Free Essay

Bank Heist Project

In:

Submitted By dtm0821
Words 319
Pages 2
Project 1: The Bank Heist 9-4-2014
Is it possible to carry $1,000,000 in cash?

My first assumption of the question is it possible to carry $1,000,000 in cash… I say yes. I will outline below with how I support my assumption. I started my research on the internet to compile my answers. I felt in order to explain my thinking, I needed to know what is the largest currency circulated to the public, how much money is in a bundle of bills for the largest bill, and how much equaled $1,000,000.00 of the largest bill printed. So below, I will outline my research and support my result on a graph for further explanation. 1.) The largest currency circulated to the public is the $100.00 bill. (www.treasury.gov) 2.) A bundle equals 100 of $100.00 bills. (www.answers.com) 3.) It takes 10 bundles of $100.00 bills to make $1,000,000.00. 4.) The weight of a single bill is 1 gram. (www.enchantedlearning.com) 5.) The weight of a bundle of 100-$100.00 bills is 100g. 6.) The weight of 10 bundles of $100.00 bills is 10,000g. 7.) Converting 10,000g to lbs.= 22lb (www.convertunits.com) 8.) The weight of $1,000,000.00 is 22lbs in $100.00 bills.
If you follow the graph below it shows the weight of $1,000,000.00 if you were to carry it with the highest currency printed of $100.00 which is a total of 22lbs or 10,000 grams. If you would change your currency to the single dollar it would be a weight of 2207.00 lbs. or 1001073 grams, my assumption would change to no, as I would not be able to lift that much weight.

References: www.treasury.gov www.answers.com www.enchantedlearning.com www.converunits.com

Similar Documents

Free Essay

Cyber Crime

...the strokes of a keyboard. Fearless thugs were replaced by highly accomplished computer hackers whose knowledge and expertise allowed for the infiltration to occur without alerting the authorities. Once the hackers had secured root access to the targeted systems, valid debit card numbers were stolen and distributed to a global network of criminal accomplices. Using these seemingly legitimate cards the thieves went to work targeting ATMs to withdraw cash on an enormous scale. What is truly remarkable about this “heist” was how relatively simple and straight forward the methods employed by the hackers were. This attack has come to be known as an “Unlimited Operation”. How it happened It is extremely difficulty to answer how the hackers managed to steal such an enormous sum of cash with any degree of certainty. Given the very nature of how it was stolen, to publicly reveal specifics on how the heist was accomplished could possibly leave the institutions at the mercy of further attacks. However, the overwhelming online consensus points to SQL Injection as the method most suitable for this form of cyber-attack. [2] Structured Query Language (SQL) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS). Databases form the backbone of all financial institutions as they are responsible for recording all customer information, transactions and...

Words: 1338 - Pages: 6

Premium Essay

Field Art Project Analysis

...On this day, my friend decide to start a field art project with some of the children at our school, also I assist her with this. I thought it would be a exciting project to do. My duty kept me busy ran around through out the building. At the end of the day, I walk to my car and I couldn’t find my keys, although I double check my purse to see if the keys were in there, however I thought “no big deal.” I return to the classroom, where my phone lay on the table, “No keys,” just my luck, I attach my keys with the wallet. In my wallet had my driver license, credit card, gift card, my insurance card, and four dollars, which they were only car and house keys, I had. I feel unsafe, with my stuff was out there, and anyone could invade my vehicle and my home anytime. The...

Words: 499 - Pages: 2

Premium Essay

The Purge Review

...the consequences for too long. All crime is legal for 12 consecutive hours starting at 7:00 pm and ending at 7:00 am. This sequel follows a few different stories that eventually intersect, but everything in the film revolves around a man named Leo Barnes. Leo is looking for retribution for his son’s death and expects to get his much needed vengeance this very night. Eva Sanchez struggles to make ends meet working at a diner and attempting to pay for her father’s medicine. She hopes to barricade herself in her apartment in the middle of the projects to survive for not only her father, but also her daughter Cali. Shane and Liz are a couple on the verge of desperation attempting to make it somewhere safe for the night yet find themselves in an unreliable car at the worst possible time. All crime is legal during the annual Purge; that means not just murder. “The Purge: Anarchy” makes it seem like hanging out around banks is a safe haven during...

Words: 745 - Pages: 3

Free Essay

Automobiles

...largest e-mail marketing company in America. Two and a half thousand companies use its services and entrust their customer e-mails to it. At least 50 companies, including Target, Best Buy, Walgreens and JP Morgan Chase, had their client e-mail addresses stolen So far, 26 companies have come forward as affected by the breach. The first company to report the data breach was the grocery chain Kroger. From there, it quickly spiraled, as a barrage of companies came forward over the weekend to report their email databases had been accessed without permission The list currently includes: TiVo, Barclays Bank of Delaware, McKinsey & Company, Marriott Rewards, Ritz-Carlton Rewards, New York & Company, Brookstone, L.L. Bean, Ameriprise Financial, The College Board, The Home Shopping Network, Lacoste, Disney Destinations, Ralphs, Food 4 Less, Fred Meyer, Fry’s, King Soopers, U.S. Bank and City Market. Fortunately for those affected, the stolen email lists included only customers’ names and email addresses; no financial information was accessed. A rigorous assessment determined that no other personal identifiable information associated with those names was at risk,” Epsilon said in a press release. Some may dismiss the type of data harvested as a minor threat, but having access to customer lists opens the opportunity for targeted phishing attacks to customers who expect...

Words: 1305 - Pages: 6

Premium Essay

Tjx Companies Case Study

...T.J.X. Companies, Inc. Final Case Study Report Nichols College T.J.X. Companies, Inc. is the leading off-price apparel and home fashions retailer in the United States and worldwide, ranking number 115 in the most recent Fortune 500 listings. They have the broadest demographic reaches in retail, all of which have enabled them to achieve successful, and profitable growth year after year, through many types of economic and retail cycles. With over 3,000 stores in six countries, approximately 179,000 associates and a fresh e-commerce presence, and they are growing faster than ever (“About the TJX Companies, Inc.,” 2014). Through T.J.X. Company’s innovative buying and sourcing strategies, they discover and deliver value for shoppers in many ways. Their goal is to provide customers with quality merchandise for the entire family, every day. Value means more than price to T.J.X. Company professionals; buyers are trained to recognize that true value is a combination of fashion, quality, brand and price. T.J.X Companies are known for their brand name and designer fashions at 20-60% off department store prices. They are able to do this by purchasing merchandise from designers when they over produce or other department stores over purchase. They go in during these certain situations and negotiate the lowest possible price to pass on the savings. How they buy is just as important as what they buy. They pride themselves in never having the same selection twice with new arrivals...

Words: 5544 - Pages: 23

Free Essay

Term Paper on Stuxnet

...scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. “To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.” Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program. In recent days, the retiring chief of Israel’s Mossad intelligence agency, Meir Dagan, and Secretary of State Hillary Rodham Clinton separately announced that they believed Iran’s efforts had been set back by several years. Mrs. Clinton cited American-led sanctions, which have hurt Iran’s ability to...

Words: 2875 - Pages: 12

Premium Essay

Higher Education

...M.S MARKETINGBRANDING DR. OSMAN KHANUNIVERSITY OF CENTRAL PUNJAB | HIGHER EDUCATION | LITERATURE REVIEW | HAFSA KHAN L1F15MSMK0007SAIRAZAKIR L1F15MSMK00085/28/2016 | LITERATURE REVIEW: THE CONCEPT OF BRANDING IN HIGHER EDUCATION Bennett and Ali-Choudhury ( 2007 p4 ) suggest that a university brand is “a manifestation of the institution’s features that distinguish it from others , reflect its capacity to satisfy students’ needs, engender trust in its ability to deliver a certain type and level of higher education, and help potential recruits to make wise enrolment decisions”. Stamp (2004) gives a number of factors for higher education (HE) branding agenda,that includes;tuition fees, competitive differentiation, league tables, organizations attaining university status and the miss-match between brand perceptions and delivery. Researchers have to continually ask why some organizations are more successful than others in brand building in order to understand branding.(Urde, 2003). It has been suggested that “Higher Education Institutions need to be managed more and more as corporate brands” (Whelan & Wohlfeil, 2006, p317), but instead of the fact that there is a large number of studies that examined image and reputation, the notion of branding has very little marks on higher education marketing literature (HemsleyBrown and Oplatka, 2006) and empirical papers that relate to HE branding are scarce (Hemsley-Brown and Goonawardana...

Words: 2644 - Pages: 11

Premium Essay

Critical Thinking in Ethics

...Ethics is the basic concepts and moral principles of decent human conduct which includes values such as the essential equality of all men and women, human or natural rights, obedience to the law of land, with respect to what is right and what is wrong (Velentzas., 2010). Ethics is the behavior that a person should adhere to in his daily dealings with the world. Ethics is a system of moral principles applied by people, society and the world. Ethics provide guidelines for acceptable behavior in the environment within which you are in. An ethical approach is becoming necessary both for corporate success and a positive corporate image (Schuder, 2014). Especially nowadays in Kenya ethics in business are obligated because many businessmen are only interested in making money despite the ethical costs or the harm they would probably cause to people or even to nature (environmental pollution). Corporate social responsibility defines all the cases of ethics that businessmen can follow effectively. Many firms are choosing to make a public commitment to ethical business by formulating codes of conduct and operating principles. In doing so, they must translate into action the concepts of personal and corporate accountability, corporate giving and corporate governance. Thinking Critically About Ethics Thinking critically about ethics is the intellectual disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and evaluating ethical issues to determine...

Words: 4674 - Pages: 19

Premium Essay

Assessment

...B120 An Introduction to Business Studies Assignment Booklet Contents 1 Introduction 3 1.1 How to pass B120 3 1.2 The purpose of assignments in B120 1.3 What tutors are looking for in the assignments 3 4 1.4 Word processing 4 1.5 Word limits 1.6 Referencing 5 7 1.7 Plagiarism – what it is and how to avoid it 1.8 Completing and sending in your assignments 7 8 1.9 The structure of each assignment 2 TMA 01 11 13 2.1 About TMA 01 13 2.2 The TMA 13 2.3 Guidance notes for TMA 01 Part I 2.4 TMA 01 Part II 16 17 3 TMA 02 18 3.1 About TMA 02 18 3.2 TMA 02 Part I 18 3.3 Guidance notes for TMA 02 Part I 20 4 TMA 03 22 4.1 About TMA 03 4.2 TMA 03 Part I 22 22 Guidance notes for TMA 03 Part 1 27 TMA 03 Part II 27 5 TMA 04 29 5.1 About TMA 04 5.2 TMA 04 Part I 29 29 5.3 Guidance notes for TMA 04 Part I 32 5.4 TMA 04 Part II 33 6 End-of-module assessment (EMA) 34 6.1 About the EMA 34 6.2 The EMA 6.3 Guidance notes for the EMA 34 34 7 Conclusion 35 1 Introduction 1 Introduction B120 An Introduction to Business Studies is assessed through five assignments: four tutor marked assignments (TMAs) and one end-of-module assessment (EMA). There is no examination. Each assignment is based on one of the five books in B120 although the EMA reviews...

Words: 11886 - Pages: 48

Premium Essay

Pawnshops

...PHILIPPINE SCHOOL OF BUSINESS ADMINISTRATION, Q.C. 1029-Aurora Blvd. Cubao, Q.C. Selected Pawnshop Businesses along Sumulong Highway, Marikina City: Factors of Success Submitted by: Leira Susana Arceo Escala Charmaine Santos Tesalona Mariel Navata Nieto John Michael Temporal Soria Ralf Louise Sauro Vico Submitted to: Dr. Carolina D. Ditan Table of Contents Title Page Acknowledgement List of Tables List of figures Chapter I Introduction Background of the study Theoretical Framework Research Paradigm Statement of the Problem Hypotheses of the Study Significance of the Study Scope and Delimitations Definition of Terms Chapter II Review of Related Literature Foreign Literature and Studies Local Literature and Studies Chapter III Research Methodology Research Design Sampling Design Research Instrument Data Gathering Procedure Statistical Treatment Chapter IV Presentation, Interpretation and Analysis of Data Chapter V Conclusion and Recommendations Summary Conclusion Recommendation Bibliography Appendix Appendix I. Letter to the respondents Appendix II-A. Questionnaire for customers Appendix II-B. Questionnaire for employee/staff ...

Words: 17570 - Pages: 71

Premium Essay

Court and Trial

...3 Учреждение образования «Брестский государственный университет имени А. С. Пушкина» Кафедра английского языка с методикой преподавания М. В. Гуль EDUCATIONAL SYSTEM. COURTS AND TRIALS СИСТЕМЫ ОБРАЗОВАНИЯ И ПРАВОСУДИЯ ВЕЛИКОБРИТАНИИ И США Практикум по английскому языку Для студентов 4-го курса гуманитарных и педагогических специальностей (специальность 1-21 06 01-01, современные иностранные языки специальность 1-02 03 06, иностранные языки (английский, немецкий)) БрГУ имени А. С. Пушкина Брест 2009 4 УДК 372.016 : 811.111(076) ББК 74.268.1(Англ)р Г94 Рецензенты: Кандидат филологических наук, доцент кафедры иностранных языков технических специальностей БГТУ Д. В. Новик Зав. кафедрой кафедрой иностранных языков второй специальности БрГУ имени А. С. Пушкина, доцент В. М. Иванова Практикум направлен на совершенствование навыков и развитие умений диалогической и монологической речи по темам: система образования, система правосудия Великобритании и США, а также на совершенствование письменной компетенции студентов. Каждый раздел содержит тематический словарь, ряд упражнений на закрепление лексики, достаточное количество текстов по теме, упражнения на повторение. Практикум предназначен для аудиторной и самостоятельной работы студентов 4-го курса, изучающих английский язык как основную специальность. 5 Educational System (the USA and the UK) Topical Vocabulary Nursery school, kindergarten, elementary school, high school (junior, senior), secondary school...

Words: 29371 - Pages: 118

Free Essay

Made to Stick

...House Publishing Group, a division of Random House, Inc., New York. Random House and colophon are registered trademarks of Random House, Inc. Library of Congress Cataloging-in-Publication Data Heath, Chip. Made to stick : why some ideas survive and others die / Chip Heath & Dan Heath p. cm. Includes index. eISBN: 978-1-58836-596-5 1. Social psychology. 2. Contagion (Social psychology). 3. Context effects (Psychology). I. Heath, Dan. II. Title. HM1033.H43 2007 302'.13—dc22 2006046467 www.atrandom.com Designed by Stephanie Huntwork v1.0 To Dad, for driving an old tan Chevette while putting us through college. To Mom, for making us breakfast every day for eighteen years. Each. C O N T E N T S INTRODUCTION WHAT STICKS? 3 Kidney heist. Movie popcorn. Sticky = understandable, memorable, and effective in changing thought or behavior. Halloween candy. Six principles: SUCCESs. The villain: Curse of Knowledge. It’s hard to be a tapper. Creativity starts with templates. CHAPTER 1 SIMPLE 25 Commander’s Intent. THE low-fare airline. Burying the lead and the inverted pyramid. It’s the economy, stupid. Decision paralysis. Clinic: Sun exposure. Names, names, and names. Simple = core + compact. Proverbs. The Palm Pilot wood block. Using what’s there. The pomelo schema. High concept: Jaws on a spaceship. Generative analogies: Disney’s “cast members.” CHAPTER 2 UNEXPECTED 63 The successful flight safety announcement. The surprise brow. Gimmicky surprise and...

Words: 91454 - Pages: 366

Free Essay

Pci for Dummies

...Compliments of ersion 2.0 ! ated for PCI DSS V Upd pliance PCI Com ition Qualys Limited Ed Secure and protect cardholder data Sumedh Thakar Terry Ramos PCI Compliance FOR DUMmIES ‰ by Sumedh Thakar and Terry Ramos A John Wiley and Sons, Ltd, Publication PCI Compliance For Dummies® Published by John Wiley & Sons, Ltd The Atrium Southern Gate Chichester West Sussex PO19 8SQ England Email (for orders and customer service enquires): cs-books@wiley.co.uk Visit our Home Page on www.wiley.com Copyright © 2011 by John Wiley & Sons Ltd, Chichester, West Sussex, England All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, England, or emailed to permreq@wiley.com, or faxed to (44) 1243 770620. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com and...

Words: 15012 - Pages: 61

Free Essay

Fake Memories of Me

...Fake Memories of Me by Cathyn McKenna Copyright 2016 ===== 1 September, 1853. Our parent's summer estate outside Arkangel'sk. You, 17, freshly returned from your second year at the Tsar's Imperial Riding Academy, your eyes all aglow with the thoughts of your Commission, two years hence, but still completely dominating your thoughts and words. Me, 25, already bored of The Social Circle, as all heirs were obligated to navigate, the slow gyration of palaces, dances, hunting, small talk, and the never ending search for a marital partner only slightly above your level, at least in income, but certainly not prestige. Rumors of war tainting everything. There was that one bright perfect day. In a week you would be back at the Academy. In a week, I'd be heading for Nizhny Novgorod to romance the Count's daughter, the insufferable thing. But on that day, the last good weather before May, we were brothers again. We drank, we danced, we fenced, we talked deep philosophy and shallow gossip, but we were brothers. Brothers again after so long apart, and so soon to be parted. Who could have known that a year later to the day, a fresh-faced Lieutenant of Horse, newly commissioned, and commanding 65 fellows, would lead a charge to silence a platoon of English cannon, those same cannon smashing the Lieutenant and his men to bits instantly, and mothers across Velikaya Rus smashed for the rest of their lives. I sit now at your cenotaph, as I have every year for the last nineteen...

Words: 9554 - Pages: 39

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503