Unit 9 Discussion

In: Other Topics

Submitted By 1averagejoe
Words 256
Pages 2
TO: Professor Tanae Williams
FROM: Raymond Lee
DATE: May 1, 2012
SUBJECT: Financial Statement Analysis - Discussion

I would imagine that the stakeholders in this case are Jack McClintock; President of McClintock Industries, Jeremy Phelps; Public Relations Director, Myself; Controller of McClintock Industries, and all of the stockholders of McClintock Industries, and any potential investors in McClintock Industries. President McClintock’s actions are unethical; the choice to only report the positive facts instead of the full truth is just as bad as covering up. For instance, no mention is made that the debt to total assets ratio has increased from 35% to 55%, that inventories are up 89%, and that while the current ratio improved, the acid-test ratio fell from 1:1 to 0.5:1 Weygandt, J., Kimmel, P., & Kieso, D. ,2011). So by only reporting what he chooses, President McClintock has left himself open for scrutiny in the future. As the Controller it is my responsibility to speak to President McClintock and let him know that although the report is correct, the presentation is wrong; plus I feel it is unethical to report only the positives without showing the negatives. As for Jeremy Phelps; he does have a responsibility to report what is given to him, but he has to know that he is still responsible for delivering the message and has to believe in it for it to be a sell to future investors.
References
Weygandt, J., Kimmel, P., & Kieso, D. (2011). Managerial Accounting, 5th edition. US: John
Wiley and…...

Similar Documents

It273 Unit 9 Guide

...Project Grading Rubric Course: IT273 Unit: 9 Points: 70 Project Instructions: Project Instructions: Respond to each of the project requirements and submit all work to the Dropbox as a single file. Project requirements: 1. Callingyou Inc is a growing company providing 24-7 telephone support services for numerous companies. They have asked you to prepare a design proposal for their new office network. They will have two offices with a dedicated T1 line between them and would like each office to be able support sixty employee workstations with internet access, central server access, and VoIP. These workstations will be shared by multiple users as the company operates on shifts to provide 24-7 support. Each office will also have eight management offices. In addition to this office support, they also need to support VPN access for employees working from home. And, support for secure internet access customers visiting the office is desired. The Callingyou Inc executives have no experience with networks but want to be sure that they are making the right decision; so, they have asked that in addition to providing a design that the proposal specifically describe all network design considerations. The descriptions should be thorough but understandable for a layman, and it should be clear how the network design proposed relates to each of those considerations. Your proposal document should be between 4 and 10 pages before including diagrams or references. Visio should be used to......

Words: 730 - Pages: 3

Is3230 Unit 9 Lab 9

...Encryption Standard. 7. What is SHA1, and what is it used for? The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. Is it used similarly to TripleDES or are they different? They are the same, they both use algorithms. 8. Provide and explanation for the difference between symmetric keys and asymmetric keys in a PKI? symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message. 9. What is a common drawback to Encrypting using enterprise level tools such as PGP? Complexity, cost, lack of scalability, and lack of interoperability with VoIP systems. So even though implementing encryption is appealing, many businesses may balk at the potential obstacles. 10. What is the difference between PGB and GPG? “PGP” stands for “Pretty Good Privacy.” It was developed by Phil Zimmermann. At first it was written as copyrighted freeware under the Gnu Public License. Later, PGP was upgraded and made into a propriety program. The rights for this program are traded around. The reason for this upgrade was legal defense costs and royalty issues related to the export laws of the USA. Now the PGP program is owned by PGP......

Words: 804 - Pages: 4

Unit 9

...Valerie Coakley PS220-03: Child and Adolescent Psychology June 22, 2010 Unit 9 Final Project: Urie Bronfenbrenner developed the ecological systems theory to explain how everything in a child and the child's environment affects how a child grows and develops. He labeled different aspects or levels of the environment that influence children's development, including the microsystem, the mesosystem, the exosystem, and the macrosystem (Bukatko, 2008). Bronfenbrenner’s theory stresses the need to understand how children develop in everyday life. The development issue I chose to discuss is Fetal Alcohol Syndrome (FAS) and how the surroundings and everyday life affects the development. There are different characteristics that accompany FAS in the different stages of a child's life. "At birth, infants with intrauterine exposure to alcohol frequently have low birth rate; pre-term delivery; a small head circumference; and the characteristic facial features of the eyes, nose, and mouth" (Phelps, 1995, p. 204). Some of the facial abnormalities that are common of children with FAS are: microcephaly, small eye openings, broad nasal bridge, flattened mid-faces, thin upper lip, skin folds at the corners of the eyes, indistinct groove on the upper lip, and an abnormal smallness of the lower jaw (Wekselman, Spiering, Hetteberg, Kenner, & Flandermeyer, 1995; Phelps, 1995). These infants also display developmental delays, psychomotor......

Words: 1466 - Pages: 6

Unit 9 Seminar

...Unit 9 Seminar August 31, 2012 MT140: Introduction to Management Unit 9 Seminar Many people encounter communication problems and sometimes they can be avoided and others not so much. Everyone uses a process of perception and filtering and it’s easy to mistake perception which will lead to a misunderstanding as does filtering. It’s best to try and use clear, slow speech when communicating with someone, be sure to repeat, pause, and use gestures. Word choice and body language are what I believe to be very important in communication. These two can clash very quickly and easily if not done properly, it can also cause confusion. There are also different kinds of communication channels that we have such as oral and written. Oral communication is face to face discussion, telephone, and even through presentation and speech. The written communication is emails, memos, letters, reports, computer files, and more. The steps to managing change can also vary, but change can happen constantly and unpredictably. There are several ways you can take to managing the change and they could be by first building a case for the change. What’s the reason for the change and why is it so important that it happens within the business? Next, would to be sharing the vision and values these are important because you would want your company to know what the vision is and values. This way everyone is on board and has and understanding to why it is happening. Thirdly, you will need the recourses......

Words: 295 - Pages: 2

Unit 9

...Unit 9 #1 Transder: A device that converts from one form to another. #3 Radio Frequency interference and Electromagnetic interference. #5. Electric Field and Magnetic field. Diffraction occurs with all waves, including sound waves, water waves, and electromagnetic waves such as visible light, X-rays and radio waves #17. Refraction is the change in direction of a wave due to a change in its transmission medium. #18. Shadow Zone is an area following an obstacle that does not receive a wave by diffraction. #19 Thre basic modes : Ground wave, space wave. sky wave. #20. Ground Wave propagation is a method of radio frequency propagation that uses the area between the surface of the earth and the ionosphere for transmission. #24. The radio waves having high frequencies are basically called as space waves. These waves have the ability to propagate through atmosphere, from transmitter antenna to receiver antenna. #30. The CRITICAL FREQUENCY is the maximum frequency that a radio wave can be transmitted vertically and still be refracted back to Earth. The CRITICAL ANGLE is the maximum and/or minimum angle that a radio wave can be transmitted and still be refracted back to Earth. In radio transmission maximum usable frequency (MUF) is the highest radio frequency that can be used for transmission between two points via reflection from the ionosphere ( skywave or "skip" propagation) at a specified time, independent of transmitter power. This index is......

Words: 412 - Pages: 2

Unit 9

...Unit 9 Assignment 1. Refer to the sets of the aggregate demand, short-run aggregate supply, and long-run aggregate supply curves. Use the graphs to explain the process and steps by which each of the following economic scenarios will shift the economy from one long-run macroeconomic equilibrium to another equilibrium. Under each scenario, elaborate the short-run and long-run effects of the shifts in the aggregate demand and aggregate supply curves on the aggregate price level and aggregate output (real GDP). a. Suppose the household wealth decreases due to a decline in the stock market asset prices (See the set of graphs below and pay attention to the 3-stage shifts in graphs). Answer: In graph one the decline in the stock market asset price causes the AD line to shift downward, decreasing. The long-run equilibrium in the first graph is the point where all three of the lines (LRAS, S1, and D1) are connecting. With a lower GDP, the aggregated demand curve shifts to the left (D1 to D2) creating a new equilibrium point at a lower price level. In the second graph it shows a higher supply with the increase in the SRAS (S1 to S2) curve. It will create a new long run equilibrium at a lower price level. In the last graph it shows both the shift in the AS curve from AD1 to AD2 due to the decrease and it shows the increase in the SRAS curve from S1 to S2 due to higher supplies. It shows both the old and new equilibrium along the LRAS curve. The first one being higher......

Words: 1410 - Pages: 6

Unit 9

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that,......

Words: 298 - Pages: 2

Unit 9

...HS140 Week 9 Final Project Name: Please answer the following case study questions using the knowledge gained in this course. Remember to cite your references in APA format. Answer the questions in complete sentences and spell-check your Assignment. Each question is worth 4 points. Case 1 A patient calls the physician’s office because she is concerned that her prescription medication looks different from what she normally takes. She mentions that her co-pay was lower too. 1. What are some initial questions you should ask the patient to gather information the physician might need? 2. Critically evaluating the situation, what are three possible explanations of the difference in appearance and cost of the medication? 3. The patient describes the tablet’s appearance and the markings on it. If the physician were to ask your assistance in identifying the medication (which you would present to him/her for verification) what are three possible sources to determine the identity of the medication? Case 2 A patient visits the clinic and it is determined he has a sinus infection as well as a seasonal allergies. The patient’s chart indicates an allergy to penicillin and lists current medications as atenolol. He is given a prescription for Augmentin. 1. Explain whether Augmentin is a reasonable antibiotic choice in this patient. 2. The patient is also given another medication to help with the itching of seasonal allergies. The instructions are to take...

Words: 683 - Pages: 3

Unit 9 Discussion 1: Risk Analysis

...Gustavo Ochoa John Webb Dani Deandresi Unit 9 Discussion 1: Risk Analysis To protect information, businesses need to implement rules and controls for the protection of information and the systems that store and process this information. This is achieved through the implementation of information security policies, standards, guidelines and procedures. This document states how a company will protect its physical and information assets. It is a living document, meaning that the document is never finished. This document can include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company’s assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy. A security policy should be written by senior management. This plan also outlines security roles and responsibilities. System characterization is used to expedite the risk analysis. It is the process of identifying which information assets need protecting either because of their criticality to the business and/or because ePHI is processed and stored on the system. This process includes conducting an inventory of major applications and general support systems—any systems that process or store PHI. A major application is an application that is critical to an organization or stores PHI. Generally, the “owner” for a major application is the director of the department......

Words: 350 - Pages: 2

Unit 9

...Unit 9 Assignment Kaplan University CJ211: Police Operations Police Technology has evolved so much from the time of the first modern officer. With population increasing, law enforcement officers needed technology that gave them the chance to do their jobs quicker and better. Instead of having to shoot a suspect, officers now have less than lethal weaponry which makes it possible to incapacitate using different methods. Crime mapping allows police departments to find correlations between crimes in different areas of the city. In order for law enforcement officers to contain traffic pursuits they now use pursuit management technology which helps to stop a pursuit before something gets damaged or somebody gets hurt. Police officers sometimes have to deal with violent, combative people and while dealing with them have to keep in mind the use-of-force protocols. Less-lethal technologies give police an alternative to using physical force options that potentially are more dangerous to the officers and the suspects (National Institute of Justice). There are seven types of less-than lethal technology. Conducted Energy Devices, such as the Taser and Stun gun, can induce involuntary muscle contractions that temporarily incapacitate people. Directed Energy Devices use radiated energy to achieve the same effect as blunt force, without injury. Chemicals, including pepper spray, tear gas, and stink bombs, are used to incapacitate suspects so officers can catch them and......

Words: 1078 - Pages: 5

Htm520 Week 9 Discussion Htm 520 Week 9 Discussion

...http://workbank247.com/q/htm-520-complete-course-select-your-due-week/2452 HTM520 Week 1 Discussion  "The Strategic Management Process” Please responds to the following: From the e-Activity, examine the four (4) main elements of the strategic management process, and determine the primary manner in which they correlate with one another. Provide two (2) examples that depict the importance of strategic alignment within the strategic management process. Determine which of the four (4) main elements of the strategic management process that you believe to be the most important in the hospitality industry. Provide one (1) example that depicts the importance of the selected element to support your position. HTM520 Week 2 Discussion "Assessment of the Broad Environment” Please respond to the following: Analyze the four (4) main elements within the micro environment. Develop one (1) strategy that shows the importance of each element and why it is necessary to adopt the changes in order to remain compliant with the law and competitive as an industry leader. Analyze the five (5) forces of competition in Porter’s Five Forces model. Suggest two (2) specific approaches that a hospitality company could take in order to examine its competition. Provide a rationale for your response in which you cite Porter’s Five Forces model. HTM520 week 2 Case study 1 Starbucks Corporation (B)” HTM520 week 3 Discussion "Mission Statement, Vision, and Values"  Please respond to the following: From the first......

Words: 2792 - Pages: 12

Chapter 9 Question and Discussion

...Chapter 9 Review Question, Discussion Topic and Project Review Question 1: In the auto shop examples on page 348, what are some problems that might arise in Mario's system? Why won't Danica run into the same problems? Provide specific examples in your answer. Problems that would be exclusive to Mario’s Auto Shop are: increased time spent on entering in the same data, miscalculations could result from having two people entering in the same data and they would not be able to compare all of the data at once. Danica wouldn’t run into those problems because she only has one table and therefore doesn’t have to retype the same data into two different tables. Danica would also be able to compare all of her data on a single screen and would be able to organize the two categories at once. Having only one large table would also reduce time being spent on entering data as opposed to having two separate data tables. Discussion Topic 1: Are there ethical issues to consider when planning a database? For example, should sensitive personal data (such as medical information) be stored in the same DBMS that manages employee salary and benefits data? Why or why not? The main ethical issues of handling sensitive data would be privacy. Medical information should only be visible to doctors or health insurance providers. While employee salary and benefits should only be visible to management. Also all the data storage should comply with all laws of privacy including the HIPPA act and......

Words: 374 - Pages: 2

Mat 540 Week 9 Discussion Mat 540 Week 9 Discussion

...MAT 540 Complete Course MAT540 Complete Course Click Link for the Answer: http://workbank247.com/q/mat-540-complete-course-mat540-complete-course/22085 http://workbank247.com/q/mat-540-complete-course-mat540-complete-course/22085 MAT 540 Week 1 Discussion "Class Introductions"  Please respond to the following: * Please introduce yourself, including your educational and career goals, as well as some personal information about yourself. In your introduction, please draw from your own experience (or use a search engine) to give an example of how probability is used in your chosen profession. If you get your information from an online or other resource, be sure to cite the source of the information. MAT 540 Week 1 Homework Chapter 1 1. The Retread Tire Company recaps tires. The fixed annual cost of the recapping operation is $65,000. The variable cost of recapping a tire is $7.5. The company charges$25 to recap a tire. a. For an annual volume of 15, 000 tire, determine the total cost, total revenue, and profit. b. Determine the annual break-even volume for the Retread Tire Company operation. 2. Evergreen Fertilizer Company produces fertilizer. The company’s fixed monthly cost is $25,000, and its variable cost per pound of fertilizer is $0.20. Evergreen sells the fertilizer for $0.45 per pound. Determine the monthly break-even volume for the company. 3. If Evergreen Fertilizer Company in problem 2 changes the price of its fertilizer from $0.45 per pound to $0.55 per pound,......

Words: 15000 - Pages: 60

Unit 9 Assignment

...main objective in completing this Assignment is to illustrate your knowledge of the course material. Citing Sources It is important to always attribute credit to the proper sources when relying on the text, articles, websites, or other sources. You must credit your work when you: • Summarize concepts and theories that you learned in the text, articles, or Internet sources. • Use others' ideas, theories, and concepts in constructing discussion question responses or completing projects. • Use direct quotes in the context of your project (when quoting directly, you must use quotation marks). Your paper must be your original work; plagiarism will not be tolerated. Be sure to review the Syllabus in terms of what constitutes plagiarism. Submitting Your Assignment Put your Assignment in a Word document. Save it in a location and with a name that you will remember. When you are ready to submit it, click on the Dropbox and complete the steps below: 1. Click the link that says “Submit an Assignment.” 2. In the “Submit to Basket” menu, select Unit 9: Assignment. 3. In the “Comments” field, include at least the title of your Assignment. 4. Click the “Add Attachments” button. 5. Follow the steps listed to attach your Word document. 6. To view your graded work, come back to the Dropbox or go to the Gradebook after your instructor has evaluated it....

Words: 694 - Pages: 3

Hi215 Unit 9 Assignment

...HI215 Unit 9 Assignment Click Link Below To Buy: http://hwcampus.com/shop/hi215-unit-9-assignment/ Centers for Medicare and Medicaid Pay-for-Performance Presentation Unit outcomes addressed in this Assignment: Describe the different pay for reporting models under the Centers for Medicare and Medicaid Services Course outcome assessed/addressed in this Assignment: HI215-2: Examine the reimbursement processes of different health insurance plans. GE- 8.2: Use principles of sound reasoning. Instructions Recently, CMS has added several prospective payment systems to their pay-for-reporting program. Many programs begin to take effect in 2012–2013. Pick one of the newly designed quality reporting program discussed in the text. 1. Review the CMS website at http://www.cms.gov/QualityInitiativesGenInfo/ as well as http://www.cms.gov tab “InnovationCenter” at http://innovation.cms.gov/initiatives/index.html 2. Prepare an educational PowerPoint presentation regarding the program’s new requirement for your medical director and department heads at Anywhere Hospital. 3. Provide examples of how this new program may impact your facility from a reimbursement perspective. Requirements Provide a 5–6 slide PowerPoint presentation and download to the Unit 9 Dropbox. See grading rubric for more information. Please be sure to download the file “Writing Center Resources” from Doc Sharing to assist you with meeting APA expectations for written Assignments. Submitting Your...

Words: 437 - Pages: 2