1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
2 years ago
7

IBM manager Celia Moore coordinates IBM's long-standing "Reinventing Education" program that involves intensive research into ho

w educational institutions can use the fruits of new technologies to transform what they do. In the process, the program is actually helping to shape a market of significant interest to IBM. "We see the program very much as an investment, rather than handing out money," says Moore. The existence of this program indicates that IBM has a(n) ________ orientation.
Business
1 answer:
nirvana33 [79]2 years ago
4 0

Answer: Triple bottom line

Explanation:

Triple bottom line is referred to as an or known as the accounting framework which tends to include three parts, i.e. environmental, social, and financial. Some of the organizations have been known to adopt the Triple Bottom Line framework in order to evaluate the performance in wider perspective i.e. to create the greater and larger business value.

You might be interested in
Item8 3.57 points Item Skipped eBook AskPrintReferences Check my work Check My Work button is now enabledItem 8Item 8 3.57 point
frez [133]

Answer:

The firm’s 2019 operating cash flow is $610,500

Explanation:

Cash Flow to Creditors

Cash Flow to Creditors = Interest Expenses Paid - Net Increase in Long term debt

= Interest Expenses Paid - [Long term debt at the end - Long term Debt at the Beginning]

= $95,500 - [$1,610,000 - $1,415,000]

= $95,500 - $195,000

= -$99,500

Cash Flow to Stockholders

Cash Flow to Stockholders = Dividend Paid – Net New Equity

= Dividend Paid – [(Common stock at the end + Additional paid-in surplus account at the end) - (Common stock at the beginning + Additional paid-in surplus account at the beginning)

= $148,000 - [($143,000 + $2,980,000) - ($143,000 + $2,680,000)]

= $148,000 - [$3,123,000- $2,823,000]

= $148,000 - $300,000

= -$152,000

Cash Flow from assets

Cash Flow from assets = Cash Flow to Creditors + Cash Flow to Stockholders

= -$99,500 - $152,000

= -$251,500

Operating Cash Flow

Cash flow from assets = Operating Cash flows - Change in Net Working capital - Net Capital Spending

-$251,500 = Operating cash flow - (-$128,000) - $990,000

-$251,500 = Operating cash flow + $128,000 - $990,000

Operating cash flow = $990,000 - $128,000 - $251,500

Operating cash flow = $610,500

Therefore, the firm’s 2019 operating cash flow is $610,500

6 0
2 years ago
Rom what you know of the company so far, what will be among the variousconstituencies that the CSIRT will serve?
son4ous [18]

The question is incomplete, Below is the complete question.

Brody had been enjoying a nice, calm shift in HAL's network operations center. The calmness of the evening was interrupted, however, when a pop-up notification appeared on his monitor. The NIDS had detected malicious traffic on a brance network in Tuscaloosa, Alabama, specifically targeting the branch Web server. As Brody picked up the telephone to contact the on-call network tech for that office, the NIDS displayed another pop-up notification, this time reporting malicious traffic on a branch network in Mobile. In short order, it also displayed notifications for branches in Athens, Columbia, Auburn, and Starkville. Even more alarming, the NIDS indicated that the traffic was all coming from other branches within the company.

Brody immediately recognized that this was different from the typical attacks he'd seen in his time with the company and decided to call his boss, Nick Shula. It was 3:30 AM when he made the call.

"Hello?" said Shula, groggy with sleep.

"Boss, it's Brody," Brody said. "Sorry to be calling like this, but i think we've got a problemm. The NIDS is showing that Web servers in multiple branch offices are under attack, and the traffic is coming from inside our network. What do you want me to do?"

Shula, suddenly awake, thought back to the proposal that was sitting on his desk, concerning the creation of an incident response team for the company. Shula had een so busy with other things that he hadn't been able to consider the proposal at all. Mentally kicking himself, he muttered into the phone, "Why didn't I look at that proposal?"

"What was that, boss?" Brody said.

"Never mind," Shula said. He had to think quickly in order to guide Brody through the situation. "Call the firewall guy on duty," he said, "and have him put in a temporary rule on the DMZ firewall to block all inbound traffic to the Web servers from internal IP addresses." After all, it was the middle of the night, and very few, if any, employees would be doing any work that involved the Web servers. Shula figured he would jsut get up a little early and have the rule removed before normal working hours; hopefully, by then the attack would have stopped.

"OK boss, will do. Get back to sleep, now," Brody said.

Shula headed back to bed, thinking everything was OK. But as soon as his eyes closed, the phone rang again. He took a look at the caller ID and blanched. It was Mal Bryant,, the company CEO.

"Nick, it's Mal," Mal said. "Listen, I'm in Belgium and attached to the corporate network via the VPN. For some reason, I can't get to our internal Web server. You have ny idea what's going on?"

Shula sighed as he realized it was going to be a long night...

Two weeks later, Brody got an e-mail from Nick Shula inviting him to attend a meeting during the day shift later in the week. The meeting was being called to discuss the formation fo the company's new CSIRT.

Brody would be one of the employees identified to perform specific actions when events became incidents and the response plans were activated. As a front-line watch stander in the network operations center, Brody would play a critical role. In addition to his role as a key memeber of the response team, Brody was going to be invited to help develop the plans and procedures and would then be trained in how to be a first responder.

Discussion Questions:

A) From what you know of the company so far, what will be among the various constituencies that the CSIRT will serve?

B) Will the company need to hire more employees to meet the needs of the CSIRT, or would you suggest it outsource some of that effort?

ANSWER;

A) When we talk of CSIRT, it typically mean computer security incident response team.

It will actually help employees report,discuss and disseminate information as it regards computer security related information across the entire organization and it's various verticals.

CSIRT will actually help in timely response that is 24/7 and a coordinated effort in the handling of incident.

The department of information technology and other departments to that are partly or heavily making use of it's systems would actually be the ones typically affected by the formation of this body.

B) For CSIRT to be efficiently constructed,the organization should also outsource the work initially in majority.

However,in the later stages, once the employees are well trained,the company can then build upon it as in house department much more effectively and efficiently.

Also,the company should have at least a part of the work outsourced to have access continuously to the respective systems at all times. This will be required mainly because information security is a fast moving technology and the company as well as it's employees need to be updated regularly and also informed of external threats.

3 0
2 years ago
Match each entity on the left to the correct establishment on the right.
Mumz [18]

The group or organization matchup is given below;

  • Non-state actor - terrorist.
  • International Organization -World Trade Organization, United Nations.
  • Nation-state - Canada.

<h3>What is a Nation state?</h3>

The term nation-state is known to be a any country that is territorially held together as a sovereign state.

Note that in this kind of country, it is one that is governed in the name of a community of its own people who identify or see themselves as a nation.

See full question below

Match the group or organization on the left with its correct category on the right.

non-state actor:

terrorist

International Organization:

World Trade Organization,

United Nations

nation-state: Canada

Learn more about Nation-state from

brainly.com/question/19454824

8 0
2 years ago
Anna is a forensic scientist who still uses the methods used by Dr. Leone Lattes. How is this MOST likely demonstrated in Anna’s
Nikolay [14]
A is the answer took the test
4 0
2 years ago
Our society is increasingly becoming more diverse. Discuss how this affects you as an individual, an organization, and society a
Mekhanik [1.2K]

Answer

Hello,

Well, a diverse society is stable and alive with positive dynamics, easy to adapt to changes and always geared towards a positive evolutionary.

As an individual, a diverse society offers greater opportunity for personal and professional growth.

In the society, diverse cultural views can inspire creativity and innovation. A diverse society has a pool of diverse skills base which allows an organization to produce broader and more adaptable range of goods and services.

A challenge in this is that integration across multicultural groups can be difficult due to negative cultural stereotypes. Some countries require navigating visa and application of employment laws that could be challenging requirements.

Diversity quotas in colleges can be outlawed but still allow colleges to consider race in admitting students.

Wish you luck!

5 0
3 years ago
Other questions:
  • Global Enterprises has spent $134,000 on research developing a new type of shoe. For this shoe to now be manufactured, the firm
    12·1 answer
  • A current liability is a debt that can reasonably be expected to be paid
    15·1 answer
  • Hercules Inc. manufactures elliptical exercise machines and treadmills. The products are produced in its Fabrication and Assembl
    7·1 answer
  • Who files one of the 1040 series of tax forms??
    14·2 answers
  • Which of the following is a likely result of a lack of accountability?
    9·1 answer
  • Chao sells custom bicycles. He buys several bike parts including wheels and tires from Upright Strides, Inc. Although several go
    10·1 answer
  • What is one of the SMART guidelines that help develop objectives?
    6·2 answers
  • Dunning's theory of international investment is known was the electric program in the theory brand names trademarks, economies o
    10·1 answer
  • All of the following are competitive forces in Porter's model except: Group of answer choices customers disruptive technologies
    5·1 answer
  • which stakeholder group includes a network of relationships that supply a company with the inputs it needs to operate?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!