Category Archives: Discussions
Accounting 1
1.Do you think all variances should be investigated and reported to top management or just those that are significant and/or over budget? Why? Answer in couple sentences
2.The overall goal of variance is showing a breakdown of standard and actual costs in material and labor. The reason companies will investigate variances is to see if they are showing indication of problem areas in the company (Jiambalvo, 2020). After reviewing the readings, all variances do not need to be investigated and reported to top management. Many managers are capable of analyzing variances set at a certain amount that needs to be reviewed.
SAMPLE ASSIGNMENT
IAE 250 scenario
I’m working on a cyber security multi-part question and need an explanation to help me learn.
I need help figuring out the answers to the questions. In full detail and I need help understanding the answers.
SAMPLE ASSIGNMENT
Management Question
Activity I: Product Development. Consider the simplified set of activities in the Table below for the development of a consumer product from initiation through the market test phase.
Activity |
Symbol |
Immediate predecessors |
Time estimate (weeks) |
Investigate demand |
A |
3 |
|
Develop pricing strategy |
B |
1 |
|
Design product |
C |
5 |
|
Conduct promotional cost analysis |
D |
A |
1 |
Manufacture prototype models |
E |
C |
6 |
Perform product cost analysis |
F |
E |
1 |
Perform final pricing analysis |
G |
B,D,F |
2 |
Conduct market test |
H |
G |
8 |
-
Draw the AOA network for this project.
-
Calculate total slacks and free slacks, and interpret their meaning. .
-
Determine the critical path and interpret its meaning.
-
Construct a Gantt chart and mark the latest start times for each activity.
Activity II: A project has 11 activities that can be accomplished either by one person working alone or by several people working together. The activities, precedence constraints, and time estimates are given in Table below. Suppose that you have up to five people who can be assigned on any given day. A person must work full days on each activity, but the number of people working on an activity can vary from day to day.
Activity |
Immediate predecessors |
Person-days required |
A |
10 |
|
B |
A |
8 |
C |
A |
5 |
D |
B |
6 |
E |
D |
8 |
F |
C |
7 |
G |
E,F |
4 |
H |
F |
2 |
I |
F |
3 |
J |
H,I |
3 |
K |
J,G |
2 |
-
Prepare an AOA network diagram, and calculate the critical path, total slacks, and free slacks assuming that one person (independently) is working on each task.
-
Prepare an early-start Gantt chart.
-
Prepare a daily assignment sheet for personnel with the goal of finishing the project in the minimum amount of time.
-
Prepare a daily assignment sheet to “best” balance the workforce assigned to the project.
-
By how many days could the project be compressed if unlimited personnel resources were available?
SAMPLE ASSIGNMENT
Management Figures and Their Theories
Management Figures and Their Theories:
Please prepare a 3-5 page critical essay to identify and analyze the management philosophy developed by one of the following scholars: Drucker, Blanchard, Deming, Porter, Collins, Follett, Minztberg, Weber, and Taylor. Your paper may include but not limited to the following:
-
-
What is the theory?
-
How does it differ from other similar theories?
-
Does it have any limitations?
-
Has it been widely adopted or contradicted?
-
What are the theoretical and practical significance?
-
What is your interpretation?
-
Do you have the intention to follow the principles in managing your team? Why and why not?
-
SAMPLE ASSIGNMENT
Time Series Simple Question 1
Plot of sample ACF and PACF of a monthly time series data on electricity consumption by domestic sector in a given district, obtained by 1 short term and 1 long term differences (Yt) for the period from January 2000 to December 2009 are shown in Fig. 3.1 & Fig. 3.2 respectively. Part of the final model fitted to the same data is also shown in Tables 3.1 and 3.2.
Figure 3.1 – Plot of SACF of the Y(1,12) series
Figure 3.2 – Plot of SPACF of the series Y(1,12)
Table 3.1 – Eviews output for the fitted model
|
Table 3.2 Breusch-Godfrey Serial Correlation LM Test: |
||||
F-statistic |
0.204007 |
Probability |
0.935638 |
|
Obs*R-squared |
0.862601 |
Probability |
0.929864 |
|
Test Equation: |
||||
Dependent Variable: RESID |
||||
Method: Least Squares |
||||
Date: 05/31/12 Time: 16:18 |
||||
Presample missing value lagged residuals set to zero. |
||||
Variable |
Coefficient |
Std. Error |
t-Statistic |
Prob. |
C |
0.000986 |
1.008738 |
0.000978 |
0.9992 |
MA(1) |
-0.156775 |
0.205190 |
-0.764051 |
0.4466 |
SMA(1) |
0.139314 |
0.466663 |
0.298532 |
0.7659 |
RESID(-1) |
0.011623 |
0.406263 |
0.028609 |
0.9772 |
RESID(-2) |
0.106383 |
0.164037 |
0.648530 |
0.5181 |
RESID(-3) |
0.119299 |
0.148040 |
0.805851 |
0.4222 |
RESID(-4) |
0.091219 |
0.132894 |
0.686408 |
0.4940 |
-
Specify two common features of the original series with justification based on Fig. 3.1.
-
Interpret the results in Table 3.1
-
Interpret the results in Table 3.2
-
Write down the final model.
-
Specify two short-comings in the selected model.
DETAILED ASSIGNMENT
20210404032142ts_analysis
Biology Question
I don’t understand this Biology question and need help to study.
I need help writing topic chosen. I will send all information regarding Paper
SAMPLE ASSIGNMENT
Software Development question
This week you need to select the type of cloud service model(s) you will use for your case study project. Describe the patterns of implementation of the project infrastructure in your report.
Your report must be at least 4 pages including conclussion and reference. and follow proper APA format. Cite any outside sources used in an APA-style reference page.
SAMPLE ASSIGNMENT
Social science question
-
Part 1: Wrestle with the essential question(s) and respond to it/them. Answer the question(s) clearly and concisely, providing evidence or examples for claims, cite the readings/videos/podcasts when appropriate, making connections to your life and/or current events, and being reflexive over how the material has shaped your previous and present understandings of the topic.
-
Part 2: List a SAC that fits within the bounds of this lesson. And briefly explain how you think this SAC is related to this module, what you learned, and make suggestions about how the SAC and module could be used in their future classroom.
Essential Question(s): How do the maps we see/use shape our view and perspective of the world?
SAMPLE ASSIGNMENT
Computer Science
Here is the link to the document and please write the answers on the that doc only
https://docs.google.com/document/d/1_Gfj_hX7p0tshS…
SAMPLE ASSIGNMENT
Cyber security project
Anti-Forensics Detection & Analysis Lab
Purpose: Apply knowledge and skills learned about anti-forensics techniques. Practice detecting and overcoming a wide variety of anti-forensic techniques.
Instructions: • Obtain the following 512MB USB image files from BlackBoard: o AntiForensics_A.001 ▪ MD5: 14EA9F129B75747D8319118B123847AE ▪ SHA-1: 1B50931A0695D8E525D61C7DEBB4690B71B540EB o AntiForensics_B.001 ▪ MD5: C55F980DC4A7972A7113D86E55EFBC46 ▪ SHA-1: 70ADC62977210D70DFF399376DDF63643D92D969 o AntiForensics_C.001 ▪ MD5: 0C11D069D370851B3D92C884DA413746 ▪ SHA-1: 4892B9960547BAA5C37D36AC3E7E04A659C3489A o AntiForensics_D.001 ▪ MD5: 16AB542DF4D76EB2DB0242C1E9D46900 ▪ SHA-1: 2E7CEF5B9D4B2B2698964BD66CEDD76EF900C817 •
Find all the evidence you can. o Evidence is anything containing the word ‘EVIDENCE’ or anything containing a picture of your suspect’s dog. Information about your suspect is listed below. o There are approximately 13 instances of anti-forensics / data obfuscation techniques (depending on how you count an instance). o You may need to apply skills and knowledge learned in Digital Forensic Analysis I.
-
Report on all evidentiary or suspicious findings.o Standard forensic reporting – metadata, discussion of findings, etc.o Include screenshots of your findings, including tool reports, if available (e.g. for John the Ripper password cracking report, and any other tools you use that has a report or log function).o Include a brief overview of your analytical strategy, steps taken, tools used, etc. Organize this section of your report by anti-forensics technique.Rules, Caveats, Hints, etc.:• What you initially know about your suspect: Her name is Lily Quinones. She is a Cyber Security major at the University of Texas at San Antonio (UTSA). She is currently a Senior in the College of Business. This is all you know at this point. Perhaps the files on the USBimage contain more information…• Analyze the UserAssist Registry Key provided to discover traces of programs used by the suspect.• Do not use FTK (or any other similarly designed / featured “all-in-one” digital forensics tool) to complete the lab. Such tools tend to do a good job at automatically extracting and alerting you to some of the anti-forensics techniques applied here. The point of this assignment is for you to think through anti-forensic techniques and then intelligently look for traces of them; the point is not to have your tool do all the work for you. You may, however, use such a tool to check your work after you’re done, or find remaining things after you’ve put forth all the effort you can/want to put into this lab. Write your findings up before doing so, however. • You can (and are recommended to) use WinHex. However, do not use its “File Recovery by Type” feature.• You will be graded primarily on your investigative approach and application of knowledge pertaining to anti-forensics techniques, more so than the degree of actual evidentiary discovery.• Be careful downloading open source tools to aid you in your search. Follow lab procedures regarding software installation. Be sure not to infect your systems or the lab systems with malware when searching for tools.• Anything that requires a password is either guessable (as it’s a commonly used password), or quickly (<5 minutes) crackable with a properly selected and configured forensic dictionary. (So no lab machines should be set to run overnight trying to crack passwords/encryption in this lab assignment.)• Every entry in your biographical dictionary should be a single lower-case word. For example, Cyber Security would be entered as “cyber” and “security”.Hint: Anti-forensic technologies applied to the disk imagesRotational Cipher, XOR Cipher, Password Cracking, Steganography (advanced), Data caving, Data recovery
SAMPLE ASSIGNMENT