Acct505, Case Study 1, Week 3

In: Business and Management

Submitted By bruno31558
Words 569
Pages 3
Case Study 1 –
Springfield Express is a luxury passenger carrier in Texas. All seats are first class, and the following data are available:

Number of seats per passenger train car 90
Average load factor (percentage of seats filled) 70%
Average full passenger fare $ 160
Average variable cost per passenger $ 70
Fixed operating cost per month $3,150,000

a. What is the break-even point in passengers and revenues per month? 35,000 Passengers; $5,600,000 Revenue b. What is the break-even point in number of passenger train cars per month? 556 Train Cars c. If Springfield Express raises its average passenger fare to $ 190, it is estimated that the average load factor will decrease to 60 percent. What will be the monthly break-even point in number of passenger cars? 487 Train Cars d. (Refer to original data.) Fuel cost is a significant variable cost to any railway. If crude oil increases by $ 20 per barrel, it is estimated that variable cost per passenger will rise to $ 90. What will be the new break-even point in passengers and in number of passenger train cars? 45,000 Passengers; 715 Train Cars e. Springfield Express has experienced an increase in variable cost per passenger to $ 85 and an increase in total fixed cost to $ 3,600,000. The company has decided to raise the average fare to $ 205. If the tax rate is 30 percent, how many passengers per month are needed to generate an after-tax profit of $ 750,000? 36,248 Passengers per Month f. (Use original data). Springfield Express is considering offering a discounted fare of $ 120, which the company believes would increase the…...

Similar Documents

Case Study Week 3

...Case Study Week 3 Principles of Info System Security Professor Gross by Nick Post Concerning the research collaboration of ABC Institute of Research and XYZ Inc., there are two standard methods that shall be considered for the encryption of all sensitive data being transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might......

Words: 451 - Pages: 2

Week 3 Case Study

...Petrie’s Electronics Chapter 5 Case Questions 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Conducted interviews with key stakeholders inside the company, He had also worked with the marketing group to put together some focus groups made up of loyal customers, to get some ideas about what they would value in a customer loyalty program. Jim had also spent some time studying customer loyalty programs at other big retail chains and those in other industries as well, such as the airlines, known for their extensive customer loyalty programs. 2. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach would be by Business Process Reengineering. It is the search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services. The first step would be to identify key business processes which are the structured set of measurable activities designed to produce a specific output for a particular customer or market. 3. Why shouldn’t Petrie’s staff build their own unique system in-house? From the list of requirements, it was clear that Petrie’s staff should seek outside IT consulting to build their system. It would be too expensive and time consuming, not to mention, building a......

Words: 486 - Pages: 2

Week 3 Case Study

...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it.  You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest  BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest......

Words: 341 - Pages: 2

Case Study Week 3

...Question 1: Identify the stakeholders and how they were affected by Heene's actions? The stakeholders in the “Balloon Ball Hoax” are the boy, Falcon Heene; the parents, Richard and Mayumi Heene, brothers, Bradford and Ryo Heene; Larimer County sheriff; Jim Alderman; Denver International Airport travelers and employees; National Guard unit; local police; search and rescue teams; media and news services; Colorado taxpayers; and the public. The public through the media watched and worried about the fate of the boy in the balloon. Colorado taxpayers footed the bill for the 50,000 USD cost of personnel time, equipment and other incidentals to track the balloon, search the rescue mission, and investigation of the hoax. Denver International Airport closed to avoid collision with the balloon. Travelers were delayed and flights rerouted and rescheduled. Airport employees had to remain calm and courteous as travelers became frustrated with delays, missed flight times and rescheduling. Local police, the National Guard unit, and search and rescue teams spent hours and used expensive equipment to track and hunt for the balloon and boy while Falcon was safe the whole time. Sheriff Jim Alderman had to conduct investigation under intense media scrutiny. At first, the media was incredulous that the parents were being questioned and investigated. Then Mr. Alderman was ridiculed for not detecting the hoax sooner. Falcon Heene was used by his parents to pull out the hoax that he was on a hot...

Words: 949 - Pages: 4

Cis 554 Case Study 1 Week 3 Solution – a Graded Work

...CIS 554 Case Study 1 Week 3 Solution – A Graded Work Follow www.hwmojo.com link below to purchase solution http://www.hwmojo.com/products/cis554-case-study-1 Email us if you need help with anything else. Support@hwmojo.com CIS 554 Case Study 1: Reaching Success through Best Project Management Practices Due Week 3 and worth 80 points Read the following articles: 1. •“OPM3® Case Study: OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence”. Note: The article in PDF format can be found in the online course shell. 2. •“IT project management and virtual teams”. SIGMIS CPR '04 Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment, pages 129-133. Note: This article can be found in the ACM Digital Library 
Please follow the steps below to access ACM Digital Library: Login to iCampus at http://icampus.strayer.edu/login: From iCampus: Click STUDENT SERVICES>> Learning Resources Center >> Databases Scroll down to "Information Systems/Computing" The ACM Digital Library is below the heading. 3. Write a two to three (2-3) page paper in which you: Identify the common challenges that exist within IT projects based on the first article. Highlight the best practices that could be linked to the successful performance of IT project teams. Determine at least three (3) challenges that exist when working with virtual teams based on the...

Words: 536 - Pages: 3

Acct 504 Week 3 Case Study 1 Flower Landscaping Corporation

...A++PAPER;http://www.homeworkproviders.com/shop/acct-504-week-3-case-study-1-flower-landscaping-corporation/ ACCT 504 WEEK 3 CASE STUDY 1 FLOWER LANDSCAPING CORPORATION PRODUCT DESCRIPTION CASE STUDY 1 -THE COMPLETE ACCOUNTING CYCLE The Entire Case Study is due Sunday at Midnight Mountain time at the end of Week 3. This Case Study is worth 100 points or 10% of your final course grade. This Case Study relates to TCO’s D and E and Chapters 3 and 4. MAKE SURE TO COMPLETE ALL REQUIREMENTS WHICH ARE LISTED BELOW. There are 10 Sheets in the Workbook including this one. All of the Information you need for the Project is located in this Workbook. Requirements Sheet in Workbook Requirement 1 – Prepare the Journal Entries in the General Journal Journal Entries Requirement 2 – Post Journal Entries to the General Ledger General Ledger Requirement 3 – Prepare a Trial Balance Trial Balance Requirement 4 – Prepare the Adjusting Entries Adjusting Entries Requirement 5 – Post Adjusting Entries to the General Ledger General Ledger Requirement 6 – Prepare an Adjusted Trial Balance Adjusted TB Requirement 7 – Prepare the Financial Statements Financial Statements Requirement 8 – Prepare the Closing Entries Closing Entries Requirement 9 – Post Closing Entries to the General Ledger General Ledger Requirement 10 – Prepare the Post Closing Trial Balance Post Closing TB Hint for success: review the Week 2 Lecture prior to starting this project. There are......

Words: 622 - Pages: 3

Acct 504 Week 3 Case Study 1

...Accounting 504 Case Study 1 Case Solution Req.1 Journal | DATE | ACCOUNT TITLES | DEBIT | CREDIT | | | | | | June. | 2 | Cash | 55,000 | | | | Common Stock… | | 55,000 | | | | | | | 3 | Supplies… | 3,000 | | | | Equipment | 5,200 | | | | Accounts Payable… | | 8,200 | | | | | | | 4 | Cash…… | 6,300 | | | | Service Revenue… | | 6,300 | | | | | | | 7 | Land | 37,000 | | | | Cash… | | 37,000 | | | | | | | 11 | Accounts Receivable… | 1,200 | | | | Service Revenue | | 1,200 | | | | | | | 16 | Accounts Payable | 2,800 | | | | Cash | | 2,800 | | | | | | | 17 | Utilities Expense | 230 | | | | Cash… | | 230 | | | | | | | 18 | Cash… | 700 | | | | Accounts Receivable… | | 700 | | 22 | Utilities Expense | 400 | | | | Cash | | 400 | | | | | | | 29 | Cash | 5,000 | | | | Service Revenue | | 5,000 | | | | | | | 30 | Salary Expense | 4,300 | | | | Cash | | 4,300 | | | | | | | 30 | Dividends | 3,000 | | | | Cash | | 3,00 | Req. 2 Cash | | Accounts Receivable | Jun. 2 | 55,000 | Jun. 7 | 37,000 | | Jun. 11 | 1,200 | Jun. 18 | 700 | 4 | 6,300 | 16 |......

Words: 506 - Pages: 3

Cis 417 Week 3 Case Study 1 Btk

...CIS 417 WEEK 3 CASE STUDY 1 BTK To purchase this visit here: http://www.activitymode.com/product/cis-417-week-3-case-study-1-btk/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 3 CASE STUDY 1 BTK In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence. 2. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader. 3. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 3 Case Study 1 BTK in order to ace their studies. CIS 417 WEEK 3 CASE STUDY 1 BTK To purchase this visit here: http://www.activitymode.com/product/cis-417-week-3-case-study-1-btk/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 3 CASE STUDY 1 BTK In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering......

Words: 622 - Pages: 3

Hrm 517 Week 3 Case Study 1 Prioritizing Projects

...HRM 517 WEEK 3 CASE STUDY 1 PRIORITIZING PROJECTS To purchase this visit here: http://www.activitymode.com/product/hrm-517-week-3-case-study-1-prioritizing-projects/ Contact us at: SUPPORT@ACTIVITYMODE.COM HRM 517 WEEK 3 CASE STUDY 1 PRIORITIZING PROJECTS HRM 517 Week 3 Case Study 1 - Prioritizing Projects at D. D. Wil Read the case titled: “Prioritizing Projects at D. D. Williamson” found in Chapter 2. Write a 3-5 page paper in which you: 1. Critique the prioritizing process at D. D. Williamson. 2. Suggest at least one (1) recommendation to improve the prioritizing process. 3. Create a scenario where the implemented process at D. D. Williamson would not work. 4. Project five (5) years ahead and speculate whether or not D. D. Williamson will be using the same process. Justify your answer. 5. Use at least four (4) resources in this assignment. Your assignment must:  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  Activity mode aims to provide quality study notes and tutorials to the students of HRM 517 Week 3 Case Study 1 Prioritizing Projects......

Words: 255 - Pages: 2

Cis 502 Week 3 Case Study 1 Strayer Latest

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER LATEST To purchase this visit following link: http://coursehomework.com/product/cis-502-week-3-case-study-1-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER LATEST Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality......

Words: 463 - Pages: 2

Cis 502 Week 3 Case Study 1 Strayer New

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-3-case-study-1-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality resources...

Words: 867 - Pages: 4

Cis 502 Week 3 Case Study 1 Strayer New

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-3-case-study-1-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality resources...

Words: 1300 - Pages: 6

Cis 210 Week 3 Case Study 1 Strayer

...CIS 210 WEEK 3 CASE STUDY 1 STRAYER To purchase this visit following link: http://coursehomework.com/product/cis-210-week-3-case-study-1-strayer/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 210 WEEK 3 CASE STUDY 1 STRAYER Case Study 1: Building an Access Control System Due Week 3 and worth 50 points As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-spCIS 210 WEEK 3 CASE STUDY 1 STRAYER To......

Words: 835 - Pages: 4

Cis 417 Week 3 Case Study 1 Btk

...CIS 417 Week 3 Case Study 1 BTK http://homeworklance.com/downloads/cis-417-week-3-case-study-1-btk/ Case Study 1: BTK Due Week 3 and worth 60 points In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent. Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your...

Words: 353 - Pages: 2

Acct 504 Week 3 Case Study 1 Flower Landscaping Corporation

...ACCT 504 Week 3 Case Study 1 Flower Landscaping Corporation To Buy This material Click below link http://www.uoptutors.com/acct-504/acct-504-week-3-case-study-1-flower-landscaping-corporation The Entire Case Study is due Sunday at Midnight Mountain time at the end of Week 3. This Case Study is worth 100 points or 10% of your final course grade. This Case Study relates to TCO’s D and E and Chapters 3 and 4. MAKE SURE TO COMPLETE ALL REQUIREMENTS WHICH ARE LISTED BELOW. There are 10 Sheets in the Workbook including this one. All of the Information you need for the Project is located in this Workbook. Requirements Requirement 1 – Prepare the Journal Entries in the General Journal Requirement 2 – Post Journal Entries to the General Ledger Requirement 3 – Prepare a Trial Balance Requirement 4 – Prepare the Adjusting Entries Requirement 5 – Post Adjusting Entries to the General Ledger Requirement 6 – Prepare an Adjusted Trial Balance Requirement 7 – Prepare the Financial Statements Requirement 8 – Prepare the Closing Entries Requirement 9 – Post Closing Entries to the General Ledger Requirement 10 – Prepare the Post Closing Trial Balance Sheet in Workbook Journal Entries General Ledger Trial Balance Adjusting Entries General Ledger Adjusted TB Financial Statements Closing Entries General Ledger Post Closing TB Hint for success: review the Week 2 Lecture prior to starting this project. There are also hints contained within certain cells on some of the...

Words: 360 - Pages: 2

Abdeckplane Gewebeplane Industrieplane Schutzplane Bau Holz Garten Plane Ösen | El Sexo Opuesto | Watch movie