percent problems

1) What percentage of 98 is 24?

 

 

 


2) What percentage of 65 is 29?

 

 

 

 

3) What is 20% of 41?

 

 

 


4) 87 is 35% of what number?

 

 

 

5) In Indiana, sales tax is 7.0%. What is the total (including tax) on items that total $45.46 before tax?

 

 

 


6) In Texas, sales tax is 6.25%. What is the tax on items that total $14.02 before tax?

 

 

 

7) You and your friends order a meal for $123.52. How much should you leave (including tip) if you want to leave a 15% tip?

 

 

 


8) In Rhode Island, sales tax is 7.0%. What is the total (including tax) on items that total $90.70 before tax?

 

 

 

9) While shopping for a gift, you find the perfect belt on sale for 13% off its original $23.89 price. How much will you pay for the belt?

 

 

 


10) Originally priced at $59.07, a jacket was found on a 70% off rack. What is the sale price of the jacket?

 

 

 

11) A ring is marked with a sale sticker saying it is 81% off. The original price is $55.76. What is the sale price?

 

 

 


12) Originally priced at $82.82, a pair of tennis shoes was found on a 27% off rack. What is the sale price of the pair of tennis shoes?

 

 

 

13) Waldo borrows $400 at 4.8% simple interest per month. When Waldo pays the loan back 10 years later, how much interest does Waldo pay?

 

 

 


14) Fiona borrows $3100 at 2.4% simple interest per month. When Fiona pays the loan back 8 years later, what is the total amount that Fiona ends up repaying?

 

 

 

15) Nate borrows $2290 at 2.7% simple interest per month. When Nate pays the loan back 9 years later, what is the total amount that Nate ends up repaying?

 

 

 


16) Fiona borrows $3250 at 38% simple interest per year. When Fiona pays the loan back 4 years later, what is the total amount that Fiona ends up repaying?

 

 

 

17) Ian borrows $1360 at 0.1% interest compounded monthly. When Ian pays the loan back 6 months later, how much interest does Ian pay?

 

 

 


18) Zina borrows $2420 at 15% interest compounded yearly. When Zina pays the loan back 6 years later, what is the total amount that Zina ends up repaying?

 

 

 

19) Harry borrows $2970 at 1% interest compounded yearly. When Harry pays the loan back 4 years later, how much interest does Harry pay?

 

 

 


20) Paul borrows $2500 at 17% interest compounded yearly. When Paul pays the loan back 7 years later, how much interest does Paul pay?

 

 

 

21) A belt was priced at $5.26 last week. This week the same belt is priced at $6.00. What is the percentage increase in price?

 

 

 


22) A belt was originally priced at $7.97, and is marked down to $1.54. What is the percentage decrease in price?

 

 

 

23) A shirt was priced at $6.21 last week. This week the same shirt is priced at $6.34. What is the percentage increase in price?

 

 

 


24) A ring was originally priced at $6.86, and is marked down to $2.45. What is the percentage decrease in price?

 

 

 

25) A coat was priced at $5.06 last week. This week the same coat is priced at $2.18. What is the percentage change in price?

 

 

 


26) A DVD was priced at $2.23 last week. This week the same DVD is priced at $1.37. What is the percentage change in price?

 

 

 

 

27) A coat was priced at $10.35 last week. This week the same coat is priced at $8.45. What is the percentage change in price?

 

 

 


28) A video game was priced at $1.57 last week. This week the same video game is priced at $8.98. What is the percentage change in price?

create flowchart and algorithm module will prompt user enter amount cash they

Create the flowchart and algorithm for a module that will prompt the user to enter the amount of cash they have in their pocket. The program should output “Not Enough” ($0 – $0.64), “Vending Machine” ($0.65 – $1.99), “Fast Food” ($2.00 – $4.99), “Cafeteria” ($5.00 – $14.99) or “Steak House” ($15 and up) depending on what the user can afford for lunch.

what is the new company total amount of liabilities plus equity what is the new company total amount of assets

answer all the questions

Refer to this chapter’s opening feature about Apple. Assume that the owners decide to open a new company with an innovative mobile app devoted to microblogging for accountants and those learning accounting. This new company will be called AccountApp.

Required

  1. AccountApp obtains a $500,000 loan and the two owners contribute $250,000 in total from their own savings in exchange for ownership of the new company.
    1. What is the new company’s total amount of liabilities plus equity?
    2. What is the new company’s total amount of assets?
  2. If the new company earns $80,250 in net income in the first year of operation, compute its return on assets (assume average assets equal $750,000). Assess its performance if competitors average a 10% return.

a minimum of 200 words is required and they must be your own words 2

A minimum of 200 words is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Discuss the significance of competitive intelligence gathering for an organization in succeeding in this current competitive field .

Discussion Question 2:

According to you, what are the necessary activities that a penetration tester need to perform while conducting a penetration test to discover valid usernames.

Discussion Question 3:

Compare and contrast different types of Steganography methods that are used for hiding confidential data.

Discussion Question 4:

Identify necessary countermeasures that should be performed by users for preventing their systems from various malware threats.

Discussion Question 5:

Discuss the role of the honeypots in safeguarding the organization’s network.

Discussion Question 6:

Describe the methodology followed by the hackers to attack a web server and discuss about necessary countermeasures against Web server Attacks.

Discussion Question 7:

Understand the Mobile Device Management (MDM) and Suggest necessary preventive measures for securing mobile phones against various attacks

Discussion Question 8:

What are the benefits of implementing virtualization in cloud computing?

why hospitality business hotel should invest in information security

The foundation of having a hospitality business is to have a good image about the offered services; therefore, establishing a good reputation would add more success and give more value to the business. Investing in a good information security for a hotel business will protect the business info from being attacked and exposed to the public. Also, it will benefit the business for the long term since customers will have a trust in this business by sharing their information with no fear. Therefore, there are some crucial points that have to be taken in consideration to make the business run during the whole year and not seasonal only:

  • Enhanced work production and association competence
  • improved decision creation
  • minimizing the cost of procedure
  • maximize the accuracy of info
  • provide excellent customer service
  • increase profit

The main danger that the hospitality information security might face is system integration. Therefore, the IT manager and the whole team have to be ready for that by implementing security measures for the data, software, and the hardware. Also, they have to be ready for the interior and exterior attack that could happen from viruses, and thefts. It is very critical to have a backup of data since it is saved in one spot and it would be easy to be stolen. The most recommended server for a hospitality business is server- based since it is quicker in terms of time reply, the capability to increase network and server volumes, and well regulator for the data.

The hospitality industry generates roughly 550 billion dollars annually (Miteva, 2017). That amount in revenue might be the main reason hotels are one of the biggest targets of credit card breaches and data theft (Miteva, 2017). A breach of customer credit card information would cause immense damage to the image of our organization. 40% of all data breaches that happen worldwide originate from the hospitality industry. The risk and high probability of a breach occurring warrants an investment in information security. There are best practices and IT security standards we should consider implementing including PCI-DSS.

Migrating our existing network towards a cloud-based solution would help minimize our operating expenses. This is possible because we would only have to pay for the services we use. For example, Microsoft Azure offers a service called Platform as a Service (PaaS) which when they host and maintain all of the servers, OSs, storage, networking, security and databases for each of their clients. There are other services like IaaS and SaaS which give the client more control. We need insure that we implement some type of mechanism of protection like a virtual private network (VPN) as these services do operate over the Internet. We also should request a service level agreement (SLA). A cloud-based solution gives us flexibility (Taylor, 2018).

The whole paragraph above is the synopsis that we did as a group and now we have to do the project. My portion of this project is to write about 2 points and they are Increased Customer Confidence and Security of Valuable Data, I will need to have at least 3 pages to talk about these points with 2 references. I hope this information is enough for you to write about them and the way that can be implemented to the hospitality business.

Let me know if you need more info and I appreciate it.

Sal

international finance and political risk

Choose a country (not the United States or Canada) that has not already been chosen by another learner and post your country choice in the discussion area. Then, identify some political and currency risks of that country and discuss why a U.S. company would invest (for example, build a factory) in that country. Also discuss some of the various international finance topics such as the foreign exchange market, purchasing power parity, interest rate parity, cross rates, and so on. Why is it important for international firms to understand these concepts?

complete part 1 and 2

The following Web page should be created using Notepad (PC users) or TextEdit (MAC users). DO NOT use Word or any other Web authoring tool to complete this assignment. When you edit your file in Notepad or Textedit, open a new instance of Notepad or TextEdit to do so. Do not make the changes from the View/Source window in your browser. That does not work.

  1. Create a Web page that makes a list of your favorite movies and a list of your favorite actors. Make one list ordered (numbered) and one list unordered (bulleted). Title your Web page – John Doe’s Movies Page but use your own name (this information goes in the title tag). Also include a paragraph describing one of your favorite movies and another paragraph describing one of your favorite actors. Include two heading levels – h1 and h2 somewhere on the page.
  2. Save your Web page as movies.html.
  3. Validate your Web page using the World Wide Web Consortium validation site. Apply HTML5 validation.

Part 2

  1. Create a Web page (separate from the one created in Part 1) that includes a table with at least two rows and two columns. Title your Web page – John Doe’s Hobbies Page but use your own name (this information goes in the title tag). Each cell in the table should contain one of your hobbies. Include two heading levels – h1 and h2 somewhere on the page. Save your Web page as hobbies.html. Link your movies page to your hobbies page. Then link your hobbies page to your movies page. Add an image to your movies page and a different image to your hobbies page. Make sure to include the alt tag with an appropriate description for each image. Also, include at least one external link on at least one of the two pages. Organize the content on each page in a way that is easy to read and save the pages again.
  2. Create an external style sheet to apply the following styles:
    • the color red to all h1 headings
    • the color blue to all h2 headings
    • the color green and the font Arial to all paragraphs
    • the font Cursive to all ordered lists
    • the font size 28px to all bulleted lists
    • a solid border around all tables
    • a solid border and a background color of purple to all cells within a table
  3. Create classes to style specific tags as follows:
    • Change the background color of one of the cells in the table to orange
    • Change the text color of one of the items in the unordered (bulleted) list to orange
    • Change the font of one of the items in the ordered (numbered) list to Arial
  4. Do not include any embedded or inline tags in your code. All styles should be applied using an external style sheet and classes. The completed external style sheet (css) should contain 7 tags and 3 classes.
  5. Save the style sheet as styles.css.
  6. Link the external style sheet to both the movies page and the hobbies page and apply the classes to the appropriate tags in each page.
  7. Save both Web pages (movies.html and hobbies.html) again.
  8. Validate both Web pages (movies.html and hobbies.html) using the World Wide Web Consortium validation site. Apply HTML5 validation.
  9. Upload your two Web pages as well as the two image files and the css file to myDrive. Instructions for doing so can be found here.
  10. Check both html files and make sure they render as you intended and that all the links work.
  11. Submit the URL (http://mydrive.nvcc.edu/username/public/) using the Movies and Hobbies Web Site link at the end of this unit. The username in the URL is your Blackboard username.

disaster recovery discussion question and read and answer the question

discussion

read the article and answer the question

1/ In the articles that you read:

Question 1a: What surprised you the most?
Question 1b: What, in your opinion, was the most costly mistake you saw in the articles?

2. Suppose you were in charge of the Data Center at Dominican. Assume that the Data Center is in the basement of Lewis Hall and that all the servers (Blackboard, Email etc.) are in one room. You have been asked to develop a Disaster Recovery Plan for the Dominican Data Center.
Question 2a: Give a reference to one or more web sites that you would use to help you build a Disaster Recovery Plan for your Data Center. Explain why you think the reference(s) you have chosen is (are) helpful.
Question 2b: List two things that you would do right away and explain the reasons for your choices.((Not Good Examples: Immediately move the Data Center to the second floor of Parmer Hall to protect against floods, build a storage tank for 10,000 gallons of diesel fuel and fill it)
Question 2c: Would you do the Disaster Recovery Plan yourself or would you hire outside help? Why or why not?

3: What is your personal disaster recovery plan? What would you do if your laptop crashed or your cell phone or smartphone was stolen? What backups do you have and how current are they?

what three requirements must be satisfied order utilize testimony expert witness

Must be in APA format (12 point font, Times New Roman, double spaced)

Original work, not plagiarized.

Must include APA Citations

 

 

  1. What three requirements must be satisfied in order to utilize the testimony of an expert witness?

  2. What are the five basic methods of impeaching a witness?

  3. Describe three ways in which expert witness’s opinions and conclusions may be biased.

  4. Name five categories of subjects about which a lay witness may testify.

  5. Why would you not want to attempt to impeach every witness’s testimony?

  6. What are five reasons why a witness may not tell the truth?

  7. What is the definition of a crime involving dishonesty or false statements?

  8. Name the four forms of evidence permitted to prove the trait of character relating to untruthfulness.

  9. Why are a witness’s biases allowed to discredit his or her testimony without the cross-examiner being required to prove that the witness is not credible, has contradicted his or herself, has bad character, or make an inconsistent statement?

  10. Name the four elements of witness capacity and an example of how each could aid in the impeachment of a witness.

 

racism milestone 2

“SOC 213 Part I Milestone Two Guidelines and Rubric The field of sociology presents a unique perspective to viewing the world ’ s social problems. Social problems tend to be viewed solely as individual constructs and responsibilities, but sociologists take a deeper dive into the complex set of variables driving the development of these problems using various theoretical perspectives. As these problems surface in individual lives, the workplace, and communities, a sociological perspective is valuable for providing a framework for deeper investigation of variables and limiting personal biases when analyzing problems. Prompt: Submit a draft of the Research and Approach sections, addressing all critical elements from Sections II and III below. You will use your research to help determine the social variables that have come together to create and sustain your social problem. You should use these variables to brainstorm some potential solutions. As a social researcher, you must also investigate your own biases. Think about why this social problem matters to you or how it impacts you. What stereotypes or assumptions do you have regarding this social problem? How did you learn about these stereotypes or biases? After investigating how your own biases may impact your research, you will select a sociological theory to help you analyze the problem from a theoretical, structured, and unbiased point of view. Use this theoretical lens to help explain your problem. Specifically the following critical elements must be addressed: II. Research : In order to further understand the social problem, you will conduct some research on its influences, impacts, and attempted solutions. A. Identify social variables and determinants that have influenced the development of the social problem and explain their influence. Support your explanations with resources. B. Explain how the social variables and determinants influencing the development of the social problem vary depending on whether the social problem is local or global . In other words, are the previously identified social variables and determinants influencing the social problem the same or different as the social variables and determinants influencing the social problem in another country. Provide specific examples. C. Describe attempted solutions to the identified social problem that failed and explain why the attempted solutions might have been unsuccessful, supporting with resources. D. Describe the attempted solutions which were successful in addressing the identified social problem, or a similar social problem, and identify best practices based on these successful solutions. Be sure to support with resources. III. Approach : In this section, you will sift through your personal biases, with the aim of limiting such biases in your later analysis. A. Describe how people generally tend to talk about this social problem and how these approaches are problematic, supporting with resources. What stereotypes , biases, and assumptions are at play? B. Reflect on your own biases and assumptions around the issue and how these may affect your analysis of the issue. Everyone has certain preconceived notions about social issues. What are yours, and how might they influence your analysis? C. Explain how you will use sociological theory to limit your biases when you analyze the social problem. How can the theory help you limit your biases? Provide a specific example. Rubric Guidelines for Submission: The draft of your Research and Approach sections must be submitted as a single 1 – 2-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and any sources cited in APA format.”