limbic structure is a center for fear responses?
Answer
Selected Answer:
b.
amygdala
· Question 5
5 out of 5 points
Imagine that you have just discovered a space craft that landed in a remote field near your home. Fortunately, the aliens aboard the space craft share your language, but they do not know anything about how to interact appropriately within the cultural norms of North America. Using your knowledge of emotions and emotional expression, create a list of 5 important points to remember when expressing emotion in this culture.
Answer
Selected Answer:
Smiling Frequently is ok
Dont kiss other male friends if male (european countries)
shake hands before hugging
Arms length of space between people, it can be seen as hostile or uncomfortable otherwise
Public displays of affection are often more acceptable then in other cultures
· Question 6
0 out of 5 points
Cindy used to study with her friend Amanda but found that she had to quit studying with her because Amanda was always so hyper and anxious before taking tests. Cindy often felt anxious after the study sessions and was worried that this might have a negative influence on her test performance. Cindy was probably experiencing:
Answer
Selected Answer:
c.
catharsis.
· Question 7
5 out of 5 points
Social and cultural rules that regulate when, how, and where a person may express emotions are referred to as:
Answer
Selected Answer:
c.
display rules
· Question 8
5 out of 5 points
Why are polygraph tests considered invalid or unreliable?
Answer
Selected Answer:
d.
There is no pattern of physical arousal that is specific to lying and distinct from other types of arousal
· Question 9
5 out of 5 points
This term is the process by which the facial muscles send messages to the brain about the basic emotion being expressed.
Answer
Selected Answer:
c.
facial feedback
· Question 10
5 out of 5 points
___________, or how we explain events or behavior, affect our emotional responses.
Answer
Selected Answer:
a.
Attributions
· Question 11
0 out of 5 points
In one study, infants were put on a modified version of a visual cliff that is only moderately frightening because the cliff did not dr.
· Question 1 2 out of 2 pointsWhich of the following i.docxLynellBull52
· Question 1
2 out of 2 points
Which of the following is not considered a union unfair labor practice?
Answer
Selected Answer:
under a valid union-shop agreement, demanding the discharge of an employee who fails to pay union dues
· Question 2
2 out of 2 points
In recent years,
Answer
Selected Answer:
all of the above
· Question 3
0 out of 2 points
The first U.S. President ever to grant official recognition to federal government employees to bargain collectively was President
Answer
Selected Answer:
Nixon
· Question 4
0 out of 2 points
Recent media campaign ads by the Automobile Workers have contained the message
Answer
Selected Answer:
"America works best when we say, 'Union, Yes!' "
· Question 5
0 out of 2 points
Most of the local union's time is devoted to
Answer
Selected Answer:
negotiating labor agreements.
· Question 6
0 out of 2 points
Most members of the National Education Association
Answer
Selected Answer:
support right-to-work laws
· Question 7
0 out of 2 points
About 85 percent of the UAW's spending goes to
Answer
Selected Answer:
strike funds.
· Question 8
0 out of 2 points
As compared to the Teachers, many of the building trades are much
Answer
Selected Answer:
less active in research efforts.
· Question 9
0 out of 2 points
In 1970, an unprecedented federal sector eight-day strile was carried on by the employees of the
Answer
Selected Answer:
State Department
· Question 10
2 out of 2 points
The American Federation of Labor was originally entitled the
Answer
Selected Answer:
Federation of Organized Trades and Labor Unions
· Question 11
0 out of 2 points
Under Taft-Hartley, if management or labor wishes to terminate or modify an existing labor contract, it must give a
Answer
Selected Answer:
thrity-day notice to the other party.
· Question 12
0 out of 2 points
At present, the unionized percentage of all United States workers is approximately
Answer
Selected Answer:
33.4
· Question 13
0 out of 2 points
In 1993, the Retail, Wholesale and Department Store Union merged with the
Answer
Selected Answer:
Service Employees International Union.
· Question 14
0 out of 2 points
By 1917 some thrity states had introduced
Answer
Selected Answer:
antitrust laws for unions.
· Question 15
0 out of 2 points
Investigation of union misconduct under the Landrum-Griffin is the responsibility of the
Answer
Selected Answer:
Senate Subcommittee on Ethics.
· Question 16
0 out of 2 points
COPE is a part of the
Answer
Selected Answer:
Furriers.
· Question 17
0 out of 2 points
When it has found that employees have been unlawfully discharged for union activities, the NLRB has most frequently required
Answer
Selected Answer:
automatic union certification.
· Question 18
2 out of 2 points
Employ.
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
· Processed on 09-Dec-2014 9:01 PM CST
· ID: 488406360
· Word Count: 1969
Similarity Index
47%
Similarity by Source
Internet Sources:
46%
Publications:
2%
Student Papers:
N/A
sources:
1
30% match (Internet from 27-Mar-2009)
http://www.isaca.org/Content/ContentGroups/Journal1/20023/The_IS_Audit_Process.htm
2
13% match (Internet from 29-Mar-2011)
http://www.scribd.com/doc/36655995/Chapter-1-the-Information-System-Audit-Process
3
2% match (publications)
Athula Ginige. "Web site auditing", Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE 02 SEKE 02, 2002
4
1% match (Internet from 26-Feb-2012)
http://www.dc.fi.udc.es/~parapar/files/ai/The_IS_Audit_Process_isaca_sayana.pdf
5
1% match (Internet from 01-Apr-2009)
http://www.idkk.gov.tr/web/guest/it_audit_manual_isaca
paper text:
Running head: AUDITING INFORMATION SYSTEMS PROCESS Auditing information systems process Student’s Name University Affiliation Auditing information systems 2process Information systems are the livelihood of any huge business. As in past years, computer systems do not simply record transactions of business, but essentially drive the main business procedures of the enterprise. In such a situation, superior management and business managers do have worries concerning information systems. Auditing is a methodical process by which a proficient, independent person impartially obtains and assesses evidence concerning assertions about a financial entity or occasion for the reason of outlining an outlook about and reporting on the extent to which the contention matches to an acknowledged set of standards. Auditing of information systems is the administration controls assessment inside the communications of Information Technology. The obtained proof valuation is used to decide if systems of information are defensive assets, maintenance reliability of data, and also if they are efficiently operating in order to attain organization’s goals or objectives (Hoelzer, 2009). Auditing of Information Systems has become an essential part of business organization in both large and small business environments. This paper examines the preliminary points for carrying out and Information system audit and some of the, techniques, tools, guidelines and standards that can be employed to build, manage, and examine the review function. The Certified Information Systems Auditor (CISA) qualifications is recognized worldwide as a standard of accomplishment for those who assess, monitor, control and audit the information technology of an organization and business systems. Information Systems experts with a concern in information systems security, control and audit. At least five years of specialized information systems security, auditing and control work practice is necessary for certification. An audit contract should be present to evidently state the responsibility of the management, 2objectives for, and designation of authority to Information .
· Strengths Public Recognition of OrganizationOverall Positive P.docxLynellBull52
· Strengths Public Recognition of Organization
Overall Positive Perception of Organization
Established Integrity and Longevity of the Organizations
Continued success in saving lives and always willing to lend a helping hand
Weaknesses
Lack of Congruency of public and internal views
Commitment to service to the public overlooks the work environment of the employees that make these endeavors possible daily
Opportunities
Disaster relief is always a turning point for anyone’s perception of the organization especially when it hits close to home
Threats
Possibility of not being able to help someone due to lack in financial or physical resources
Understanding that it’s impossible to please everyone, there could be some bad experiences that are communicated to many tarnishing the positive perception of the brand
Strengths with Opportunities
Increasing amount of volunteers and assistance of employees on a continual basis in order to secure definite support in the face of a disaster
Weaknesses with Threats
Increase and expand awareness of employees concerns through surveys and group discussions in order to increase the morale of the organization.
Strengths with Threats
With understanding the necessity of all aspects of the organization needing to be congruent, implementing and ensuring that public and employees all hold the same values to be true simultaneously through continued efforts of the organization increasing the involvement of the employees in minor decision making abilities in order to feel as if the organization is less of a dictatorship and slightly reflective of a democracy
Weaknesses with Opportunities
Increasing awareness of the severity of a need for this organization in the country due to the lack of ability by the country alone
.
· Part I Key Case SummaryThis case discusses the Union Carbid.docxLynellBull52
· Part I: Key
Case Summary
This case discusses the Union Carbide gas leak that occurred in Bhopal, India in 1984. Over five thousand people were killed and hundreds of thousands were injured after water inadvertently mixed with methyl isocyanate (MIC) causing the release of a deadly gas. The plant in Bhopal was a pesticide production facility that served the increasing demand of India’s thriving farming industry. However, uncontrolled zoning allowed the plant to be built within close proximity to a densely populated region. While the plant was initially profitable, market changes negatively impacted revenue forcing budget cuts that led to the decay of maintenance and safety practices. There are several theories as to why the incident occurred such as a disgruntled employee’s maliciousness or an accidental contamination. Over several years, Union Carbide paid out hundreds of millions of dollars to the survivors and ultimately ceased to exist, while the community continues to struggle with the aftermath of the disaster.
Main Critical Issues (the list):
· India’s officials adopted careless zoning practices and allowed the construction of the plant near dense population.
· The proper safety procedures were not followed and the equipment was not being properly utilized as designed. UCIL managers placed a higher weight on cost cutting than on safety, resulting in the reduction of maintenance and safety practices.
· Union Carbide Corp. did not require frequent reporting from its subsidiary in India (UCIL), which allowed malpractices and unsafe systems in the Bhopal plant to go unnoticed.
· Union Carbide Corporation and UCIL had an ethical obligation to warn the surrounding community of potential dangers of living close to the pesticide plant
· If the case, the disgruntled employees action to sabotage the plant to take vengeance
· Employees and supervisors in the Bhopal plant did not follow numerous policies and routines that could have prevented the tragedy (e.g. acting upon the alarming increase in the tank pressure, instead of postponing it to after the tea break).
· The residents were not informed of what actions to take in the event of a toxic leak or accident.
· The employees did not use the emergency buses to evacuate surrounding residents.
·
Part II: Key
Stakeholders:
The following are the stakeholders in the case: The Union Carbide’s Corporation Stockholders, The Bhopal’s population, The Indian Government, The Bombay Stock Exchange, The Union Carbide’s workers from de Indian subsidiary “UCIL”. The workers from Union Carbide headquarter in Connecticut, The Board of Directors of Union Carbide Headquarter, and The Board of Directors from Union Carbide’s Indian subsidiary. The American and Indian lawyers. UCIL’s Executives. Carbides’ Scientifics. Indian Scientists and engineers. Indian Court Systems. Insurance company. Indian Public. Corrupts Physicians. Corrupts Court Officials. Bhopal Congress. Chemical Industry. Dow Chemical. The Activis.
· Perceptual process is a process through manager receive organize.docxLynellBull52
· Perceptual process is a process through manager receive organize and interpret information. According to this case, after Andrea decided quit this job, Sam chose Grant for the manager position from three candidates, even he is not very suitable for this position, because Sam strongly believes the manager have to be a full time based on previous customer experience(He believed that you can’t be a part time manager and that his customers would think Vibe was not a serious company if he appointed a part time manager for marketing and public relations-Sam Nguyen) Moreover Sam thought Grant could Increase himself-awareness to achieve demonstrate good relationship with customer.
· Job satisfaction is a collection of positive or negative felling that an individual holds toward their job. In this case, Andrea is a good example of having a negative felling of her job. ( Sam’s only criticism of her was that she seemed to live to work). Because Sam does not care about the employee satisfaction, Andrea can not get more spiritual benefit even get good salary. People may have different level of the job satisfaction. In this case, Andrea work long hours, she may feel very stressful, she is happy with cognitive job satisfaction, but not with the affective job satisfaction.
LIBRARY USE
lllillllllllllllll LA TROBE UNIVERSITY
3 2934 02374381 0
SEMESTER TWO EXAMINATION PERIOD
2010
student ID: Seat Number:
Unit Code: LST2LBA
Unit Name:
Paper Name:
Reading Time:
Writing Time:
Paper No: 1
Law of Business Association
Final
30 minutes
3 hours
No. of Pages (including cover sheet): 9
OFFICE USE ONLY (FACULTY/SCHOOL STAFF):
CAMPUS AW BE BU MI SH
Number
102
92
ALLOWABLE MATERIALS
Description
Open book, including electronic dictionary
Students may make notes during reading time (not on script books or multiple
choice answer sheets)
INSTRUCTIONS TO CANDIDATES
1. This examination Is in three parts:
i. Part A: This Is a set of 20 multiple choice questions, worth 1 mark each. You may tear off the
answer sheet at the back of the examination paper. Write your student number on the answer
sheet. Circle the appropriate letter for each question.
li. Part B: This comprises three questions worth 10 marks each. Answer all questions.
III. Part C: Answer ONE of the two questions In Part C. It Is worth 20 marks.
2. This examination is worth 70 marks, being 70% of the marks for the course.
This paper MUST NOT BE REMOVED from the examination venue
Part A
This Part of the examination consists of twenty (20) multiple choice questions, each worth
one (1) marlc. The suggested time for completion is fifty minutes; that is, two minutes and
thirty seconds for each question. Be very careftal not to spend too much time on this section.
Students should circle the most appropriate answer to each question in Part A on the Part A
answer sheet provided at the end of this examination paper. Y o u may tear the answer shee.
· Performance Critique Assignment· During the first month of.docxLynellBull52
· Performance Critique Assignment
· During the first month of class, you are required to attend a theatrical production and to respond to it in the form of a performance critique (due February 29). A performance critique is a short essay in which you describe and offer your perspective on the specific choices that were made in a production. For this particular assignment, you are asked to develop an argument about how the production choices reflected (or failed to clearly reflect) the play’s central message.
· This piece of writing is uniquely tied to your own experience as a spectator in the theatre. Your critique should engage with the production as performance. This is different from doing a simple literary analysis of the main themes in the play. You should explore how these ideas are communicated through specific scenic choices – acting, directing, design, use of space, etc. – and make an argument about how these choices contributed to the production as a whole. Did they further the audience’s understanding of the message it was trying to convey? Did they make sense within the world they were trying to create? Was the text more alive because of them?
·
· *If there is a director’s note in the program, this will be particularly useful in ascertaining what the director’s intentions were or why he/she chose to stage this play in particular.
·
· A Performance Critique Looks Like:
·
· Format: 4 pages, 12-point font, double-spaced, 1” margins. Consulting other sources is not recommended (and you should definitely NOT consult other reviews of the performance), but if there is a secondary source that you feel provides important supporting information for your argument, you may use it if you include proper MLA citation.
·
· Ticket: Staple your ticket stub to the back page of your paper.
·
· Description: Give the audience a sense of the play. Include information about the name of the production, location, notable cast members, etc. Also include a very brief description of the main action, and/or the driving character relationships, and/or the genre (period piece, musical, etc.). When describing the action of the play, use the present tense.
·
· Argument: You should move far beyond saying simply whether you liked or disliked the play. Be sure to develop a clear thesis about what you think the production company was attempting to accomplish and whether they were successful.
·
· Specific Examples: Remember to provide specific examples to back up your argument. Your critique should help readers "visualize" the play. Provide relevant and evocative details. You will likely want to address several of the following elements: Acting (were the characters believable? Were they supposed to be?), Directing (Did there seem to be a unifying concept behind the production? How was that concept realized? Did the different elements of the production fit together?), Costume/Set/Lighting/Sound Design (H.
· Please read the following article excerpt, and view the video cl.docxLynellBull52
· Please read the following article excerpt, and view the video clips below. Listen carefully in order to understand as much of the Spanish as you can, using the images and contextual clues to help you get a sense of the gist of the video content.
· Next, write a 200-word response in English to the issues raised. Make sure to address the following questions:
1. What is syncretism and how does it differ from the concept of the melting pot?
2. How is Latin America’s (specifically Brazil and Cuba) experience with racial and cultural mixture different from that of the U.S.?
3. Can you give a couple of examples of syncretism in your own culture or in the U.S.?
Article
SYNCRETISM AND ITS SYNONYMS: REFLECTIONS ON CULTURAL MIXTURE by CHARLES STEWART
(If you would like to read the article from which this excerpt was taken, you can find it in Doc Sharing.)
The subject matter of anthropology has gradually changed over the last twenty years. Nowadays ethnographers rarely search for a stable or original form of cultures; they are usually more concerned with revealing how local communities respond to historical change and global influences. The burgeoning literature on transnational flows of ideas, global institutions, and cultural mixture reflects this shift of attention. This increased awareness of cultural penetration has, furthermore, been instrumental in the critique of earlier conceptions of “culture” that cast it as too stable: bounded, and homogeneous to be useful in a world characterized by migrations (voluntary or forced), cheap travel, international marketing, and telecommunications… In this body of literature the word syncretism has begun to reappear alongside such related concepts as hybridization and creolization as a means of portraying the dynamics of global social developments.
My purpose in considering the history of syncretism up to the present is not to enforce a standard usage conformed to the domain of religion; nor is it my goal to promote syncretism to a position of primus inter pares in the company of all other terms for mixture. I see my approach instead as an attempt to illustrate historically that syncretism has an objectionable but nevertheless instructive past…
Current Discussions of Mixture
Cultures, if we still wish to retain this term (and I do), are porous; they are open to intermixture with other, different cultures and they are subject to historical change precisely on account of these influences. This has no doubt always been the case…
Cultural borrowing and interpenetration are today seen as part of the very nature of cultures… To phrase it more accurately, syncretism describes the process by which cultures constitute themselves at any given point in time. Today's hybridization will simply give way to tomorrow's hybridization, the form of which will be dictated by historical-political events and contingencies… As [Edward] Said expresses it: all cultures are involved in one another, none is simple and pure, all.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
· Respond to 3 posts listed below. Advance the conversation; provi.docx
1. · Respond to 3 posts listed below. Advance the conversation;
provide a real-world application and experiential examples;
· Conceptually discuss your key [most significant] learning
insight or take-away from the selected forum topic comments.
· Responses should be a minimum of 150-250 words, supported
by at least one reference outside of the textbook (use academic
journals), either supporting or refuting the position of the
author of the forum topic response or peer response.
Topic #1: The Cost of Capital
The cost of capital refers to the “cost” a company must incur in
order to use funds towards a new project or investment. The
funds may come from lenders by borrowing the funds, by
financing equity, or by selling bonds or assets. The cost of
capital is expressed as an annual interest rate that the company
will be charged on the capital funds. Therefore, this is the
minimum return a company must be striving for when
undertaking a new project, making a purchase, or making an
investment. Otherwise, they are simply losing money.
The cost of capital is used as the minimum rate of return that
the project must achieve and is also the rate that is used in a
discounted cash flow analysis. If the return of future net cash
flows on an investment or project are greater than the cost of
capital, then the investment or project is worthwhile to the
business. For example, if a project generates a return of 20%
and the cost of capital was estimated at 15%, then this project
has added value to the business.
In addition, the NPV formula can be used to compare multiple
projects using different costs of capital. For instance, Project A
2. and Project B compared by using 10%, 15%, and 20% costs of
capital. This can allow businesses to see how investing more or
less capital would affect the outcome of the NPV. Just as you
can compare these different costs of capital, you can also add
the element of risk into your calculations by increasing the cost
of capital to reflect a riskier project or investment. Very simply
put, if investment B is riskier than investment A, then you could
compare them with B having a cost of capital at r = 15% and A
having a cost of capital at r= 10% - therefore adjusting for one
project/investment being riskier than the other.
Interestingly, there has been much discussion and debate over
how companies set their cost of capital rates. In the case of
large Fortune 500 companies, they spend hundreds of billions of
dollars per year. If they miscalculate the cost of capital rate on
an investment or project with a difference of even 1%, this
could mean a gain or loss of billions of dollars depending on
which way the value was incorrectly estimated. For example, if
a company plans to invest $52 million dollars into a new project
that is estimated to bring in $10.5 million per year over the next
seven years, and the company incorrectly estimates the cost of
capital by 1%, then you can see by the table below the affect
this small percentage potentially has on the resulting NPV. If
the company assumes a 9% cost of capital rate incorrectly and it
should have been estimated at 10%, then the company may
proceed with a bad investment or project. If they assume the
cost of capital at 10% and in fact it should have been 9%, then
they potentially miss out on a profitable investment opportunity.
When NPV’s are being calculated with incorrect variables, then
it affects the reliability of this decision-making tool. This is not
to say that one improper or missed investment will significantly
impact a business (although it may), but that repeated errors in
calculating the cost of capital could result in an enormous
cumulative loss in potential investment returns over time.
3. Project A Yields Cash Flow-In of $73.5 million over 7yrs and
has a cost of $52 million
at 10% the NPV = -880,000
at 9% the NPV = +850,000
Therefore, how do companies accurately determine the cost of
capital? Published surveys reveal varying information as to the
preferred method of computing cost of capital. Some surveys
showed greater than 90% of Fortune 100 companies preferred
using “a weighted-average cost of capital” and others revealed
that over 30% of Fortune 500 companies used the “capital asset
pricing model (CAPM)” (Bruner, 1998). However, one
particular survey differed from the previous paper surveys in
that they were conducted by phone and questions/responses
were focused specifically on how cost of capital was estimated
by each of these firms (Bruner, 1998). This survey concluded
that weighted average cost of capital (WACC) based on market
value (instead of book value that looks at debt vs. equity) was
the most popular method and the capital asset pricing model
(CAPM) was the most used model for estimating cost of equity
(Bruner, 1998).
A WACC is a standardized method for evaluating a company’s
cost of capital. It is a “weighted average of individual sources
of capital” that are used for a project or investment (Bruner,
1998). It is expressed by the formula:
WACC = Wdebt (1-t)Kdebt) + (Wpreferred Kpreferred) +
(WequityKequity) (Bruner, 1998)
K = component cost of capital
W = weight of each component as percent of total capital
t = marginal corporate tax rate
4. The above formula shows three sources of capital, but more may
be added. The capital costs must be those under current market
conditions; the costs should equal the expected internal rate of
return for each source of capital, and the cost of debt value
should be “after tax” to reflect tax deductible interest
(Luehrman, 1997). However, difficulties still arise when
calculating the cost of equity. As stated, the CAPM was most
commonly used, but there were differing opinions on the
variables used in this formula (risk-free rate of return, equity
beta estimates, and market risk premium). This component of
determining equity had the most debate and therefore affects the
results of the WACC depending on which variables were
selected to calculate the CAPM (Dempsey, 2013). The impact of
using differing rates to calculate the WACC mean that there
could potentially result in an unnecessarily wide range from
minimum WACC to maximum WACC having huge potential
economic impact on decision making.
Given the enormous amount of capital used for projects and
investments each year by corporations, the proper assessment of
cost of capital rates is an extremely important concept for
financial analysts and managers. Where there is fairly standard
use of the WACC, the method and rates used to determine cost
of equity using CAPM varies greatly and can cause large
differences in cost of capital estimates (Bruner, 1998).
Therefore, it seems that there should be better guidelines for
calculating this where, based upon industry, standardized,
current averages may be widely used.
References
5. Bruner, R. F., Eades, K. M., Harris, R. S., & Higgins, R. C.
(1998). Best practices in estimating the cost of capital: survey
and synthesis. Financial Practice and Education, 8, 13-28.
Dempsey, M. (2013). The Capital Asset Pricing Model (CAPM):
The History of a Failed Revolutionary Idea in Finance?.
Abacus, 49(S1), 7-23.
Luehrman, T. A. (1997). What’s it worth. Harvard Business
Review, 75(4), 132-142.
Topic #2: Risk and Diversification
Top of Form
In the realm of investments and financial management, risk is
an important variable that cannot be neglected. There are many
sources of risk in the financial variables of any corporation and
investments. Risk can be political in nature, where the
investments in a specific country can be threatened by political
turmoil or changes. Risk can be market driven, where the new
product lunch may be unsuccessful due to a current competition
[Microsoft surface tablets for example, never captured any
market share and the company was forced to sell the product
below production costs at a loss] (Arthur, 2014). There is also
a risk involved when a new product is introduced to the market
despite previous risk analysis done.
The risk can also stem from investments. In general there are
ten main types of risk associated with investments (Brown,
2008). They are risks associated with interest rates, business,
credit, taxability, call, inflation, liquidity, market, reinvestment
and currency/exchange rate. Business risk is associated with a
specific security which is also known as the unsystematic risk.
In credit risk, the issue is with the bonds issuer, who may not be
able to make the expected payments. In taxability risk, a
security was issued with a tax-exempt status by a municipal
6. office, however, it may lose that status prior to its maturity. In
inflation risk, the value of the asset may be lost to inflation,
especially if the currency in which it was issued has lost value
since. In liquidity risk, the investor may not be able to
purchase or sell a specific investment in a timely manner or the
optimum time. Market risk or systematic risk [as opposed to
the business risk] is a risk that cannot be controlled by
diversification of the assets. Currency or exchange risk occurs
when the currency in which the assets are purchased may have
lost value, or the desired final currency has increased in value
since the initial purchase. This risk has been common in the
past year. For example Euro was valued as 1.4885USD in May
of 2011 and today it is 1.1734USD. Although the difference
appears to be small [0.31], but when it is measured in millions
of euros the difference is significant.
As Brigham and Houston (2004) explain, diversification is the
single best weapon against risk. They further explain that
“global diversification offers investors an opportunity to raise
returns and at the same time reduce risk” (Brigham, 2004, p.
231). “The process of spreading an investment across assets
[and thereby forming a portfolio] is called diversification”
(Ross, 2000, p. 413). Therefore, we can conclude that
spreading of the investments across many forms of assets will
reduce some of the risks, but will not eliminate the risk all
together. Unsystematic risk [or business risk] is perhaps the
only risk that can be completely eliminated with diversification
of the assets (Ross, 2000, p. 415). In contrast to the
unsystematic risk, systematic risk cannot be eliminated because
it affects all assets to some degree. The systematic risk which
is also known as non-diversifiable risk. In the financial
management, we calculate the total risk by adding systematic
risk to the nonsystematic risk.
Another aspect diversification is in the supply chain. The
management of the company must ensure sufficient supply of
7. materials in-order to meet the demands of the market
(Bowersox, Closs & Cooper, 2002). To ensure ample and un-
disturbed supply chain of materials, financial managers and
operations must strike a balance between multiple suppliers
(Bowersox et al, 2002, p. 15). An example of this would a
company like Apple who uses many materials for its devices
and hardwares. If the company uses one supplier for its device
displays [the same as investing in one form of asset] and should
that supplier is unable to meet the demands or the promised
screens for number of reasons [such as political turmoil, fire in
the facility, worker strikes] then company [Apple] is unable to
make its products. The same is true in the case of the
company’s product lines. Apple has secured its market
superiority with multiple safety nets [product lines] that can be
viewed as “diversification”. By having a diverse line of
products within an eco-system, Apple has ensured a steady
stream of income regardless of the market changes. At the same
time, Apple has diversified its suppliers across the globe.
Incidentally in 2009, Apple caused a shortage of flash-storages
in Asia which caused other companies including Samsung itself
to scramble to locate parts (Farrell, 2009).
Risk in the business world is unavoidable. Risk in involved in
multiple aspect of the business from the supply chains to market
and also investments. Risk is so important to businesses that
colleges and universities offer specific degrees in Risk
Management and avoidance. Along with sound investments and
planning, risk can be reduced by diversifying the companies
portfolio, assets, supply chains and product lines to name a
few. Diversification breaks down the risk associated buy
reducing the overall probability of the risk (Su & Tsang, 2014).
Doing so ensures that investments the company has made is
secure from risk, that even should a part of the operation is
affected [from a given risk], the whole operation can still
maintain a steady move forward. A low risk enterprise will
therefore becomes a sound investment which in return will
8. increase the sources of investment in that enterprise [and
therefore reducing yet another risk].
References:
Arthur, C. (2014, May 1). Microsoft Surface tablet is still losing
money, figures show. Retrieved January 19, 2015, from
http://www.theguardian.com/technology/2014/may/01/microsoft
-surface-pc-tablet-losing-money-figures-show
Brigham, E., & Houston, J. (2004). Risk and Rates of Return. In
Fundamentals of financial management (10th ed., p. 231).
Mason, Ohio: Thomson/South-Western.
Brown, K. (2008, June 2). Types of Investment Risks - Series 6
| Investopedia. Retrieved January 19, 2015, from
http://www.investopedia.com/exam-guide/finra-series-
6/evaluation-customers/types-investment-risks.asp
Bowersox, D. J., Closs, D. J., & Cooper, M. B. (2002). Supply
chain logistics management (Vol. 2). New York: McGraw-Hill.
Farrell, N. (2009, September 15). Apple causes NAND shortage
in Asia. Retrieved January 19, 2015, from
http://www.theinquirer.net/inquirer/news/1533511/apple-causes-
nand-shortage-asia
Ross, S., & Westerfield, R. (2000). RETURN, RISK, AND THE
SECURITY MARKET LINE. In Fundamentals of corporate
finance (9th ed., p. 412). Boston: Irwin/McGraw-Hill.
Su, W., & Tsang, E. (2014). Product Diversification and
Financial Performance: The Moderating Role of Secondary
Stakeholders. Academy of Management Journal, amj-2013.
Topic #3: The Monte Carlo Simulation
The Monte Carlo simulation is a simulation that is used in order
to understand the impact of risk and possible uncertainty in
project, financial and cost management. It is also often referred
to as a probability simulation. Though for the purpose of this
paper I will talk about its applications in business and finance it
also has strong applications in engineering, biology and
physical sciences. By definition the Monte Carlo simulation
encompasses "any technique of statistical sampling employed to
9. approximate solutions to quantitative problems" (Kwak,2007).
A model or a real-life system or situation is developed, and this
model contains certain variables. These variables have different
possible values, represented by a probability distribution
function of the values for each variable. The first item that
one needs to understand though is that when you use any
forecasting model there is a relative uncertainty. This is due to
the fact you are using a model that is planning ahead for the
future. When doing this the analysis is forced to make
assumptions that can range from a possible investment return on
a portfolio to the possible cost of a project. There are also
factors that have to be assumed in this equation such as time. In
order to decide these values the financial manager must
formulate guesses based on historical data and past experiences
rather than actual hard numbers. This creates an overall
uncertainty in the projection.
The question then becomes how do financial managers
estimate the proper ranges of values that can be used when
projecting a project. These ranges are typically based on
experience in the field of typical cost and time frames of
projects. Once this is established the Monte Carlo simulation
can start to come into play. In the Monte Carlo simulation
values are selected at random for each of the tasks to be
analyzed. Based on then on the range of these estimates a model
is calculated based on the random value. The results that are
found are then recorded and the process is then repeated. The
results are typically demonstrated by a graph that shows various
points in a scatter plot format. They also can be displayed in
tables but the graph is the typical model this is normally
accepted and followed. These graphs can at some points have
over 3000 data points to be taken into consideration. It is
important though to note that there are situations where the
numbers are not completely random but this is not always the
case. It is not atypical for a Monte Carlo simulation to be
repeated hundreds or even thousands of times, each time using a
different set of randomly selected values.
10. Even though at first appearance the Monte Carlo simulation
appears like a firm simulation there are various problems that a
company must be aware of when using this simulation model.
Nawrocki,2001 addressed that fact that the Monte Carlo
simulation does prove very useful in cases where data and
normal analytic models are not available. Outside of this though
the model is flawed. The model often creates more work for the
financial analyst and the results are not always as accurate as
other techniques. The cost in this situation often outweighs the
benefits of using the model. The major driving problem is that
assumptions are made and very few financial managers have the
operations background to make these assumptions. For example
many times this model is used in building projects. It takes a
person with a strong construction background to place proper
cost and time frames. When the model is projected by someone
lacking this background it often skews the numbers. The Monte
Carlo simulation also makes the implication that a company is
operating under conditions of risk and that the financial
manager knows all of the underlying distributions. This is not
typically the case as normally in uncertinatany the distributions
are unknown. In other words the financial manager might be
able to calculate the obvious risk such as broken equipment and
employee sick days, but may not be able to factor in things such
as natural disasters that cannot be predicted. Another downside
as referenced by Whiteside, 2008 is that analyst often take the
Monte Carlo predictions over the historical data. The problem
with this is that historical data is factual where the Monte Carlo
simulation is a set of assumed numbers. It often presents a
problem that people invest more faith in assumed numbers over
actual historical data with true proven values.
There are though positive points for the Monte Carlo method
or else it would not be used in financial management today. It is
a simulation that has lasted a long time in the financial and
other worlds so it has its’ use and merits. One of them
addressed by Whiteside, 2008 is that even though the process is
time consuming once the equations are entered in the computer
11. system the analysis then becomes easy to run. It produced fast
results that appeal to a broad audience that are capable of
understanding the entire picture over just the individual
elements that are required under most financial systems. This
speed makes this method very attractive as in today’s business
world time is often money. The system also produces a wide
range of numbers which adds strength to any analysis as the
more data you have the stronger the data. The final positive
aspect is the simulations use in other fields. Even though at first
this may not appear to matter in reality it does. When a
financial manager can explain to a biologist how they are
finding their data and that the data shares the same type of
model it becomes a point of similarity. This can help in creating
a bridge between two very different business worlds which is
always an attractive point.
References
Kwak, Y. H., & Ingall, L. (2007). Exploring monte carlo
simulation applications for project management. Risk
Management, 9(1), 44-57.
doi:http://dx.doi.org/10.1057/palgrave.rm.8250017
Nawrocki, D. (2001). The problems with monte carlo
simulation. Journal of Financial Planning, 14(11), 92-103+.
Retrieved from
http://search.proquest.com.proxy.davenport.edu/docview/21755
9045?accountid=40195
Whiteside, James D,I.I., P.E. (2008). A practical application of
monte carlo simulation in forecasting. AACE International
Transactions, , ES41-ES49,ES410-ES412. Retrieved from
http://search.proquest.com.proxy.davenport.edu/docview/20819
3177?accountid=40195
Bottom of Form