Free Essay

Chapter 3

In:

Submitted By theblackknight
Words 2053
Pages 9
4. The implementation of networking technology has created more risk for businesses that useinformation technology because business networks are now connected to the internet andother networks external to the organization. This has made it easier for people to gainunauthorized access to the organizations networks.
5.Information extortion occurs when an attacker steals information from a computer system anddemands compensation for its return or for an agreement not to disclose it. For example, if a hacker gains unauthorized access to a celebrity’s computer and discovers embarrassing photosor videos of the star, he could then blackmail the star into giving him money in exchange forkeeping the photos quiet. This causes not only a monetary loss for the celebrity, but also a loss of privacy .
6. Employees constitute one of the greatest threats to information security because employeemistakes can lead to the revelation of classified data, entry of erroneous data, accidentaldeletion or modification of data, the storage of data in unprotected areas, or they could fail to follow procedures to protect data.
7. The first, most basic step is to set up the computer so that the screen and keyboard are not visible to persons passing by. If you have an LCD monitor, adjust the viewing angle to makew it as difficult as possible for anybody else to read your screen. Also, be aware of all people near the computer; frequently look and verify that no one is watching your screen or keyboard. If someone is watching you, ask that they look away. Also, be aware of the location of any cameras near your computer. Security cameras, in particular, have become so common as to beubiquitous. But those same cameras can be used to record your fingers’movements over your keyboard, and possibly, the contents of your monitor screen. As well, watch out for portable cameras
8. Back in the 1970s and 1980s, the image of a hacker in the popular mind was rather like Robin Hood. In movies and television, hackers were depicted as popular heroes, challenging and defeating the defenses of corporate and government computers, usually in the name of defending the helpless against the powerful. Many movies, such as Hackers,strengthened such an image. Until the 1980s, hacking was a relatively small-scale operation. But as personal computers became more common, the number of hackers grew, and the problem of hacking became more than a nuisance. Soon newspapers and television news began describing hackers as dangerous criminals. It is true, some did use their computer skills to steal information and money, but others simply broke into computer systems to find out if they could, with no further objective in mind. Still, all hackers are included in the class of criminals in reports of the media. Hackers fall into two broad categories. First are the elite hackers, persons of great skill with computers who can break into most computer systems using security shortcomings of computer systems. Today, many elite hackers work to enhance the security of IT systems, and others discover security flaws and report them. Some of the elite hackers who discover security flaws also write programs, or scripts, that exploit these flaws and then publish them on the internet. The other category of hackers are novice hackers, also called script babies or script kiddies. These hackers use the scripts written by elite hackers to attack vulnerable systems, but do not have the skills to design and write such scripts themselves.
9. A skilled hacker is a professional/mercenary a highly skilled programmer gone rogue also an expert in social engineering usually works for the mob and the underworld for the money. The other is what's known as a script kiddy this is a guy who runs automated programs and scripts doesn't have any programming skills or knowledge of social engineering techniques and makes mistakes that professional criminals don't make like bragging he toasted CNN and thousands of websites in DDOS attacks in IRC for attention.
10. Malware - software components designed to damage, destroy or deny service to targeted systems. Types include viruses, worms, Trojan horses, DOS attacks, logic bombs and back doors.Worms differ from viruses in that they do not require a host file to replicate. Worms will usually utilize flaws in a network to spread. Viruses may utilize a Trojan horse as a host to disguise themselves for penetrating s system. The user will generally aid the Trojan/virus by initiating the executable.
11. Polymorphism causes greater concern because the malicious code changes over time, which makes this type of threat harder to detect because commonly used anti-virus software is not programmed to detect the newly changed attack. This makes it harder to protect against.

12. The most common form of violation is the use or duplication of software, commonly called software piracy. Some organizations use digital water marks, intentional placement of bad sectors. Most companies use coptright codes. Also most comapnies file patents, trademarks and or copyrihgts, which enable companies to persue a violator. There are two major organizatiosn the fight IP theft, Software and Infomation Idustry Association, and the Business Software Alliance.
13. Force majeure is an act of god, such as a flood, torando or natural disaster.
14. Due to the rapidly changing world of technology, it seems the minute we turn around our equipment and systems our obsolete. While this may be exaggerated, it is certainly a formidable issue that garners much attention. IS technicians must understand that not only is technology advancing, but the means and methods of the would-be attackers are as well. This means the information security in place now may become quite vulnerable in the future. Both planning and the ability to recognize these needs play a large role in keeping up with the times. There is a fine line between efficient upgrades and wasted money. Balancing the necessary systems and equipment against the overpriced daily-available upgrades is a key to fighting technological obsolescence.
15. Yes, but the extent of the value varies significantly by the type of IP and how many people want it. One fantastic new stapler design may be worth millions in licensing fees, while another may never be produced. The McDonald's logo may bring in a ton of revenue, while the logo for, the Sugar Shack is only ever used by Mike, the owner A hit single is worth millions to the publisher and label, but thousands of songs are never heard in public.
16. The most common type of attack is password guessing. Attackers can guess passwords locally or remotely using either a manual or automated approach. Automated password guessing programs and crackers use several different approaches. The most time consuming and most successful, attack method is the brute-force attack, in which the attacker tries every possible combination of characters for a password, given a character set a maximum password length. Dictionary attacks work on the assumption that most passwords consist of whole words, dates, or numbers taken from a dictionary. Dictionary attack tools require a dictionary input list. You can download varying databases with specific vocabularies free or commercially off the Internet. Hybrid password guessing attacks assume that network administrators push users to make their passwords at least slightly different from a word that appears in a dictionary. Hybrid guessing rules vary from tool to tool, but most mix uppercase and lowercase characters, add numbers at the end of the password, spell the password backward or slightly misspell it, and include characters such as @!# in the mix. Both John the Ripper and Cain & Abel can do hybrid guessing. Password Resetting, attackers often find it much easier to reset passwords than to guess them. Many password cracking programs are actually password resetters. In most cases, the attacker boots from a floppy disk or CD-ROM to get around the typical Windows protections. Most password resetters contain a bootable version of Linux that can mount NTFS volumes and can help you locate and reset the Administrator's password.
Administrators face a tough task in ensuring network security, because of password sniffers such as l0pht, which can sniff an password easily. To solve this, one can use a network sniffer that can detect such password sniffers. The network sniffer could log a user running a password sniffer and also issue an alert. This page provides guidelines which, to the best of our knowledge, will help prevent security attacks on your JIRA installation. Administrators should use Strong Passwords. Do not use passwords that are dictionary words. Use mixed-case letters, numbers and symbols for your administrator passwords and make sure they are sufficiently long (e.g. 14 characters). We encourage you to refer to the Strong Password Generator for guidelines on selecting passwords.
17. A DoS Attack is a Denial of Service attack. This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP). The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there. A DDoS Attack is a Distributed Denial of Service Attack. In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter. Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.
18. In order for an attack to succeed, the attacker must first identify the vulnerabilities of the systems he wishes to infiltrate. The attacker must select one or more attack vectors to exploit the vulnerabilities. There is more than one way to gain access to use the sniffer system. Because the sniffer is used to monitor data traveling over the network, a back door may work. Back/Trap doors utilize an access mechanism often left in by designers. This is beneficial for the attacker as it does not draw as much attention as brute force or a hoax may. From here the sniffer can operate almost undetected on the network.
19. Social engineer hackers can be smooth operators. They may call looking for advice, offering flattery in the attempt to gain your trust. They use this connection to talk their way into getting information about the security your company has in place and the programs you run. They may also prey on your confidence in the network in order to gain specific details and shortcomings about your system operations. By using social engineering to obtain even small amounts of information about how your system operates and what programs you use, the hackers can run software on their end that will not only give them greater detail on your system, it can show them how to get inside. Suavely manipulating an individual isn't the only social engineering method hackers use. Some hackers are far more direct. They may directly call a business and impersonate an authority in the company. Employees can be easily swayed by a person issuing a direct request in an authoritative tone. Employees have been known to do what the hacker says because they believe they are being asked on behalf of the company. They may change passwords or issue new ones, allowing the hacker access to your system. The hacker may start small and simply ask for access to their email account, which is generally that of a system administrator. Once they have access to this account, they can issue credible commands to gain further access to and control over your business systems.
20. Basically, a buffer overflow is when a program on the computer tries to store more data to a temporary data storage area, or buffer. It is generally used by hackers when the web sever is corrupted due to the program writing outside of the allocated memory area.

Similar Documents

Free Essay

Assignment Timeline

...ASSIGNMENT TIMELINE—COSC 2425   Dates | Text Chapters | Pages and sections covered | Assignments | Week 1June 6th – June 11th |  Chapter 1: Basic Concepts Chapter 2: x86 Processor Architecture | Page 1-28 Pages 29-57 | Read all material in the Getting Started Folder, read the syllabus (located on the Course Home tab), read the assignment timeline and grading sheet.Assignment 1: Introduce yourself to the class (Located in the Getting Started Folder) Quiz Chapter 1 Quiz Chapter 2 | Week 2June 12th –June 18th | Chapter 3: Assembly Language Fundamentals Chapter 4: Data Transfers, Addressing, and Arithmetic | Pages 58-93 Pages 94-131 | Quiz Chapter 3 Quiz Chapter 4 | Week 3June 19th –June 25th | Chapter 5: ProceduresChapter 6: Conditional Processing | Pages 132-179 Pages 180-228 | Quiz Chapter 5 Quiz Chapter 6 Programming Project 1 (Covers Chapters 1-6) | Week 4June 26th – July 2rd | Chapter 7: Integer Arithmetic Chapter 8: Advanced Procedures | Pages 229-269 Pages270-331 | Quiz Chapter 7 Quiz Chapter 8 | Week 5July 3rd – July 9th | Chapter 9: Strings and Arrays Chapter 10: Structures and Macros | Page 332-365 Pages 366-418 | Quiz Chapter 9 Quiz Chapter 10 Programming Project 2 (Covers Chapters 1-10 concentrating on the concepts learned in chapters 7-10) | July 4th Holiday | | | No Class | Week 6July 10th – July 12th | Comprehensive and covers all chapters (1-10) | | FINAL EXAM on Tuesday July 12th, 2011...

Words: 324 - Pages: 2

Free Essay

Eco 305 Wk 1 Homework Ch 2 - 12(a-B), 13(a-C), 14

...ECO 305 All Quiz and Homework, ECO 305 WK 3 Homework Ch 5 - 16(a-c), 17(a-d), 18(a-b); Ch 6 - 13(a-b), ECO 305 WeeK 3 Quiz 2 - Chapters 3 and 4 , ECO 305 WK 1 Homework Ch 2 - 12(a-b),13(a-c),14, ECO 305 WK 2 Homework Ch 3 - 13(a-d); Ch. 4 - 15(a-b),16(a-b), ECO 305 WK 2 Quiz 1 - Chapters 1 and 2, ECO 305 WK 5 Homework Ch 8 - 6(a-d) , ECO 305 WK 5 Quiz 4 - Chapter 7 , ECO 305 WK 6 Homework Ch 9 - 11(a-c), 12(a-c), ECO 305 WK 6 Quiz 5 - Chapter 8 - All Possible Questions, ECO 305 WK 9 Quiz 8 - Chapters 12 and 13 , ECO 305 WK 11 Quiz 10 - Chapters 16 & 17 , ECO 305 Complete Class Assignments | strayer help, ECO 305 Strayer ECO 305 Week 1, ECO 305 Week 2, ECO 305 Week 3, ECO 305 Week 4, ECO 305 Week 5, ECO 305 week 2 Assignment, ECO 305 week 3Assignment, ECO 305 week 4 Assignment, ECO 305 week 1 Assignment, ECO 305 tutorial, ECO 305 Complete Course, ECO 305 Entire Class, ECO 305 Whole Tutorial, ECO 305 tutorial, ECO 305 Summary, ECO 305 Study Guide, ECO 305 Questions , ECO 305 Answered , ECO 305 Solution, ECO 305 Final , ECO 305 Presentation, ECO 305 Universty, ECO 305 University of, ECO 305 Homework, ECO 305 Version, ECO 305 Strayer assignment, ECO 305 Strayer course, ECO...

Words: 252 - Pages: 2

Premium Essay

Eco 410 Test Bank

...Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 - 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes and Exam Week 1 - 11 All Possible Questions With Answers ECO 410 Week 2 Quiz 1: Chapters 1 and 2 ECO 410 Week 3 Quiz 2: Chapters 3 and 4 ECO 410 Week 4 Quiz 3: Chapters 5 and 6 ECO 410 Week 5 Quiz 4: Chapters 7 and 8 ECO 410 Week 6 Quiz 5: Chapters 9 and 10 ECO 410 Week 7 Quiz 6: Chapters 11 and 12 ECO 410 Week 8 Quiz 7: Chapters 13 and 14 ECO 410 Week 9 Quiz 8: Chapters 15 and 16 ECO 410 Week 10 Quiz 9: Chapter 17 and 18 ECO 410 Week 11 Quiz 10: Chapter 19 and 20 ECO 410 Quizzes...

Words: 471 - Pages: 2

Free Essay

Syllabus

...| THEO | Chapter 12 | | Chapter 12 Quiz | Th: 15 | THEO | | Exam #2: Ch 9-12 | | Fri: 16 | CSTU | Chapters 11-12 | | Ch. 11-12 Quiz | Fri: 16 | BIBL | | Test 1 (Midterm Exam) | | Fri: 16 | UNIV | Effective Email Project | | | | | | | | Mon: 19 | BIBL | Romans Essay Available | | Bb Quiz: Ch 10, 14, 15 | Mon: 19 | EVAN | Reading & Book Review | + Reflection Paper | + Check for reading | Tue: 20 | BWVW | Read: World Religions Overview | | | Tue: 20 | THEO | Chapter 13 | | Chapter 13 Quiz | Th: 22 | BWVW | | Test #2 | | Th: 22 | THEO | Chapter 14 | | Chapter 14 Quiz | Fri: 23 | CSTU | Chapters 13-14 | | Ch. 13-14 Quiz | Fri: 23 | UNIV | Time Management Activity | Reflections Paper | | | | | | | Mon: 26 | EVAN | Check for possible reading | | | Tue: 27 | BWVW | Read: What is Moral Relativism | | | Tue: 27 | THEO | Chapter 15 | | Chapter 15 Quiz | Wed: 28 | BIBL | Acts 21-28 Pent-Sum; Eph. Com. Meditation; Phil. Prayer Journal | | | Th: 29 | THEO | Ch. 16 & Biblical Worldview | | Chapter 16 Quiz | Fri: 30 | CSTU | Chapters 15-16 | | Ch. 15-16 Quiz | Fri: 30 | UNIV | Information Literacy Project Pt 1 | | | | | | | | November | | | | | | | | | | Mon: 2 | BIBL | Col. Com. Prayer; Phile. Ch. Ref. | | Bb Quiz: Ch 16&22 (Col, Phile) | Mon: 2 | EVAN | Witnessing Report + | Check for reading | | Tue: 3 | BWVW | Read: Measuring Morality | | | Tue: 3 | THEO | Chapter...

Words: 542 - Pages: 3

Free Essay

Class Schedule V5

...Be ready to meet and show up. Look forward to getting to know you all. 8/31 Group activities continued to cover fundamentals later used for the class and group work; plus Chapter 1. Read Chapter 1 and finish online quiz #1 on Blackboard by end of day Wednesday 11:59pm MST-No late work accepted, so don’t miss these easier points. 9/7 Chapter 2 and 3 started. Quiz #2 and group work. 9/11 Drops (partial schedule remaining) through this date will be refunded 100%. IMPORTANT NOTE: No drop refunds after this date 9/14 Chapter 3 and project/lab work. Quiz #3 and group work. 9/21 Chapter 4 and project/lab work. Quiz #4 and group work. 9/28 Chapter 5 and project/lab work. Quiz #5 and group work. 10/5 EXAM #1 Be ready and get a lot of points. Bring Laptop with wireless and Respondus lockdown ready 10/12 Chapters 6 and Group Work Quiz #6 and group work. 10/19 Chapters 7 and 8; Group Work (time permitting) Quiz #7 and group work. 10/26 Project Group Work Time in the Library Project Work Due Sunday end of day Nov 2. 10/31 Last day to drop or withdraw without special permission from your dean (Regular semester courses) 11/2 Chapters 9 and 10; Group Work Quiz #8 and group work. EXAM #2 – Take Home Due before Sunday 10/9 11:59 11/9 Chapters 11 and 12; Group Work Quiz #9 and group work. 11/16 Chapters 13 Quiz #10 and group work. 11/23 THANKSGIVING BREAK Quiz #11 and group work. 11/30 Group Time Be Ready 12/7 Presentations Be Ready 12/14 Prep and Final Exam Work Be...

Words: 367 - Pages: 2

Premium Essay

Bus 300 Complete Class

...answers BUS 300 Week 2 Quiz 1: Chapters 1 and 2 BUS 300 Week 3 Quiz 2: Chapters 3 and 4 BUS 300 Week 4 Quiz 3: Chapters 5 and 6 BUS 300 Week 5 Quiz 4: Chapters 7 and 8 BUS 300 Week 6 Quiz 5: Chapters 9 and 10 BUS 300 Week 7 Quiz 6: Chapters 11 and 12 BUS 300 Week 8 Quiz 7: Chapters 13 and 14 BUS 300 Week 9 Quiz 8: Chapters 15 and 16 BUS 300 Week 10 Quiz 9: Chapters 17 and 18 BUS 300 Week 11 Quiz 10: Chapter 19 BUS 300 Quizzes Week 1-11 Solution All possible questions with answers BUS 300 Week 2 Quiz 1: Chapters 1 and 2 BUS 300 Week 3 Quiz 2: Chapters 3 and 4 BUS 300 Week 4 Quiz 3: Chapters 5 and 6 BUS 300 Week 5 Quiz 4: Chapters 7 and 8 BUS 300 Week 6 Quiz 5: Chapters 9 and 10 BUS 300 Week 7 Quiz 6: Chapters 11 and 12 BUS 300 Week 8 Quiz 7: Chapters 13 and 14 BUS 300 Week 9 Quiz 8: Chapters 15 and 16 BUS 300 Week 10 Quiz 9: Chapters 17 and 18 BUS 300 Week 11 Quiz 10: Chapter 19 BUS 300 Quizzes Week 1-11 Solution All possible questions with answers BUS 300 Week 2 Quiz 1: Chapters 1 and 2 BUS 300 Week 3 Quiz 2: Chapters 3 and 4 BUS 300 Week 4 Quiz 3: Chapters 5 and 6 BUS 300 Week 5 Quiz 4: Chapters 7 and 8 BUS 300 Week 6 Quiz 5: Chapters 9 and 10 BUS 300 Week 7 Quiz 6: Chapters 11 and 12 BUS 300 Week 8 Quiz 7: Chapters 13 and 14 BUS 300 Week 9 Quiz 8: Chapters 15 and 16 BUS 300 Week 10 Quiz 9: Chapters 17 and 18 BUS 300 Week 11 Quiz 10: Chapter 19 BUS 300 Quizzes Week 1-11 Solution ...

Words: 459 - Pages: 2

Free Essay

Management

...This set of 28 questions, taken from prior examinations, covers topics in Chapters 1, 2, 3, 4, and 5. The purpose of sample multiple choice questions is to acquaint you with the style and substance of typical exam questions over this material. Please be aware that: 1. multiple choice format questions are only one of many resources available to prepare for testing events – reading textbook chapters and working through chapter examples, studying the end-of-chapter review problem and accompanying solution, and reviewing assigned homework items and the published solutions may be more powerful methods to increase your understanding of the topics covered in the course. 2. the exam questions used this quarter will be similar but different from these example questions – understanding the main concepts in each chapter is critical to success on the testing events; remembering a sample question may be of some help but the format of a question on the same topic often differs rendering memory a distant second choice to understanding. The Questions: 6. Scheney Company uses the weighted-average method in its process costing system. The company's work in process inventory on March 31 consisted of 20,000 units. The units in the ending work in process inventory were 100% complete with respect to materials and 70% complete with respect to labor and overhead. If the cost per equivalent unit for March was $2.50 for materials and $4.75 for labor and overhead, the total cost in the...

Words: 265 - Pages: 2

Premium Essay

Chapter 3?

...CHAPTER 3 Introduction This chapter mainly focuses on the methods and instruments that will be used to gather data and the design of the research. The respondents that will answer the questions needed to be asked about the topic of the research and the questionnaires regarding the topic are also comprised in this chapter. It will also include the plan that will be used to analyze and collect data. The time table allotted in collecting data and information is also encompassed in this chapter. Methodological The research has no cause and effect relationship. It doesn’t contain any relationship and prediction. Therefore, the research is classified as descriptive. The research will be done in order to test the hypothesis and answer the statement of the problem. The instrument the researchers will be using to gather data is questionnaire. Questionnaire will be constructed to gather descriptive data necessary for the description of the problem. The researchers plan to use questionnaire because it is more efficient, more effective because the researchers can conduct a survey with a number of students in a small period of time. Aside from its efficiency, it is also easier to tabulate and analyze because it provides the respondents options and idea for decision making. Interview is not conducive since it will involve a lot of respondents. A one-on-one interview denotes a lot of time and effort that will be impossible to achieve because of the limited time span given. Observation...

Words: 305 - Pages: 2

Free Essay

Chapter 3

...DISSERTATION.doc DownloadSign up for Dropbox * Sign in ------------------------------------------------- Top of Form Email Password Remember me Create an account Bottom of Form 1 CHAPTER I THE PROBLEM AND ITS BACKGROUND Introduction National University was founded on August 1, 1900 by Don Mariano Fortunato Jhocson and was previously known as Colegio Filipino, the first private non- sectarian school in the country. It stood as one of the respected institution for engineering, architecture, education, and business. In 1998, National University met a great ordeal, a great fire burned the original main building to ashes, crippling one of the pioneer universities in Manila. Nevertheless, National U proved its commitment by continuing to strive for quality education. In late 2008, majority of its share was acquired by the SM Group of Companies, paving way to the erection of a new Main Building. Along with the joint venture were new improvements in facilities and a better perspective as a higher education institution. 2 Currently, National U has eleven colleges, a basic education department, and a graduate studies department. This Legarda-based institution annually serves more than one thousand and three hundred tertiary students, new and old, and more than five hundred elementary and high school students. The campus is currently composed of three buildings, the New Main Building, the Jhocson Memorial Building (JMB) and the Pharmacy-Dentistry Building...

Words: 1893 - Pages: 8

Premium Essay

Chapter 3

...Developmental Psychology Chapter 3 Assignment Genetics After reading chapter 3 in the text, read each of the following scenarios and answer the questions about the expected phenotype in each case. Bethany and Hank are going to have a baby, and they wonder whether or not it will have dimples. Having dimples is a dominant characteristic (not having dimples is recessive). Bethany has dimples and Hank does not. What are the probabilities that their baby will have dimples? If Bethany is homozygous: If Bethany is heterozygous: Jackie and Ron would like to have a baby. However, they are worried because Jackie has a sister who has cystic fibrosis. Although, Jackie does not have it, she knows that she could carry the recessive allele for it (not having cystic is dominant). Her husband does not have any family members who have cystic fibrosis, but he could carry it too. If they both have recessive alleles for cystic fibrosis, what are the chances that their baby will have it? Rachel just found out that she is pregnant. She is excited, but she is worried. Her brother has hemophilia. Hemophilia is a sex-linked, recessive trait. If she carries the gene for hemophilia and she has a girl, what are the chances that the baby will have hemophilia? If she has a boy, what are the chances that the baby will have hemophilia? How would this change if her husband has hemophilia, too? Girl baby: Boy baby: Girl baby (if Dad has hemophilia): Boy baby (if Dad has...

Words: 256 - Pages: 2

Premium Essay

Chapter 3

...CHAPTER 3 Methodology This chapter presents the methodology that will be used in this study and will include the discussion of research design, respondents, sampling, data gathering, and statistical instruments used. A. Research Design A descriptive research methodology was used for this study. Researchers used survey as their primary instrument to collect data that they can used to give relevant results for this study. It also attempts to determine, describe, and analyze relationships between time management and study habits. B. Research Locale Students in Baliuag University who are enrolled as BSA 2nd year, school year 2012, are the respondents of this study. BSA 2nd year comprises ___ boys and ___ girls, for total number of ___ students. No sampling technique was used because all BSA 2nd year are asked to participate and to answer the researchers questionnaire. Researchers choose them because they believe that BSA 2nd year have the knowledge to answer the questions and they can get data they need for this study. The study will be conducted at rooms 203 and 204 in College of Business Adminitration and Accountancy Department. C. Instrumentation For this study, the survey-questionnaire instruments were used achieve the main objective of the study. A self-administered questionnaire was distributed to 2nd year BSA students. The questionnaire given to the 2nd year aimed to the effects of study habits and time management to the learning’s of a student.  In addition...

Words: 283 - Pages: 2

Premium Essay

Chapter 3

...Chapter 3 and Chapter 13 Homework Problem 03-02. The Road King Tire Company in Birmingham wants to monitor the quality of the tires it manufactures. Each day the company quality-control manager takes a sample of 100 tires, tests them, and determines the number of defective tires. The results of 20 samples have been recorded as follows: Sample Number of Defectives Sample Number of Defectives  1 14 11 18  2 12 12 10  3  9 13 19  4 10 14 20  5 11 15 17  6  7 16 18  7  8 17 18  8 14 18 22  9 16 19 24 10 17 20 23 Construct a -chart for this process using limits and describe the variation in the process. P-chart average = 0.178 UCL = 0.178+3*SqRt(0.178*(1-0.178/200) = 0.2591 LCL = 0.178-3*SqRt(1-0.0.178/200) = 0.0969 The process is NOT in control. Problem 03-06. One of the stages in the process of making denim cloth at the Southern Mills Company is to spin cotton yarn onto spindles for subsequent use in the weaving process. Occasionally the yarn breaks during the spinning process, and an operator ties it back together. Some number of breaks is considered normal; however, too many breaks might mean that the yarn is of poor quality. In order to monitor this process, the quality-control manager randomly selects a spinning machine each hour and checks the number of breaks during a 15-minute period. Following...

Words: 625 - Pages: 3

Premium Essay

Chapter 3

...Chapter 3 METHODS OF RESEARCH This chapter discusses the method and procedures employed by the researchers to gather the needed data. It includes the Research Design, Respondents, Sampling Techniques; Instruments used its construction, validation, administration and retrieval, and the statistical treatment of data. RESEARCH DESIGN The researchers employed the descriptive method approach which, according to Thomas (2014), refers to the method used to describe data and characteristics used to describe the population. Its purpose is to acquire accurate, factual, systematic data that can provide an actual picture of the data set that are being reviewed. RESPONDENTS The researchers used ____ College Students from Education, Business Administration and Criminology Department who are currently enrolled in Metro Manila College, Novaliches Quezon City during the Academic year 2016 – 2017. SAMPLING TECHNIQUES The researchers utilized the cluster sampling technique in this study. According to Kelly (2013), Cluster sampling technique is a method of survey sampling which selects clusters such as groups defined by area of residence, organizational membership or other group-defining characteristics. It is often used where a complete list of subjects is impossible or impractical to construct. Cluster sampling is a two- (or more) stage process whereby clusters of individual units are first defined and selected and then samples of individual units are taken from each of the defined clusters...

Words: 860 - Pages: 4

Premium Essay

Chapter 3

...CHAPTER 3: PRINCIPLES OF OPTION PRICING END-OF-CHAPTER QUESTIONS AND PROBLEMS 1. (Basic Notation and Terminology) The average of the bid and ask discounts is 8.22. Discount = 8.22(68/360) = 1.5527 Price = 100 – 1.5527 = 98.4473 Yield = (100/98.4473) (365/68) – 1 = 0.0876 Note that even though the T-bill matured in 67 days, we must use 68 days since that is the option's time to expiration. 2. (Minimum Value of a Call) This would create an arbitrage opportunity. The call would be purchased and immediately exercised. For example, suppose S0 = 44, X = 40, and the call price is $3. Then an investor would buy the call and immediately exercise it. This would cost $3 for the call and $40 for the stock. Then the stock would be immediately sold for $44, netting a risk-free profit of $1. In other words, the investor could obtain a $44 stock for $43. Since everyone would do this, it would drive the price of the call up to at least $4. If the call were European, however, immediate exercise would not be possible (unless, of course, it was the expiration day), so the European call could technically sell for less than the intrinsic value of the American call. We saw, though, that the European call has a lower bound of the stock price minus the present value of the exercise price (assuming no dividends). Since this is greater than the intrinsic value, the European call would sell for more than the intrinsic value. Then at expiration, it...

Words: 2466 - Pages: 10

Free Essay

Chapter 3

...Chapter 3 Methodology This third chapter discussed the methods that the researcher has used in order to collate and evaluate the data in accordance to the goal of the study. Methodology is like a strategy or plan for achieving some goal; methods are the tactics that can be used to service the goals of the methodology. In essence, methodologies provide the blueprints that prescribe how the tools should be used. Considerably, the researcher used a structured questionnaire as the instrument of the study. Data gathered from the survey questionnaire are used to gauge the perceptions of the participants about the efficiency performance of Malaysian commercial banks. 3.1 Research philosophy An interpretivist approach was used in the study since the method used is exploratory as the study aimed to determine present facts and present facts that are not yet explored about the efficiency performance of Malaysian commercial banks. As already noted, the study explored the current level of performance of Malaysian banks including the key factors of scale economy and their operating conditions. What scale is currently in used in improving operational and cost efficiencies are also explored. The study operated in a cross-sectional design using a structured questionnaire. This design enabled the study to focus on the breadth and depth of the research while also minimizing confounding variables. In particular, the philosophy adapted for this study dissertation is interpretive epistemology...

Words: 3370 - Pages: 14