The Concept of Outsource Manufacturing Discussion Responses

This week’s discussion is about “Outsourcing and Procurement”:1-)Hello Everyone,After the watching the video I can observe that outsource manufacturing consists of hiring people outside of the company to assemble parts of, or build an entire product. The main reason why companies chose to do this is to cut costs. Labor is often among any company?s largest costs. Outsourcing parts of the production line to a third party in a lower cost location leads to a significant decrease in production costs.Disadvantages of Outsourcing:Although there are several reasons to outsource, according to Webb (2017) there are also disadvantages to the practice such as:Make or Buy Decisions for Manufacturing Industries:The make-or-buy question has always been a concern of complex nature which represents a fundamental dilemma faced by many companies. The cut-throat competition compels all the manufacturing and services companies to re-evaluate their existing processes, technologies, products and services in order to find an opportunity to positively impact the bottom line by making strategically drawn out make-or-buy decisions (Sillanpaa, 2015). The make-or-buy decision is the act of making a strategic choice between producing an item internally (in-house) or buying it externally (from an outside vendor). The video described that, outsourcing decisions are based on the difference in the cost of purchasing or buying a product or service from an external supplier compared to the cost of producing the item or providing the service in house. One important aspect of cost management is determining whether to make or buy components in a product. A complete and correct assessment of the various elements of the cost is essential to make sound economic decisions.Kraljic?s Supply Matrix:The supplier suffers from a range of risks depending on its geographic location, business model and supply chain length. If the vendor is based in Switzerland, it is unlikely that political uncertainty or logistical delay will impact upon operations. On the other hand, facilities based in the developing world may be subject to legislative risk, political upheaval and unreliable transportation routes. According to Webb (2017), all such risk factors have bearing upon the buying company. Profitability describes the impact of a supply item upon the bottom line. For certain areas of spend, such as stationery, supplies have only a negligible effect on profits. In other categories, a single source of supply can make or break a business. For Apple, a large proportion of its profits are determined by Foxconn?s ability to manufacture the scale of products required to a precise specification.2-)Outsourcing and ProcurementIn this video Dr. Millar present topics on outsourcing, names of some companies that outsource, the products they outsource, reason for outsourcing, issues with outsourcing, benefits and risks involved, framework for make-buy model, hierarchical model for outsourcing decision, procurement strategy, link between procurement and outsourcing, and types of e-market . Outsourcing is a common activity and is on the rise due to its use by manufacturing and electronic industry. The concepts learned from this video are benefits of outsourcing, risks of outsourcing, Hierarchical Model for outsourcing decision and Kraljic Supply Matrix.Benefits of OutsourcingEconomies of scale allows cost to decrease both in purchasing and manufacturing due to bigger orders or multiple orders. In other words, as the business grows or due to bulk product ordering cost of product can be reduced thus increasing profit.Risk pooling is the ability for suppliers to spread the risk of demand and supply. Outsourcing allows transferring the risk of uncertainty to suppliers through the effect of risk-pooling.Reduce capital investment allows to save the money allocated for the function or support of an activity. By transferring some of the non-core activities to the supplier, the cost of maintaining those activities are also transferred to the supplier.Focus on core competency allows focusing on the talent available inside the organization so that performance can be increased.Increased flexibility allows making use of talent available outside the organization (Millar, 2013, February 22).Risks of outsourcingLoss of competitive knowledge even though outsourcing can be considered an effective way to compete in the business world. Care must be taken not to outsource the processes at what the company is specialized at.Conflicting objectives when an organization outsources only product and services are transferred not the responsibility of meeting quality and customer satisfaction. Therefore the organization can lose visibility as well as direct control on its transferred operations (Millar, 2013, February 22).3-)In the shared video, Miller has explained procurement and outsourcing with few examples. Below are the few points which are discussed in the video:Outsourcing:Outsourcing is a process where an organization assign or delegate some organization?s activities to outside company by seeking benefits or fulfill some business need. Initially, manufacturing used to outsource, nowadays product design and innovation get outsourced. Benefits can get in terms of cost savings, competitive advantage, focus on core business etc. Likewise, outsourcing provides many advantages to organizations, whereas it can bring dependency issues. It can be competitive knowledge sharing to competitors. Therefore, in outsourcing secondary activities of business outsourced to other companies.In general, there are two main reasons to outsourcing; dependency on capacity (Knowledge and Skills) and dependency on knowledge. Based on the product is modular or integral, outsourcing decision may differ. There are few parameters that need to consider while outsourcing, those are customer importance, component clock speed, competitive position, capable suppliers and architecture.Procurement:Procurement is the process of finding and acquiring the goods, services or works from the external organizations. Procurement decision should be made considering few parameters like types of products the firm is purchasing, level of risks and uncertainty involved.Kraljic?s Supply Matrix:This matrix works on two dimensions; one is profit impact and another is supply risk. Using these two dimensions, firm can decide where they land while procuring any service or product.E-market:In a procurement process, getting suitable suppliers to business is challenging. Suppliers price negotiation depends on demand and supply gap. If the demand of procurement thing is high and supply is less, then suppliers offers high prices and vice versa. E-market provides a platform where may suppliers easily accessible and firm can find suitable suppliers easily. Advantages of e-market are; flexible revenue model and open market. There are two ways e-market service is accessible; one is licensing fees and second is subscription fee. Install.com for food service industry and Pefa.com for a fresh fish market are two examples of e-market.

Aspen University Renewable Solar Energy for Homes

5 SOURCES10 pages The topic of the research paper must be about renewable solar energy for homes and it must be written from a Christian perspective. The thesis statement must include the problem, possible approaches or solutions, and the writer?s proposed approach must be expressed in this statement. I would like the thesis statement to be based on the following: eliminating our usage of fossil fuels to generate energy by implementing and utilizing renewable solar energy that provides energy (free-of-charge) to anyone having the necessary equipment to capture it?thus reducing the need of electric public utility companies and creating incentives for people everywhere to stop using them (both the public utility companies and the fossil fuels which pollute and contaminate our environment). The research paper should analyze the data gathered from various sources and reach a conclusion on an issue or problem that has been raised in the thesis statement. I want the conclusion of the research paper to mention that solar energy is the best of all the renewables since every single person on this planet having sunlight, in every climate, location, etc. is able to capture and utilize it using solar panels, an inverter, and store the energy using batteries. With this energy at hand, people are able to charge their electric cars, power their homes, etc. and in some countries they are even able to sell excess energy/feed it back into the national power grid. I also want the conclusion to mention that as stewards of God?s creation, we need to care for and protect the environment with which we have been entrusted and make the first step in ensuring that our planet will be environmentally clean for us and future generations. Please also do mention the recent advancements in solar panel technology and the types that are currently available. The audience of the research paper should be that of the average person, so everything must be written in an understandable manner, and all terms that are unfamiliar must be defined. Please pay special attention to the Outline Guidelines 1-3 that I have uploaded and follow the instructions carefully. A final revision of the general outline should be made to accurately reflect the proper order of the material covered in the final draft of the paper. The final revision would be the detailed outline. It should contain a thesis statement and three main sections (headings) that include subheadings and supporting details. When taking notes, incorporate or delete certain ideas in the outline. In this way you will be able to determine areas you may have neglected or overemphasized. After you have established the accuracy of the general outline, make sure that the points are in the best order. The work must flow logically, and orderliness is a vital aspect. I have uploaded a sample research paper (Sample RP 1-11) to show you the exact way the research paper must look like, and some instructions on the MLA style (MLA-Style Guidelines 1-7 & MLA-Style Guidelines for I.S. 1-2). Please note that the uploaded instructions regarding the MLA style are not exhaustive, so please refer to MLA Handbook for Writers of Research Papers, Sixth Edition (2003) or visit the MLA website at for any questions that might arise. Photocopies of relevant pages from Internet articles or Webpages, articles, books, periodicals, journals, etc. that are cited in the research paper need to be provided. Include only pages that have been cited in the paper, not entire articles or whole sections from books. Words that have been quoted or ideas otherwise cited need to be highlighted in these copies (without these required copies of the source materials?the whole research paper is useless to me). The ?Works Cited? page must contain at least five sources, including two hard copy books, periodicals, or journals. Only one of the five sources may be an encyclopedia. Please note neither Wikipedia nor any film may be used as a source. Please do NOT plagiarize or inspire yourself from another research paper. The writing must be original and unique and all inspiration needs to come from the sources themselves. My school has a zero-tolerance policy for plagiarism even if the plagiarism is not word-for-word. My school considers plagiarism to be the using of ideas from other published researched papers. So please use parenthetical documentation when making a direct quotation, summarizing, paraphrasing, or simply reiterating someone else?s thoughts. If a quote is more than forty words, put it in a block quote and ident one-half inch from the left margin. Please ensure that the paper is clear and flows logically from one paragraph to the next, all thoughts are organized, all parts are in the proper order, each part has been developed at an appropriate length in proportion to its importance, and there are no foggy concepts, weak arguments, or problem areas. The phrases also need to be examined for the appropriate figure of speech and expression of idiom. Please avoid jargon, trite phrases, and wordiness or redundancies. Please check to see that the verbs are bright and alive, and that the nouns are specific and direct. Proofread every word, phrase, sentence, and paragraph for proper usage: spelling, clarity, oneness, cohesion, stress, order, grammar, and mechanics. Please ensure that ALL uploaded and written instructions are carefully read, as well as the sample research paper before the writing process begins. Once this research paper is completed and done to the standards described, I will purchase another one using the same instructions; so please do pay careful attention to all details. If you have any questions, please contact me. Thank you

AC Prejudice and Discrimination Literature Review

Prejudice and Discrimination Introduction In many parts of the world and throughout history, prejudice and discrimination exist in different forms. Racism, nepotism, gender discrimination and discrimination against people with disabilities are examples of prejudice and discrimination. Prejudice concerns the irrational and inflexible feelings or thoughts retained by a particular individual or group of persons towards an individual or group of people. Discrimination is the act of developing unwarranted behavior while directing them towards an individual or group of persons. This research project determines the various causes of discrimination and prejudice in contemporary society. The idea is to determine the various ways in which discrimination and prejudice present itself in society together with its effects on society. Literature review Because of the existing differences among the societies in the world as well as the differences within the workplaces, many researchers have conducted extensive surveys to determine the sources of differences. As a result, comprehensive literature on discrimination and prejudice is born including the major causes of these kinds of discrimination and prejudice as well as the possible mitigation measures to avoid extremes of the prejudices and discrimination. According to the study by Snellman(2007), discrimination and prejudice emerge from different sources. Although the study determines that, there exists no precise cause of discrimination and prejudice, subconscious attitudes and perceptions influence people to develop feelings of discontentment concerning others while directing the feelings towards the target population. Discriminating individuals often use other people as scapegoats. The research shows that discrimination and prejudice exist in a very complex state demonstrating the diverse factors and behaviors causing different forms of discrimination including nepotism, racism, ethnicity, stereotyping and other forms of prejudice.  The conclusions from the research by Tileag? (2015) reveal that economic benefits and socialization are major predictors and causes of prejudice and discrimination. For example, the differences in income between individuals influence the formation of a particular social class. Notably, the rise in lifestyle somewhat makes people develop a certain attitude towards low-income earners or people without adequate money to spend. In this regard, the rise in lifestyle not only influence exclusion and seclusions but also makes people have some perceptions towards other individuals. Consequently, a particular group of people develops attitudes towards the other while discriminating each other. Whitley Jr. & Kite (2016) determines that ethnocentrism is a major cause of prejudice and discrimination throughout history. Ethnocentrism concerns the behavior of evaluating other people?s cultural practices basing on the assessor?s culture. For example, since the 15th century, racism has very apparent in the United States. Many people develop certain stereotypes for African Americans, Asian Americans and other immigrants majorly because of the differences in cultures. While some people concentrate on the color of the skin of a certain group of people, others consider the practices of people from where the target group comes from. For example, racists evaluate the conducts, practices, and behaviors of the Africans with the aim to establish the difference with their original culture. The latter develops a particular perception of the target group. The literature also reveals that group closures or the development of boundaries for a particular population increase discrimination. It is notable that likeminded people often form groups to drive some interests. As such, the members often define some boundaries that restrict others from joining the group. With these kinds of boundaries, some people develop some negative feelings and attitude towards the group. Similarly, people may form a group with the aim to block the association with others. This way, people continue to have negative perceptions and attitudes towards each other. The developed attitudes influence some conducts and behaviors. The respective parties direct the formed behaviors towards the target group bringing forth discrimination and other forms of prejudice (Dovidio, Hewstone, Glick& Esses, 2010). Another major source of discrimination and prejudice as depicted by Snellman (2007) is the social status. Sometimes, people develop a sense of self-satisfaction or lack thereof. When people determine their abilities to satisfy their needs, they mainly grow some attitudes towards others. While the sense of self-satisfaction may influence the need for power and authority, the feelings may lead to undermining other people’s abilities or lack of integration with certain individuals. As such, people continue to form some distances and stereotypes concerning other groups. Consequently, the people end up discriminating one another in various events and life situations. In workplaces, for example, discrimination and prejudice force the employer to turn down job application from specific communities, races or gender mainly because of the undue perceptions against the jobseekers.   According to the existing literature, people with authoritarian personalities largely have tendencies to influence discrimination and prejudice. Primarily, authoritarian personalities make people reject openly any person they feel are inferior (Whitley Jr. & Kite, 2016). Similarly, the authoritarian people submit without questions to the people they feel that they have some flourishing energies, drive or power. This kind of rejection of a particular group of persons is a form of prejudice and discrimination and that the rejected persons are likely to develop some attitudes or perceptions towards the authoritarian persons. The formed perceptions, feelings, thoughts, and attitudes lead to discrimination and prejudice. According to a recent survey by Whitley Jr. & Kite (2016), various theories provide solutions to discrimination and prejudice. The self-esteem theory determines that increased knowledge and self-esteem decreases the development of prejudice and discrimination. Whitley Jr. & Kite (2016) argue that education increases the level of understanding among people. Additionally, socialization requires a high level of self-esteem among people. In this regard, combining education and self-esteem, people will not only understand each other but also will improve their interpersonal and intergroup relations thus avoiding any possible conflicts that may trigger unwarranted feelings attitudes and perceptions about each other. The latter would avoid discrimination and prejudice.  The cooperation hypothesis determines that conflicting groups must learn to develop strategies and a shared objective while foregoing their interests for the benefit of the group (Tileag?, 2015). According to this theory, it is apparent that members of a group are likely to enhance their relationship by establishing a common goal, foregoing their interests and committing to the group’s effectiveness. The legal theory determines that creating and enforcing laws against unwanted behaviors can eliminate discrimination and prejudice in society. it is apparent that people have different interests and feelings towards different situations in life. However, every society needs to establish acceptable practices and the penalties for contradicting the set social standards.   Conclusion As determined above, prejudice and discrimination are a historical, social disorder that has a greater impact on the economic and other aspects of life. The literature reveals that subconscious attitudes and perceptions influence people to develop feelings of discontentment concerning others while directing the feelings towards the target population. Page Break References Dovidio, J. F., Hewstone, M., Glick, P., & Esses, V. M. (2010). Prejudice, stereotyping and discrimination: a theoretical and empirical overview. The SAGE handbook of prejudice, stereotyping and discrimination, 3-29. Retrieved from: Snellman, A., (2007). Social Hierarchies, Prejudice, and Discrimination. Retrieved from: Tileag?, C. (2015).?The nature of prejudice: Society, discrimination and moral exclusion. Routledge. Whitley Jr, B. E., & Kite, M. E. (2016).?Psychology of prejudice and discrimination. Routledge.

Bus 225 section 1 review problems solutions chapter 1 to 3

ÿÿ
Chapter #1
PROBLEMS (p. 24-25)
(Note: Some of these problems require the use of the Time Value of Money Tables in the Chapter 1 Appendix, pp. 40-43).
1. Using the rule of 72, approximate the following amounts.
a. If the value of land in an area is increasing 6 percent a year, how long will it take for property values to double?
ÿb. If you earn 10 percent on your investments, how long will it take for your money to double?
ÿc. At an annual interest rate of 5 percent, how long will it take for your savings to double?
ÿÿ
2. In 2013, selected automobiles had an average cost of $16,000. The average cost of those same automobiles is now $20,000. What was the rate of increase for these automobiles between the two time periods?
3. A family spends $46,000 a year for living expenses. If prices increase by 3 percent a year for the next three years, what amount will the family need for their living expenses after three years?
ÿÿ
4. Ben Collins plans to buy a house for $220,000. If that real estate is expected to increase in value by 2 percent each year, what will its approximate value be seven years from now?
ÿÿ
5. What would be the yearly earnings for a person with $8,000 in savings at an annual interest rate of 1.5 percent?
ÿÿ
6. Using time value of money tables (Exhibit 1-3 or Chapter Appendix tables-Pages 40-43), calculate the following:
a. The future value of $550 six years from now at 7 percent.
b. The future value of $700 saved each year for 10 years at 8 percent.
c. The amount that a person would have to deposit today (present value) at a 5 percent interest rate in order to have $1,000 five years from now.
d. The amount that a person would have to deposit today in order to be able to take out $500 a year for 10 years from an account earning 8 percent.
7. If you desire to have $10,000 for a down payment for a house in five years, what amount would you need to deposit today? Assume that your money will earn 4 percent.
8. Pete Morton is planning to go to graduate school in a program of study that will take three years. Pete wants to have $8,000 available each year for various school and living expenses. If he earns 3 percent on his money, how much must be deposit at the start of his studies to be able to withdraw $8,000 a year for three years?
9. Carla Lopez deposits $3,000 a year into her retirement account. If these funds have an average earning of 7 percent over the 40 years until her retirement, what will be the value of her retirement account?
10. If a person spends $10 a week on coffee (assume $500 a year), what would be the future value of that amount over ten years if the funds were deposited in an account earning 3 percent?
ÿÿ
Chapter #2
PROBLEMS (p. 65-66)
1. Based on the following data, determine the amount of total assets, total liabilities, and net worth.ÿ
Liquid assets, $3,870 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿInvestment assets, $8,340
Current liabilities, $2,670 ÿÿÿÿÿÿÿÿÿHousehold assets, $87,890ÿ
Long-term liabilities, $76,230
ÿÿ
a. Total assetsÿ
b. Total liabilities
c. Net worth
2. Using the following balance sheet items and amounts, calculate the total liquid assets and total current liabilities: Money market account $2,600 Medical bills $262
Mortgage $158,000 Checking account $780
Retirement account $87,400 Credit card balance $489
a. Total liquid assetsÿ
b. Total current liabilitiesÿ
ÿ3. Use the following items to determine the total assets, total liabilities, net worth, total cash inflows, and total cash outflows.
Rent for the month, $650 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿMonthly take-home salary, $2,185 ÿÿÿ
Spending for food, $345 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCash in checking account, $450
Savings account balance, $1,890 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBalance of educational loan, $2,160ÿ
Current value of automobile, $8,800 ÿÿÿÿÿÿÿÿÿÿÿÿTelephone bill paid for month, $65ÿ
Credit card balance, $235 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿLoan payment, $80
Auto insurance, $230 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿHousehold possessions, $3,400
Video equipment, $2,350 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿPayment for electricity, $90
Lunches/parking at work, $180 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿDonations, $160
Personal computer, $1,200 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿValue of stock investment, $860
Clothing purchase, $110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿRestaurant spending, $130
ÿÿ
a. Total assets =ÿ
b. Total liabilities =ÿ
c. Net worth =ÿ
a. Total cash inflows =ÿ
e. Total cash outflows =ÿ
ÿÿ
4. For each of the following situations, compute the missing amount.
ÿÿ
a. Assets $65,000; liabilities $18,000; net worth=??
ÿÿ
b. Assets $86,500; liabilities=?? net worth $18,700.
ÿÿ
c. Assets $34,280; liabilities $12,965; net worth=??
ÿÿ
d. Assets=?? liabilities $38,345; net worth $52,654
5. Based on this financial data, calculate the ratios requested: (Page 51) Liabilities $7,800 Net worth $58,000
Liquid assets $4,600 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCurrent liabilities $1,300
Monthly credit payments $640 ÿÿÿÿÿÿÿÿÿÿÿTake-home pay $2,575
Monthly savings $130 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿGross income $2,850

ÿÿ
a. Debt ratioÿ
b. Current ratio
c. Debt-payments ratioÿ
d. Savings ratio
ÿÿ
10. Fran Powers created the following budget and reported the actual spending listed. Calculate the variance for each of these categories, and indicate whether it was a deficit or a surplus.
ÿÿÿÿÿ
Item ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBudgeted ÿÿÿÿÿÿÿÿÿActual ÿÿÿÿÿÿVariance ÿÿÿÿÿÿÿDeficit/Surplus
ÿ
Food ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$360 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$298 ÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Transportation ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ320 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ334 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Housing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ950 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ982 ÿÿÿ
ÿ
Clothing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ134 ÿÿ
ÿ
Personal ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ275 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ231 ÿ
ÿÿ
Note: A deficit in one category means that another category will have to make up the difference.
ÿÿ
Chapter #3
PROBLEMS (p.100-101)
2. If Samantha Jones had the following itemized deductions, should she use Schedule A or the standard deduction? The standard deduction for her tax situation is $6,350.
Donations to church and other charities, $3,050
Medical and dental expenses exceeding 10 percent of adjusted gross income, $450ÿ
State income tax, $920
Job-related expenses exceeding 2 percent of adjusted gross income, $1,450
3. What would be the average tax rate for a person who paid taxes of $6,435 on a taxable income of $40,780?
5. If $4,323 was withheld during the year and taxes owed were $4,122, would the person owe an additional amount or receive a refund? What is the amount?
9. Using the tax table in Exhibit 3?5, determine the amount of taxes for the following situations:
a. A head of household with taxable income of $62,525.
b. A single person with taxable income of $62,001.
c. A married person filing a separate return with taxable income of $62,365.
10. Wendy Brooks prepares her own income tax return each year. A tax preparer would charge her $75 for this service. Over a period of 10 years, how much does Wendy gain from preparing her own tax return? Assume she can earn 3 percent on her savings. (LO 3.3)
11. Julia Sims has $30,000 of adjusted gross income and $5,000 of medical expenses. She will be itemizing her tax deductions this year. The most recent tax year has a medical expenses floor of 10%. How much of a tax deduction will Julia be able to deduct?
ÿÿ
***Tax Law Change: Medical and Dental expenses that can be itemized have changed over the years from 7.5% to 10%, back to 7.5% You will be told in all problems whether to use 7.5% or 10% for your calculations.
ÿÿ
14. On December 30, you decide to make a $3,000 charitable donation. (LO 3.4)
a. If you are in the 28 percent tax bracket, how much will you save in taxes for the current year?
b. If you deposit that tax savings in a savings account for the next five years at 8 percent, what will be the future value of that account?

MGT 317 Rules of Experimentation Discussion

SOURCE: Interactive: Entrepreneurship: The Practice and Mindset Interactive eBookby: Heidi M. Neck; Christopher P. Neck; Emma L. MurrayChapter 7!!Case StudyMarissa Mayer, Yahoo Inc. CEOIn 2013, Fortune magazine listed Marissa Mayer in the #1 slot on their prestigious 40 Under 40 list, ahead of well-known Internet tycoons such as Mark Zuckerberg (Facebook), Ben Silberman (Pinterest), and Kevin Systrom (Instagram). In 2014, Fortune magazine listed Mayer as #14 on its Most Powerful Women in Business list, and #18 on its Most Influential Women in the World list. Yet, by 2015, her star quality seemed to be getting tarnished.Hailing from the farmland of central Wisconsin, Marissa Mayer had a typical small-town American upbringing. In high school, she was active in extracurricular activities, where she demonstrated leadership abilities as captain of her school?s successful debate team and pom-pom squad. She continued in her upward trajectory of success at Stanford University, where she initially studied to become a doctor but earned both a bachelor?s and master?s degree in computer science.Mayer?s successes coming out of college opened many doors of opportunity. Despite receiving 14 different job offers from a variety of prestigious organizations, Mayer chose to accept an offer with a computer startup company called Google, which at the time was still in its infancy. When Mayer joined Google in 1999, she was only the 20th person hired by the company, which had been incorporated just a year previously.An entrepreneur at heart, Mayer made contributions to Google in the early days of the company that were prominent, far-reaching, and in many ways foundational to the overarching success the company has enjoyed. She started out as a programmer writing code. Over time, however, she became increasingly involved in leadership roles that allowed her to experiment with policy strategies that proved highly successful. For example, her leadership and example led to clearer communication between executives and floor-level employees, and to the development of a mentoring program that has since been replicated at numerous other tech companies.During her decade-plus stint with Google, Mayer became known for ?her work ethic, eye for detail and vision? (Marissa Mayer Biography, 2016). Her perfectionism led her to experiment and research until she had found design, market, and policy solutions that met her unusually high standards. For example, Mayer once ?wanted to test out 41 shades of blue for the toolbar on Google pages to see which one appealed the most to the user.? While such fastidious decision-making processes have surely caused anxiety among some of her colleaguesover the years, they seem to have ultimately served her?and the companies she has worked for?very well.Like all entrepreneurs, Mayer has always kept her eyes open for new opportunities.In a 2008 interview . . . she seemed to [already] be looking ahead to her next act. ?I helped build Google,? Mayer said, ?but I don?t like to rest on [my] laurels. I think the most interesting thing is what happens next (Marissa Mayer Biography, 2016).What happened next caught the attention of Silicon Valley and the rest of Corporate America in unprecedented fashion. In July 2012, Yahoo Inc.?the search engine giant and competitor of Google?hired Mayer to be its new CEO. With the hire, Mayer became one of only 20 female CEOs in the Fortune 500. And at only 37 years of age, Mayer became the youngest of all Fortune 500 CEOs, male and female.Yahoo hired Mayer for her entrepreneurial vision hoping she could turn around a troubled company that was facing ?a lack of innovation? and ?a culture problem.? Innovation and culture building were two things Mayer had excelled in at Google, and she immediately went to work. Her immediate shake-up of Yahoo included a line of executive firings and several new hires to replace them.With her new leadership team in place, Mayer began leading Yahoo in a series of substantial investments and acquisitions. However, one decision made before she came on board was the sale of over $7 billion dollars of Yahoo stock to the Chinese e-commerce giant Alibaba in order to increase Yahoo?s cash reserves. With added capital for experimentation and expansion, Mayer spent her first year on the job overseeing the acquisition of over 20 smaller companies. The company?s highest profile, and most expensive, move was to acquire the hugely successful microblogging company Tumblr for a price of just over a billion dollars. Ever willing to demonstrate her entrepreneurial capacity for flexibility and experimentation, Mayer pioneered a new path for Yahoo with her nod to acquire Tumblr?a move that ?analysts hailed . . . as a shift in industrial strategy? (Riggins, 2014).After only 22 months at the helm, Mayer was able to announce an 84% profit rise from the previous year. Observers commented that Yahoo?s decision to place its future in the hands of a young and gifted math and science whiz from Upstate Wisconsin had been touched by King Midas. And Marissa Mayer, worth an estimated $300 million, was goldenly compensated for her leadership as well.Given such accolades, it was a shock to many when, in the summer of 2014, Mayer was forced to announce Yahoo?s lowest quarterly earnings in a decade. By the end of 2014, analysts were questioning not only Yahoo?s financial viability but also Mayer?s leadership.She may be a woman of power, but she?s been heavily criticised [sic] for her lack of support in helping other women break through the glass ceiling of her industry?s heavily male-dominated hierarchy. Meanwhile, her cold, calculated style has continued to chase some of Yahoo?s most talented engineers into the arms of rivals like Google and Facebook. (Riggins, 2014)No stranger to ambition and audacity, Mayer was known for following a personal working style that includes the following two principles: ?a) work with the smartest people she can find, and b) go for a challenge that makes her feel like she?s in over her head.? As impressive as it is for a woman under the age of 40 to have taken over one of the most prominent tech companies in the world, Mayer faced the risk of being blamed for Yahoo?s demise. Nevertheless, if the company were to be sold, she would take with her a severance package valued at over $150 million.Critical Thinking QuestionsMarissa Mayer?s early successes were rooted in her proficiency as a student in math and science. Why are subjects like math, statistics, logic, and critical thinking essential to product experimentation and market hypotheses?How might you apply the ?Rules of Experimentation? to discovering and developing your own entrepreneurship and leadership skills?Data generation is critical to market research and product experimentation. What ?Data? might you begin collecting to better prepare yourself for a career in entrepreneurship (journal writing, subscribing to a professional journal or blog, asking questions of entrepreneurial role models, seeking out a mentor, etc.)?Marissa Mayer?s executive opportunity at Yahoo came about because of her outstanding work at Google, and skilled marketing of her own career along the way. In what ways are you currently expanding or contracting future opportunities for yourself based on your present performance as a student, employee, entrepreneur, networker, friend, and human being. Secondly, how are you marketing your own career to achieve future success?

Responses week 1 | Computer Science homework help

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
ISSC 471
1. What is IT Security Auditing? What does it involve?
An IT security audit is a comprehensive examination and assessment of an information security system. By conducting regular audits, organizations can identify weak spots and vulnerabilities in their IT infrastructure, verify security controls, ensure regulatory compliance, and more. It involves running scans on IT resources like file-sharing services, database servers and SaaS applications to assess network security, data access levels, user access rights and other system configurations. It includes physically inspecting data centers for resilience to fires, floods, and power surges as part of a disaster recovery evaluation. Finally, it involves interviewing employees outside the IT team to assess their knowledge of security concerns and adherence to company security policy.
2. Why are Governance and Compliance Important?
To ensure that businesses protect their information, have consistent cohesion departmentally, and follow all governmental regulations, a governance, risk, and compliance program is important. This helps to minimize the threats and risks that companies are exposed to on a daily basis.
3. Explain in detail the roles and responsibilities in an organization associated with the following:
According to our lesson, the risk manager, auditor, and executive manager have the following responsibilities:

Risk Manager – responsible ÿÿÿÿÿfor identifying organizational risk.
Auditor – responsible for ÿÿÿÿÿconducting information assurance audit and applying frameworks to the ÿÿÿÿÿseven domains to align with compliance.
Executive Manager – responsible ÿÿÿÿÿfor aligning external or internal compliance with governance requirements.

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
It is my understanding that the C&A process is outdated, and we now use assessment and authorization (A&A) to follow terminology in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). In my job, we follow NIST guidelines, and all of our accreditation processes follow the RMF process. The C& process was initiation and planning, certi?cation, accreditation, and then continuous monitoring. Though I never worked with the C&A process, I have been working with RMF for about 2 years now, and it is very involved.
References:
Tierney, M. (2020, Aug 5) IT Security Audits: The Key to Success. Retrieved from: https://blog.netwrix.com/2020/04/09/it-security-audit/
Hall, K.T. (n.d.) Why a Governance, Risk, and Compliance Program is Important for Your Business. Retrieved from: https://www.scripted.com/writing-samples/why-a-governance-risk-and-compliance-program-is-important-for-your-business
Sengupta, S. (2018, Apr 13) Cyber Security ? Certification and Accreditation. Retrieved from: https://www.nxtkey.com/cyber-security-certification-and-accreditation
-JAMIE
RESPONSE 2:
1. What is IT Security Auditing? What does it involve?
According to the reading this week an IT Security Audit is an internal assessment of an organizations policies, controls, and activities. An audit ensures that an organization is in compliance with legal regulations and that their security controls are adequate. Audits can involve any number of aspects within a business? activities including finances, compliance, operations, investigations and information technology. An IT Security Audit also involves three goals, providing an objective and review of policies, providing reasonable assurance controls are in place, and recommendations for improvement.
ÿ2. Why are Governance and Compliance Important?
As businesses become ever more reliant on technology governance and compliance become a more integral part of business function. Governance of IT systems ensures proper use as well as compliance and risk management, all vital to the success in a business environment. Compliance is important and beneficial to all aspects of a business, it ensures the reliability as well as public trust of a business which is vital to the business? success.
ÿ3. Explain in details the roles and responsibilities in an organization associated with the following:
ÿÿÿRisk Manager- A risk manager is familiar with the risks and vulnerabilities that an organization faces, as well as creating and evaluating risk management procedures. They are also responsible for knowing auditing controls as well as reporting procedures (Patel, 2016)ÿÿÿÿAuditor- The roles and responsibilities of an auditor include assessing current security controls and risk management procedures, advise management on how to improve security controls, evaluate risks, and analyze internal operations (Kumar, 2017)ÿÿÿÿExecutive Manager- The Executive Manager is responsible for ensuring their department is aligned with company vision and goals. They help to create and implement policies and procedures, and they make business decisions, such as security policy changes, based on the information received from the risk manager and auditor (Woodman, 2018)
4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
The Certification and Accreditation process is a standardized process, activities, and management to validate, implement and ensure security. The phases of the C&A process include Phase I Initiation and Planning: Which defines the C&A effort, it documents the steps needed to achieve the desired accreditation. Phase II Certification: This phase verifies system compliance with the identified security standards. Phase III Accreditation: Here validation is made that the system is compliant and security accreditation is achieved. Phase IV Post Accreditation: This phase continuously monitors the system to ensure it remains compliant with accreditation standards (QTS, 2019).
Alysha Macleod
Kumar N. (2017) Roles and Responsibilities of an Internal Auditor. EnterSlice

Roles and Responsibilities of Internal Auditor


Patel N. (2016) A Risk Manager?s Role in Strategic Leadership. NIC State.
https://erm.ncsu.edu/library/article/risk-manager-strategic-leadership
QTS. (2019) The Four Phases of the Certification and Accreditation Process. QTS
https://www.qtsdatacenters.com/resources/articles/the-four-phases-of-the-certification-and-accreditation-process
Woodman C. (2018) Job Description of an Executive Manager. Career Trend
https://careertrend.com/about-6507018-executive-manager-job-description.html
ISSC 341
RESPONSE 3:
There are 7 layers to the Open Systems Interconnection (OSI) model, but I will be discussing layers one and two. The first layer, physical layer, is responsible for the physical cable or wireless connection between the network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of raw data (Os and 1s). The second layer, data link layer, establishes and terminates a connection between two physically connected nodes on a network. It is comprised of two parts, Logical Link Control (LLC) which identifies protocols and performs error checking/synchronizes frames. Media Access Control (MAC) uses MAC addresses to connect devices and define permissions to transmit and receive data.
ÿÿÿÿÿÿÿÿÿÿÿIPv6 is the latest version of internet protocol and was introduced in 1998 by the Internet Engineering Task Force (IETF) to solve address space exhaustion. IPv6 uses 128-bit addressing instead of IPv4 32-bit addressing scheme. What that means is IPv4 address method uses four sets of one-to-three-digit number (192.0.2.146), and IPv6 uses eight groups of four hexadecimal digits (2001:0db8:85a3:0000:0000:8a2e:0370:7334). While IPv6 may seem more secure and will eventually replace IPv4 one day, the adoption of it has been delayed because there?s a dual stack requirement. IPv6 is not backwards compatible with IPv4. There is a problem with the network address translation (NAT), which takes private IP address and turns them into public IP addresses.
ÿÿÿÿÿÿÿÿÿÿÿIPv4 allows for a variation of the network and host segments of an IP address, known as subnetting. It can be used to design a network physically and logically. Subnetwork addresses enhance local routing capabilities, while reducing number of address required. The subnet mask is used to show what part of the addresses is the network portion and what part is the host portion. In IPv4, there are 3 default subnet masks corresponding to three classes of IP address.
ÿÿÿÿÿÿÿÿÿÿÿHope everyone is having a great start to their week!
Regards,
Al
Works Cited:
McKeever, G., Sillam, Y., R.M., Hathaway, M., Houcheime, W., P.W., Kerman, D., Lynch, B., Hewitt, N., & Ray, T. (2020, June 10). What is OSI Model | 7 Layers Explained | Imperva. Learning Center. https://www.imperva.com/learn/application-security/osi-model/
Fruhlinger, K. S. A. J. (2020, August 26). What is IPv6, and why aren?t we there yet? Network World. https://www.networkworld.com/article/3254575/what-is-ipv6-and-why-aren-t-we-there-yet.html
Google IPv6 adoption Statistics. (2020). IPv6. https://nfware.com/blog-what-is-ipv6
IPv4 subnetting. (2021). IPv4 Subnetting. https://www.ibm.com/docs/en/zos/2.4.0?topic=internetworking-ipv4-subnetting
-ALI
RESPONSE 4:
1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer.ÿ
The Open Systems Interconnection (OSI) Reference Model consist of 7 layers and they are from top to bottom application, presentation, session, transport, network, data link and physical. The architecture of the OSI reference model is separated into 7 layers so it aids in development, design, and troubleshooting and provides changes in one layer without effecting the other therefor all layers are equally important. These 7 layers of OSI reference model are divided into 2 groups upper (top 3 layers) and lower layers (bottom 4 layers). The upper layers define communication between the applications of the end users and the lower layers define how the data is transmitted between the two applications. Common protocols used in the layers are TCP, IP/IPX and Ethernet for the lower group and for the upper group HTPP, SSL and RPC just to name a few.ÿ
2. What was the reason that IPv6 was introduced? Why do you think many organizations are not
upgrading their network solely to IPv6 and run that protocol instead of running IPv4?
IPv6 was introduced for its capacity over the IPv4, IPv4 is out of IP addresses and holds 4.3 billion addresses. With the growing devices like the smartphone, tablets, computer and other devices IPv4 was not able to support which gave birth to IPv6 which supports 128 bit addressing. Many organizations are not upgrading because IPv4 is enough for the company and because the internet at large doesn?t support IPv6 end to end there is a need to encapsulate IPv6 traffic into IPv4.
3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?
Subnetting provides network security, better performance while providing clean separation for troubleshooting. Subnet mask plays important part of masking the IP address. Looking forward to reading other post and learning the role of IPv4 and 6 as my knowledge on the subject is limited. Have a good rest of the week.
References:
Imperva. (n.d.). What is OSI Model | 7 Layers Explained | Imperva? Learning Center. Retrieved from https://www.imperva.com/learn/application-security/osi-model/
PARR, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved March 05, 2019, from Mashable:
https://mashable.com/2011/02/03/ipv4-ipv6-guide/#MFRFxeOnk
-TAVEN

Ethics and Law Discussion

Question 1 (1 point)In the URL encoding scheme, the URL is converted into a valid ASCII format, so that data can be safely transported over HTTP. Which character is used in the URL encoding followed by the character?s two-digit ASCII code, which is expressed in hexadecimal?. Select oneQuestion 1 options:&Question 2 (1 point)Vulnerability management life cycle is an important process that helps in finding and remediating security weaknesses before they are exploited.identify the phase that involves the remediation.Question 2 options:Pre-Assessment PhaseVulnerability Assessment PhaseRisk Assessment PhasePost Assessment PhaseQuestion 3 (1 point)Silicon Pvt Ltd is a reputed company, which is having around 1000?s employees working in their company. One day, one of the employees approached the authorized person of the organization claiming that he/she forgot their ID badge and requested the person to allow through a secure door. Whereas the authorized person believed that the person forgot the ID badge and helped the person to go through the entrance by swiping with his/her ID badge. Later on that authorized person realized that the person is a non-employee of the organization and he/she is an intruder who intentionally entered into the company From the above scenario, which of the following comes under the Human-based Social EngineerinQuestion 3 options:TailgatingPiggybackingReverse Social EngineeringNone of the aboveQuestion 4 (1 point)Run the following ?nbtstat? command, in order to get the content of NetBIOS name cache, the tables of NetBIOS names and their resolved IP addresseQuestion 4 options:. nbstat .exe ?enbstat .exe ?tnbstat .exe ?cnbstat .exe ?iQuestion 5 (1 point)Which type of attack that search for the web server login passwords by using the alphabetical letters, symbols and number is calledQuestion 5 options:Password GuessingDictionary AttackBrute Force AttackHybrid AttackQuestion 6 (1 point)From the following TCP Communication Flags identity the flag which Initiates a connection between different hosts.Question 6 options:. PSHQuestion 7 (1 point)SavedGoogle supports several advanced operators that help in modifying the search. Which of the following Google advanced search operator displays the web pages stored in the Google cacheQuestion 7 options:[site:][link:][info:][cache:]Question 8 (1 point)Which of the following term is defined as the process of installing a modified set of kernel patches that allows running third-party applications not signed by the OS vendor?Question 8 options:TrackingHijackingBlackjackingJailbreakingQuestion 9 (1 point)Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jack made the number of HTTP requests rise to a high level, which made the victim?s server with the number of requests and resulted in failure of server responding to the request and crashed. Which type of attack Jack performed in the above scenario?Question 9 options:Social engineering attackMITM attackPacket Injection attackDoS and DDoSQuestion 10 (1 point)Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP connections B. It attacks the servers with a high rate of connections from a valid source C. It initiates a request for a single connectionQuestion 10 options:ONLY An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP is true connectionsBoth It attacks the servers with a high rate of connections from a valid source and It initiates a request for a single connection are trueBoth An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP connections and It attacks the servers with a high rate of connections from a valid source are trueOnly  It initiates a request for a single connection is trueQuestion 11 (1 point)Using which port the attacker can compromise the entire network, and receive a copy of every packet that passes through a switchQuestion 11 options:SPAN PortTAP PortUDP portTCP portQuestion 12 (1 point)Question 12 options:EavesdroppingShoulder surfing Dumpster divingImpersonation on social networking sitesQuestion 13 (1 point)In Code Breaking Methodologies, which of the following method involves the use of social engineering techniques to extract cryptographic keysQuestion 13 options:Brute-ForceTrickery and DeceitFrequency AnalysisOne-Time PadQuestion 14 (1 point)In the Command Injection attacks, the following type of attack is used to deface a website virtually. Select oneQuestion 14 options:HTML EmbeddingShell InjectionWebsite EmbeddingHTML injectionQuestion 15 (1 point)Which type of rootkit is used to hide the information about the attacker by replacing original system calls with fake ones?Question 15 options:Application Level RootkitLibrary Level Rootkit Boot Loader Level RootkitHardware/Firmware RootkitQuestion 16 (1 point)Switch Port Stealing sniffing technique uses the following attack to sniff the packetsQuestion 16 options:MAC floodingARP SpoofingDHCP attacksDNS poisoningQuestion 17 (1 point)Identify the following technique, in which the attacker use drones to detect open wireless networksQuestion 17 options:WarChalkingWarFlyingWarDrivingQuestion 18 (1 point)In which of the following mobile platform vulnerabilities, unsolicited text/email messages sent to mobile devices from known/ unknown phone numbers/email IDs.Question 18 options:Mobile PhishingSMS SpamSMS PhishingMobile SpamQuestion 19 (1 point)Identify the ports that are allowed by the firewall in an organizationQuestion 19 options:Port 443 and Port 69Port 80 and Port 69Port 80 and Port 110Port 80 and Port 443Question 20 (1 point)Identify which of the following detection is used to detect the intrusion based on the fixed behavioral characteristics of the user and components in a computer systemQuestion 20 options:Anomaly Detection Protocol Anomaly DetectionIntrusion Detection SystemSignature RecognitionQuestion 21 (1 point)Sam receives an email with an attachment, he downloads the file and finds that it is infected with virus which overwrites a part of the host file with a constant content without increasing the length of the file and preserving its functionality. Which type of virus that the file was infected by?Question 21 options:Cavity VirusesShell VirusesFile Extension Viruses Cluster VirusesQuestion 22 (1 point)Which of the following attack allows Android users to attain privileged control access with in Android?s subsystemQuestion 22 options:RootingJailbreakingSMiShingApp SandboxingQuestion 23 (1 point)From the following identify the technique through which an attacker distributes malware on the web by sending a malware attached email and tricking the victim to click the attachment.Social Engineered Click-jackingSpearphishing SitesSpam EmailsDrive-by DownloadsQuestion 24 (1 point)From the following, identify the attack in which an attacker exploit default configuration and settings of off-the-self libraries and code.Question 24 options:Operating System AttackMisconfiguration AttacksApplication-Level AttackShrink-Wrap Code AttacksQuestion 25 (1 point)Identify the hacking phase in which an attacker tries to gather information about the target prior to launch an attackQuestion 25 options:ScanningGaining AccessReconnaissanceClearing TracksQuestion 26 (1 point)Identify the type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.Question 26 options:Active AssessmentNetwork AssessmentsHost-Based AssessmentApplication AssessmentQuestion 27 (1 point)Attacker uses the ?%00? character prior to a string in order to bypass detection mechanism. Identify the type of evasion technique used by the attacker.Question 27 options:Case VariationURL EncodingNull ByteObfuscated CodesQuestion 28 (1 point)In the SQL Injection Characters, which of the following character represents the global variable?Question 28 options:@@variableQuestion 29 (1 point)SavedIdentify the type of cloud computing, which provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service APIQuestion 29 options:Software-as-a-Service (SaaS)Platform-as-a-Service (PaaS)Infrastructure-as-a-Service (IaaS)Virtual ServiceQuestion 30 (1 point)SavedIdentify the type of virus that adds its code to the host code without relocating the host code to insert its own code at the beginningQuestion 30 options:Intrusive VirusesTransient VirusesAdd-on VirusesShell VirusesQuestion 31 (1 point)Identify the type of IDS alert that occurs when an IDS fails to react to an actual attack eventQuestion 31 options:True PositiveTrue NegativeFalse NegativeFalse PositiveQuestion 32 (1 point)SavedCloud Pent Testing is not allowed for one of the following Cloud Computing type, as it might impact on the infrastructureQuestion 32 options:Platform-as-a-Service (PaaS)Software-as-a-Service (SaaS)Hybrid-as-a-Service(HaaS)Infrastructure-as-a-Service (IaaS)Question 33 (1 point)The testing that is also called black box testing, which require no knowledge of the inner design of the code is calledQuestion 33 options:Fuzzing TestFunction TestStatic TestDynamic TestSavedIdentify the command which is used to adjust RSSI rangeQuestion 34 options:python RFCrack.py ?i ?F MOD_2FSK -F 314350000python RFCrack.py -j -F 314000000python RFCrack.py -r -U “-75” -L “-5” -M MOD_2FSK -F 314350000python RFCrack.py -r -M MOD_2FSK -F 314350000Question 35 (1 point)Which type of DNS record helps in mapping an IP address to a hostname?Question 35 options:HINFOQuestion 36 (1 point)SavedWhich of the following sequence is used by the attacker, in the Directory Traversal Attacks to access restricted directories outside of the web server root directory. Select oneQuestion 36 options://…Question 37 (1 point)SavedWhich of the following attack involves in stealing a cloud service provider?s domain nameQuestion 37 options:CybersquattingDomain SnippingDNS Poisoningd. Domain HijackingQuestion 38 (1 point)Identify the rootkit, which helps in hiding the directories, remote connections and logins.Question 38 options:Azazel ZeroAccessNecursAvatarQuestion 39 (1 point)SavedQuestion 39 options:RemoteExecPDQ DeployDameWare Remote SupportKeyloggersQuestion 40 (1 point)Which of the following tool can capture RPL related information and live packets from networks in a non-intrusive manner?Question 40 options:Foren6RFCrackHackRF OneTelnetQuestion 41 (1 point)SavedRoy is a senior penetration tester working in a Gensolutions Inc, a US based company. The company uses the Oracle database to store all its data. It also uses Oracle DataBase Vault in order to restrict user from accessing the confidential data from their database. One day Roy was asked to find all the possible vulnerabilities of the company?s Oracle Database Vault. Roy tried different kinds of attacks to penetrate into the company?s Oracle DB Valut and succeeded. Which of the following attack helped Roy to bypass Gensolutions Oracle DB Vault? Select oneQuestion 41 options:Denial of service attackSQL InjectionSession HijackingSniffingQuestion 42 (1 point)In a computer based social engineering, a person receives emails that issues warnings to the user on the new viruses, worms or Trojan that may harm the user?s system. These kind of computer based social engineering is known asQuestion 42 options:Spam EmailChain LettersHoax LettersInstant Chat MessengerQuestion 43 (1 point)ICMP scanning involves in checking for the live systems, which can be done by sending the following ping scan request to a host. If the host is live, then it will return a reply.Question 43 options:ICMP Echo ReplyICMP Echo PingICMP Echo RequestICMP Echo hostQuestion 44 (1 point)Which of the following cryptographic attack technique involves extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or tortureQuestion 44 options:Chosen-ciphertext AttackAdaptive Chosen-plaintext AttackRubber Hose AttackQuestion 45 (1 point)The attacker uses the following attack, in order to listen to the conversation between the user and the server and captures the authentication token of the user. With this authentication token, the attacker replays the request to the server with the captured authentication token and gains unauthorized access to the serverQuestion 45 options:Session Replay attackSession Fixation attacksSession hijacking using proxy serversClient side attacksQuestion 46 (1 point)Which of the following Hping command used to intercept all traffic containing HTTP signature?Question 46 options:hping3 192.168.1.103 -Q -p 139 -shping3 -9 HTTP ?I eth0hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 –floodhping3 ?F ?P ?U 10.0.0.25 ?p 80Question 47 (1 point)In webserver password cracking techniques, The attacker tries every combination of character until the password is broken, such type of attack is known as. Select one:Question 47 options:Brute force attackDictionary attacksGuessing attackHybrid attackQuestion 48 (1 point)Which of the following service uses the port TCP/UDP 53 to enumerateQuestion 48 options:DNS Zone TransferSNMP TrapNetBIOS Name ServiceGlobal Catalog ServiceQuestion 49 (1 point)SavedAt which phase of the Session Fixation attack does the attacker obtains a legitimate session ID by establishing a connection with the target web server.Question 49 options:Entrance phaseSession set-up phaseFixation phaseFinal phaseIn the Permanent Denial-of-service, the attacker will uses the ?Bricking a system? method, in order to __________Question 50 options:Send fraudulent hardware updates to the victimsLaunch a massive denial of service attacks and compromise websitesExploit weaknesses in programming source codeSend malicious email attached to the victi

Texas redistricting | Government homework help

ÿ
Redistricting in Texas has been an issue of significant controversy since 2000 ( and even before but not as dramatic and consequential).ÿ First read some of the issues involved in 2000 and then read the issues involved in 2010 redistricting controversies including court cases responding to all questions concerning both separate but in many ways very connectedÿ cases, incidents and processes.
Redistricting is a highly partisan activity mandated indirectly by the required reapportionment of the constitution every decade. The House of Representatives state member allocations is dependent on an accurate population count and subsequent redistricting. ?The primary reason for taking the census is to comply with the U.S. Constitutional mandate for data needed to reapportion the 435 seats in the U.S. House of Representatives. With the census data tapes in hand, states swiftly began to draw a seemingly infinite number of state legislative and congressional district plans to use in theÿ elections.
In 2001-2004 following the 2000 mandated censusÿ redistricting in Texas adopted and thenÿ re adopted redistricting plans in an unusual manner.ÿ Eventually, state legislators adopted plans that were carefully crafted to satisfy a wide range of criteria including compliance with one-person one-vote, the federal Voting Rights Act and traditional redistricting principles such as compact and contiguous districts. In addition, legislators meticulously designed plans to further political goals without violating federal and state statutes. A couple of states, New Jersey and Virginia, had to draw plans for 2001 elections and almost all states had plans in place for the 2002 elections with the exception of Maine and Montana where redistricting is done prior to the 2004 election.” (NCLR) However, Texas re drew its districts at least twice. The first redistricting effort was under the direction of the courts and the other instance and latest with a new republican majority in the legislature.
This action of redistricting has been litigated in the Supreme Court (as often Texas legislation and policies are?with many found unconstitutional). The Supreme Court has ruled that much if not most of what Texasÿ enacted ÿduring ÿthe 2000 decade was in fact constitutional but with one exception also a violation of minority voting rights.
The process with a little less drama repeated itself in 2010 but with different relevant Supreme Court rulings and a new interpretation of the voting rights act. 2010 again was the beginning of a decade in whichÿ Texas attempt to redistrict was again found incongruous with minority voting rights.
Discuss, after conducting your own research on the issues involved, that decision and the process in the U.S. Supreme Court. REMEMBER that the decisions and opinions of the Supreme Court change . Should the last ( following the 2010 census)ÿ redistricting of Texas congressional seats by the Texas legislature have been found in violation of the constitution and civil rights laws?
The most recentÿ 2010-2012 process did in fact result in the plan being rejected over and over and over again. Outline the current (2010-2012 rejection of Texas redistricting efforts) and determine the fatal flaws and underlying values which undermine that process.ÿ What could be done toÿ prevent this from occurring again?
The process is again heating with disputes still over data and boundaries and maps regarding current congressional ( and state legislative) districts. The basic argument again focuses on denial of minorities ( particularly in these cases Latino) voting rights.
see below:
https://www.texastribune.org/2017/08/18/brief-aug-18/
https://www.texastribune.org/2017/08/18/paxton-redistricting-filing/
You must show depth in your arguments and demonstrate your research so very long and many paragraphs with numerous academic citationsÿ are expected.
You do not have to discuss the concept/practice ofÿ redistricting or reapportionment but focus on the Texas process and the aftermaths of recent census on that process both in terms of legislative/political actions and court decisons.

GCU Issue of Abortion Discussion

********please respond to the discussion question below add citations and references ;)******I have a strong belief that every person is naturally good-hearted and willing to love and care for others. It is upbringing that may alter this thinking. Every single person has a value and can contribute to society. This can be made difficult based on how a person is raised, and the circumstances in which they must live their life. Choices must be made every day. As children, we cannot help the environment in which we are raised. While a person may be naturally good-hearted and loving, if they are brought up in a harsh or cruel environment, they may begin to have a more negative outlook on life and others around them.According to Kirsten (2018), the main issue that comes about with abortions is the question of whether or not the fetus should be considered a person, and at which point do we consider the fetus a person. I do not feel that it is my place to tell another person that they should not have an abortion. Every situation is different. I cannot imagine the horrors that a woman must face if they are raped and then forced to have a child that they cannot care for. I do not believe that it should be a regular form of birth control, however. I have known persons in my experience that regularly get abortions instead of taking birth control. I do not feel that this is right either, however, who am I to judge. As a nurse, it is my duty to care for patients in a compassionate way, and I will do that, no matter my beliefs on their decisions as far as treatment. I can, however, educate the patient about birth control, which may be more cost-effective and less damaging to the body.Designer babies are another subject in which I feel that it is not my place to judge. Is it something that I would do? Probably not. However, can you imagine being able to eliminate the potential for disability or genetic disease for your child? Everyone wants what is best for their children, so it is no surprise that people would want to choose what they believe to be the best life for their children.Meilaender (2013) points out that we should always consider bioethics in our patient care and ?to ignore it is to ignore the just claims of others upon our attention and our care? (p. 2). While I do not choose to share my own beliefs with my patients, it is something to always take into consideration for sure. These issues are controversial, yes. However, my job as a nurse is not to pass judgement on these issues. I must provide compassionate care. I must make sure that my patients are receiving the best care possible, and to make sure that their needs are being met.References:Kirsten, J. (2018). Top 15 bioethical issues in biological advancements. Retrieved from Meilaender, G. (2013). Bioethics: A primer for Christians (3rd ed.). Cambridge, UK: William B. Eerdmans Publishing Company.

Discussions six (6) | Accounting homework help

ÿÿ
*Unit 2 DB: Deming’s 14 Point Philosophy (BUS211_34_Baldrige Principles & Introduction to Quality Standards)
After reviewing Demings 14 Point-Philosophy, discuss which one you believe is most important for an organization to implement and why.
*Unit 2 DB: Supply and Demand (ECO201 Macroeconomics)
This discussion board addresses the interaction among price, demand, and supply in how global markets work. H&M Brand and others face a backlash from China, a major cotton supplier after expressed concern over the alleged use of forced labor in cotton production.
Review the following article:
Please address in a presentation format with an accompanying graph of how the market for H&M Company cotton clothing is impacted by this change in supply. Only 5.2% of H&M sales are in China. It is most important to explain the underlying reasons, the impact of cost, price, and supply and demand changes if any. Your focus is on the market for H&M clothing.
Include an accompanying graph for each of the three situations showing demand, price, and supply before and after the change effected by China.ÿ
1. China tells H&M that it will not be able to make a profit on sales into China if they don?t buy all their cotton from the Xinjaing Region.
2. South Carolina, an alternative source of cotton, has a bumper crop of cotton that exceeds the supply from Xinjaing but is much more expensive.
3. A synthetic material is developed that is identical to cotton in every way except that the cost is considerably less.
Each original post should include an explanation for each with three diagrams to emphasize the impact on the market for H&M apparel. Your graph should show three variables at two points in time, before and after the action by China.
NOTE: Diagrams can be created using an Office product such as Word or Excel or PowerPoint or some other product of the student’s choice, or drawn by hand and submitted as an image and attached to your discussion board submission.ÿ
*Unit 2 DB: State Regulation vs. Federal Regulation (FIN401_30_Insurance & Risk Management)
After the financial crisis of 2008, many states began to review their regulatory framework with respect to domestic and foreign insurance companies that operate within each state’s border. The main goal of this review was to ensure proper oversight of insurers to prevent a catastrophic liquidity crisis in the overall insurance marketplace. Review the videos discussing the attempts at regulating the financial sector after the credit crisis of 2008. Then think about the main objectives of states for regulating the insurance industry.ÿ
Discuss the impact of state regulation on the insurance marketplace. Describe any similarities with the attempts by the federal government to regulate the financial sector after the 2008 financial crisis. Defend whether states should continue to be the primary regulators of insurance or if such regulation should be a federal matter. ÿ
In response to at least three of your peers, address whether you agree with the conclusions of your peers or not. Ask probing questions that are specific to each post that you respond to.ÿ
*DB2.1: Security Personnel vs Police (CRJ104_30_Introduction to Security)
How does the level of training and regulation for security personnel compare with that of the police?
*DB2.2: Federal Regulations (CRJ104_30_Introduction to Security)
What impact have federal regulations, rules and guidelines had on private business in the United States?
*Chapter 11 Discussion (BUS2113 Principles of Accounting)
1.) Liabilities are obligations that a business owes and are categorized. They are due within a years time.
2.) Current liabilities are a company’s short term financial obligations that are due within one year or within a normal operating cycle. Accounts includes accounts payable, short-term debt, dividends, and notes payable and taxes owed.
3.) Contingent liabilities are recorded as an expense on the income statement and a liability on the balance sheet.ÿ

× How can I help you?