stat i excel project

p4 fall 2014 ma 117 yourlastname.xlsx 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

a short paper on mill

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

georgia agrees to lend money to matt at a special interest rate of 9 9 per year

Georgia agrees to lend money to Matt at a special interest rate of 9.9% per year, on the condition that he borrow enough that he would pay her $573 in interest over a 9 month period. What was the minimum amount Matt could borrow? 

A) $8681.82 

B) $6945.45 

C) $7652.86

 D) $7717.17

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

elasticities amp market structure phase 2

write 600–800 words; 

The board of directors at AutoEdge is actively discussing several options to address flagging revenue. One option continues to surface during each board meeting; that is, relocating the manufacturing operation back to the United States. Longtime Chief Financial Officer, Ingrid Adams, leads the group that is in favor of this option.

Ingrid Adams approaches you in the company break room.

“Hello,” she says. “I’m glad I saw you.”

“Hi,” you say. “What can I do for you?”

“I have a question about economics,” she says. “I think you can help me explain something to some shareholders on the board.”

“Economics! My favorite subject,” you say. “What’s your question?”

“If AutoEdge decided to increase its prices and return to the United States,” she says, “how would this action affect consumer demand? I want to know your opinion about elasticity.”

“Sure,” you say. “So you want to know if the elasticity for auto parts is considered to be relatively inelastic, relatively elastic, unitary elastic, perfectly elastic, or perfectly inelastic. Right?”

“Exactly,” she says.

“I have an opinion,” you say. “Do you want to talk about it now, or do you want something in writing?”

“Something in writing would be best,” she says. “Would you explain your opinion so that I can respond to questions from other members of the board, too?”

“I’d be glad to,” you say. “I’ll put something together this afternoon and get it to you before I leave today. Is that soon enough?”

“Perfect,” she says. “Thanks for your help.”

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

estimating returns assessment

2-1 Estimating Returns Assessment

Preparation

For this assessment, you will use a hypothetical situation in order to demonstrate the use of a probability analysis in estimating returns. Imagine the following scenario:

A company is faced with a 20 percent chance of a poor economy, a 40 percent chance of an average economy, and a 40 percent chance of an above-average economy. The company would expect only a 10 percent return in a poor economy, an 18 percent return in an average economy, and a 30 percent return in an above-average economy.

Instructions

Use this hypothetical situation above to answer these questions:

·  What would the expected return be for this company?

·  What would the standard deviation be for this company?

Then, explain how the standard deviation helps you better understand what to expect in terms of a return. Use at least two resources to support your ideas.

You have the option of either completing the calculations in a spreadsheet or just describing the steps in the process.

Other Requirements

·  Length: Your paper should be 1–2 typed, double-spaced pages. In addition, include a title page and references.

2-2 Refinancing Decision Assessment

Instructions

Changing interest rates create opportunities for home owners to gain advantage by refinancing their homes.

Imagine you have a $100,000 mortgage. Your current loan is at 7 percent with 14 years left, negotiated one year ago and involving $2,000 in closing costs. You are considering refinancing at 5.5 percent for 15 years. The closing costs would be $1,500.

For this assessment, use the scenario above to write a paper in which you address the following:

·  Would you decide to refinance? Why or why not?

·  What qualitative considerations would you consider in your decision to refinance or not refinance?

Provide examples of calculations you would use to help you make your decision. In addition, use at least two resources to support your ideas.

Other Requirements

·  Length: Your paper should be 1–2 typed, double-spaced pages. In addition, include a title page and references page.

2-3 Unit 2 Problems Assessment

Overview

For this assessment, you will apply the necessary knowledge to assess ways to maximize shareholder wealth.

Instructions

For this assessment, complete Problems 1–6. You may need an HP 10B II Business Calculator to complete the following problems. You may use Word or Excel to complete the assessments throughout this course, but you will find Excel to be most helpful for creating spreadsheets.

Problem 2-1: Portfolio Required Return

You are the money manager of a $10 million investment fund, which consists of four stocks. This fund has the following investments and betas:

Stock

Investment

Beta

A

$3,000,000

1.50

B

$1,000,000

(0.50)

C

$2,000,000

1.25

D

$4,000,000

0.75

If the market’s required rate of return is 12 percent, and the risk-free rate is 4 percent, what is the fund’s required rate of return?

Problem 2-2: Required Rate of Return

·  Stock R’s beta = 1.5

·  Stock S’s beta = 0.75

Consider that the required return on an average stock is 14 percent. The risk-free rate of return is 6 percent. If this is so, the required return on the riskier stock exceeds the required return on the less risky stock by how much?

Problem 2-3: CAPM and Required Return

Calculate the required rate of return for XYZ Inc using the following information:

·  The investors expect a 3.0 percent rate of inflation.

·  The real risk-free rate is 2.0 percent.

·  The market risk premium is 6.0 percent.

·  XYZ Inc. has a beta of 1.7.

·  Over the past 5 years, the realized rate of return has averaged 13.0 percent.

Problem 2-4. Present Value of an Annuity

Find the present values of the following ordinary annuities if discounting occurs once a year:

1.  $300 per year for 10 years at 10 percent.

2.  $150 per year for 5 years at 5 percent.

3.  $350 per year for 5 years at 0 percent.

Problem 2-5: Uneven Cash Flow Stream

Use the table below to answer the following:

1.  What are the present values of the following cash flow streams if they are compounded at 5 percent annually?

2.  What are the PVs of the streams at 0 percent compounded annually?

0

1

2

3

4

5

Stream A

$0

$100

$400

$400

$400

$300

Stream B

$0

$300

$400

$400

$400

$100

Problem 2-6: Capital Budgeting Criteria

XYZ Inc. is considering two projects. Its WACC is 12 percent, and the projects’ after-tax cash flows (in millions of dollars) would be as follows:

0

1

2

3

4

Project A

-$30

$5

$10

$15

$20

Project B

-$30

$20

$10

$8

$6

1.  Calculate the projects’ NPVs, IRRs, MIRRs, regular paybacks, and discounted paybacks.

2.  How might conflicts exist between the NPV and the IRR when independent projects are evaluated? Explain your answer.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

organizational theory and behavior unit 3 question 1

Begin each writing assignment by identifying the question number you are answering followed by the actual question itself (in bold type).

Use a standard essay format for responses to all questions (i.e., an introduction, middle paragraphs and conclusion).

Responses must be submitted as a MS Word Document only, typed double-spaced, using a standard font (i.e. Times New Roman) and 12 point type size.

Undergraduate courses: 350 – 500 words or 1 – 2 pages.

 Plagiarism All work must be free of any form of plagiarism. Put written answers into your own words. Do not simply cut and paste your answers from the Internet and do not copy your answers from the textbook.

Question 1) Discuss strengths and weaknesses of group decision making. Unit 3

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

different types of shops in labor relations

Discuss the following for this assignment:

  • Describe the differences between agency shops, union shops, and closed shops. Do you think closed shops are ethical?
  • Summarize right to work legislation (both pros and cons).
  • Do you think it is ethical to have nonunion-paying-dues employees receive the same coverage and representation as dues-paying members?
APA format, 500 – 600 words with references 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

taking a test i need help

1. -8x
5(11x
3 + 6)…Multiply

2. 
(4m
2
)(5m
4
).. Multiply

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

it paper need to be rephrase

I want someone to rephrase it and change the preferences. 

The Stuxnet virus was emerged in 2010 and was first reported by a security company in Belarus (Kerr, Theohary and Rollins, 2010). Like many other computer virus, this worm also spreads arbitrarily from the one computer to another. However unlike other worms, this virus was designed to release its payload only into an industrial control system (ICS) such as Iran‘s nuclear enrichment facility at Natanz (Denning, 2012). This virus targeted a power plant and some other industries in Hormozgan province (FoxNews, 2012). It tampered the code of the programmable logic controller (PLC) which controls the centrifuges at Natanz, and ultimately destroyed about a thousand centrifuges and disrupted Iran‘s nuclear program (Denning, 2012). It is difficult to determine the geographic origin of the malware, as cyber attackers often employ sophisticated methods such as peer-to-peer networking or spoofing IP addresses to obviate attribution. Also it may contain no signature to identify its author. Some security analysts speculate that Stuxnet could have been developed by a Siemens insider who had direct access and knowledge of the system (Kerr, Theohary and Rollins, 2010) wheeras other speculated that it may be developed by United states and Islaeli officials to shut down the development of Iran’s nuclear program (Albanesius, 2012).

This virus can spread through an “air-gapped” network using a removable device, such as a thumb drive, and possibly through computers connected to the Internet and has capability to remain hidden from detection (Kerr, Theohary and Rollins, 2010). It was reported that this virus was spread into the wild after an engineer hooked up his computer to the Natanz centrifuge and then later to the Web from home (Denning, 2012).  Stuxnet damaged the centrifuges at Natanz by reprogramming the PLC and to do this, it compromised a Microsoft windows system, and then the Siemens WinCC/PCS 7 SCADA control software running on it. This was accomplished by exploiting several vulnerabilities, such as hardcoded WinCC/SCADA password posted on the Internet (Denning, 2012).  Iranian officials claimed that  Stuxnet caused only minor damage to the nuclear program, but the impact could be far-reaching (Kerr, Theohary and Rollins, 2010).

This is the first malicious software designed, particularly to attack a particular type of ICS that controls nuclear plants (Kerr, Theohary and Rollins, 2010). In general, this worm is very different from other previously reported malaware, in term of its precision targeting or physically damaging through ICS manipulation. This virus operates “autonomously with its commands and data wired into the code” but when connected to the internet, it can receive new code. Unlike other virus like Boden,  Stuxnet‘s authors cannot adjust their tactics and try things, they needed to get it right the first time and much of its code had to be developed from scratch and craft carefully to recognize the intended target. In addition, this virus needs to be presence long enough to cause the desired damage, in case of Natanz, this virus hid its code and lead a false impression to network operator that centrifuges were operating normally in spite of being harmfully manipulated (Denning, 2012) which makes it more different from others.

Stuxnet worm is unique because the software code can infiltrate and attack an ICS that is used by critical infrastructure facilities and causes long-term physical damage. Even though the extent of the damage is unknown but the worm’s ability to identify specific ICSs and launch an attack at specific time could lead to catastrophic consequences on nations’ infrastructures (Kerr, Theohary and Rollins, 2010).

The observers of Stuxnet can easily use the code and develop the cyber-weapon of their own to attack a particular ICS device with particular goal or simply for the race. So the security of the country may be at risk by release of the virus like this. Stuxnet virus is out now and its object code is available, even though source code was not released but analyst are able to decompile or reverse the object code to discern Stuxnet‘s functionality, making it easier to develop new cyber-attack (Denning, 2012). So, one of the major risk of this virus is its ability to replicate as the code developers do not need to start from scratch.

The Stuxnet worm attempts to identify and exploit equipment that controls a nation’s critical infrastructure. So an attack by a virus such as the Stuxnet could result in manipulation of control system code leading to inoperability or long-term damage. This can impact many interconnected critical infrastructure facilities, government preparation and response plan depending on this system may be compromised threatening many aspect of life. Modern infrastructure facilities rely on computer hardware and software continuously to monitor and control equipment that supports numerous industrial processes (Kerr, Theohary and Rollins, 2010). Thus the damage to the nation’s critical infrastructure by the virus threatens many aspects of life, including the government’s ability to safeguard national security interests (Kerr, Theohary and Rollins, 2010).

The discovery of the this Stuxnet worm has raised several issues for Congress about its the impact on national security, government response to it, international treaty to control its use (Kerr, Theohary and Rollins, 2010). To date, numerous countries are known to have been affected by the Stuxnet worm to various degrees however, there is no public information on this which makes it difficult to determine the malware’s potency. To identify and slow progress of its spread to other ICSs, many researchers have speculated the identity of the software code’s developer, however no one has claimed it yet (Kerr, Theohary and Rollins, 2010).  To resolve this issue and identify the vulnerabilities, the researcher are studying the Stuxnet and examining the ICS security (Denning, 2012). 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

communication discussion

Communication.docx

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.