After reading the following Brookings article, answer the fo…

After reading the following Brookings article, answer the following questions: Reaping the benefits of the AfCFTA: Strengthening transport services and infrastructure for growth 1. This regional trade agreement is set to cover more than 1.5 billion people and a combined GDP of over $10 trillion dollars. The goal is to reduce tariffs and non-tariff trade barriers. According to the article, by 2035, FDI has the potential to increase more than percent as well as lift over 30 million people out of poverty. 2. Infrastructure within Africa remains a huge obstacle, particularly since about 600 million lack access to . One of the solutions offered in the article is to increase the tax to GDP ratio on the continent, which is about the global average. 3. The article suggests that currently more than 3/4 of Africa’s freight moves over road. The article suggests that to increase trade in the future, more goods will need to move via . 

Watch or remember what you saw in this video, Globalization…

Watch or remember what you saw in this video, Globalization I – The Upside: Crash Course World History #41, which was shared with you prior to the final and at the beginning of the semester. This video uses a t-shirt to explore global trade and One of the main points of the video is that the scale of global trade has grown dramatically in part because has/have become cheaper, more time efficient, and safer. The video suggests that the US govt. subsidizes more of our but not so much , which results in production happening in many Global South (developing) countries that is geared mostly towards markets. While suggesting that over the past 30 years, globalization has moved more people poverty, the video also asks if the costs involved include negative impacts on the and . is happening in greater numbers than ever before, leading to .

You work for a company that is having issues where many empl…

You work for a company that is having issues where many employees use passwords that are too weak. Your task is to help by writing a program that reads a list of employee passwords from a file and checks how strong they are. The program will: – read passwords from a text file (you can assume the input passwords.txt file is not erroneous) – use a function to check if a password conforms to the official company rules – write an analysis.txt back to disk with the password and whether or not it was OK Use only the features we’ve covered in this course: from the first 7 chapters.  Use exception handling for file input / output by including a try – except block.  You can check for more than one exception if you wish, but a generic Exception check should be made at a minimum. Functions to be coded in addition to a main() function: Tip:  Don’t try to do all these at once, I suggest getting the contents of the passwords.txt read in first, then print it to confirm you can access each password. Then, move ahead with the other tasks. 1. read_passwords() – takes a file name string  and returns a list of string; you’ll need to connect to the file name passed, read the list in line by line and return the list (each line holds one employee password).  2. satisfies_policy() – takes a password string, pword, and returns a true if pass has the following characteristics; false otherwise.  If you can’t remember how to do one of these checks do the ones you know how to do. a) pword must be a length of at least 8 b) pword must contain exactly three $ or three # characters c) pword must contain at least 1 number 3. write_report() – takes a output_file_name string a list of passwords and returns nothing; the function should create a file connection via open() to the output_file_name, iterate over each line of the file (each line will be a password), then you’ll call your satisfies_policy() function on that password to determine if it’s strong enough or not.  – If the password is OK, you’ll write to the file the password followed by the string “(OK)” – If the password is not OK as determined by your satisfies_policy() function, then you’ll write to the file the password followed by an “(X)” — meaning it violates company policy; see below for a model output examples. Don’t forget that you’ll need to put a new line escape character of “\n” (without the quotes) after each line that you write to the file. Here’s pseudocode for the main() function: main:      call the read_passwords(“passwords.txt”) function             (save the list of passwords read_passwords() returns into a variable)      call the write_report(“analysis.txt”, list-of-read-passwords saved from the above call) When done, the analysis.txt file will contain each password and its status, such as the following where (X) is a bad password and (OK) is a good password: WeakPass (X) WeakPass1## (X) Strong$Pass1## (OK) short1## (X) NoDigits### (X) 1234567$$$ (OK) abc123$$$ (OK) Pa$$$w0rd (OK) Cash###123 (OK) mix#of$chars#9 (OK) #####999 (OK) lettersONLY (X) ###7$abc (OK) You should create passwords.txt (the input file for this assignment) using the below list.  Simply copy / paste this list into passwords.txt and then access it using your read_passwords() function. WeakPass WeakPass1## Strong$Pass1## short1## NoDigits### 1234567$$$ abc123$$$ Pa$$$w0rd Cash###123 mix#of$chars#9 #####999 lettersONLY ###7$abc

Discussion Question: Summit Corp., a leading U.S. consumer p…

Discussion Question: Summit Corp., a leading U.S. consumer products company, has set the strategic growth direction by expanding its market coverage to include highly populated countries in Asia with China and India being the top two targets.  The top executives at Summit Corp. have also recognized this growth strategy while promising with high growth potentials, there are quite high variations in demand characteristics, consumption patterns, cultural aspects, and legal systems among those countries. The top executives at Summit Corp. are committed to this strategic direction and seek a recommendation from you regarding how Summit Corp. should be organized in implementing its growth strategy.  What type of organizational structure and control you would recommend to Summit Corp’s top executives? Why?

One of the steps in manufacturing metal clamps involves dril…

One of the steps in manufacturing metal clamps involves drilling holes. In an attempt to monitor efficiency of the manufacturing process, the time for the drilling step was gathered for a random sample of 25 clamps. In the sample of 25 clamps, the mean time for this drilling step turned out to be 50 seconds with a standard deviation 10 seconds.  99% confidence interval for true mean time for the drilling step in this manufacturing process is

Character as Social Critique – Choose one major character fr…

Character as Social Critique – Choose one major character from The Importance of Being Earnest and explain how Wilde uses that character to critique Victorian society.In your response, analyze how the character reflects or exaggerates social values and explain the broader message Wilde communicates through them. 

Store manager of a retail store collects information about p…

Store manager of a retail store collects information about people who use the store’s mobile app to find discounts while they are shopping. Based on his survey, a 90% confidence interval for the true proportion of customers who use the app while they are shopping is from 0.54 to 0.58. What is the 90% confidence interval for the true proportion of those who DO NOT use the mobile app to find discounts while they are shopping.