Posts

Critically evaluate the significance and the relationship between ethics and Business as explained by the author. Discuss how ethics could be incorporated in education, particularly for business students.

Business Ethics and Organization Social Responsibility 422

Assignment Question(s):

  1. Critically evaluate the significance and the relationship between ethics and Business as explained by the author. (Not less than 500 words-5 Marks)
  2. With suitable examples (at least 2) discuss the importance of trust in business. What happens when trust is lost? (Not less than 500 words-5 Marks)
  3. Discuss how ethics could be incorporated in education, particularly for business students. (Not less than 500 words-5 Marks)

 # Note: All answers should be supported with proper references.

Summarize an article about virtual leadership (e-management).

Business Question

Summarize an article about virtual leadership (e-management).

Simulate some of the actions that you perform in Drive test center. Develop an extension of this application by adding few other user interfaces to perform different actions.

Programming Question

Kiosk for picking time slot for G, G2 drive test: (Continue from assignment 3, make sure it is working correctly)

In this application you will simulate some of the actions that you perform in Drive test center. But here you have greater flexibility to pick the time of your choice. You will also develop an extension of this application by adding few other user interfaces to perform different actions. Mainly entire application consists of following parts:

  1. Driver Interface (a person who wants to take G2/G license)
  2. Examiner Interface (a person who takes driver’s exam)
  3. Admin (a person who adds schedules and other stuff in the portal)

What do you call a field of science that help us understand the harmful effects?

Scientific discipline, that overlaps biology

What do you call a field of science that help us understand the harmful effects?

Find integers x and y with 65537x + 3511y = 1. Find the last five digits of 31234567. Solve 314x ≡ 271 (mod 11111). Find all solutions to 216x ≡ 66 (mod 606).

Cryptography

Assignment
Much of this assignment requires the use of a computer algebra system (Maple, MatLab, Mathematica, or SageMath) or other software of your choice. If you have experience with one or more of them, this should be no problem for you.

SageMath is open source; https://www.sagemath.org. It’s a bit of a “learning curve” at first, but it’s well worth it.

1. Use a computer algebra system to do the following problems:
(a) Find integers x and y with 65537x + 3511y = 1.

(b) Find the last five digits of 31234567.
(c) Solve 314x 271 (mod 11111).

(d) Find all solutions to 216x 66 (mod 606).

Note to (b): Do not attempt to compute this power! Think of an appropriate modulus, and use the “modular exponentiation” feature in the system of your choice (in Maple it’s &^). You may also wish to first use Euler’s Theorem.

2. (a) Suppose that Alice encrypts a message m with Bob’s public RSA key (899, 11). The ciphertext is 468. Break the cipher, that is, determine the plaintext.
(b) Do the same with the key (11413, 7467) and the ciphertext 5859.

Note: These are, of course, “baby examples”; for reallife requirements on the key size, see the course notes or lectures.

The following questions are about factoring integers, and they also require the use of a computer algebra system. Some questions refer to Appendix A or B, posted along with the assignment. These are short excerpts from the book “Introduction to Cryptography With Coding Theory”, 2nd Ed., by W. Trappe and L. C. Washington, Pearson PrenticeHall, 2006. Appendix C contains examples on the use of Maple.

3. You are trying to factor n = 642401. Suppose you discover that 5161072 7 (mod n) and that 1877222 22 · 7 (mod n). Use this information to factor n.

Hint: Look at the “Basic Principle” in Appendix A, and equate the right hand sides of the two given congruences.

4. Let n = 537069139875071. Suppose you know that 859753244431662 4624361062612 (mod n). Factor n.

Hint: Again, look at Appendix A.

5. The following ciphertext c ws encrypted with RSA modulus n using the exponent e:
n = 152415787501905985701881832150835089037858868621211004433
e = 9007
c = 141077461765569500241199505617854673388398574333341423525

The prime factors are consecutive primes. Break the cipher, that is, find the decryption exponent d and obtain the plaintext (which is an integer).

Note: In spite of the reasonably large RSA modulus n, it is absolutely insecure, for the following reasons:

(1) The modulus n is much too small; most computer algebra systems can factor it very easily. (But here the point is to use the Fermat factorization method; see the hint below).

(2) The two prime factors are too close together, which makes them vulnerable to the Fermat factorization method; see again below. How ever, randomly chosen primes are very unlikely to be too close together.
(3) If you look at the two primes after successful factoring, you will see that they are certainly not random. For a secure use of RSA, the two primes must be chosen randomly.

Hint: Read the paragraph on the Fermat factorization method in Appendix B, p. 182. It works best when the two factors are close together, as is the case here. In Maple, first use the command Digits:=50 to obtain 50digit accuracy, then use the command round(sqrt(n*1.)) to change n to a decimal number, take its square root, and round to the nearest integer.)

Who are stakeholders in our community or in the healthcare system that you can present your identified health problem? How would you propose the need for change?

Discussion 5

Who are stakeholders in our community or in the healthcare system that you can present your identified health problem? How would you propose the need for change? Be specific and realistic.

PICOT QUESTION

Will nutrition in expecting moms decrease the possibilities of preeclampsia or eclampsia during pregnancy?

What types of drugs are being abused in KSA? Classify and highlight the most popular drugs. Mention different reasons for substance abuse in KSA. Classify them suitably.

Public Health Question

ASSIGNMENT COVER SHEET

Course name: Society and drugs
Course Code: PHC314
CRN: 23523
Questions

(Each question has 2 marks)

Go through the article entitled, “Addiction and Drugs” published on the website of MOH, Saudi Arabia.

Link to the article: https://rb.gy/ah6fq6

 

On the light of this statement, discuss the following:

1.      What types of drugs are being abused in KSA? Classify and highlight the most popular drugs.

2.      Mention different reasons for substance abuse in KSA. Classify them suitably.

3.      What are the different complications of addiction?

4.      How to identify an addict in the family?

5.      How can we prevent addiction?

Student name:  
Student ID:  
Submission date:  

How does your explanation of theme in everyday life differ from the other responses? What are some additional things about theme in everyday life that you think should be considered?

Unit 4 DB: Finding theme in everyday life

The definition of Theme is often abridged to “the main idea.” However, Theme is more involved than that. Essentially, a theme is the author’s message–what the author wants to tell his/her readers about people in general. Themes can be supported by many of the story’s components, particularly the characters’ words, actions, and conflicts.

Initial response: We have now come to the half way part of the course. You have all read and viewed a number of different types of literature. Considering what you now know about literature, how do you think the study of theme can relate to our daily lives? Select one of the works of literature from the first four units to support your answer. Also, make sure to analyze the theme of that story and to show the implications that work of literature may have on your daily life.

Responses: How does your explanation of theme in everyday life differ from the other responses? What are some additional things about theme in everyday life that you think should be considered?

Remember to consider the following Discussion Board Rubric. Discussion Board Rubric. – Alternative Formats

Identify the sections and sub-sections within each branch as well as a short description of what each will cover (if applicable).

Lab Report 8

For your second draft you will identify the sections and sub-sections within each branch as well as a short description of what each will cover (if applicable).

Note: Not all sections will have sub sections, and in some rare cases some branches may not have any sections

 

Follow the following format:

The format is an example. Please make sure you include ALL branches, sections, and sub-sections applicable to your policy. Please make sure to include a one-sentence description for EVERY branch.

Policy setting and type (example: social media privacy policy)

  • Branch 1

One sentence description of what this branch covers (scope)

  • Section 1

1.1.1 Sub-section 1

  • Section 2

1.2.1 Sub Section 2

  • Section 3
  • Section 4
  • Branch 2

One sentence description of what this branch covers (scope)

  • Section 1

1.1.1 Sub-section 1

  • Section 2

1.2.1 Sub Section 2

  • Section 3
  • Section 4
  • Branch 3
  • Branch 4

Branch 5

Create a graphic organizer or infographic that helps explain accounting concepts useful in classifying costs.

Managerial Accounting & Cost Concepts

Managerial accounting deals with information that is for internal use. It helps managers to control costs, price, and make other relevant decisions. View the following YouTube video about managerial accounting:

  • ACCT 205 Chapter 1 Managerial Accounting & Cost Concepts. (n.d.). Www.youtube.com. Retrieved July 19, 2022, from https://youtu.be/A9r8TuCvlKg

Then, create a graphic organizer or infographic that helps explain:

  • The purpose of managerial accounting
  • Accounting concepts useful in classifying costs
  • Manufacturing activities and the flow of manufacturing costs