Wednesday, December 11, 2019

Cash Flow Statement of Walmart-Free-Samples-Myassignmenthelp.com

Question: Using Walmarts Consolidated Statement of Cash Flows for the years 2016 and 2017, analyze the cash flow statements. In your analysis discuss where cash was generated and where it was used, as well as the resultant ramifications to the company. Answer: Analysis of the Consolidated Cash Flow Statement of Walmart for the years 2016 and 2017 The cash flow statement discloses the information about the cash receipts of Walmart and the payment of cash during the accounting time period and provides cash connects with the closing cash balance to the initial cash balance that has been disclosed in the financial position statement of the firm (Martnez et al., 2017). The cash flow statement comprises of three parts that includes the cash flows provided in the operating activities, cash flows given in the investing activities and the cash flows given in the financial activities. The net cash that has been exploited from all the operating activities of Walmart are inclusive of the discontinued activities of the reporting article. The operational activities are usually inclusive of delivering and producing goods and providing services. The operational activity cash flows even includes adjustments, transformations in the value and transactions that are not explained in the financing and the investing activities (Boyas, Teeter 2017). The net cash was created from the consolidated net income and this has been discovered to be the income from the sustainable operations. This cash has been used for the purpose of paying the income tax that has been accrued, accounts payable, inventories, depreciations and the deferred income tax. The cash flow statement provides the adjustments from the reconcile income from the sustaining operations to the net cash provided by the operational activities (Zentes et al., 2017). The net cash that is generated from the operating activities has been used for the purpose of payment of property and equipment, business acquisitions and investments and other investing activities. The other expenses that has to be paid off includes the payment of dividend, purchase of the stocks of the firm long term debt payment, and the net changes in the borrowings that are long term in nature. There are various other income as well that includes the proceeds from the issuance of the long term debt, proceeds from the disposal of the property and the equipment and proceeds from the disposal of various operations. The net cash rise or fall i n the cash equivalents and cash is adjusted with the cash equivalent that was available during the beginning of the year in order to find out the cash equivalent and the cash that would be presented in the end of the year. The assessment of the cash flow statement for the years 2016 and 2017 explains that net cash of Walmart from the operational activities has increased from 2016 to 2017 which has exceeded from 2015 (Wal-Mart Stores Inc. (WMT) | Statement of Cash Flows 2017). The net cash that has been used in the investing activities has even increased from 2016 to 2017 and there has been significant rise in the net cash used in the financial activities from 2016 to 2017 for Walmart as well. This explains that along with the rise in the net cash provided by the operating activities, the net cash used for the investing and financing activities has increased as well and therefore the cash at the end of the year has fallen significantly in 2017 from 2016. The cash equivalent for Walma rt at the end of 2017 has been lower than the last two years explaining that the operational activities of the company has increased and therefore there has been a rise in the cost associated with the production and delivering of services and goods (Wal-Mart Stores Inc. (WMT) | Statement of Cash Flows 2017). The following reveals the financial ratio of Walmart for the year 2016 and 2017 and it has been observed that all the ratios excepting the financial leverage has increased significantly from 2016 to 2017. This explains that the operational activity of Walmart has improved for the past few year and the company has been gaining significant level of profit Particulars Year 2017 Year 2016 Current ratio 0.93 0.86 Quick Ratio 0.22 0.19 Financial Leverage 2.48 2.56 Debt to equity 0.55 0.54 Reference List Boyas, E., Teeter, R. (2017). Teaching Financial Ratio Analysis using XBRL.Developments in Business Simulation and Experiential Learning,44(1). Martnez, A. B., Galvn, R. S., Alam, S. (2017). Financial Analysis of Retail Business Organization: A Case of Wal-Mart Stores, Inc.Nile Journal of Business and Economics,3(5), 67-89. Wal-Mart Stores Inc. (WMT) | Statement of Cash Flows. (2017). Stock Analysis on Net. Retrieved 11 December 2017, from https://www.stock-analysis-on.net/NYSE/Company/Wal-Mart-Stores-Inc/Financial-Statement/Statement-of-Cash-Flows Zentes, J., Morschett, D., Schramm-Klein, H. (2017). Monitoring Operational and Financial Performance. InStrategic Retail Management(pp. 441-461). Springer Fachmedien Wiesbaden.

Wednesday, December 4, 2019

Variation in Privacy and Confidentiality Concept

Question: Discuss the variation in privacy and confidentiality concept. Answer: Introduction In health care areas, ethics are considered to be the most important part of the patients care. The practices of the various paramedical staff reflect the value of ethics, as well as, moral parameters that are being valued during the provision of compassionate care to the patient. Currently the concept and idea of confidentiality are under high debate in the health care settings. The concept of confidentiality ponders that whether the private information of the patient should be kept confidential or can be shared among various medical, as well as, paramedical staff for better health care provision, improved quality, as well as, for audit or research purposes. Ethical health research, as well as, privacy protections both can provide valuable advantages to the society. Research with respect to health is vital to the improvement of the human health, as well as, the health care. Moreover, protecting patients that are involved in the process of research from harm, as well as, preserving t heir rights is very important to ethical research (Maliapen, 2009). The foremost justification in the protection of the personal privacy is related to the protection of the interests of concerned individuals. While in contrary, the primary justification related to the collection of the personal identifiable health information used in the health research is beneficial to the society. But it is very necessary that no information about the patient or individual should be used in any activity without his/her prior consent and we should respect the privacy and confidentiality of every individual irrespective of caste, color, creed, as well as, social or economic status (Magnusson, 2010). Variation in privacy and confidentiality concept Initially, using names, taking samples, as well as, using them for future research without the consent of the individual was not considered to be the part of the breaching any confidentiality. These parameters were used and were considered that they did not violate any kind of legal standards related to the health care settings. However, there are changes in the rules and they all have changed since then, as well as, they all are still changing (Willison, 2000). As per the National Institutes of Health, there are recent modifications in the requirements for consent that should be kept in mind prior to use of tissues, as well as, all the related medical data, personal information to be used in the research. In the present times, one of the important fundamental principles used in the work of clinical research and care is respect for individuals. Privacy and confidentiality, nowadays, are considered to be the most important part in the health care setting (Serour, 2006). In the past, there were no such adoption of regulations, as well as, the ethical guidelines that were used and followed for biomedical research. However, today, in the present times, there is generally the requirements which the researchers have to obtain which includes the voluntary, as well as, informed consent from the concerned individuals before carrying out or using any kind of personal information in the biomedical experiments and research (Laurie, 2001). There has been significant development of the ethical, as well as, legal governance in relation to the ones privacy and confidentiality in the present times. Any kind of breach in these laws is an offense and necessary steps are undertaken in that case. For instance, there is a development of the Nuremburg Code that advocates for informed, voluntary participation, as well as, consent of the individual in the medical research. Moreover, the passage of the Health Insurance Portability and Accountability Act and its federal regu lations was prompted to ensure privacy, as well as, protection of all the personal data and records in an environment of maintaining the electronic medical records, as well as, third-party insurance bodies (Murray, Calhoun, Philipsen, 2011). Patient confidentiality, nowadays, is considered to be the important part of the health care system and it means that all the personal, as well as, the medical information provided to the health care practitioner and other concerned staff members will not be leaked or disclosed to others without the prior consent and specific permission that is given by the individual such release. As the disclosure of any kind of personal information may cause personal or professional problems, patients completely rely on their physicians to keep all of their medical data and information private. However, it is very rare for keeping all the medical records completely sealed ("Patient Privacy and Mental Health Care in the Rural Setting", 2011). The most common and benign breach related to the privacy and confidentiality occurs when clinicians used to share the medical information of the individuals as case studies. The data shared by the physicians is when published in different professional journals it is made sure that the identity of the concerned individual is never divulged, and moreover, all the identifying data and elements is either changed or eliminated. If this confidentiality and privacy are breached in terms of any parameters, the individuals have the right to sue. Hence, if this case could have occurred in present times, the individual and her family have the right to file the case against the researchers for using her name without her prior permission or consent. At that time, consent or permission was neither important and required nor was sought customarily. However, at present times, the use of identifiable elements such as the name, address of the individual are considered to breach the confidentiality and privacy of the individual and is a punishable offense (Loebel, 2003). Though in the previous times, the consent and permission was not required and did not violate any kind of legal regulations, these kind of acts in the present times is considered to be a breach. The new international standard of editorial policy makes it necessary to have a written informed consent provided by the subject involved in every case report. New federal policies related to the privacy and confidentiality of the patients have been imposed that gives the right to the patient over their privacy and confidentiality. If this case could have happened in the present times, the civil or criminal penalties could be imposed on the concerned authors for using the name and hence creating the privacy violation. These rules and regulations became enforceable in the year 2003 and any such kind of violations or breaches is liable to the penalty that can include the fine or the imprisonment or both depending on the criticality of the violation. The recent imposition of these rules and regulations related to the patients confidentiality is aimed at maintaining the privacy of the individual and to avoid any kind of breaches. Hence, direct authorization must be gained from the individual prior the release of the information that has been used. Any breach that affects the privacy of the patient is a punishable offense under the new sets of rules and regulations (Francis Francis, 2014). Like in this case, as there is breach regarding personal information, the concerned individual or family members can undergo the disciplinary proceedings with the GMC, criminal proceedings, or the civil proceedings. Hence, in the present times, breaching confidentiality and privacy fail to respect the autonomy of the patient. Moreover, the violation of confidentiality of the patient is the form of betrayal. Therefore, patients have the right to privacy, as well as, confidentiality that has recently been changed and frequently been demonstrated i n the specific areas as per the common law, as well as, outlined in the statute law. This kind of breaches was not considered to be violations of any legal laws and hence, were not liable to any penalty or punishments. However, changes in the federal laws and regulations have given the right to the patient, which in turn promotes the maintenance of the privacy and confidentiality of the individual (Foster, 2014). Conclusion Privacy, as well as, confidentiality, is basic rights of the individuals in our society. The safeguarding of those rights, regarding to the individuals personal data and health information, is the ethical, as well as, the legal obligation that should be followed by the health care providers. Nowadays, there occurs a widespread agreement related to the interests of participants regarding the protection of their privacy, as well as, the corresponding duties of all the researchers meet these standards and to treat the subjects personal information and data in a confidential way. Indeed, the confidentiality and respect for the privacy of the individual in the research is an ethical standard and norm, which is internationally recognized (Martin, 2001). Failure to comply with these rules and regulations related to the safeguarding of the ones privacy and confidentiality can result in civil, as well as, criminal penalties. Though these kind of information was not considered to get the conse nt of the concerned individual in the past, but in the present times it is considered as the important part to get the prior consent of the subject involved in the case studies or articles. Any kind of violations and breaches related to these are liable to the penalties depending upon the nature, as well as, the extent of the breach or violation ("Confidentiality of patient care records and a patient's rights to medical privacy," 2006). References Confidentiality of patient care records and a patient's rights to medical privacy. (2006).Mdecine Droit,2006, 25-27. Foster, S. (2014). Confidentiality and Patients Rights.IJMHCL, (7), 229. Francis, J. Francis, L. (2014). Privacy, Confidentiality, and Justice.J Soc Philos,45(3), 408-431. Laurie, G. (2001). Challenging Medical-Legal Norms: The Role Of Autonomy, Confidentiality, And Privacy In Protecting Individual And Familial Group Rights In Genetic Information.Journal Of Legal Medicine,22(1), 1-54. Loebel, J. (2003). Privacy and Confidentiality in Mental Health Care.Journal Of Psychosomatic Research,55(2), 107. Magnusson, R. (2010). Privacy, confidentiality and HIV/AIDS health care.Australian Journal Of Public Health,18(1), 51-58. Maliapen, M. (2009). Clinical Genomics Data Use: Protecting Patients Privacy Rights.Studies In Ethics, Law, And Technology,3(1). Martin, J. (2001). Confidentiality in primary care.Primary Health Care,11(1), 14-16. Murray, T., Calhoun, M., Philipsen, N. (2011). Privacy, Confidentiality, HIPAA, and HITECH: Implications for the Health Care Practitioner.The Journal For Nurse Practitioners,7(9), 747-752. Patient Privacy and Mental Health Care in the Rural Setting. (2011).Virtual Mentor,13(5), 282-286. Serour, G. (2006). Confidentiality, privacy and security of patients' health care information.International Journal Of Gynecology Obstetrics,93(2), 184-186. Willison, D. (2000). Counterpoint. Privacy and confidentiality concerns - are we up to the challenge?.International Journal For Quality In Health Care,12(1), 7-9.

Sunday, November 24, 2019

5 Ways to Stand Out In Any Interview

5 Ways to Stand Out In Any Interview Remember, you’re almost never the only person being interviewed for the job. The hiring manager doesn’t know how special and talented you are or what a good fit you’d be unless you show her. And remember, you’re not the only one trying to prove yourself. Here are 5 tips to make sure you give the best first impression possible.Dress for the Career You WantMost new interviewees fidget constantly, tugging at their ill-fitting business-wear. This is immediately distracting and will have an impact on your confidence- and the interviewer’s confidence in you. Get yourself a good suit that fits you and your style. If you think you look good, you’ll be able to relax and be yourself and focus on selling your abilities. Dress for the career you want, not necessarily the entry-level job you’re applying for!RELATED:Â  12 HUGE Job Interview Mistakes to AvoidResearch Every Detail About the JobSo many new interviewees come in blind, expecting to lear n everything they need to know about the job from the hiring manager. This does not inspire confidence in your abilities or initiative. Instead, make sure you research every detail that you can- about the company and especially about the position. That way, you can prepare to discuss how your particular background and prior experience make you the most excellent choice. Who knows, those years of babysitting or waiting tables might actually be excellent out-of-the-box qualifications that will help you stand out from the pack.Impress Hiring Manager with Your Social SkillsDon’t be a creeper, but it it’s not a bad idea to look around your interviewer’s office for little clues about their interests or hobbies. Maybe they’ve got a diploma from your alma mater- look for anything you an use to find some common ground. Just be sure they’re using their own office and you don’t end up complimenting someone else’s children!Be Smart about the Job You Are Interviewing ForWe’ve all been at the interview that feels like a coffee date. You yammer on for half an hour, but you hardly speak about the job. This can be a sign of good chemistry, but it can also be a trap. Some interviewers might be testing you to see whether you can keep control of the conversation. Try (politely!) steering things back to your eagerness to explain why exactly you’re the best fit for the position. You’ll be surprised how few of your peers are prepared to do the same.Prepare, prepare and prepareSo many young interviewees speak in one word or one sentence answers. Prepare a few example answers to questions you’re likely to be asked. Don’t turn your answers into a speech, but make sure that with every one, you’re demonstrating your intelligence and acuity and your suitability for the job. When in doubt, read your interviewer’s body language for signs of interest or boredom, and adjust accordingly.

Thursday, November 21, 2019

Radio report about jazz Essay Example | Topics and Well Written Essays - 750 words

Radio report about jazz - Essay Example The instruments played during their Live concert in Belgium in 1958 included trumpet, saxophone, piano, drums and Bass guitars. The concert starts with drums by Art Blakey followed by the rest of the band blowing their saxophones and playing their pianos. The song is classified under cool jazz characterized by hard and fast sound similar to that of Bebop. Such music was popularized by Lester Young between the 1940s and 1960s (Goldersher 83). However, the roles played by instruments differed significantly. For example, drums were accompanied by sticks while walking bass was complimented by Art Blakey in assistance with Lee. The piano was meant to raise the tempo of the cool flow of the song. This is unlike achieving neutrality of sounds through the hard and fast sounds of the drums and saxophone. Moanin’ is also a jazz piece done by Art Blakey & The Jazz Messengers. It was performed in 1958 in the famous Belgium concert. Musicians in the entourage included Bobby Timmons, Benny Golson, Lee Morgan and Jymie Merritt. Instruments, on the other hand, entailed piano, bass guitars, tenor saxophone and trumpet. Moanin’ is a fusion of swing and Hard Bop. Swing was popularized by Duke Ellington because of several band members as noted in Moanin’. ... Art Blakey & The Jazz Messengers performed ‘I Remember Clifford’ in Belgium in 1953 as part 3 of their ongoing concert. The musicians present were Lee Morgan, Jymie Merritt, Benny Golson, and Bobby Timmons. Instruments included pianos, bass guitars, tenor saxophones, mallet drums and trumpets. Use of instruments in this piece was both distinct and significant in projecting the message in the song. The piece being a mixture of Bebop and Modern Jazz because of sentimental beats used piano to match its beats. Alternatively, bass was applied to increase the vocals of other musicians in the band (Goldersher 87). Conversely, decision by Lee not to sing the song and instead concentrate on the mallet drums gave the piece its modern jazz combination. Horn players, on the other hand, infused beats in between breaks to help the tenor in the saxophone. A Night in Tunisia was another thrilling performance of 1958 in Belgium by The Jazz Messengers and was written by Frank Paparelli an d Dizzy Gillespie. Others artists who performed the song include Jymie Merritt, Benny Golson, Art Blakey, Bobby Timmons and Lee Morgan. Instruments comprised of tenor saxophone, bass, piano, drums and trumpet. However, being Afro-Cuban jazz style, the piece had a fusion of African beats similar to soul music with a modal harmony. It has also a minimal influence of the Bossa Nova genre popular in Brazil and also known as West Coast Jazz. The pianist uses low sounds with muted vocals of the trumpeter to produce looping beats with funk feel (Goldersher 82). Bassists and saxophonists, on the other hand, play their miscellaneous percussion instruments to compliment the ride pattern of the piece. However, Lee Morgan is the most appealing soloist in the group because of his

Wednesday, November 20, 2019

Context paper English 105 Essay Example | Topics and Well Written Essays - 500 words

Context paper English 105 - Essay Example Ryves Hall has proved to be a second home for children of all ages in the Terre Haute locality, regardless of race or money. They serve children from ages three to seventeen and all their programs are age related, appropriately designed to benefit the children. Ryves Hall has been offering service to any children who walk in. All the activities provided by the institutions are free for the children. Their primary mission is to assist children and families in Terra haute, which is one of the most impoverished areas in the locality. They serve children who lack educational facilities, unemployment, hunger and poverty. It is the beacon of hope for many young Americans who are deprived of basic necessities in life. Most of the children who attended Ryves can be put under â€Å"at- risk youth â€Å"as they come from single parent, below poverty line and children who do not have anyone to turn to. â€Å"Students from lower socio-economic status are often denied the same luxuries that other students take for granted. These individuals often live in a single parent homes where the mother is the sole financial provider, disciplinarian and caregiver and may face issues such as hunger, live infestations, lack of hot water and inadequate attention† (Miller). Ryves Hall takes care of these children who lack the normal home upbringing. The children who are under their wings are between three and seventeen. Half of them come from minority population. Their main aim is to give them a second chance in life and to bring them up in the best possible way. Living in a home where basic needs as well as guidance are not available can have a negative impact on the children. Ryes Hall acts as their mentor and guides them to be respectable citizens in the society. Most of the children in Ryes Hall display problems associated with having to grow up too early due to lack of proper guidance at home. Many of them have experienced substance abuse, physical abuse, sexual abuse and low

Sunday, November 17, 2019

Research Findings, Statistical Analysis and interpretation for Essay

Research Findings, Statistical Analysis and interpretation for Etisalat Telecom Corporation - Essay Example The developed or developing world countries are the major victims affected by the dynamics of the demographic splits. The main concerns relating to the identification of the developing and developed countries gets connected from the populace records (Lovie, 2005). The median age, raises the majority of populace in developed countries, whereas median age falls in developing countries therefore affecting the demographic splits of financial busting by a great percentage. Therefore, the median age in developed and developing countries need analyzation with great concern to the dynamics that they create in business financial status particularly the effects of demographic splits that they establish from their populace. Companies must come up with new product portfolios to meet the need of these new growing demographic needs established by the median age both in developed and developing world countries. The new products will establish new markets that meet the customers’ tastes and p references in the demographic splits. Identification of the new products concerns the median age in the developing and developed world countries. Additionally, companies must develop new methods of marketing messages and the method of packaging. The packaging of Old consumers should be one that is easier to open compared to the packaging of new consumers. Eventually, quick reactions to these changes in the demographics can bring significant growths in different companies that create greater opportunities for expansion and profit development (Lovie, 2005). Independent T-Test Independent T-test using SPSS compares the relation between two groups connected in any way but are on the same progressive, dependant variable. Independent t-test has two variables, the dependent variable and independent variable, manipulated in different ways to come up with variables that determine the independent t-test. Besides, ones data must meet certain assumptions to come up with comprehensive independen t t-test results. The assumptions establish valid t-test results using your data. According to Lovie, using an independent t-test, one of the major processes involves checking analyzed data if it actually uses an independent t-test. The main reason for checking is to be sure and appropriate that the independent t-test data passes the required six assumptions required an independent t-test to give valid and reliable results. The six assumptions determine the validity of independent t-test results by adding a little more time to the analysis. It requires checking and using keys in SPSS while performing the analysis as well establishing more ideas and thoughts about your data. When analyzing the data some of these assumptions are violated despite the fact all the six assumptions are valid and used in when analyzing data of the independent t-test. This is mostly common when working with data that is real rather than data found in the textbooks. Using the real world data, allows for the use of data that often shows you how to handle out an independent t-test when everything concerning the anayzation of the data goes in a professional way. In contrast, when the data fails to meet all the assumptions there is still a solution to overcome all this. The six assumptions that are considered in the independent t