Entries by Student

write my assignment 9508

Below is the question that I am having difficulty with. I used a similar questions mathematics to try and solve it myself but I keep getting the wrong answer and I keep getting different answers as well. I fear that I am doing the formula incorrectly. Can anyone please provide guidance?

During the morning hours at a catalog sales department, telephone calls come in at the rate (Poisson) of 36 per hour. Calls that cannot be answered immediately are put on hold. The system can handle 8 callers on hold. If additional calls come in, they receive a busy signal. The 3 customer service representatives who answer the calls spend an average of 3 minutes with a customer. Use Table 1 and Table 2.

What is the probability that a caller will get a busy signal? (Hint: Solve for log K or ln K using trial and error.) (Do not round intermediate calculations. Round your answer to 5 decimal places.)

(Do not round intermediate calculations. Round your answer to 3 decimal places.)

 

"Not answered?"


Get the Answer

write my assignment 20920

Write a 5 page essay on Policy Paper.

In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).

The security policy addresses antivirus, spyware, and adware in a medium-sized organization. If defines the handling of computer gadgets in the organization including how regularly computer software maintenance is expected to be performed, the manner in which computer updates are conducted, the type of programs to be installed and used on computers. The policy also defines the means by which prevention and removal of malware programs from computers is done (Aycock, 2011). It also denotes the types of files attachments to be blocked at the mail server, anti-virus and anti-spyware programs to be run on the server. The policy also specifies whether the use an anti-spam firewall is acceptable in order to offer additional security measures to the mail server (Aycock, 2011).

It also specifies the manner in which files should be availed to the trusted sites and the examination process to determine unwanted or hostile content. A virus has the ability to replicate and distribute to other programs in the computer (Aycock, 2011). It also causes damage by using up computer memory, reformatting the hard disk and deleting files. A spyware automatically gathers information from a computer and online activities and transfers it to other interested parties. Adware is financially supported or that which offers financial support to a different program through the display of ads when a computer is connected to the internet (Aycock, 2011).

This policy is applicable to all computers and servers that are connected or associated with the organization network through wireless connections, standard network connections, virtual private network connections or modem connections. The policy explicitly includes computers owned by the organization, individuals or sharing the organization’s network. The computer

 

"Not answered?"


Get the Answer

write my assignment 13247

 

"Not answered?"


Get the Answer

write my assignment 2347

Katherine is evaluating a capital budgeting project that should last for 4 years. The project requires $700,000 of equipment. She is unsure what depreciation method to use in her analysis, straight-line or the 3-year MACRS accelerated method. Under straight-line depreciation, the cost of the equipment would be depreciated evenly over its 4-year life (ignore the half-year convention for the straight-line method). The applicable MACRS depreciation rates are 33, 45, 15 and 7 percent as discussed in Appendix 12A. The company’s required return on capital is 10 percent and its tax rate is 40 percent.Which depreciation method would produce the higher NPV, and how much higher would it be?

 

"Not answered?"


Get the Answer