Entries by Student

write my assignment 26517

6) Quattro Corporation signed a lease from Cinco Leasing Company of July 1 Year 1, for equipment having a five-year useful life. The lease does not include any option to purchase the equipment at the end of the four-year lease term, nor does it include a provision for ownership transfer. Five equal payments of $10,000 per year are required by the term of the lease, with the first payment due upon signing. Quattro’s incremental borrowing rate is 8%, but its implicit interest rate is unknown.Present value of an annuity at 8% for 5 years = 3.993Present value of an annuity at 8% for 4 years = 3.312On its December 31, 20X3 financial statements, Quatto would display the following amounts in the indicated accounts:Equipment ; Accumulated Depreciation; Lease Payablee) $0;$0;$0f) $43,120; $5,390; $33,120g) $43,120; $4,312; $33,120h) $49,930; $6,241; $39,9307) Finance Here Sales & Service provides leased-based financing for its full line of commercial generators. Sales of the generators are properly accounted for as operating sales-type leases. Terms of the leases include return of the generators to Finance Here Sales & Service for resale in secondary markets. The company estimates that the non-guaranteed residual values on generators are equal to an average of 10 percent of the historical cost of the generators. Finance Here Sales & Service can expect that: 

A) Cost of goods sold will be equal to the historical cost of the generators sold. 
B) Cost of goods sold will be greater than the historical cost of the generators sold. 
C) Cost of goods sold will be less than the historical cost of the generators sold. 
D) The relationship of cost of goods sold and the historical cost of the generators cannot be determined.8) Capius Corporation issued 2000 bonds in $1000 individual denominations. Each bond has twenty detachable warrants. The bonds and warrants were sold at 110. At the time the bond were issued each warrant had a market value to one percent of the face value of one bond. Capius will account for this transaction as:E) Bond payable with an unamortized premium and a credit to Additional Paid In Capital WarrantsF) Bond payable with an unamortized premium and a debit to Additional Paid In Capital WarrantsG) Bond payable with an unamortized discount and a credit to Additional Paid In Capital WarrantsH) Bond payable with an unamortized discount and a debit to Additional Paid In Capital Warrants

 

"Not answered?"


Get the Answer

write my assignment 12950

80, 71, 81, 99, 1, 54, 55, 16, 20, 27, 61, 62, 79, 68, 35, 37, 38, 41, 45, 49, 50, 21, 27, 50, 51, 55, 55, 60, 61, 70

PROBLEM #10. The last concept we want to cover is “rare events” or “unusual values”. How do we identify them? This does NOT mean that if a data point is “unusual” we can simply delete it. Any deletions MUST be justifiable. Imagine if a pharmaceutical company deleted the one death in 100 patients taking a new medication because it was “unusual”. Want to take that pill?  

An UNUSUAL data point can be characterized two ways (for us) DO BOTH FOR OUR 30 DATA POINTS:

(a) Any data point that is more than TWO (2) standard deviations ABOVE OR BELOW the mean.

(b) Any data point that is more than Q3 + (1.5 * IQR) ABOVE OR BELOW the mean.

(c) ARE ANY DATA POINTS “UNUSUAL”?  

Next week we move into PROBABILITY which is the basis for INFERENTIAL STATISTICS. This allows us to test hypotheses about a POPULATION, based on samples taken from that population. This is what statistics is all about. It starts with PROBABILITY, meaning that life is a “crap shoot”. Failing to realize that, we have the famous last words: “What could go wrong?”  

Can someone breakdown this probelm for me?

 

"Not answered?"


Get the Answer

write my assignment 18283

Scenario SummaryYou are the Manager of Information Security Operations for a medium-sized organization and report directly to the Chief Information Security Officer (CISO) in the Information Security department. The organization consists of a headquarters and six other geographically dispersed offices. You work at the headquarters location and manage a team of five security engineers. The role of the Information Security department is to ensure the confidentiality, integrity, and availability of the organization’s data and systems. One of your key responsibilities is to understand, analyze, and design the security architecture for the enterprise network. This network not only supports the internal employees of the organization, but also leverages the Internet for communication with vendors, customers, and remote employees. Your team of five security engineers is responsible for the following areas of network security:• Network Security Policy Planning and Implementation• Attack Prevention and Mitigation• Secure Authentication Techniques• Wireless LAN (WLAN) Security and Authentication• Hardware Firewalls and DMZs• WAN Security• Virtual Private Networks (VPNs)• Remote User Security and AuthenticationYour Role/AssignmentFollowing a recent increase in cyber attacks in the industry, the CISO has directed you to develop network security strategies that will ensure that the organization’s network is protected from both internal and external security risks. He will be providing three briefings to the CIO on specific topics (to be determined) regarding the overall security posture of the organization. Prior to each meeting, the CISO will request you provide him with a one-page summary on a specific network security-related topic.

 

"Not answered?"


Get the Answer

write my assignment 24917

Assignment 2: Ethical Implications of Cultural Abuse

After addressing the challenges leaders and managers face regarding diversity in M6: Assignment 1, let us focus on how leaders and managers might abuse power in dealing with a diverse workforce. Consider the role cultural stigmas play regarding how leaders and managers communicate with and react to a diverse workforce. Consider the importance of diversity training for leaders, managers, and employees. Further, consider how sociocultural factors related to leaders, managers, and employees help or hinder functionally effective communications. Finally, there is the ethical consideration of determining whether a leader or manager’s use of power to gain compliance is acceptable.

Using the module readings and the Argosy University online library resources, research the ethical implication of cultural abuse. Based on your research, respond to the following:

  • Explain the ethical implications of cultural abuse of leader/manager power. Your response should not simply state whether cultural abuse of power is ethical or unethical but also include the underlying theoretical premise that justifies your position as well as personal experiential examples.
  • Briefly discuss how diversity might influence (hinder or aid) such abuse.
  • Research your textbook as well as appropriate trade journals and academic peer-reviewed journals to support your arguments.

Write a 3–4-page paper in Word format. Note: The title page, references, and appendices are not included in the page count.

Apply APA standards to citation of sources. Click here to download the APA Guide. Use this guide to format your assignment.

Write your responses in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; display accurate spelling, grammar, and punctuation per APA (6th edition) standards.

 

"Not answered?"


Get the Answer