Calculate earnings per share in 2014 and 2015.
Financial information for Forever 18 includes the following selected data (in millions)($ In millions)20152014Net Income171201Dividends on preferred stock2116Average shares outstanding (In millions)228300Stock price11.9710.92Required:1-a. Calculate earnings per share in 2014 and 2015. (Enter you answers in millions.)1-b. Did earnings per share increase in 2015?· No· Yes2-a. Calculate the price-earnings ratio in 2015 and 2015. (Enter your answer in millions. Round your answers to 2 decimal places.)2-b. In which year is the stock period lower in relations to reported earnings?· 2014· 2015
Which one of the following is not an ownership right of a stockholder in a corporation?
FIN 534 Quiz 3Question 1Which one of the following is not an ownership right of a stockholder in a corporation?To share in assets upon liquidation.To share in corporate earnings.To declare dividends on the common stock.To vote in the election of directors.Question 2A corporation has the following account balances: Common stock, $1 par value, $30,000; Paid-in Capital in Excess of Par Value, $1,350,000. Based on this information, theaverage price per share issued is $4.60.number of shares outstanding are 1,380,000.number of shares issued are 30,000.legal capital is $1,380,000.Question 3If stock is issued for a noncash asset, the asset should be recorded on the books of the corporation atfair market value.a nominal amount.cost.zero.Question 4Which of the following represents the largest number of common shares?Outstanding sharesTreasury sharesIssued sharesAuthorized sharesQuestion 5A corporation purchases 20,000 shares of its own $20 par common stock for $35 per share, recording it at cost. What will be the effect on total stockholders equity?Increase by $400,000Increase by $700,000Decrease by $700,000Decrease by $400,000Question 6The acquisition of treasury stock by a corporationhas no effect on total assets and total stockholders equity.requires that a gain or loss be recognized on the income statement.increases its total assets and total stockholders equity.decreases its total assets and total stockholders equity.Question 7Which of the following is not a right or preference associated with preferred stock?First claim to dividends.Preference to corporate assets in case of liquidation.The right to vote.To receive dividends in arrears before common stockholders receive dividends.Question 8If preferred stock is cumulative, thepreferred dividends not declared in a given year are called dividends in arrears.preferred shareholders and the common shareholders receive equal dividends.preferred shareholders and the common shareholders receive the same total dollar amount of dividends.common shareholders will share in the preferred dividends.Question 9When common stock is issued for services or non-cash assets, cost should beeither the fair market value of the consideration given up or the consideration received, whichever is more clearly evident.the book value of the common stock issued.only the fair market value of the consideration given up.only the fair market value of the consideration received.Question 10Common Stock Dividends Distributable is classified as a(n)asset account.stockholders equity account.expense account.liability account.Question 11Indicate the respective effects of the declaration of a cash dividend on the following balance sheet sections:Total Assets Total Liabilities Total Stockholders EquityIncrease Decrease No changeDecrease No change IncreaseNo change Increase DecreaseDecrease Increase DecreaseQuestion 12Which of the following show the proper effect of a stock split and a stock dividend?Item Stock Split Stock DividendTotal paid-in capital Increase IncreaseTotal retained earnings Decrease DecreaseTotal par value (common) Decrease IncreasePar value per share Decrease No changeQuestion 13Restricting retained earnings for the cost of treasury stock purchased is alegal restriction.contractual restriction.stock restriction.voluntary restriction.Question 14Retained earnings are occasionally restrictedto set aside cash for dividends.due to contractual loan restrictions.to keep the legal capital associated with paid-in capital intact.if preferred dividends are in arrearsQuestion 15Prior period adjustmentsmay only decrease retained earnings.do not affect retained earnings.may only increase retained earnings.may either increase or decrease retained earnings.
Explain where you would invest your advertising budget and how you would generate free publicity to extend your advertising budget.
1.) Week 5 DiscussionBootstrap Marketing and Advertising Please respond to the following:Using the Internet or Strayer databases, find three (3) examples of bootstrap marketing strategies. Next, develop a bootstrapping marketing idea that will help promote a small business at a minimal expense. Be creative and thorough in developing the idea for this implementation.Assume you have an advertising budget of $1,500 to invest in a campaign promoting an upcoming sale or special event for your business. Your target customers are 25- to 45-year-old individuals with higher-than-average disposable income. Explain where you would invest your advertising budget and how you would generate free publicity to extend your advertising budget.2.) Student Response Bootstrap Marketing and Advertising Please respond to the following:Using the Internet or Strayer databases, find three (3) examples of bootstrap marketing strategies. Next, develop a bootstrapping marketing idea that will help promote a small business at a minimal expense. Be creative and thorough in developing the idea for this implementation. Assume you have an advertising budget of $1,500 to invest in a campaign promoting an upcoming sale or special event for your business. Your target customers are 25- to 45-year-old individuals with higher-than-average disposable income. Explain where you would invest your advertising budget and how you would generate free publicity to extend your advertising budget. Hello all,When marketing a business weather it is a small business or a major corporation, we have to look at cost and set up a goal to our marketing in terms of capacity of the volume of business that we would like to bring in. choosing the strategies all depends on the type of business, and the client base that we are working with. my favorite marketing strategies are as follows: Social media, such as, facebook, google/yelp reviews/ pay per click ads. Bill boards on a busy highway or street close to the business location anticipated. third, i would pick text messaging/ emailing the client base through capturing there data throughout the times that they have visited the business and had an interaction with it. When considering all above options, cost is minimal and sometimes free for our google/yelp reviews and facebook advertisement throughout a personal profile or a business page.For the second portion of the question, i would invest in text message blast, radio remotes and events for the hottest radio station in town and for that type of a budget we can probably also send mailers to at least 3 zip codes in the surrounding area. We will also social media blast the event and spread the word out to our clients and as many people that we can spread the word out to using the word of mouth.Thank you all for reading.
Identify the interdisciplinary foundations of criminological theory
Interdisciplinary Foundations of Criminal TheoryWithin every criminal justice field, practitioners use and agencies set forth practice, policy, and procedure. The interdisciplinary foundations, biological, sociological, and psychological impact these three Ps of criminal justice.Create a 1012 slide PowerPoint presentation that includes the following:Identify the interdisciplinary foundations of criminological theoryExamine how the interdisciplinary foundations relate to each of the following: criminal justice practice, policy, and procedure.Compare the interdisciplinary foundations to determine the most significant impact on current criminal justice practice, policy and procedure.Illustrative examples of each of the following: practice, policy, and procedure.Directions:Your 1012-slide requirement excludes your introduction and reference slides.Use one basic slide design and layout.Limit slides to between 6 and 8 lines of content.Use bullets for main points.Use speaker notes to fully explain what is being discussed in the bullet points as though you are presenting to an audience.Include an introduction slide and a references slide.Include at least five credible, outside sources.All citations of outside sources plus the listing of all references should adhere to APA style
Analyze what Schering-Plough and Jim Reed did to motivate Fred, why it did or did not work
Write 6 Pages double space with the exception of recommendation and reference page. References not less than 7 good quality research papers to substantiate the discussion and add value to the extant literature in the field of study. Review the attached journal and practice caseCase 2: How to Motivate Fred Maiorino? (100 Points)You may or may not agree with Schering-Ploughs actions to terminate Fred because he was arecalcitrant, over the hill salesman who was not performing up to their standards. They claimed that theymade an effort to help him get higher numbers. Analyze what Schering-Plough and Jim Reed did tomotivate Fred, why it did or did not work, etc. In this Analysis section, discuss as many importantmotivation-related issues as you can so that you complete a thorough analysis. Also, make sure that youinclude as much reference support as possible in order to back up your discussion. In a separate sectionentitledRecommendations, I would also like you to recommend some other things that the companyand Jim Reed could have done to increase Freds motivation. Be thorough in your discussion and providereference support for your recommendations. Include the full citations for all of your references on yourReferencepage at the end of your analysis, following the APA Guidelines that I provided you in DocSharing. You will be evaluated in accordance with the grading rubric provided at the end of this document.Submit this assignment to the Case 1 Assignment dropbox. Dont forget to submit your case toTurnitin.com (without the reference page/pages) prior to submitting the complete case (with the referencepage/pages) to the dropbox.
What factors led to a rise in tensions within colonial communities in the early 1700s?
1. What factors led to a rise in tensions within colonial communities in the early 1700s?2. How did social, economic, and political tensions contribute to an increase in the accusations of witchcraft?3. Why and how did the legal and economic status of colonial women decline between 1650 and 1750?4. How did patriarchal ideals of family and community shape life and work in colonial America? What happened when men failed to live up to those ideals?5. How and why did economic inequality in the colonies increase in the first half of the eighteenth century?6. How did population growth and increasing diversity contribute to conflict among and anxieties about the various groups inhabiting British North America?7. What groups were most attracted to the religious revivals of the early eighteenth century? Why?8. What were the legacies of the Great Awakening for American religious and social life?9. How did ordinary colonists, both men and women, black and white, express their political opinions and preferences in the first half of the eighteenth century?10. How did politics bring colonists together across economic lines in the first half of the eighteenth century? How did politics highlight and reinforce class divisions?
Calculate the timing of password-guessing attacks
1. Calculate the timing of password-guessing attacks:(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?(b) Argue for a particular amount of time as the starting point for secure. That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?(c) If the cutoff between insecure and secure were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password. 2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access. per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access) per-object access control list (that is, one list for each object tells all the subjects who have access to that object) access control matrix capability3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections? 5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner. 6. Defeating authentication follows the methodopportunitymotive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication. 7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver. 8. Humans are said to be the weakest link in any security system. Give an example for each of the following:(a) a situation in which human failure could lead to a compromise of encrypted data(b) a situation in which human failure could lead to a compromise of identification and authentication(c) a situation in which human failure could lead to a compromise of access control.9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value?10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?
Develop research questions that address contemporary issu es in criminal justice by applying a ppropriate criminological theories
GuidelinesandRubricOverviewYour final project in this course is the development of aresearch report.The fundamental responsibility of criminal justice personnel is based on sound decision making. Using the scientific method within the criminal justiceinvestigations process allows investigators the opportunity to base their findings on factual data and ethical reasoning. This is especially important within thefield of criminal justice because the decisions made undergo rigorous scrutiny from entities such as the media, judiciary system, and the general public. Creatingliterature reviews isa common practice when explaining trends within the criminal justice field. For example, as a criminal justice representative, you may betasked with explaining why calls of domestic violence have increased in a specific area in your jurisdiction over a certain periodof time. It is your responsibility togather and interpret data, analyze criminological theories, and make use of the scientific method to offer an explanation forthe increase, as well as an effectiveavenue of resolution. In thefinal projectyou will practically apply research methods to come to informed conclusions.For this assessment, you will play the part of an individual currently employed at a criminal justice agencysuch as a police force, a correctional institution, or acourt system. Your administrative staff holds monthly meetings to discuss trends, departmental issues, and community concerns. Your supervisor hasapproachedyou and told you that there has been a trend of increased incidents related to a specific issue, and furthermore, the community has taken notice. Your supervisormust provide an answer to the administrative staff and the community, and would like your assistance. You have been tasked with conducting initial research onthe issue to inform the direction of your supervisorsfurther research and statement to the administrative staff and community.To begin, you will be presented with a predetermined list of issues impacting the field of criminal justice. You are to choose an issue, or select an issue outside ofthe list withinstructor approval. You will then seek out five peerreviewed scholarly articles, two of which must use qualitative methodology, andsynthesize andcritically analyze theliteraturetodevelop a research question and createdatainformed conclusionsabout your selected issue. Additionally, you must identify themethodologyused in each article, and explain the importance of using the scientific method to practice ethical research.The project is divided intothreemilestones, which will be submittedat various points throughout the course to scaffold learning and ensure quality finalsubmissions. These milestones will be submitted inModulesTwo,Four,andFive.The finalproductwillbe submittedinModuleSeven.Additionally, throughoutthe course you will work on a series of worksheets that directly relate to elements of your final research report.These worksheets will be submittedinModulesOne, Three,andSix.In this assignment,you will demonstrateyour mastery of the following course outcomes:?Developresearch questionsthat address contemporary issues in criminal justice by applying appropriate criminological theories?Interpret criminal justiceresearchto identify patterns for drawing evidencebased conclusions
How does the Queen provide payment for the service by the fig wasps?
The Queen of TreesThis video shows the intimate relationships within a community of organisms in an African savannah ecosystem. Your task is to complete the questions and map out the connections among the various organisms within the community. You should indicate the trophic level to which the organism belongs, its relationship to the Queen and any other direct relationships to other organisms in the community. The connections within the community should be illustrated. The figure on page 3 of this handout gives an example of how to illustrate those connections. The arrow tips point in the directions of where the energy is flowing. For example, the fruit bats feed on the fruit of the fig tree so the arrow is a one-way directions towards the bats.To submit this quiz: download the template, as you watch the video complete the table below, complete the questions on page 3, and complete the construction of your food web illustrating the connections listed in the table and then upload your document.If you do not know how to construct the food web electronically, you may draw your food web, scan a digital image (or take a photo) of the food web and submit it.Trophic levels: The position that an organisms occupies in a food chain. It shows the flow of energy through an ecosystem. Energy is always lost from one trophic level to the next.· Producers autotrophic organisms using solar or chemical energy to produce all the organic nutrients for an ecosystem.· Consumers heterotrophic organisms that cannot make their own food. They get energy from the chemical bonds in the nutrients they eat.· Primary consumers (herbivores) eat primary producers (plants).o Conversion efficiency: only 10 to 20 percent of the available energy passes from producers to primary consumers.· Secondary consumers (carnivores) eat primary consumers (herbivores).o Conversion efficiency: only 5 to 10 percent of the available energy passes from primary consumers to secondary consumers.· Tertiary consumers (carnivores) eat secondary consumers (carnivores).o The conversion efficiency for tertiary consumers may be as low as 1%.· Omnivores eat both plants and animals.· Decomposers break down dead tissues and wastes.Table 1 Relationships and trophic levelsOrganismTrophic LevelConnections with the Queen/communitySycamore Fig TreePrimary producerFig waspGrey Horn BillSecondary consumerUses the Queen as a nesting site, consumes insects that prey on queenCaterpillarsGiraffesFig CadididPink MantisVinegar FliesParasitic NematodesAntsHilda bug nymphsBeesFig CicadasMonkeysGeckoSpiderCrocodileElephantsTiger beetlesButterfliesSeed bugsFruit batsPrimary consumersSeed dispersal for the QueenQuestionsHow does the Queen protect herself from predation?What do the ants provide for the Queen?What do the ants get in return for their service to the Queen?What interesting behavior did the Fig cicadas display? What is the ultimate causation of this behavior?What service do the fig wasps provide for the Queen?How does the Queen provide payment for the service by the fig wasps?What happened to the second horn bill chick?How does the gecko protect itself from being consumed by the snake?How did the humans gather honey?The behavior the bees displayed as the humans gathered the honey is an example of proximate or ultimate causation?Fruit batsExample food web
Create a cyber-security policy describing the principle, the objective, and policy statement for the law firms company network.
Project Deliverable 5: Cybersecurity Policy CatalogProject Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.Submission RequirementsInfrastructure Document (MS Word)Security Project Plan (MS Project)Section 1Write a three to five (3-5) page paper in which you:Create a cyber-security policy describing the principle, the objective, and policy statement for the law firms company network.Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.Determine the security testing methodology you would use to facilitate the assessment of technical controls.Section 2Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:Tasks, subtasks, resources, and predecessors.An outline of the planning, analysis, design, and implementation phases.The use of cyber-security in the information systems development life cycle.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Determine the strategy for cybersecurity and public policy development in the U.S.Use technology and information resources to research issues in information assurance.Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.