Paine and Jefferson’s views on religion

Compare Paine and Jefferson’s views on religion
Disregard Ben Franklin in the American
Literature iBook. Please use the stories of Thomas Paine and Thomas Jefferson from the American

Literature
iBook, for this paper.
Also in this paper: you must use at least 3 secondary research sources (beyond the literary text you’re
analyzing) to help build the case for your interpretation. Your research sources need to be useful,

intelligent
sources that fully meet the requirements of “legitimate academic sources.” In addition to this, of course,

you
must engage in significant close textual analysis of your chosen text.
Overall, the stories of Thomas Jefferson and Thomas Paine need to be used, along with 3 other resources.
Preferred language style Simple (Easy vocabulary, simple grammar constructions)

Sample Solution

The post Paine and Jefferson’s views on religion appeared first on homework handlers.

The writings of Benjamin Franklin, Thomas Paine, and Thomas Jefferson

Analyze and research the writings of Benjamin Franklin, Thomas Paine, and Thomas Jefferson
Then, write an essay in which you analyze and discuss the cultural and political characteristics of their works.
Be specific to the assigned readings in the textbook, and provide examples from those readings. Enhance and support your findings with research.

Sample Solution

The post The writings of Benjamin Franklin, Thomas Paine, and Thomas Jefferson appeared first on homework handlers.

Cash transaction

Question 1: [5pts each]
A. Calculate the future worth of the following 6-year cash transaction if the
interest rate is 10%, compounded annually. Draw the cash flow diagram.
Year Trx
1 $1000
2 $1200
3 $1400
4 $1600
5 $1800
6 $2000
B. Consider the following two investment opportunities. The investor’s MARR
is 15% and the investor only has enough funds to invest in one of the projects.
Which one should be chosen?
C. Use Excel (or equivalent application) to determine how long it will take for
an investment to triple in value at interest rates of 1%, 5%, 10%, 15%, 20%,
and 25%. Can you determine an approximate “Rule” for how to quickly
calculate how long it takes for an investment to triple in value?
Question 2: [10pts]
A company has decided to invest in a project to make a product. The initial
investment cost will be $1,000,000 to be spread over the first two years with
$700,000 in the first year and $300,000 in the second. The plan calls for producing
products at the following rates: 5,000 units in year 2; 10,000 in year 3; 30,000 in
year 4; 30,000 in year 5; $10,000 in year 6; and $5,000 in year 7. Products will be
sold for $50 each throughout the life of the project and cash operating expenses will
be $60,000 per year for years 2 through 7. Construct a cash flow diagram for the
project.
Question 3: [5pts each]
Air Links, a commuter airline company, is considering the replacement of one of its
baggage loading-unloading machines with a newer and more efficient one. The
relevant details for both machines are as follows:
• The current book value of the old machine is $50,000, and it has a remaining
useful life of five years. The salvage value expected from scrapping the old
machine at the end of five years is zero, but the company can sell the machine
now to another firm in the industry for $10,000.
• The new baggage-handling machine has a purchase price of $120,000 and an
estimated useful life of seven years. It has an estimated salvage value of
$30,000 and is expected to realize economic savings on electric-power usage,
labor, and repair costs and to reduce the amount of damaged luggage. In total,
annual savings of $50,000 will be realized if the new machine is installed.
The firm uses a MARR of 15%. Use any Annual Worth Method, address the
following questions:
A. What is the initial investment required for the new machine?
B. What are the cash flows for the defender in years zero to five?
C. Should the airline purchase the new machine?
Question 4: [10pts each]
The city of Toronto is considering two types of green water filtration subsystems.
Design A requires an initial investment of $500,000, with annual operating and
maintenance costs of 10% of the investment for the next 15 years. Design B needs
an investment of $250,000, with annual operating and maintenance costs of $75,000
per year for the next 15 years. Tax collections from Torontonians would be $85,000
per year. The interest rate is 6%, and no salvage value is associated with either
system.
A. Using Present Worth Analysis, which system should be selected and why?
B. If a new design (design C), which requires an initial outlay of $350,000 and
annual operating and maintenance costs of $65,000, is proposed, would your
answer to (A) change?
Question 5: [20pts]
SMART Robotix is planning to replace its old switchboard system, which has been
used in the company’s HQ for 10 years. This particular system, which has a current
market value of P, was installed for $100,000 and presumed a 15-year service life,
with no appreciable salvage value. Currently, the machine is costing the company
$20,000 a year, and these costs are presumed to be the same for the rest of its life.
SwitchT is proposing the company a new computerized switching system which
would require an investment of $200,000 for installation. The computerized system
is expected to have an economic life of 10 years, and a salvage value of $18,000.
One of the benefits of this new system is the reduction of operating cost to $5,000
per annum. No detailed agreement has been made with the sales representative about
the disposal of the old system.
Determine the range of resale values associated with the old system that would
justify installation of the new system at a MARR of 14%. Hint: use Annual
Equivalent Analysis

Sample Solution

The post Cash transaction appeared first on homework handlers.

The use of “stand alone machines”


Information Systems Strategic Plan: Electronic Proving Ground
An information system is formally designed and interlinked data structure elements that gather or retrieve, analyses, preserve and distribute information in the organization or institution to enhance decision making and problem resolution. All things being equal, information systems provide a significant element in the testing facilities and organization operating in vast geographical regions. Therefore, testing facilities need to adapt and embrace swift and authentic information systems to enable the fast transfer of data from one person to another. This is no different for the US Army Electronic Proving Ground (EPG). The testing facilities located in southern Arizona, surveil, and record data from advanced communication systems which need to be processed and provided to leadership to make decisions on equipment for the modern warfighter. According to EPGs website, their missions is to “Plan, conduct, analyze, and report the results of developmental testing in direct support of Army Futures Command (AFC) through rigorous testing, while continuing to support Program Executive Offices and industry partners ensuring Soldiers receive systems that enable mission accomplishment on the battlefield.” Therefore, the process and evaluation of this data is essential to the companies providing equipment and the US Army.
History
EPG has been part of Fort Huachuca since 1954. The surrounding mountainous area was optimal for testing and evaluating advanced communication electronics. The area of operations includes more than 9,000 square miles on the military reservation. Most private sector testing organizations tend to develop advanced information systems to ensure swift and ready access to the test data and information. Being a military organization this is not always the case. Only approved devices and systems can be used for production and without approval from the authorizing entities oftentimes the Army is behind on the latest technology and processes. EPG is looking to shift from using any type of removable media to central server systems were an organizational employee with designated credentials can access, edit and copy the test data remotely. Undeniably, over the past decades, the organization the testing institution utilized in t, CDs, and even tape to store and transfer test data from a particular testing station or person to another. That is to say, the computing systems of a specific testing station operated independently, with zero network interlinkage of the testing stations and the organization headquarters. The test personnel physically moved data from one computer or person to another.
Advancing to the server systems entail rigorous update of the organization’s computer and network systems and ascertaining the functionality of the computers in the organization’s facilities. To enable the testing company to utilize many computers spread throughout various subsidiary testing points in the state. As well as integrated software platforms to transfer and analyze the test information of multiple clients. In other words, my contract is entitled to coordinate and interlink numerous computing systems and the organization’s software platforms. Allowing smooth transfer of information and test data from one person to another in the organizational premises or entitlement.
Scope
Primarily, developing a central server system to interlink multiple computers spread across large organizations testing regions and stations entail a significant switch of the organization’s operations.
The system entails routers and network switches with a high bandwidth backbone. Ideally, the server is set at the automatic repair and upgrade mode with installed updating software. The system swiftly upgrades the installed programs in the order as well as troubleshot network problems to ensure a fast and reliable connection of the various computing systems in different regions (Hiroki et al.). As a network administrator, the information system advancement in the organization involves the composite design of the network models in every testing station. Enabling remote access to the organization’s file servers to access, edit, copy, and record the test data in the company database.
On the other hand, the organization server system security incorporates the identity security question. The system stores its data through the administration of the cloud storage software and the physical network storage in the company server rooms located at the company’s headquarters (Hiroki et al.). Hence data, input at the testing stations are processed into information that is transferred to the organizational servers through the organization’s online software platforms.
Information System Requirement Assessment
Procedures and Methods Used During this Investigation
Based on the information system scope definition, the current system will require an upgrade in its architecture, hardware, and software aspects. Therefore, to facilitate the shift to the central server system, it is imperative to perform an assessment of the current system. This is essential in enabling the identification of system structures, fundamental organizational processes, system and information flow, as well as facilitate in the evaluation of possible gaps and vulnerabilities present in the system. Hence, implementing certain procedures and methods will facilitate the requirement investigation process through enabling collection of pertinent information on the current system as well highlight the upgrade requirements.
The initial procedure involves mapping out the infrastructure of each facility within the US Army’s geographically distributed testing locations. Performing a network evaluation is key in highlighting the network hardware and software requirements for the upgrade from independent organization operations to network connectivity to the central server systems (Hove, Grahn, Poarch, Orde, Pirc, & Holder, 2017). Here, network hardware and software specifications that will allow cloud-based communication, data storage, remote access, as well as enable data manipulation stand out as the central server system requirements. Additionally, decomposition of the system into its constituent parts will facilitate the evaluation of the way each part works and its requirements.
Another crucial procedure involves performing interviews with relevant stakeholders from the US Army Electronic Proving Ground will assist the network administrator define the organizational processes in place as well as outline the system and information flow. This step works collaboration with graphical approaches such as flowcharts and data-flow diagrams to help in network architecture and infrastructure conceptualization and design. These procedures are fundamental in designing the new system, mitigating identified security risks, performing system tests, as well as facilitate optimal system design and implementation.
Overview of Current Systems Operations
The current systems operations in the Army’s Command, Control, Communications, Computers and Intelligence (C4I) Developmental Tester headquartered at Fort (FT) Huachuca, Arizona highlights independent local area network systems within each facility. The EPG have several test facilities within its headquarters including the Antenna Test Facility, the Electromagnetic Environmental Effects Test Facility, the Communication Systems and Networks, COSPAS-SARSAT, among others (EPG, n.d.). The LAN within each facility in the EPG allows communication of vital testing data to relevant members of the facility. The facility’s LAN connects workstations in each facility and enables data and device access to users. Additionally, users in this network can share the software necessary for specific testing modelling, simulation, and analysis as well as devices such as printers. These facilities have computing capabilities that include data access using designated credentials, data manipulation, and data storage in secondary storage devices. From the local nature of the network, the manipulation and storage of test data is also local.
Due to the lack of interconnectivity, vital communication occurs through physical movement of data from one computer or person to another using removable storage media within the EPG. This stands out as a point of vulnerability that threatens data integrity and confidentiality. Therefore, for a single client with numerous different requirements in testing services offered by EPG, the overall test results will require physical movement of information to one station for compilation. This process proves high risk and tedious. Additionally, the current system operations lack the capability to communicate with other testing locations via a secure network channel. The current system operations for EPG highlights several aspects that require upgrades to facilitate secure communication with data manipulation and sharing across its various testing facilities as well as communication over a wide area network with cloud-based capabilities.
Analysis of Current Systems
• *talk about the use of “stand alone machines” (computers that are not on the domain) These are now not allowed without proper patches and approval. This method of transferring data is not only unsecure but slow and lacks redundancy.
• Talk about the use of removable media to the Test network that is managed.
• Talk about how a storage server is already in place for testers to use rather than removable media.
• Add anything else that sounds good.

References
Hove, D., Grahn, A., Poarch, D., Orde, C., Pirc, J., & Holder, B. (2017). 10 Steps to an Effective Vulnerability Assessment. Retrieved from https://edge.siriuscom.com/security/10-steps-to-an-effective-vulnerability-assessment.

Sample Solution

The post The use of “stand alone machines” appeared first on homework handlers.