Category Archives: Discussions

Accounting 1

1.Do you think all variances should be investigated and reported to top management or just those that are significant and/or over budget? Why? Answer in couple sentences

2.The overall goal of variance is showing a breakdown of standard and actual costs in material and labor. The reason companies will investigate variances is to see if they are showing indication of problem areas in the company (Jiambalvo, 2020). After reviewing the readings, all variances do not need to be investigated and reported to top management. Many managers are capable of analyzing variances set at a certain amount that needs to be reviewed.

SAMPLE ASSIGNMENT

IAE 250 scenario

I’m working on a cyber security multi-part question and need an explanation to help me learn.

I need help figuring out the answers to the questions. In full detail and I need help understanding the answers.

SAMPLE ASSIGNMENT

Management Question

Activity I: Product Development. Consider the simplified set of activities in the Table below for the development of a consumer product from initiation through the market test phase.

Activity

Symbol

Immediate predecessors

Time estimate (weeks)

Investigate demand

A

3

Develop pricing strategy

B

1

Design product

C

5

Conduct promotional cost analysis

D

A

1

Manufacture prototype models

E

C

6

Perform product cost analysis

F

E

1

Perform final pricing analysis

G

B,D,F

2

Conduct market test

H

G

8

  1. Draw the AOA network for this project.

  2. Calculate total slacks and free slacks, and interpret their meaning. .

  3. Determine the critical path and interpret its meaning.

  4. Construct a Gantt chart and mark the latest start times for each activity.

Activity II: A project has 11 activities that can be accomplished either by one person working alone or by several people working together. The activities, precedence constraints, and time estimates are given in Table below. Suppose that you have up to five people who can be assigned on any given day. A person must work full days on each activity, but the number of people working on an activity can vary from day to day.

Activity

Immediate predecessors

Person-days required

A

10

B

A

8

C

A

5

D

B

6

E

D

8

F

C

7

G

E,F

4

H

F

2

I

F

3

J

H,I

3

K

J,G

2

  1. Prepare an AOA network diagram, and calculate the critical path, total slacks, and free slacks assuming that one person (independently) is working on each task.

  2. Prepare an early-start Gantt chart.

  3. Prepare a daily assignment sheet for personnel with the goal of finishing the project in the minimum amount of time.

  4. Prepare a daily assignment sheet to “best” balance the workforce assigned to the project.

  5. By how many days could the project be compressed if unlimited personnel resources were available?

SAMPLE ASSIGNMENT

Management Figures and Their Theories

Management Figures and Their Theories:

Please prepare a 3-5 page critical essay to identify and analyze the management philosophy developed by one of the following scholars: Drucker, Blanchard, Deming, Porter, Collins, Follett, Minztberg, Weber, and Taylor. Your paper may include but not limited to the following:

    • What is the theory?

    • How does it differ from other similar theories?

    • Does it have any limitations?

    • Has it been widely adopted or contradicted?

    • What are the theoretical and practical significance?

    • What is your interpretation?

    • Do you have the intention to follow the principles in managing your team? Why and why not?

SAMPLE ASSIGNMENT

Time Series Simple Question 1

 Plot of sample ACF and PACF of a monthly time series data on electricity consumption by  domestic sector in a given district, obtained by 1 short term and 1 long term differences  (Yt) for the period  from January 2000 to December 2009 are shown in Fig. 3.1 & Fig. 3.2 respectively.   Part of  the final model fitted to the same data is also shown in Tables 3.1 and 3.2.

Figure 3.1 – Plot of SACF of  the Y(1,12) series

 

Figure   3.2 – Plot of SPACF of the series Y(1,12)

                                         Table 3.1 – Eviews output for the fitted model

Dependent Variable: D(Y,1,12)

Included observations: 107 after adjustments

Convergence achieved after 10 iterations

Backcast: 12 13

Variable

Coefficient

Std. Error

t-Statistic

Prob.

C

0.307937

0.993209

0.310043

0.7571

MA(1)

-0.752623

0.099966

-7.528812

0.0000

SMA(1)

-0.205122

0.038057

-5.389863

0.0000

R-squared

0.784528

    Mean dependent var

0.383178

Adjusted R-squared

0.774615

    S.D. dependent var

69.55677

S.E. of regression

50.41714

    Akaike info criterion

10.70618

Sum squared resid

264356.3

    Schwarz criterion

10.78112

Log likelihood

-569.7804

    F-statistic

48.87842

Durbin-Watson stat

1.985581

    Prob(F-statistic)

0.000000

 

Table 3.2    Breusch-Godfrey Serial Correlation LM Test:

F-statistic

0.204007

    Probability

0.935638

Obs*R-squared

0.862601

    Probability

0.929864

Test Equation:

Dependent Variable: RESID

Method: Least Squares

Date: 05/31/12   Time: 16:18

Presample missing value lagged residuals set to zero.

Variable

Coefficient

Std. Error

t-Statistic

Prob.

C

0.000986

1.008738

0.000978

0.9992

MA(1)

-0.156775

0.205190

-0.764051

0.4466

SMA(1)

0.139314

0.466663

0.298532

0.7659

RESID(-1)

0.011623

0.406263

0.028609

0.9772

RESID(-2)

0.106383

0.164037

0.648530

0.5181

RESID(-3)

0.119299

0.148040

0.805851

0.4222

RESID(-4)

0.091219

0.132894

0.686408

0.4940

  • Specify two common features of the original series with justification based on Fig. 3.1.

  • Interpret the results in Table 3.1

  • Interpret the results in Table 3.2

  • Write down the final model.

  • Specify two short-comings in the selected model.

DETAILED ASSIGNMENT

20210404032142ts_analysis

Biology Question

I don’t understand this Biology question and need help to study.

I need help writing topic chosen. I will send all information regarding Paper

SAMPLE ASSIGNMENT

Software Development question

This week you need to select the type of cloud service model(s) you will use for your case study project. Describe the patterns of implementation of the project infrastructure in your report.

Your report must be at least 4 pages including conclussion and reference. and follow proper APA format. Cite any outside sources used in an APA-style reference page.

SAMPLE ASSIGNMENT

Social science question

  • Part 1: Wrestle with the essential question(s) and respond to it/them. Answer the question(s) clearly and concisely, providing evidence or examples for claims, cite the readings/videos/podcasts when appropriate, making connections to your life and/or current events, and being reflexive over how the material has shaped your previous and present understandings of the topic.

  • Part 2: List a SAC that fits within the bounds of this lesson. And briefly explain how you think this SAC is related to this module, what you learned, and make suggestions about how the SAC and module could be used in their future classroom.

Essential Question(s): How do the maps we see/use shape our view and perspective of the world?

SAMPLE ASSIGNMENT

Computer Science

Here is the link to the document and please write the answers on the that doc only

https://docs.google.com/document/d/1_Gfj_hX7p0tshS…

SAMPLE ASSIGNMENT

Cyber security project

Anti-Forensics Detection & Analysis Lab

Purpose: Apply knowledge and skills learned about anti-forensics techniques. Practice detecting and overcoming a wide variety of anti-forensic techniques.

Instructions: • Obtain the following 512MB USB image files from BlackBoard: o AntiForensics_A.001 ▪ MD5: 14EA9F129B75747D8319118B123847AE ▪ SHA-1: 1B50931A0695D8E525D61C7DEBB4690B71B540EB o AntiForensics_B.001 ▪ MD5: C55F980DC4A7972A7113D86E55EFBC46 ▪ SHA-1: 70ADC62977210D70DFF399376DDF63643D92D969 o AntiForensics_C.001 ▪ MD5: 0C11D069D370851B3D92C884DA413746 ▪ SHA-1: 4892B9960547BAA5C37D36AC3E7E04A659C3489A o AntiForensics_D.001 ▪ MD5: 16AB542DF4D76EB2DB0242C1E9D46900 ▪ SHA-1: 2E7CEF5B9D4B2B2698964BD66CEDD76EF900C817 •

Find all the evidence you can. o Evidence is anything containing the word ‘EVIDENCE’ or anything containing a picture of your suspect’s dog. Information about your suspect is listed below. o There are approximately 13 instances of anti-forensics / data obfuscation techniques (depending on how you count an instance). o You may need to apply skills and knowledge learned in Digital Forensic Analysis I.

  • Report on all evidentiary or suspicious findings.o Standard forensic reporting – metadata, discussion of findings, etc.o Include screenshots of your findings, including tool reports, if available (e.g. for John the Ripper password cracking report, and any other tools you use that has a report or log function).o Include a brief overview of your analytical strategy, steps taken, tools used, etc. Organize this section of your report by anti-forensics technique.Rules, Caveats, Hints, etc.:• What you initially know about your suspect: Her name is Lily Quinones. She is a Cyber Security major at the University of Texas at San Antonio (UTSA). She is currently a Senior in the College of Business. This is all you know at this point. Perhaps the files on the USBimage contain more information…• Analyze the UserAssist Registry Key provided to discover traces of programs used by the suspect.• Do not use FTK (or any other similarly designed / featured “all-in-one” digital forensics tool) to complete the lab. Such tools tend to do a good job at automatically extracting and alerting you to some of the anti-forensics techniques applied here. The point of this assignment is for you to think through anti-forensic techniques and then intelligently look for traces of them; the point is not to have your tool do all the work for you. You may, however, use such a tool to check your work after you’re done, or find remaining things after you’ve put forth all the effort you can/want to put into this lab. Write your findings up before doing so, however. • You can (and are recommended to) use WinHex. However, do not use its “File Recovery by Type” feature.• You will be graded primarily on your investigative approach and application of knowledge pertaining to anti-forensics techniques, more so than the degree of actual evidentiary discovery.• Be careful downloading open source tools to aid you in your search. Follow lab procedures regarding software installation. Be sure not to infect your systems or the lab systems with malware when searching for tools.• Anything that requires a password is either guessable (as it’s a commonly used password), or quickly (<5 minutes) crackable with a properly selected and configured forensic dictionary. (So no lab machines should be set to run overnight trying to crack passwords/encryption in this lab assignment.)• Every entry in your biographical dictionary should be a single lower-case word. For example, Cyber Security would be entered as “cyber” and “security”.Hint: Anti-forensic technologies applied to the disk imagesRotational Cipher, XOR Cipher, Password Cracking, Steganography (advanced), Data caving, Data recovery

SAMPLE ASSIGNMENT
Powered by WordPress