Operational : 5 to 9

ATTTACH ALL THE QUESTIONES IN A WORD DOCUMENT

IN TEXT CITATIONS MUST

APA FORMAT MUST

You must have at least one course and one non-course scholarly/peer reviewed source in your initial posting. 

——————————————————————————————————————————————————————————————————–

1.

 don’t select face book, apple, select small companies 

Discussion (5)

Note : Make sure the company selected are unique 

[ The mode of entry a company chooses to enter international markets depends on a variety of factors including the nature of the company’s strategic objectives. 

Select a well-known company that competes in the international markets.

What was the company’s mode of entry?

What was the entry designed to achieve?

Finally identify two advantages and two disadvantages to the entry mode chosen by the company.

Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Your initial response to the discussion question should be 250 words. 

You must have at least one course (our Thompson Text) and one non-course scholarly/peer reviewed source in your initial posting. 

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post. ] – 250 words

———————————————————————————————————————————————————————————————-

2.

Assignment (5)

 

[ Modes of entry into an international market are the channels which organizations employ to gain entry to a new international market.

Within our Thompson (2020) text, read Chapter 7 Assurance of Learning Exercise #2 related to Walgreens’ mode(s) international market entry and respond to the following questions:

  • What was Walgreens’ entry strategy designed to achieve?
  • Why would this make sense for a company like Walgreens?
  • Provide two recommendations on what Walgreens might do differently going forward with their entry strategy? Make sure you support your recommendations?
  • Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be 350 words.
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.] – 350 words

———————————————————————————————————————-

3. 

 dont select facebook, apple, select small companies 

Discussion (6)

NOTE: Make sure you choose a company that has not been selected unique.

[Select a company of your choosing. In the event the company has the opportunity to diversify into other products or businesses of your choosing, would you opt to pursue related diversification, unrelated diversification, or a combination of both?

 Explain why? 

Identify one pro and one con associated with your choice(s) of diversification.

 Incorporate our coursework (Thompson text and other material) from this week into your post analysis.

Instructions to write :

Your initial response to the discussion question should be 250 words. 

You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting.

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.] 

– 250 words

————————————————————————————————————————————————————————————————————-

4. Assignment (6)

 dont select facebook, apple, select small companies 

Related Diversification. Related Diversification is the most popular distinction between the different types of diversification and is made with regard to how close the field of diversification is to the field of the existing business activities.

 Related Diversification occurs when a company adds to or expands its existing line of production or markets.

For this assignment, consider your own company or one that you know well.

 Assume your company opted to pursue a strategy of related diversification and respond to the following questions. 

  • What industries or product categories could if diversify into that would allow it to achieve economies of scale?
  • Identify at least two or three such industries or product categories?
  • Describe the specific kinds of cost savings that might accrue from entry into each?
  • Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Submission Details/Instruction Details: 

  • Your analysis should be 350  words.
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.] 
  • – 350 words

——————————————————————————————————————————————————————————————

5.

 don’t select facebook, apple, select small companies 

Discussion 7

Research a recent ethics scandal using Danforth Library resources. Using our Thompson text and other course material around ethical considerations, discuss the following:

  1. Company background.
  2. Conditions that gave rise to the unethical business strategies and behavior.
  3. Overview of the costs to the company resulting from the company’s business ethics failure.
  4. Two ethical principle recommendations to put into practice and why.
  5. Again, incorporate our coursework (Thompson text and material) from this week into your initial post comments.

NOTE: Make sure you choose a company that has not been selected before

Your initial response to the discussion question should be 250 words. You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting. 

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.]

 – 250 words

—————————————————————————————————————————————————————————————————————

6.

 

Assignment (7)

[

 

Environmental sustainability is defined as responsible interaction with the environment to avoid depletion or degradation of natural resources and allow for long-term environmental quality. The practice of environmental sustainability helps to ensure that the needs of today’s population are met without jeopardizing the ability of future generations to meet their needs.

Within our Thompson text, read Chapter 9 Assurance of Learning Exercise #1 related to Dell.

Now, click on the website link provided in the learning exercise description from our Thompson text, which will provide you with information to respond to the following:

  • Prepare a list of 5 specific policies or programs that help Dell achieve its vision of driving social and environmental change while still remaining innovative and profitable.
  • Describe how Dell’s environmental sustainability strategies provide valuable social benefits?
  • Finally, explain how Dell’s strategies fulfill customer needs in a superior fashion while simultaneously sustaining competitive advantage?
  • Incorporate concepts from our coursework (Thompson text and other material) from this week into your above responses.

Submission Details: 

  • Your analysis should be 350 words.
  • Incorporate a minimum of at least one course and one non-course scholarly/peer reviewed source in your paper.
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.] – 350 words

——————————————————————————————————————————

 7.

 

Written Assignment #8: Facebook’s Career Page

[

Facebook, Inc. is an American online social media and social networking service company based in Menlo Park, California. It was founded by Mark Zuckerberg along with other fellow Harvard College students. As of the end of 2018, the number of Facebook employees reached 35,587 full-time staff. It is considered one of the Big Four technology companies along with Amazon, Apple, and Google.

From our Thompson text, read Chapter 10 Assurance of Learning Exercise #3 related to Facebook’s Career page and click on the website link to provide you with information to use in your response to the following:

  • How do Facebook’s internal management training programs integrate the traits and stated goals on the Careers page into specific and tangible construction of employee capabilities?
  • How does the internal training prepare Facebook employees of all types to “move fast and break things”?
  • Incorporate information from our coursework (Thompson text and other material) this week into your assignment analysis of the above.

Submission Details: 

  • Your analysis should be 350 words
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.

]

Total 350 words

 ——————————————————————————————————————————————————————————————————–

8.

 dont select facebook, apple, select small companies 

[

Week Eight Discussion: Decentralized vs Centralized Decision Making

How would you describe the organization of your company’s top-management team? Is some decision making decentralized and delegated to individual managers? If so, explain how the decentralization works. 

Or are decisions made more by consensus, with all co-managers having input? 

What do you see as the advantages and disadvantages of the decision-making approach your company is employing?  Be certain to incorporate our coursework (Thompson text and other material) from this week into your initial posting.

Your initial response to the discussion question should be 250  words. You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting.

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.

] – 250 words

 ——————————————————————————————————————————————————————————————————–

9.

 dont select facebook, apple, select small companies 

[

 Week Nine Discussion: Information Systems and Effective Strategy Execution

Company strategies cannot be executed well without a number of support systems to carry on business operations.

Using the Danforth Library resources, search for recent (five years) articles that discuss how a company has used real-time information systems to aid the cause of effective strategy execution.

  Explain their use of the information and how it relates to our coursework from this week. 

 Based on our readings (Thompson text and other material) from this week, what one enhancement or addition would you recommend the company make and why?

NOTE: Make sure you choose a company that has not been selected for the rest of the companies.

Your initial response to the discussion question should be 250 words. You must have at least one course and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.

] – 250 words

 ——————————————————————————————————————————————————————————————————–

10.

Written Assignment #9: Allocating Resources

A company’s strategic priorities must drive how capital allocations are made and the size of each unit’s operating budget.
Using the Danforth’s library resources search for recent (most recent five years) articles that discuss how a company has revised its pattern of resource allocation and divisional budgets to support new strategic initiatives.

 How do the revisions fit within the context of the material we have covered in our coursework (Thompson text and other material) from this week?

Submission Details: 

Your analysis should be 350 words .

Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  

All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced and proper in-text citations using APA guidelines.

]

– 350 words

Python coding help

  

Task 2

Given two lists, write python code to print “True” if the two lists have at least one common element. For example, x = [1,2,3], y=[3,4,5], then the program should print “True” since there is a common element 3.

Hint: 

We can first calculate set(x) – set(y). set(x) – set(y) is to remove the element in x that also exists in y (3 in this case). So set(x) – set(y) will be equal to (1,2), which is a set. And its length is 2 if you calculate len(set(x) – set(y)).

if set(x) – set(y) has a smaller length than set(x), i.e. len(set(x) – set(y))

This will get easier after we learn the iteration structure and the conditional statement in the next few weeks. 

case study

Learning Objectives and Outcomes

  • Examine IT infrastructure policies.
  • Describe IT infrastructure policies based on the scenario given.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.

Sean, your manager, was impressed with the work you did on User Domain policies. This time, Sean is asking you to write descriptions for policies that affect server, mainframe, and RSA user access. 

Assignment Requirements

Research policies for each affected IT infrastructure domain, and place them into a table with an introduction explaining the following questions: Who? What? When? Why? Be sure to add a conclusion with a rationale for your selections. Reference your research so your manager may add or refine this report before submission to senior management.

Required Resources

  • None

Submission Requirements

  • Format: Microsoft Word
  • Font: Times New Roman, 12-Point, Double-Space
  • Length: 1–2 pages

Business Intelligence

  

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 1

Discussion 1) Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise Q) Find information about IBM Watson’s activities in the healthcare field. Write a report.

Chapter 2

Discussion 1) Discuss the difficulties in measuring the intelligence of machines.

Exercise Q4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.

server networking

  

# 1

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Describe each of the DNS zone types that are available in Windows Server 2016. Explain why you would use each type of zone. For example, when would you use a Standard Zone versus an Active Directory Integrated Zone? Make sure you include Stub Zones in your answer. Also, include in your answer methods for securing and protecting DNS servers  and clients.

# 2

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Compare and Contrast IPv4 and IPv6. Find examples of companies who are currently using IPv6. What are some of the benefits of using IPv6 over IPv4 and vise versa.

#3

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

One of the most important concepts is all of networking is NAT. What is NAT? How does it affect web log files? What are some ways that you can view your public IP Address? Discuss the IP Addresses that are not routable. Describe the LAN and WAN addresses on your system, using tools like ipconfig and www.ipchicken.com.

#4

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

What types of things would you suggest to a manager be included in a Network Access Policy? Should users be allowed to bring their own equipment? Can users connect to the company’s network? Can users do personal work on company issued equipment? Find an example policy that a company has and indicate whether you agree with the policy.

# 5

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

This week we discussed Fault Tolerance. The Distributed File System is only one example of Fault Tolerance. Find some other technologies from Microsoft or other vendors that help protect data. End your discussion with justifying to your manager why the company can benefit from such a (likely expensive) purchase. What is the cost and can you justify it?

#6

A minimum of 200 words is required, and they must be your own words.  Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

You will have a fairly large project on SOFTWARE-DEFINED NETWORKING in your 495 capstone. Here is a chance to get some background and understanding of the topic. Your manager has asked you, one of her most technical employees, to make a presentation to your co-workers on SOFTWARE-DEFINED NETWORKING. Explain what it is, what the advantages are, and how it can benefit your company.

Linked Inventory Management

 CS 2336 PROJECT 3 – Linked Inventory Management Project Due: 11/04 by 11:59 PM KEY ITEMS: Key items are marked in red. Failure to include or complete key items will incur additional deductions as noted beside the item. Submission: • The file containing main must be named Main.java. (-5 points) • The project files must be in packages that start with LinkedInventoryManagement.* (-5 points) • All project deliverables are to be submitted in eLearning until further notice o Zip the contents of the src directory into a single zipped file o Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.) (-5 points) o Add your project’s presentation link in the comments section in eLearning • Programs must compile and run with Java SE 13. • Each student is responsible for developing unit test cases to ensure their program works as expected. • Type your name and netID in the comments at the top of all files submitted. (-5 points) Objectives: • Create a modular code solution with multi-packages • Use the Singleton pattern to create and manage the Scanner object • Create and manipulate a multi-directional LinkedList in Java • Use Java Generics to create generic classes and methods • Implement and use the Comparable interface Problem: A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes to the description of a menu item without having to change the code. Security: The company has suggested to start the application by asking the user for a username and password to ensure that the user is authorized to access the application. There are two types of users at this company, managers and employees. If managers log on to the application, they will see all options on the menu list. If employees log on to the application, they will see a limited set of options on the menu list. User information is stored in Users.dat file, which may or may not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creation of other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not. The file is comma separated and it is formatted as follows: Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, true Sam,, sone, 2c2a293a18a48e3e12058c536ed8facc, false Jane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, false Application Menu: The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. The file may contain duplicate menu items. Your program should detect this by checking the command name as a key to compare menu items and prevent showing duplicates in the menu. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file. Below is a sample of how the MenuList.dat file looks like: Add User, true, AddUserCommand Delete User, true, DeleteUserCommand Change Password, false, ChangePasswordCommand Add New Product, true, AddProductCommand *Note: The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example). Inventory: The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int) and margin (int, integer that represents margin percentage). Your program must prevent the user from inserting duplicate products by checking existing products using the product name (ignore case) as a comparison key. The Inventory.dat file is comma separated and formatted as follows: 3424, Smart Watch, 20.45, 23, 80 65454, Flat Screen TV, 465.98, 15, 35 435, Computer Monitor, 123.54, 84, 43 Data Structure: The MenuList and ProductCatalog classes must use a custom LinkedList that you will create instead of using an ArrayList. The nodes in this list must be multi-directional to facilitate moving from current node to next node and from current node to previous node if needed. This custom linked list must be named InventoryLinkedList, must be generic, and must contain at least the following methods: – public InventoryLinkedList(E[] elements) //Constructor – public E GetFirst() //Get the first element in the list – public E GetLast() //Get the last element in the list – public void Insert(int index, E element) //Inserts element e at the specified index – public E Remove(int index) //Remove the element at the specified index – public String toString() //Return formatted elements information – public boolean Contains(E element) //Check if list contains the element – public E SetElement(int index, E element) //Set the element at the specified index – public E GetElement(int index) //Get the element at the specified index – public Integer GetLength() //Returns the number of elements in the list Output Format: Enter username: some username Enter password: some password //Repeat prompts until user is authenticated OR show error and option to exit. Invalid username or password! Press enter to continue or “Exit” to exit: Enter username: some username Enter password: some password Welcome Firstname LastName! Inventory Management System Menu //This is the header of the MenuList // The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file. 1- Add user 2- Remove user 3- Change password 4- Add new product 5- Update product information 6- Delete product 7- Display product information 8- Display inventory 9- Exit Enter your selection: 7 Enter product name: sMaRt wAtCh Id Name Cost Quantity Retail ———————————————————— 3424 Smart Watch $20.45 23 $36.81 Type “Next” or “Previous” to display next/previous product, press enter to return: next Id Name Cost Quantity Retail ———————————————————— 65454 Flat Screen TV $465.98 15 $629.07 Type “Next” or “Previous” to display next/previous product, press enter to return: next End of products list… //Displayed if no more products in the list Type “Next” or “Previous” to display next/previous product, press enter to return: //Enter //Repeat the menu after each command is executed.

Security Architecture & design

Length:  Minimum of 600 words

Simply, no plagiarism

Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment:

residency paper

  

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. Remember to use APA formatted headings for each section of the paper and provided in text citations of the sources you use. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not.  Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research.

Course writing requirements:

· References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

· Always include a cover page and reference page with ALL submissions (even initial discussion posts)

· Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources

· No abbreviations, no contractions – write formally

· Write in the third person formal voice (no first or second person pronouns)

· Write MORE than the minimum requirement of the word count assigned

· As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

· Indent the first line of each new paragraph five spaces

· Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

· Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

portfolio project (information governance)

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.

· Week 6 – Develop a full annotated bibliography (2-3 pages).  25 pts.

· Week 12 – Develop the literature review (2-3 pages). 25 pts.

· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.