Friday, 15 April 2016

Assignment 3: You Are an Investment Analyst


Assignment 3: You Are an Investment Analyst

As the representative from your accounting firm or practice, you are in charge of stock market analysis that will be presented to clients as part of professional consultation process. One of your high-profile clients is trying to determine the possible investment potential between two companies. However, before you can recommend investments to clients, you need to familiarize yourself with the background of the companies, analyze stock trends, research current events, and analyze financial statements. Select one (1) pair of these companies and conduct your analysis:

1.) Pepsi versus Coca Cola, or
2.) Amazon versus eBay


Write an eight to ten (8-10) page paper in which you:

1.) Analyze each company’s history, product / services, major customers, major suppliers, and leadership and provide a synopsis of each company.

2.) Based on the stock price for the timeline listed below, present a graph that illustrates the stock price of each company. Indicate conclusions that can be drawn based on the trend: 

a.) The day of its initial public offering
b.) January 1, 2013
c.) January 1, 2012
d.) January 1, 2011

3.) Research and summarize at least two (2) news events (this may include mergers, acquisitions, or political issues) that occurred from 2012 to the present day and the potential impact on the stock price of each company. Indicate how this influences your investment decision related to the company. 

4.) Provide an overall financial analysis for each company that highlights the key characteristics for investment and how this may impact an investor’s decision. 

5.) Based on your review of the financial data for each company, indicate the accuracy and reliability of the data for making investment decision. Provide support for your conclusion. 

6.) Recommend which company you consider as the better investment for your client and how you will present your recommendation. Support your recommendation with data from your analysis.

7.) Use at least four (4) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.


Your assignment must follow these formatting requirements: 

1.) Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. 

2.) Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

No comments

Increasing use of Medical Marijuana


Increasing use of Medical Marijuana


?  An introduction

?  Identification and History of the Issue/Problem

?  Evidence of outside research (data, quotations, statistics, all cited properly)

?  Multiple proposed solutions, with one of them recommended (which sums up the arguments) and call to action

?  Your draft should be 2 - 3 pages in length and use at least a minimum of 3 - 5 cited sources from the Library or from Google Scholar.

?  Your Individual Project should contain a cover page, headers, page numbers, and be double-spaced using Times New Roman, Arial, or Courier fonts. The size of the font should be 12 point.
No comments

Review the Skillsoft® topic "Information Systems Maintenance and Development Tools."


Review the Skillsoft® topic "Information Systems Maintenance and Development Tools."



Resource: Patton-Fuller Community Hospital Networking Virtual Organization or an organization you are familiar with that you can research to discover the cabling, network equipment, and structure.



Create a 3-year organizational systems management plan incorporating current trends and security concerns.



Include the following:



Strategic goals that the 3-year must support or align to
An ability for the organization to upgrade its network transmission speed or bandwidth during the 3-year plan and beyond
Change management plan
Replacement schedule for networking and computing devices
Configuration management processes
Network and application software upgrades and replacement
Contingency planning when unforeseen future hardware, software, and networking technology or processes that may be disruptive must be procured for the organization to remain competitive
Upgrades to network and application security, if appropriate, to include any missing network devices that provide security over several layers of the OSI model
Upgrades to wireless technology if appropriate
Upgrades or procurement of specific network components that will enhance transmission speed, accuracy, or availability, based on an analysis of the network
Priority list of the items that must be procured or require funding so that the budget execution authority can cost and plan for procurement
No comments

Case 2: IPO Analysis: Select a company that has gone public in the last few years

Case 2: IPO Analysis: Select a company that has gone public in the last few years

Select a company that has gone public in the last few years* on an organized exchange anywhere in the world. Prepare a typewritten paper, double spaced, no longer than 3 pages plus bibliography listing sources of information. Include as many exhibits as you wish. (* It is wise to select a more recent IPO as you will obtain more information than an IPO that was listed more than 10 years ago).

Start out with an introduction of the company, including the business it is in, and when it was established. Then address the following issues:

1. Introduction of company. What business is the company in? When was the company established? When did the company go public? Why did the company decide to go public?
2. What exchange lists the stock? Why did the company decide to list on that exchange. What is stock symbol?
3. Who was the investment banker? Why did the company choose that investment banker? Was IPO done on an underwritten or best efforts basis? How much was paid to the investment banker?
4. How many shares were issued? What portion of the company did insiders retain?
5. What was the offer price per share? How was the offer price decided? How much money was raised? What did the company do with the money?
6. Has stock price changed since IPO? What was the price at end of first day? Estimate the amount of underpricing? What is current price, and calculate the returns if an investor purchased at IPO price and held it till today.
7. Would you invest in the company today? (Consider the future prospects of the firm)

You should be able to find all, or most of the information needed for this case. However, if you just can't find information on a particular issue, include a note to that effect so I'll know you didn't just overlook it. 
No comments

STR/581 Week 2 Assignment

STR/581 Week 2 Assignment




Write a proposal of no more than 750 words, outlining the research approach you will use for your Strategic Plan, due in Week 6. Include the following:



How you intend to ensure the organization's vision, mission, and people strategies and values statements are aligned with the proposed strategic plan.
Sources you expect to use to perform an external environmental analysis

No comments

compare-contrast and application


compare-contrast and application


            Paper One will consist of two parts.  PART I should be a contrast/comparison of each of the three major sociological perspectives discussed in class.  Please compare/contrast each of the three on the basis of the image of society offered by each, the image of social change, the fundamental elements and questions asked by sociologists within each perspective.  Also mention the major classic theorists and some of their contributions.  Please discuss how each of the perspectives reflects the time and place in which the theorists were writing, putting their ideas into a social and historical context.



            PART II will consist of the APPLICATION part of the paper.  Choose some social phenomena (marriage, homelessness, crime , video games--could be ANYTHING that relates to human behavior) and then describe how a sociologist from each of the three perspectives would go about studying the phenomena from that particular perspective.  What sorts of questions might he or she ask?  How would the phenomena be viewed, what aspects would the sociologist be interested in?



.  You should refer to portions of the text, readings, and/or class notes when describing concepts (and be sure to include a reference page).  Citation style may be APA, MLA, or any other format you are familiar with (or that is required for your particular major).  Criteria for grading the papers are as follows:



            1.  Paper must be well written and well organized--it may be helpful to break it down into sections.



            2.  Responsiveness--don’t just strive to “fill pages”--make sure to respond to the requirements of the assignment, and you will easily have enough pages.



            3.  Creativity/originality--Expand your mind!  Be creative in the examples you use, and/or in the way you apply the theories.



            4.  Use of text materials and class notes--Good papers will weave together the concepts in the books with “real life” examples.  Again, have a reference page.
No comments

Demonstrating the multidisciplinary nature of cybersecurity

Demonstrating the multidisciplinary nature of cybersecurity


The final assignment should demonstrate the multidisciplinary nature of cybersecurity.   The paper should be 11 pages long (Page #11 or Last page for reference and source), with references and sourced material at the end. Please use Microsoft Word format, Times-New Roman font, 12 point, double-spaced. Any sourcing should include a bibliography at the end of the paper (not counted in page limit).



 Sample projects are:
1. Demonstrating an organization responding to a client request for a cybersecurity system or services (this should show the involvement of management and technical personnel, the considerations of cost and schedule, and so forth);
2. Addressing a major cyber incident at a company and discussing the various management roles for addressing the incident;
3. Demonstrating organizational training provided to employees about their roles in cybersecurity and the benefits to the organization;
4. A review of a looming cyber threat and how the organization should prepare to mitigate and/or prevent the threat (can include national security concerns, military topics, or nation state threats in this section). The issues do not have to be real, but should be realistic.

No comments