Pick an industry to examine. Keep in mind that many industries are global in nature, so consumers and/or producers need not be located in the US.

  1. Pick an industry to examine. Keep in mind that many industries are global in nature, so consumers and/or producers need not be located in the US.
  2. Chapter 3. What can you find out about the market structure in your industry? Which firms are squarely in the industry, which others arguably produce substitutes or complementary goods?
  3. Chapter 4. What can you find out about the production technology and the cost function? To what extent are there scale economies; how has that affected the number of firms in the market?
  4. Chapters 5-8. What strategic pricing strategies are used? Price discrimination based on identifiable characteristics (3rd degree)? Two-part tariffs or menu pricing (1st or 2nd degree)? Bunding?
  5. Chapters 9-10. Returning to market structure, what does it look like? Do firms seem like they compete in price (Bertrand competition) or quantity (Cournot competition)? Are the goods homogeneous or differentiated (and along what dimensions)? Does there seem to be a simultaneous-move or sequential-move structure?
  6. Chapter 11. What sequential aspects does the industry have (if any)? Do any commitment strategies seem to be in use (such as strategic investments to large capacity or cost-reducing investment)? Is there any evidence of entry-deterring strategies or predatory pricing allegations?
  7. Chapter 14. Does there seem to be collusion in the industry? Has there been collusion historically? What aspects of the industry would help the firms collude (or hinder collusion)?
  8. Chapters 16-17. What has been the recent history in the industry with respect to mergers? Have the mergers been horizontal, vertical, or involving complementary products? Have there been any

Based on the presentations of her research, discuss how you could understand the sweeping political changes that have taken place and are currently taking place since the election of President Trump.

Read the article in Chapter 15 (page 398) in your textbook and the New Yorker article assessing Arlie Hochschild’s book Strangers IN Their Own Land. Based on the presentations of her research, discuss how you could understand the sweeping political changes that have taken place and are currently taking place since the election of President Trump. Do we need to climb or break down empathy walls? How might you use sociological knowledge and research to start this process?

https://learn-us-east-1-prod-fleet01-xythos.s3.us-east-1.amazonaws.com/5c1754ad402d4/13600691?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Arlie%2520Russell%2520Hochschild%25E2%2580%2599s%2520View%2520of%2520Small-Town%2520Decay%2520and%2520Support%2520for%2520Trump%2520_%2520The%2520New%2520Yorker.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200319T230007Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20200319%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=c372ed9352c6d02e737ab5bc0c723602673e917799d8b8b682ca391e64cb1a31

Question 06: Have you ever received an e-mail that indicated someone else had sent out spam with your return e-mail address on it? How would you feel about that?(150 words for the answer this question)

comment this 2 article (40 words for each comments)

1- This question raises an interesting dilemma. On one hand every person that owns an access point to the internet should be able to maintain and protect it to a reasonable extent. In one sense the in-action of not protecting your machine, makes you a perpetrator. On the other hand, people being infected by viruses and unknowingly running a program that is harmful to others, is a victim. I would say that the act of running one of these scripts should not be punished, but they should be made to replace or wipe their hard drive for the protection of others on the network. I would say that being involved in a spam emailing service makes you both a victim and a perpetrator.

2- When I first moved out of my house and into a dorm in Freshman year of college, I had a habit of not locking my door. I didn’t think it was a huge deal because the dorm was in a hidden corner of the building and my roommate had essentially moved out to live with her friend. Typically, it only helped me because there were times when a friend would want to borrow something from my room and if I wasn’t home, I could just tell them to let themselves in. I also had a bad habit of leaving my keys in my pockets, so when I was running late, I didn’t have to worry about digging through my laundry to find the keys. However, once I moved back home a couple years later, I continued that same habit with the front door of my parents’ house, where people actually do try to break in. To fix this, we installed an electronic lock that automatically locks the door after anyone leaves or enters.

If you were comparing two companies of different size (say one is at least 3 times larger than the other) with different products, what financial information (type of information) and financial ratios (at least 3) would you use to evaluate the two companies to determine your preferred investment?

If you were comparing two companies of different size (say one is at least 3 times larger than the other) with different products, what financial information (type of information) and financial ratios (at least 3) would you use to evaluate the two companies to determine your preferred investment? Of the ratios and financial information that we have studied so far, which do you feel are the least important (the least important 3 ratios)? Why do you believe each is the most important and least important?

Use these 3 Financial Ratios to evaluate the two companies to determine your preferred investment.
1. Profit Margin
2. Inventory Turnover
3. Debt to total assets

Use these 3 as least important.
1. Average Collection Period
2. Quick Ratio
3. Receivable Turnover

Explain what type of user input validations you should have. What happens if the user enters a negative number?

Your software company was invited to provide a proposal for a company in Australia. You currently have the cost in US dollars and need to convert the prices to the Australian dollar.

Write a 2-part program using Ruby, Java®, or Python.

Part 1: Write a function to gather the following costs from the user:

  • Travel Cost: $9,800
  • Hotel Cost: $3,500
  • Rental Car Cost: $1,600
  • Labor Cost: $15,500

Part 2: Write a function to convert the costs from United States dollar (USD) to Australian dollar (AUD). Note: Look up the current USD to AUD exchange rate to use in your function.

Test the program 3 times by providing different costs in USD.

Provide the code and take a screenshot of the output, then paste the screenshot(s) into a Microsoft® Word document.

Write a half-page response in the same Microsoft® Word document to address the following:

  • Provide a manual for the user explaining how to use the program.
  • Explain what type of user input validations you should have. What happens if the user enters a negative number? What happens if the user puts a $ in the input?

Evaluate and revise ethical issues in visual media communication to improve awareness of social perceptions.

Evaluate and revise ethical issues in visual media communication to improve awareness of social perceptions.

You are the campaign manager for a well known environmental outreach organization. The current campaign is to bring awareness to the organization’s Ohio River Clean-Up Project. As the manager, one of your tasks is to review all content and visuals used by the campaign. You actively evaluate and revise any ethical issues that may be detrimental to the project, your organization, or society in general.

As you meet with one of the campaign designers, you identify several ethical problems with the new poster he has created. His poster includes the following elements:

  1. The poster image shows a group of poor, urban, African-American children playing alongside the Ohio River.
  2. The poster text states: “Let’s help them clean up.”
  3. The poster has several overlaid images in the corner of a few celebrities, which gives the impression of celebrity endorsement.
  4. There are no sources acknowledged anywhere on the poster.
  5. The poster has been digitally altered to make the African-American children appear thinner, darker, and dirtier.

Since you are flying out to a campaign meeting in one hour, you ask this campaign designer to hold this poster and wait for your video review.

You plan to take time tomorrow to create a seven minute or less video analysis. Using screen share, you can present the poster image visually and verbally instruct this designer how to correct several ethical visual issues. You realize you will not only have to identify the ethical visual issues and explain how to revise and change them, but you will also need to clearly describe to him the effect these unethical media issues will have on society.

Instructions

The presentation must include a visual and an audio recording using Screencast-O-Matic®, a free audio recording software compatible with PC and MAC computers. Follow these instructions to download and use this software to create your presentation.

  1. Access the Screencast-O-Matic® homepage by clicking on the box in the upper right-hand corner titled, “Sign Up” to create your free account.
  2. Create a free account (be sure to write down the email and password created for account access.)
  3. Once logged in, click on the “Tutorials” link at the top of the homepage and view Recorder Intros.
  4. Create your presentation by clicking on the “Start Recorder” box.
  5. Once finished recording click on the “Done” button.
  6. Next, choose, “Upload to Screencast-O-Matic®”.
  7.  Creates video which accurately analyzes the visual stereotypes presented in poster and discusses a revision option.
  8.  Creates video which accurately analyzes how the ethical issues will affect social perception.
  9.  Creates video which accurately analyzes the ethical problems of digital alteration in poster.
  10.  Creates video which accurately analyzes the ethical problems of using improperly acknowledged images sources in poster.

Do you think social contract exists for professionals like medical providers that require them to provide care to all patients regardless of patients statutes ? Why or why not ?

Define and discuss the concept social contract. Do you think social contract exists for professionals like medical providers that require them to provide care to all patients regardless of patients statutes ? Why or why not ?

In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?

In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?

fter reading Genesis 1:1-31, reflect on each of these key aspects of God’s creative process. Then, analyze how each of these four elements function within God’s creation of the world.

In our textbook, Echoes of Eden (2013), Jerram Barrs explores a key idea from another scholar, Daniel Loizeaux: the consideration of creativity under four categories:

1. Perfection

2. Diversity

3. Profusion

4. Inventiveness

After reading Genesis 1:1-31, reflect on each of these key aspects of God’s creative process. Then, analyze how each of these four elements function within God’s creation of the world. Present a minimum of one specific example from the passage to support your analysis of each element.

Click on the Session 1 Creativity Analysis of Genesis link to submit your assignment by the posted due date. Review the rubric available in Due Dates and Grades for specific grading criteria.