...Karen Gaskill LID: 00498315 Chapter 02: Describing Data: Frequency Tables, Frequency Distributions, and Graphic Presentation Essay I read an article from abc News found at this website: http://abcnews.go.com/blogs/politics/2014/01/this-chart-explains-why-politicians-arent-like-the-rest-of-us/. The article was published January 10, 2014 and is called “This Chart Explains Why Politicians Aren’t Like The Rest of Us”. The article begins with a bar graph showing the median net worth of the members of Congress compared to the median net worth of the U.S. population. The bar graph illustrates that the median net worth of the Congress is about 10 times more than the median net worth of the U.S. population. About half of the Congress members are millionaires. This has been such a recent focus as the rich vs. poor has become such a common theme in American politics and there has been quite a debate about income inequality. As a result, the Senate has been recently debating how to renew extended unemployment benefits for 1.4 million Americans. The graph included in this article definitely added to the report. The author was obviously trying to show the income inequality of the Congress members and the U.S. population. The graph illustrated the drastic difference in median net worth between these two by comparing the two population’s net worth. It was quite apparent by looking at the graph that the Congress median net worth was about 10 times more than the U.S. population...
Words: 268 - Pages: 2
...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative numbers...
Words: 727 - Pages: 3
...Gunther Documet 9/14/2015 Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal review...
Words: 334 - Pages: 2
...Linsey Cessor EDUC 2253 Dr. Shahan January 28, 2015 Professional Practice Chapter 2: Question for Discussion 2. Why is membership in an ethnic group more important to some individuals than to others? What characteristics might an educator look for to determine a student’s ethnic background and its importance in that student’s life? * Individuals may have multiples reasons of being more in tuned to their ethnicity than others. Most are drawn to their ethnic group because that is what is familiar to them. When the elderly generation is a dominate part of their raising then the younger generation has more information about their heritage. * Others are not so luck to grow up with the elderly generation influence and have are disconnected with their ethnic groups. Some people are a merge of two different ethnic groups and this causes confusion for the individual. With the merging of different ethnic groups, some people tend to loners. Not ever finding that “prefect” ethnic group that they belong in. As an educator there are many characteristics that will reveal the ethnicity of a student such as a student’s gender, race and religion. However, with all of this being said I do not think that the ethnicity of a student is completely important for an effective teacher. An effective teacher teaches on the level of their students, and then begins helping the student’s excel. An effective teacher is able to teacher all the curriculum to the students without biases...
Words: 344 - Pages: 2
...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an agreement...
Words: 1152 - Pages: 5
...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the CEO...
Words: 1762 - Pages: 8
...1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to disclose...
Words: 1114 - Pages: 5
...What is a conceptual framework? Why is a conceptual framework necessary in financial accounting? .A conceptual framework establishes the concepts that underlie financial reporting. A conceptual framework is a coherent system of interrelated objectives and fundamentals that are expect to lead to consistent standards'. A coherent system of concepts that flow from an objective. The objective identifies the purpose of financial reporting. The other concepts provide guidance on (1) identifying the boundaries of financial reporting; (2) selecting the transactions, other events, and circumstances to be represented; (3) how they should be recognized and measured; and (4) how they should be summarized and reported. What is the primary objective of financial reporting? The objective of general-purpose financial reporting is to provide financial information about the reporting entity that is useful to present and potential equity investors, lenders, and other creditors in making decisions about providing resources to the entity. Those decisions involve buying, selling, or holding equity and debt instruments, and providing or settling loans and other forms of credit. Information that is decision-useful to capital providers may also be useful to other users of financial reporting, who are not capital providers What is meant by the term “qualitative characteristics of accounting information”? Qualitative characteristics of accounting information that distinguish better or (more useful)...
Words: 662 - Pages: 3
...Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host, and run applications for customers; or they provide other services. An IT services firm may be chosen if the system can’t be developed internally or requires customer support. Packaged software providers are companies that produce software exclusively, like Microsoft or Intuit, and are preferable if the task needing the system is generic. Vendors of enterprise solution software create a system that is composed of a series of integrated modules. Each module supports a business function, such as accounting, or human resources. ERP systems may be appropriate if a complete system is required that can cross functional boundaries. A more intense option for larger, more customizable solutions are Managed service providers who can provide more services than application service providers. ASPs and MSPs may be appropriate when instant access to an application is desired, and in the case of ASPs, when the task is generic. Open-source software is a type of software that is developed by...
Words: 897 - Pages: 4
...Chapter 1 1. Why do we speak of “basic” rather than “primitive” religions? We speak of “basic” religions because the term is applied to many religions of contemporary people whose religious ideas are not found in written forms and to those of prehistoric people. In fact, it embraces a large variety of beliefs and practices. The word “primitive” means representative of the earliest stages of human development, which no religions can actually be considered primitive. Most religions are not the exact same and do not believe the same things, as they did thousands of years ago. Over time, religions have evolved, developed, or adopted new or different beliefs, in response to ecological and social environments, and continue to build on the wisdom of previous generations. 4. Define animism, and give several examples of surviving animism in modern life. Animism is the belief that all nature is alive and filled with unseen spirits and souls that have feelings and can be communicated with. Animists see a soul or a self, existing in animals, trees, stones, rivers, mountains, heavenly bodies, seas, and the Earth. These spirits can be flattered or offended, and can either help or hurt humans. Some examples in modern life of animism are historic stones, fireplaces, evergreen trees for Christmas, the sacred black stone for Muslims, the sacred river Ganges for Hindus, sandalwood for burning in the sacred fire temple for Parsis, and pilgrimages to the graves of presidents and famous people...
Words: 512 - Pages: 3
...by believing that one’s own culture is superior to the culture of others, tending to make people to neglect important cultural differences. 2. Q: What is cultural literacy? Why should businesspeople understand other cultures? ANSWER: Cultural literacy is the detailed knowledge about a culture that allows a person to work effectively within it. Businesspeople should understand other cultures because it would improve their ability to manage employees, market products, and conduct negotiations in other countries. It also helps managers to attend local needs and desires, improving the company’s competitiveness as globalization continues. 3. Q: How do nation-states and subcultures influence a people’s overall cultural image? ANSWER: When it comes to culture, we tend to invoke the concept of the nation-states that support and promote the concept of national culture by building museums and monuments to preserve the legacies of important events and people, and that also intervene in business to preserve national culture. While the subculture that is a group of people that share a unique way of life within a larger culture (including language, race, lifestyle, attitudes, or other characteristics) tends to be neglected, even that subcultures are very important when considering to expand business abroad. Quick Study 2 1. Q: What is meant by a culture’s aesthetics? Give several examples. ANSWER: A culture’s aesthetics are what it considers “good taste”...
Words: 2352 - Pages: 10
...Chapter 2 Application Questions 1. Imagine yourself as the CEO of a large firm in an industry in which you are interested. Please (1) identify major trends in the general environment, (2) analyze their impact on the firm, and (3) identify major sources of information to monitor these trends. (Use Internet and library resources.)As I am striving to work in the Funeral or Death Industry as a Funeral Director, I am observing the change in our industry from traditional burial to cremation. This shift in the industry which reduces the price of a funeral by three or four thousand dollars depending on the demographic area, these trends can be followed in Funeral Industry standards such as the NAFD, a Funeral Directors Organization 2. Analyze movements across the strategic groups in the U.S. retail industry. How do these movements within this industry change the nature of competition?The retail industry is driven by young consumers. These consumers make decisions for their group by purchasing the goods and services that they want. Making the decisions changing competiton for everyone. 3. What are the major trends in the general environment that have impacted the U.S. pharmaceutical industry?More easily accessible drug information. Help with drug costs through programs from the pharmacy and the drug companies. Rewards programs. 4. Go to the Internet and look up www.kroger.com. What are some of the five forces driving industry competition that are affecting the profitability...
Words: 321 - Pages: 2
...Chapter 2 – Case Questions: Petrie’s Electronics 1) Information systems projects arise out of need. In the case of Petrie’s Electronics, Jim has been assigned the task of managing a project that will improve the company’s relationships with its customers. Petrie’s has a need to not only stay viable but to flourish and be a major competitor in today’s global technological marketplace. Upper management at an organization realizes at some point that in order to stay competitive they cannot stand still. They must grow and prosper. In this case, Ella the CFO along with other top management figures saw an area for improvement and Jim has been bestowed this opportunity to help the company. In this particular case, the organization’s information system needs may have resulted from issues associated with poor customer relations possibly having a history of high turnover rates for customers. Furthermore, key decision makers at Petrie’s most likely realized they could further capitalize on their current customer base through improvements in their current information technology system. 2) Organizational information systems should not only reinforce and support a company’s strategy they should aim to improve and complement it as well. Similar to a company’s strategy, information systems need to encompass a strategic vision that establishes an Information system’s main purpose and direction, sets core principals as guidelines, identifies clear objectives for monitoring the Information...
Words: 414 - Pages: 2
...to provide mortgage loans to, previously, undesirable borrowers. Now the demand for houses rose & so did the prices for the houses making these subprime loans attractive to lenders because of the high return. So the Banks & investment houses continued to invest in mortgage securities but the financial institutions did not maintain enough reserves in case the housing market crashed. Naturally, the housing market came crashing down leaving borrowers “upside down” in their loans & they were forced to foreclose. When this happened, the banks became unwilling to lend money so funds were not available for businesses. Without funds for everyday operations, businesses struggled causing layoffs & raising the unemployment rate. 2. What steps did the Federal government and the Federal Reserve take to mitigate the crisis? The Federal Reserve bailed out Bear Stearns & AIG. The U.S. Department of the Treasury seized Fannie Mae & Freddie Mac. Congress passes the economic bailout plan TARP which spent $700 billion investing in banks & bailing out the auto industry. Congress also passed an $825 billion economic stimulus package called the American Recovery & Reinvestment Act which included cutting taxes, building infrastructure, & investing in green energy. 3. Compare and contrast microeconomics and macroeconomics. How do the two approaches interrelate? Microeconomics is...
Words: 489 - Pages: 2
...1. Describe the first settlements by the English and their purposes. The first English settlement was Jamestown, Virginia, and it was massacred by starvation. It was also full of mosquitoes carrying malaria and other parasite carrying diseases. With such a large amount of the population dying and the fact that women were not sent to the settlement until 1619 (12 years after its origin), moral was low. In 1616 the headright system was enforced, which gave 50 acres of land to everyone who pays his own way to Virginia, and another 50 for every person they bring along. Still the settlement was built upon indentured servitude, in which the company would pay the voyage for men who would then work for the company for 4-7 years. After the end of the 4-7 year contract, the men would receive their own land. In theory it was a good plan, but most men died before the end of their contracts. Mortality rates were so high because the main purpose of the settlement was to gain a profit for the company. the men spent the majority of their time digging for gold, searching for a northwest passage to Asia, and farming tobacco, and not enough time farming or hunting! the Virginia company was a joint stock company, so in order to raise money for colonization they sold shares of their company to willing investors. The Plymouth Company was also a joint stock company. The house of Burgesses was founded to govern the settlement of Virginia. It became a royal colony in 1624. In 1632, 10 million...
Words: 1244 - Pages: 5