Answer:
One would have to invest 55%
Duration of 3-year bond is 2.78
Then 5wZ + 2.78(1 - wZ) = 4
2.22wZ = 1.22
wZ = .5495
Explanation:
To properly understand the concept behind the above calculation, let us define some basic concept:
Portfolio: This can be refereed to as a phrase in finance. It refers to the collection on investment that is being held by an investment company, a financial institution such as a bank ,persons or an individual.
Zero coupon bond: A zero-coupon bond is a bond where the nominal or return on investment (ROI) value is repaid at the time of maturity. This definition usually reflects a positive time value of money.
We should also recall that the formula for zero coupon bond as:
price = M / (1 + i)^n
where: M = maturity value
i = required interest yield divided by 2
Applying this formula, we were able to arrive at the investment percentage.
Answer:
Power.
Explanation:
A leader can be defined as an individual who is saddled with the responsibility of controlling, managing and maintaining a group of people under him or her. Also, they provide guidance, support, supervision, administrative control, as well as acting as a role model or example to the employees working in an organization by being morally upright.
Generally, managers are typically involved in taking up leadership roles and as such are expected to be build a strong relationship between their employees or subordinates by creating a fair ground for effective communication and sharing of resources and information.
Some types of power expressed by leaders are referent power, coercive, etc.
In this scenario, Nour is usually takes charge of the situation and gets people moving toward the group's objective. Thus, Nour probably has a high need for power because he's more often than not in charge and control while getting his team members to achieve the set objective.
Royal carribean cruises are going up, as well as walmart!
Answer:
The amount of dollar sales must be achieved to reach the goal is $331,875.
Explanation:
This can be calculated using the following formula:
Amount of dollar sales required = (Targeted pre-tax income + Fixed costs) / Contribution margin ratio ……..(1)
Where:
Amount of dollar sales required = ?
Targeted pre-tax income = $70,000
Fixed costs = $36,200
Contribution margin ratio = 32%, or 0.32
Substituting all the values into equation (1), we have:
Amount of dollar sales required = ($70,000 + $36,200) / 0.32 = $106,200 / 0.32 = $331,875
Thereforee, the amount of dollar sales must be achieved to reach the goal is $331,875.
Answer: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.
Explanation:
The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :
- To manage information security risks to keep them at acceptable levels.
- Protect information assets.
- Train public servants, suppliers and stakeholders about the importance of data protection.
- Monitor compliance with information security requirements.
- Implement corrective and improvement actions.
Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.
The most common threats are :
- Unofficial applications. (Can ask you for permitions and steal your private information)
- Public WIFI.(Can enter in to your network and steal your private information)
- Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)
Always is important to protect the device with one or several of this advices:
- Secure access networks.
- Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
- Write a security policy. Define which devices can access corporate information.
- Protect WiFi connections.
- Protect against malware.
In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.
The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.
Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).