Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 COmputer, Email And Internet Acceptable Policy

2023 You have been hired as the CSO Chief Security Officer for an organization Your job is to | Assignment Collections

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  1. Computer and email acceptable use policy
  2. Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references.  

Your paper should meet the following requirements:

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 disscussion reply to the question asked from students minimum words count 50 each need in 10 hours

2023 need in 10 hours IT 236 MELISSA SIMPSOM 1 Since the website is suppose to attract the audience I think the | Assignment Collections

need in 10 hours

 

IT 236 

MELISSA SIMPSOM

1:Since the website is suppose to attract the audience I think the best practice is the description. In other words, make sure that the information the user is looking for is there without confusing them. When I go to a website to look for information I am not looking for contacts or about us at the time. I want to find the information that I need to search out. I believe that web designers should put the most important pages first in their description. When all of the important pages are together an in order the user can find the information easily.

 

2:Since the website is suppose to attract the audience I think the best practice is the description. In other words, make sure that the information the user is looking for is there without confusing them. When I go to a website to look for information I am not looking for contacts or about us at the time. I want to find the information that I need to search out. I believe that web designers should put the most important pages first in their description. When all of the important pages are together an in order the user can find the information easily.

 

3:In my opinion I think the best practice is to keep it simple, do not over complicate getting from page to page. This will make it easy for the visitor to find what they want and may lead them to look at more that is on your site. A good example is the Missouri Department of Conservation’s website, it is packed with information but can be very hard to find one item or subject you are looking for, because you have to go though some many pages, tabs and links to get there. Simple, easy to read tabs that will take the visitor where they want to go and find the information they are looking for, will help them want to come back to the site. I think to many designers want to make a site look and feel more sophisticated then they need too.

 

IT 240

4:   I pretty much went through all the parts of a TCP/IP plan that I thought were important. I am therefore going to talk about why you should register your network in this post. For people who are newer at this like me, I was wondering why it is necessary to register your network. I found out that one reason is so that you can get a network number because you cannot arbitrarily make one up for yourself and you need one so that other people and networks like the Internet can recognize you. You also do it in order to register your domain, but I have not found out why you need to do that yet?

 

5:You bring up a good point about the MAC address on the device being referenced.  I am used to hearing about MAC reservations.  From what I am understanding about it is that the server will recognize the MAC address rather than the IP address and it will keep reassigning the same IP address based on the MAC address.  I see this as a form of using a static IP address.  What are your thoughts on this??

 

6: Hi Again Phillip,

For IP addresses if you want to use what is referred to as “Internet Addressable” space, you register or reserve your IP network really so that no one else will use them and create potential conflicts.  And the same is true of a domain name.  There is a registry so that only one entity can use any particular domain name.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Compare a centralized-versus-distributed-server model as an in-house implementation to cut costs. Determine the viability of both as they apply to Riordan–to understand keeping IS/IT functions in-house. Provide the pros and cons of each as they pertain

2023 Compare a centralized versus distributed server model as an in house implementation to cut costs Determine the viability of | Assignment Collections

 

Compare a centralized-versus-distributed-server model as an in-house implementation to cut costs. Determine the viability of both as they apply to Riordan–to understand keeping IS/IT functions in-house. Provide the pros and cons of each as they pertain to various business support systems

Explain why the CRM system will be an additional tool that increases effectiveness and efficiency of Riordan Manufacturing Company.

 

Make sure you identify the value each implementation will bring, and how the organization will measure the ongoing value of each one. Your paper should discuss a process or method the IT group must implement to ensure they provide continual value to the organization (1300 words)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment

2023 There are two types of ciphers Block and Stream Block is used to encrypt a | Assignment Collections

 There are two types of ciphers – Block and Stream. Block is used to encrypt a block of bits at one time. Stream cipher is used to encrypt one bit at a time. 

 

  • Modes of CiphersUnderstanding Modes
    Hide Details
    Electronic Code Book (ECB) Mode

    This mode is a most straightforward way of processing a series of sequentially listed message blocks.
    Operation
    The user takes the first block of plaintext and encrypts it with the key to produce the first block of ciphertext.
    He then takes the second block of plaintext and follows the same process with same key and so on so forth.
    The ECB mode is deterministic, that is, if plaintext block P1, P2,…, Pm are encrypted twice under the same key, the output ciphertext blocks will be the same

    Cipher Block Chaining (CBC) Mode
    CBC mode of operation provides message dependence for generating ciphertext and makes the system non-deterministic.
    Operation
    The operation of CBC mode is depicted in the following illustration. The steps are as follows −
    Load the n-bit Initialization Vector (IV) in the top register.
    XOR the n-bit plaintext block with data value in top register.
    Encrypt the result of XOR operation with underlying block cipher with key K.
    Feed ciphertext block into top register and continue the operation till all plaintext blocks are processed.
    For decryption, IV data is XORed with first ciphertext block decrypted. The first ciphertext block is also fed into to register replacing IV for decrypting next ciphertext block.

    Output Feedback (OFB) Mode
    It involves feeding the successive output blocks from the underlying block cipher back to it. These feedback blocks provide string of bits to feed the encryption algorithm which act as the key-stream generator as in case of CFB mode.
    The key stream generated is XOR-ed with the plaintext blocks. The OFB mode requires an IV as the initial random n-bit input block. The IV need not be secret.

    Counter (CTR) Mode
    It can be considered as a counter-based version of CFB mode without the feedback. In this mode, both the sender and receiver need to access to a reliable counter, which computes a new shared value each time a ciphertext block is exchanged. This shared counter is not necessarily a secret value, but challenge is that both sides must keep the counter synchronized.
    Operation
    Both encryption and decryption in CTR mode are depicted in the following illustration. Steps in operation are −
    Load the initial counter value in the top register is the same for both the sender and the receiver. It plays the same role as the IV in CFB (and CBC) mode.
    Encrypt the contents of the counter with the key and place the result in the bottom register.
    Take the first plaintext block P1 and XOR this to the contents of the bottom register. The result of this is C1. Send C1 to the receiver and update the counter. The counter update replaces the ciphertext feedback in CFB mode.
    Continue in this manner until the last plaintext block has been encrypted.
    The decryption is the reverse process. The ciphertext block is XORed with the output of encrypted contents of counter value. After decryption of each ciphertext block counter is updated as in case of encryption.

    (Tutorial.com)

  • ItemWeakness of DES cipherThe launch a brute force on DES, the attacker would need to search 2^56 keys. That is a search for a needle in a haystack of 72 quadrillion straws. In 1977 that was considered an impossible computational task. In 1999 a special-purpose DES search engine combined with 100,000 personal computers on the Internet to find a DES challenge key in 22 hours.  

    FIPS 46-3, Data Encryption Standard (DES), was withdrawn on May 19, 2005 because the cryptographic algorithm no longer provided the security that is needed to protect Federal government information. DES is no longer an Approved algorithm. It was replaces temporarily by 3DES and later by AES

  • ItemApplying CBC ModeCBC-Mode

    CBC mode for DES –>

    1. Generation of an Initial Vector (Called an IV).

    (there is a few steps here that I am skipping for simplicity)

    2. This IV is XOR with the Clear Text

    3. The resulting ciphered text is used as the seed to generate the next encryption key for the next block.

    CBC.jpg

  • ItemCourse ProjectFor this project, you will need to pick a CURRENT topic in Cryptography and proposed a 5-page research paper. You paper will consist of an introduction, a literature review, a methodology and a result. Submit your proposal in the drop box.

 

  • Galois Finite FieldGalois Fields or Finite FIelds

    Galois Fields

    Supposed we look at three numbers like 6 3 9 (IN THE DECIMAL BASE)

    If we look at these types of numbers  as a  decimal value, it is six hundred and thirty nine…right?

    SO, it is 6 X 10^2 + 3 X 10^1   + 9 X 10^0 = 600 + 30 + 9 = 639

    IN BINARY BASE

    10101011

    1X2^7 + 0X2^6 + 1X2^5 + 0X2^4 1X2^3 + 0X2^2 + 1X2^1 + 1X2^0

    Remember X^0 = 1

    128 + 0 + 32 + 0 + 8 + 0 + 2 + 1 = 171

    SO FAR…SO GOOD

    Let’s expand this concept more

    Let’s consider the number 5 7 2 (Still decimal)

    Based on what we learned above 572–> 5X^2 + 7X^1 + 2X^0

    BUT HERE IS THE WRENCH IN GALOIS FIELD

    Suppose we are adding 5 7 2 + 6 7 3

    We are looking at this in the DECIMAL SPACE

    5 7 2

    6 7 3

    You start with 2 + 3 = 5 (right!)

    Now let focus on the 7 + 7 = 14 –>you must now drop the 1 and keep the 4. We do not carry over the 1

    Same thing with the 5 + 6 = 11 –>you must now drop the 1 and keep the 1. We do not carry over the 1

    The answer is

    5 7 2

    6 7 3

    1 4 5 –>HA! (This is the trick)

    Well, we would never use BASE 10 in Galois field, we would use a Prime numbers

    Suppose we take the binary number  

    1 0 1 1 0 1 0 1 –>State of your clear text (One byte)

    1 0 0 1 1 0 1 1 –>KEY

    Remember here 1 + 1 = 2 but in base 2 and Galois field, this is equal to 0   (suppose you were looking at 5 + 5 = 10 à You would drop the 1 and keep the 0.

    1 0 1 1 0 1 0 1

    1 0 0 1 1 0 1 1

    0 0 1 0 1 1 1 0

    THINK OF THIS AS AN XOR <–

    0 0 –> 0

    0 1 –> 1

    1 0 –> 1

    1 1 –> 0

    I THINK WE HAVE THE ADDITION UNDER CONTROL — Right?

  • ItemDOT MATRIXWe know what PRODUCTS are. Now I am adding something new called DOT PRODUCTS. Well, a dot product applies to VECTORS. Well, what are Vectors?

    Think of a vectors as  a set of numbers ( 6    7   2)  – > this is a vector with 3 elements. Remember, MATRIX from college algebra and your high school teacher told you to remember MATRIX and you will see it again, well, today is the day. A VECTOR can be a ROW or a COLUMN of a MATRIX.

    If this make sense, I am ready to define DOT PRODUCT 

  • ItemProductPRODUCT (not DOT Product)

    MULTIPLICATION IN GALOIS FIELD

    Suppose we need to multiply two POLYNOMIALS

    (x^5 + X^3 + X^2 + X^1) times (X^4 + X^3 + X^2)

    What do you usually do in Algebra?

    X^5(X^4 + X^3 + X^2) + X^3(X^4 + X^3 + X^2) + X^2(X^4 + X^3 + X^2) + X^1(X^4 + X^3 + X^2)

    THIS IS A LOT OF WORK

    Let’s try again

    (x^5 + X^3 + X^2 + X^1) times (X^4 + X^3 + X^2)

    Galois.jpg

    23411 + 2 = 31 + 3 = 41 + 4 = 522 + 2 = 42 + 3 = 52 + 4 = 633 + 2 = 53 + 3 = 63 + 4 = 755 + 2 = 75 + 3 = 85 + 4 = 9

    Now it gets tricky

    We need to count the numbers (SUM)

    How many 9s? -> 1 (do not touch)

    How many 8s? -> 1 (do not touch)

    How many 7s? -> 2 -> NOW MODULUS 2 (binary) -> 0

    (Think of it this way -> if your count is EVEN, it becomes Zero and if it is ODD, the count is 1)

    How many 6s? -> 2 (even) -> 0

    How many 5s? -> 3 (odd) -> 1

    How many 4s? -> 2 (even) -> 0

    How many 3s? -> 1 (odd) -> 1

    How many 2s? -> 0 (even) -> 0

    REMEMBER WHERE WE STARTED:

    (x^5 + X^3 + X^2 + X^1) times (X^4 + X^3 + X^2)

    I am going to REWRITE

    (1X^5 + 0X^4 + 1X^3 + 1X^2 + 1X^1 + 0X^0) times (0X^5 + 1X^4 + 1X^3 + 1X^2 + 0X^1 + 0X^0)

    REMEMBER the underlined portions are ZEROs

    NOW, WE ARE GOING TO READ THE COEEFICIENTS

    (1 0 1 1 1 0) times ( 0 1 1 1 0 0 ) = 0 1 0 1 0 0 0 (THIS IS WHAT YOU HAVE ABOVE)

    I USED THIS EXAMPLE RANDOMLY BUT WE WANT TO LIMIT EVERYTHING TO ONE BYTE. IN OUR EXAMPLE, WE ARE GOOD SINCE WE HAVE LESS THAN 8 BITS  BUT WHAT IF THE RESULT WAS BIGGER THAN 8 BITS.

    What if our product was – 10101010100? This is bigger than one byte and it would not fit. FOR AES WE WANT EVERYTHING TO FIT IN ONE BYTE (One character).

    NOW we have to perform a Polynomial Reduction in Galois FIELD.

    THE MAGIC AND THE FACINATING PART OF THE ALGORITHM IS TO DIVIDE BY

    X^8 + X^4 + X^3 + X^1 + X^0 ( I am not sure how they came up with this polynomial – they are genius)

    REWRITING -> 1X^8 + 0X^7 + 0X^6 +0X^5 + 1X^4 + 1X^3 +0X^2 + 1X^1 + 1X^0

    Remember LONG DIVISION – We are going to use it in the next section.

  • ItemTHE AMAZING REDUCTIONTHE AMAZING REDUCTION

    Let me see how to do the reduction.

    Let start with
    1010101010100 <- Clear text

    we have a total of eleven bits here.

    We are going to divide by X^8 + X^4 + X^3 + X^1 + X^0 (THE MAGIC POLYNOMIAL)

    Now let’s add the missing terms

    1X^8 +0X^7 + 0X^6 + 0X^5 + 1X^4 + 1X^3 + 0X^2 + 1X^1 + 1X^0

    So pulling the coefficient

    1 0 0 0 1 1 0 1 1

    REMEMBER WHAT WE ARE TRYING TO DO – TAKE

    1010101010100
    REDUCE to an 8-bit string

    According to AES, there is a magic formula – DIVIDE BY 1 0 0 0 1 1 0 1 1 (In GALOIS FILED)

    LIKE I SAID YESTERDAY – WE ARE going to do LONG DIVISION LIKE YOU DID IN HIGH SCHOOL OR JUNIOR HIGH SCHOOL. LET’s DO it. DIVIDING IS ALSO XOR in Galois Field

    1 0 1 0 1 0 1 0 1 0 1 0 0 <- ORIGINAL STRING
    1 0 0 0 1 1 0 1 1 <- REDUCER
    0 0 1 0 0 1 1 1 0 ( DO YOU REMEMBER HOW WE GET THIS STRING?)
    Now, notice the 0 1 0 0 was not used

    Now take the BOLD part (resulting from the XOR) and concatenate 0 1 0 0
    0 0 1 0 0 1 1 1 0 0 1 0 0
    Just in plain Black and White ->
    0 0 1 0 0 1 1 1 0 0 1 0 0 (THE BOLD + THE UNDERLINED)

    IS THIS A REDUCTION? <- YES, YES – YOU CAN DROP THE LEADING ZEROs, you will get

    1 0 0 1 1 1 0 0 1 0 0

    LET DO IT AGAIN and the rest is yours
    1 0 0 1 1 1 0 0 1 0 0 (the underlined  is unused)
    1 0 0 0 1 1 0 1 1 <- REDUCER
    0 0 0 1 0 0 0 1 0 0 0 <- Bring the unused 0 0 down
    0 0 0 1 0 0 0 1 0 0 0  Drop leading zeros
    You have 1 0 0 0 1 0 0 0
    WE DID IT!!!!!!
    COUNT IT  — 8-bit string

    AMAZING 

  • ItemTHE ENCRYPTIONTHE ENCRYPTION

    The final stages of EAS Encryption

    When encrypting with AES, we only need to multiply by the Galois fields for 1, 2 and 3. The interesting part about this multiplication, it is already done for us. It is everywhere on the internet. I will show you the tables in a few minutes.

    A few things to remember –

    1. Multiply a Galois field by a Galois field for 1 – you get the same thing. It is like multiplying a number by 1. You get the same number back.
    2. Multiply by two or three are different. The original values des change. We can multiply or we can use the look up tables.
    3. There are two tables that are available MUL2 and MUL3.
    4. Remember the resulting values have to be MOD 100011011  Do you remember why? This is the reducer to make the result fit in a byte

    Let’s look at the word ‘what’ and apply AES to it

    W is a 57 in HEX – represented by 0x57
    h is a 68 in HEX – represented by 0x68
    a is a 61 in HEX – represented by 0x61
    t is a 74 in HEX – – represented by 0x74

    Now we have to take the DOT PRODUCT and it is complex.
    0x57
    0x68 [ 0x02 0x03 0x01 0x01 ]
    0x61
    0x74

    5 = 0101 (in bits)
    7 = 0111 (in bits)
    57 = 01010111 (Or use your scientific calculator)

    NOW
    How about the 02? -> (10)

    Now multiple the 01010111 by 10 (0x57 times 0x02 – HEX) (remember you did this before)

    X^6 + x^4 + x^2 + x^1 + x^0 multiply by X^1

    0 1
    1 2
    2 3
    4 5
    6 7

    Now we count
    How many

    7 – 1

    6 — 0
    5 — 1
    4 — 0
    3 — 1
    2 — 1
    1 – 0

    So 0x57 DOT 0x02 = 1 0 1 0 1 1 0

    Now do you need to reduce 

    THE ANSWER IS NO.

    Why  because the bits fit in a BYTE

    NO REDUCER NEEDED.

    I have one more post to finish with AES

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 ISS Written Disc

2023 Discussion topic You have been asked by management to secure the laptop computer of an individual | Assignment Collections

 Discussion topic:

You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop.
 

Read the above discussion topic and write papers, APA format, provide references, no plagiarism.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Reflection R1

2023 Submit a 5 page paper APA style detailing the how Blockchain technology can be implemented to reduce ad fraud | Assignment Collections

 Submit a 5 page paper (APA style) detailing the how Blockchain technology can be implemented to reduce ad fraud and cost while meeting consumers’ increasing expectation for excellent customer service? 

Sources :

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CPS150 homework

2023 Using the Design Recipe write the algorithm not the program for the | Assignment Collections

Using the Design Recipe, write the algorithm (not the program) for the following problems:

  • Write a program that prints the sum of the first n positive integers, 1 + 2 + … + n, where n is user-specified.
  • Write a program that prints the product of the first n positive integers, 1 × 2 × … × n, where n is user-specified.
  • Write a program that prints the balance of an account after each of a number of years y, given an initial balance b and a yearly interest i, specified as a percentage (e.g., 5%). The values of y, b and i are all user-specified.

Make sure, for each problem, you clearly show the Design Recipe steps:

  1. Contract (25%)
  2. Purpose Statement (25%)
  3. Examples (25%)
  4. Algoritm (25%)

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Want A Unique Feature In Faq Project Using Phpstorm, Laravel And Sqlite

2023 hi want a voting feature for answers to add in faq project that i have done | Assignment Collections

hi want a voting feature for answers to add in faq project that i have done using php storm,laravel and sqlite.  require adding a field(s) to a model(s), a updated query to use the new field such as to sort by votes, and an updated UI, so the feature can be used by an application user and tests should also be done and then deploy it heroku 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer Science

2023 1 Given a student registration system for the University of ABC The university has Fall Spring and Summer semesters | Assignment Collections

  

1. Given a student registration system for the University of ABC. The university has Fall, Spring and Summer semesters for undergraduate and graduate classes. The student can register or drop any course before the deadline. Late registration and drop will be penalized by a certain amount of payment. Each undergraduate student can register at most 5 courses and minimum 3 courses. Each graduate student can register at most 3 courses and minimum 2 courses. All of the courses can be registered online. Each course has certain capacity (you can assume any number, e.g., 30). Your task is to model this simple registration system using correct Z notation. You need to define data, two operations (register and drop) and corresponding schemas. 

Note: Some Symbols that may be useful for this assignment: 

Power set: Ã

Change/update of database: D book

No update of database: Xbook

First Order Logic: 

Quantifiers: 

There is at least one element p in the set of patron: $ p Î patron. 

For all elements b in the set of book: ” b Î book.

Schema: 

      

Borrow-Success

  

D patron

 

{< “Prof.”, Yujian   Fu, 10111111, l, 0, l>,  … }

  

/* set   declaration is here */

 

/* constraints   are defined here */

X ¹ ∆ ” $ Î £ ³ Ù Ú

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 2 Required Assignment 1—Genesis Energy Cash Position Analysis The Genesis Energy operations management team is now preparing to implement

2023 The Genesis Energy operations management team is now preparing to implement the operating expansion plan Previously the firm s | Assignment Collections

The Genesis Energy operations management team is now preparing to implement the operating expansion plan. Previously, the firm’s cash position did not pose a challenge. However, the planned foreign expansion requires Genesis Energy to have a reliable source of funds for both short-term and long-term needs.

One of Genesis Energy’s potential lenders tells the team that in order to be considered as a viable customer, Genesis Energy must prepare and submit a monthly cash budget for the current year and a quarterly budget for the subsequent year. The lender will review the cash budget and determine whether or not Genesis Energy can meet the loan repayment terms. Genesis Energy’s ability to repay the loan depends not only on sales and expenses but also on how quickly the company can collect payment from customers and how well it manages its supplier terms and other operating expenses. The Genesis Energy team members agreed that being fully prepared with factual data would allow them to maximize their position as well as negotiate favorable financing terms.

The Genesis Energy management team held a brainstorming session to chart a plan of action, which is detailed here.

  • Evaluate historical data and prepare assumptions that will drive the planning process.
  • Produce a detailed cash budget that summarizes cash inflow, outflow, and financing needs.
  • Identify and compare interest rates, both short-term and long-term, using debt and equity.
  • Analyze the financing mix (short/long) and the cost associated with the recommendation.

Since this expansion is critical to Genesis Energy expanding into new overseas markets, the operations management team has been asked to prepare an executive summary with supporting details for Genesis Energy’s senior executives.

Working over a weekend, the management team developed realistic assumptions to construct a working capital budget.

  1. Sales: The marketing expert and the newly created customer service personnel developed sales projections based on historical data and forecast research
  2. Other cash receipt: Rental income $15,000 per month
  3. Production material: The production manager forecasted material cost based on cost quotes from reliable vendors, the average of which is 50 percent of sales
  4. Other production cost: Based on historical cost data, this cost on an average is 30 percent of the material cost and occurs in the month after material purchase
  5. Selling and marketing expense: Five percent of sales
  6. General and administrative expense: Twenty percent of sales
  7. Interest payments: $75,000—Payable in December
  8. Tax payments: $15,000—Quarterly due on 15th of April, July, October, and January
  9. Minimum cash balance desired: $25,000 per month
  10. Cash balance start of month (December): $15,000
  11. Available short-term annual interest rate is 8 percent, long-term debt rate is 9 percent, and long-term equity is 10 percent. All funds would be available the first month when the firm encounters a deficit
  12. Dividend payment: None

Based on this information, do the following:

  1. Using the Cash Budget spreadsheet, calculate detailed company cash budgets for the forthcoming and subsequent years. Summarize the sources and uses of cash, and identify the external financing needs for both the forthcoming and subsequent years.

    Download this Excel spreadsheet to view the company’s cash budget. You will calculate the company’s monthly cash budget for the forthcoming year and quarterly budget for the subsequent year using this information.

  1. In an executive-level report, summarize the company’s financing needs for the forecast period and provide your recommendations for financing the planned activities. Be sure to comment on the following:
    1. Your recommended financing solution and cost to the firm: If Genesis Energy needs operating cash, how should it fund this need? Are there internal policy changes with regard to collections or payables management you would recommend? What types of external financing are available?
    2. Your concerns associated with the firm’s cash budget. Is this a sign of weak sales performance or poor cost control? Why or why not?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now