Friday, February 28, 2020

Ethics Assignment Essay Example | Topics and Well Written Essays - 250 words

Ethics Assignment - Essay Example The major similarity between these associations is that they uphold the value of safety, competence, faithfulness, integrity, responsibility and honorably. Both the codes of conduct require engineers to be concerned about the public safety, welfare and health. Therefore, they should make decisions that do not harm the public whatsoever. Besides, they should act as competent professionals who only conduct services in which they were educated. Moreover, they should be honest people who do not engage in any deceptive act, but to be truthful to their employers and trustees so as to avoid any conflict of interest. Lastly, these codes of ethics require engineers to be honorable, lawful and responsible professionals who conduct themselves honorably to gain reputation and respect from the society. However, the only difference between these codes of ethics is that ASCE provides a close that advocate for career growth and development. Members of the ASCE are encouraged to continue with education and develop their careers. This can help in adding value to themselves and making them much better each day. So, these are the positions held by the codes of ethics of these engineering associations. Since hey are meant for the benefit of professionals and the general public, they need to be strictly adhered to without any unnecessary

Friday, February 21, 2020

Financial accounting Master Research Paper Example | Topics and Well Written Essays - 3250 words

Financial accounting Master - Research Paper Example Also, assume that the only thing that the Dow Jones sold was one piece of printing equipment for $190,000 in cash. a) How much did the Dow Jones originally pay for the piece of equipment that was sold COMPUTATION: Balance (at start) = 1,181,171 Add: Purchase during the year = 155,000 Less: Balance (at end) = (1,177,300) Cost of Equipment = 158,871 JOURNAL ENTRIES Debit Credit Cash 190,000 Allowance for depreciation 122,000 Equipment 158,871 Gain on Sale 153,129 So the payment is made $ 190,000. b At the time of sale, what was the accumulated depreciation on the piece of equipment that was sold COMPUTATION: Cost of Equipment = 158,871 Less: Depreciation = (122,000) Book Value = 36,871 Less: Sale proceeds = (190,000) Gain on Sale = 153,129 Therefore, the depreciation on the sale of equipment amounted $122,000. c Did Dow Jones record a gain or a loss on the sale of the printing equipment As per calculation in the part (b) it is clear fact that Dow Jones recorded a gain of $153,129 on the sale of equipment. PART III: Trump Hotels and Casino Resorts Inc. - Bonds 1. Were the "Trump AC Funding 11% First Mortgage notes, due 2006" issued at par, at a premium or at a discount Justify your answer. After reviewing the long term debt section, according to my assessment "Trump AC Funding 11% First Mortgage notes, due 2006" it was clearly indicated that the management of the company funds the mortgage at par and the management of the company issues mortgage notes at par on the secondary market. 2. Record the entry made at the original... Although, their is no clear indication about the face value but I assume that the face value of the mortgage is $100.And the "Trump AC Funding II 11 % First Mortgage notes" bonds are issued on discount. Bond prices are fluctuated when the company opt the aggressive or conservative accounting policies. The adaptation of those accounting practices enforces management to issue the bond at discount or at face value. Macro factors like fiscal policy, interest rate fluctuations, recession in the economy and difference of timing in the issuance of bond makes a significant impression on the overall valuation of the company. 5. Record the entry that was made for the "Trump AC Funding II 11 % First Mortgage notes" when these notes were issued on January 1, 1997 (Hint: These notes were issued at 95.70% of their face value). 8 Assume that on December 31st, 2001, Trump re-purchased all of the outstanding Castle PIK Notes for $119,500,000. What would the gain or loss be on the repurchase of bonds (net of tax rate of 40%) 10 Assume that on January 1st, 2001, the market rate of interest was 12% on bonds of similar risk to these Castle PIK Notes.

Wednesday, February 12, 2020

Responding to Memo Essay Example | Topics and Well Written Essays - 2000 words

Responding to Memo - Essay Example The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000. Attacks which exploit security holes in hardware and software systems are quite common. Apart from the above described incident, the company was subjected to a second attack as a direct outcome of a security hole in its Cisco IOS router. This, the most popular corporate router, had a serious security flaw which the company only identified after the release of the router and even then did not inform users about (Zetter, 2006). Consequently, our company, just like countless others was attacked through this security hole. In the second place, our identity renders us the target of attacks. It is unlikely that any hacker would deliberately target your daughter's computer and infect it with a Trojan Horse but where we are concerned, the issue is quite different. As a profit-making organization, we represent potentially financially lucrative information (Rhodes-Ousley, Bragg, and Strassberg, 2003). We are targeted by professional hackers who seek out security flaws in our system for the explicit purpose of infecting us, either in order to access our data or to bring our networks to a halt (Rhodes-Ousley, Bragg, and Strassberg, 2003). The fact of the matter is that our department has protected our networks as much as is possible. The fact that we send out malware alerts or often engage in the cleaning up of the system is quite simply because we cannot afford any viruses on our networks. Malware could undermine the integrity of our data and, therefore, we often resort to the exercise of extreme precaution. Indeed, it is quite probable that your daughter's computer has some malware on it but that she is not able to identify it. We, on the other hand, identify and remove all malware. Lastly, Windows OS is ore vulnerable to malware than is Macintosh OS. This is because of security holes in the latter which are not present in the former and because hackers target Windows much more than they do Macintosh (Rhodes-Ousley, Bragg, and Strassberg, 2003). Migrating to Macintosh, however, is not an option both because it would be too costly and because it does not have the software range that we need. P2P Memo To: Salamanika Giorgiopolis, Corporate Counsel From: CISO Date: 05/18/2007 Re: Peer to Peer and Piracy Irrespective of the popularity of Peer to Peer Networks and regardless of the fact that everyone is doing it,' company employees are explicitly prohibited from running P2P programs on company computers or from using the company's network connection to download files through these programs. Apart from the aforementioned being explicitly forbidden under company policies and regulations, it comprises an immoral and illegal violation of copyright laws which the company is not going to abide by. Copyright laws are very precise, leaving little room for manoeuvring or interpretation. As Paradise (1999) clarifies, this body of legislature, determines the fortification of

Wednesday, February 5, 2020

System analysis and design 251 Essay Example | Topics and Well Written Essays - 1000 words

System analysis and design 251 - Essay Example Due to the disadvantages of this system, Helen McPherson seeks information systems that are crucial to the achievement of modern business organizations. Information systems are the hardware and software applications that sustain data-intensive functions. They involve  an integrated set of mechanisms for gathering, storing, and handling data and for provision of information, facts, and electronic products (Stair and Reynolds 2013, 120). Business corporations (OT included) and other institutions depend on information systems to implement and manage their functions, interrelate with their consumers and suppliers, and contend in the marketplace to gain competitive advantage. With this system in place OT will be able to serve their customers efficiently and accurately. This Functional Requirements Report provides information system fundamentals that will facilitate the Customer Booking system including accommodation booking of OT (Stair and Reynolds 2013, 156-200). This Functional Requirements Report identifies the required system capabilities that would enhance OT customer booking and accommodation facilities to improve general performance of OT (Institute for Systems and Technologies of Information, Control and Communication 2006, 264). The capability of incorporating IT efforts with business activities and purposes. This potential is to administer organizational preparations, structure procedures and staffing tacking any predicaments in OT booking arrangements Functional Requirements Report provides new information system’s scope through context Data Flow diagram. It is easy to analyze the scope through the diagram. This Functional Requirements Report identifies the below procedures as critical information system that would enhance OT’s customer booking system. OT novel customer booking system allows integrate OT management, accommodation department, customer request, departures, marketing, and