Saturday, December 28, 2019

Donald Trump And Hillary Clinton - 957 Words

Donald Trump and Hillary Clinton are two possible contenders to represent their political parties in the upcoming presidential elections in 2016. After several GOP/Democratic debates, Trump and Clinton have firmly addressed their immigration reform plans, which greatly contrast with one another. Before running for the presidency, Donald Trump was, and still is, a business magnate. His immigration reform focuses on three fundamental principles in order to â€Å"make America great again.† Firstly, Trump believes a nation without a border is simply not a nation, which is a key principle, central to his campaign. Secondly, Trump states that â€Å"A nation without laws is not a nation.† Consequently, he is determined to strictly enforce both old and new laws made during his presidency. Lastly, Trump believes that a nation must first prioritize its citizens, in terms of employment, wages and safety (Trump, 2015). To enforce his first principle, Donald Trump plans to construct a wall along the southern border in between the U.S. and Mexico, which he guarantees the Mexican government will be fully financially responsible for. He strongly believes that the U.S. taxpayers have been directly affected by this situation in terms of increased health care, housing and education costs etc. which are caused by the transfer of crime and poverty that comes with illegal immigration from Mexico (Trump, 2015). Although as a senator, Clinton voted several times to construct a barrier with the intent ofShow MoreRelatedAnalysis Of Donald Trump And Hillary Clinton Essay1246 Words   |  5 PagesPresidencial Paper This years presidential candidates have proven themselves to be some very unique nominees from all parties. Donald Trump and Hillary Clinton have been called the two most unfavorable candidates ever to have made it through the primaries. The media shares many of the views of the nominees with the public but some are distorted by the media and not really their views. Some of the more important issues for a christian this election include the faith and morals of each candidate andRead MoreComparing Hillary Clinton And Donald Trump Essay1647 Words   |  7 PagesAmerican presidential elections there has never been an election that is being dread this much. The choices for the election are Hillary Clinton and Donald Trump. Hillary Clinton has spent years in politics, and has held both the position Secretary of State and First Lady. She is well known for the federal investigation into her and the corruption of the Clinton Foundation. Trump on the other hand, is a very successful business man and is worth billions. He has never been in politics and it shows when heRead MoreAnalysis Of Donald Trump And Hillary Clinton1013 Words   |  5 Pages From the majority of all Americans to America’s allies are paying close attention to the 2016 Election. Donald Trump and Hillary Clinton are practically the center of the universe, for they will both have major changes upon being elected president of the United States. Both candidates should be wary of what they say in public, because they are considered role models to young children. Trump has been known to speak his mind without a filter, and not be politically correct. Clinton’s campaign aimsRead MoreThe Presidential Election : Donald Trump And Hillary Clinton Essay1103 Words   |  5 Pagescandidates Donald Trump and Hillary Clinton as it relates to the presidential election, along with my opinion and views regarding what recently took place as of November 8th, 2016. It’s no secret that this election h as been the craziest thus far. Not only for the first time has a female candidate made it this far in an election, but we also got to witness the shenanigans that took place leading up to the election, majority of which came from our very own, Donald Trump. Donald Trump and Hillary ClintonRead MoreThe Economic Policies Of Hillary Clinton And Donald Trump Essay1382 Words   |  6 Pagesthe upcoming presidential election coming up on November 8th, with the two candidates’ being Donald Trump and Hilary Clinton. A huge issue in this election was to come up with an economic policy on both Republican side and democrat side. Both candidates have come up with many different policies for a positive economy of the United States. The Economic policies of Hillary Clinton and Donald Trump Taxes. Trump s plan to come up with an improvement to our taxing system will move all citizens into threeRead MoreComparison Between Hillary Clinton And Donald Trump1116 Words   |  5 PagesComparison between Hillary Clinton and Donald Trump After every four years, American voters elect the president of their choice to lead the government. Voters are expected to turn up in large numbers and exercise their democratic right. Elections in America are critical because they determine how the country will be run and ultimately the future of the nation. It is always an historic moment as the rest of the world waits to see the outcome of the elections. Indeed, America has been known as theRead MorePresidential Election Between Hillary Clinton And Donald Trump1262 Words   |  6 Pages In the year 2016, there will be a presidential election between Hillary Clinton and Donald Trump. I rather vote for Clinton because she’s a trustworthy person. Clinton is reliable because she has a plan for everything. She represents the Democratic Party and Trump represents the Republican Party. Clinton and Trump have a lot of differences and not much in common when it comes to competing with each other about personal political power. I consider myself a Democrat because Democrats believe peopleRead MoreLeadership Style And Management Of Hillary Clinton And Donald Trump Essay2116 Words   |  9 Pagesthis analysis is to evaluate and summarize the leadership style and management of Hillary Clinton and Donald Trump. Since they both hold influence and they’ve developed a campaign to become the greatest leader of the United States of America this analysis will explore the different styles they possess to get a better idea of their leadership behaviors. Keywords: Leadership, Leadership Style, Hillary Clinton, Donald Trump, 2016 Election Introduction Since the late 1700’s the United States ofRead MoreThe Issue That Donald Trump And Hillary Clinton Disagree On Is Abortion1001 Words   |  5 PagesMullen / Professor Rodin November 3, 2016 Part 1 The first issue that Donald Trump and Hillary Clinton disagree on is abortion. Let us take a look at Mr. Trump’s position on this topic. He is quoted as saying, â€Å"Public funding of abortion providers is an insult to people of conscience at the least and an affront to good governance at best† (Trump). He believes that â€Å"life is the most fundamental right.† Donald Trump actively opposes Planned Parenthood and disapproves of using government fundsRead MoreU.s. Presidential Nominees Donald Trump And Hillary Clinton1893 Words   |  8 PagesPresidential Comparison This paper is going to be a comparison between the presidential nominees Donald Trump and Hillary Clinton. Donald Trump was born in Queens New York in the year of 1946. Trump’s father was a wealthy business man in the field of real-state, spending his time building supervising middle income apartments throughout New York City. At the age of thirteen, Trumps father sent him to the local military school in order to teach him discipline and top marks. He demonstrated the ability

Friday, December 20, 2019

Analysis Of The Book The Eyes Of A Journalist By...

Sharp Objects follows a story through the eyes of a journalist named Camille Preaker. The setting is modern day America, in the 2000’s, somewhere down in the bible-belt south. Preaker – a white female in her thirties – has a multitude of mental issues, two recounted in the book are depression and self-injurious behavior (e.g. cutting). Recently being discharged from her 6-month care at a psychiatric hospital for the aforementioned ailments, she is sent for work to her hometown. There are two seemingly-linked cases of young girls: a missing and a murdered one, with the potential serial killer. On her journey, Preaker: encounters two love interests, discovers that her mother poisoned her dead younger sister and herself, and that her half-sister is the murderer. Overall the women in this book are portrayed as â€Å"crazy† characters that take form through a variety of mental issues. As previously stated the main character suffers from depression and her cutting behavior; she is portrayed as a troubled, masochistic, unlikeable character. As another example, her mother comes off as a pretentious, stale housewife whom is also unlikeable. Lastly, the half-sister of Preaker is described as a perverse, ostentatious, deceitful preteen with sociopathic behavior. Women’s issues appear through the lives of these three women. It is the apparent paradox of Camille’s demise at the end of the book, the pretenses of her mother’s insane behavior, and the half-sister’s actions fitting with a young,

Thursday, December 12, 2019

Attempts at Poetry Explication Essay Example For Students

Attempts at Poetry Explication Essay Death, be not proud is the unusual portrayal of Death as a bringer of deliverance rest and sleep, which but thy pictures be rather than a figure of hell, torment, and punishment, Rest of their bones, and souls delivery. through a fourteen-line sonnet written in iambic pentameter. The speaker emphasizes the inevitability of death through its personification which allots death a more formidable role through characterization. we wake eternally is an allusion to heaven, accentuating deaths role as deliverer rather than a persecutor. As a servant, a deliverer of souls, Death paradoxically dies at the end of the poem creating an effectual loop; the circle of life is seen even in death. The description of souls delivery adds a light connotation to the apparently bright future of the afterlife. The poem is driven by a sonnets abbaabbacddc rhyme pattern ending with the death of Death himself to emphasize the termination of the poem. At this death, the speaker feels sympathy, poor Death, nor yet canst thou kill me. for the plight of an entity portrayed as not truly malicious, but which merely brings peace to the living. The Pulley The Pulley, written with each stanza according to its own rhyme pattern ababa 2 cdcdc to distinctly mark four separate events, is the speakers observations regarding the operation of God in his or her world. Strength, Beauty, Wisdom, Honor, and Pleasure are all personified to emphasize their importance as the speakers values. The speaker says that these values allow a person to surmount lifes great obstacles which lend them their significance. The poet has enjambed each stanza, If goodness lead him not, yet weariness / May toss him to my breast. to emphasize continuity of experience, and the oneness of the good which may bring salvation. The last line details the suggestion that the damned may find salvation not through their direct efforts but as a last resort. A pulley is a device that eases lifting; the title suggests that lifes sequence of events are set up for the best through the powers that be. Storm Warnings This unrhymed poem, with each stanza composed of seven lines, compares the ravages of weather to the ravages of a tumultuous relationship. glass has been falling may be applied to both a barometer and broken expectations, as well as frustrations with a lover. a silent core of waiting compares the eye of the storm with the speakers nervous tension. secret currents of the undiscerned can be applied to rising storm winds or the passive-agressive actions in a dysfunctional relationship. Weather becomes a reference to both weathered and internal violent feeling. Weather abroad/ And weather in the heart alike come on / Regardless of prediction. refers to an inability to select with whom one falls in love; love is spontaneous and uncontrolled. Time in the hand is not control of time relays to the reader a basis for the speakers sense of helplessness when trapped in an unfavorable relationship. We can only close the shutters.  is the speakers presenting the need to protect herself from the society which presents a danger to her because of her love. These are the things that we have learned to do / Who live in troubled regions. ends with a note of resignation, seeing the necessity to disguise her life even should it mean living with unhealthy relationships.

Wednesday, December 4, 2019

Essay on Quantitative Methodology For Quantitative Research Essay Example For Students

Essay on Quantitative Methodology For Quantitative Research Essay Quantitative research involves the collection and converting of data into numerical form to enable statistical calculations be made and conclusions drawn. It provides a measure of how people think, feel or behave and uses the statistical analysis to determine the results. However, this measurement results in numbers, or data, being collected, which is then analyzed by using quantitative research methods (Byrne, 2007). There are hypotheses or questions that the researcher wants to address which includes predictions about the possible relationship between two they are investigating (variables). However, in order to find answers to these questions, the researcher will have different instruments and materials, paper/complete tests and observation check lists and as well define plan of action (clearly). Notably, the main emphasis for quantitative analysis is on deductive reasoning which moves from the general to the public. However, this paper will use the previous topic to discuss the research problem, how quantitative methodology is used to address the research problem, state the purpose, propose research questions, identify and discuss a design that is associated with a quantitative methodology, and determine whether the chosen methodology and design best suited to address the research problem and questions.Problem Statement Organizational conflict arises when an individual or group perceives a threat to her/their interest. Most organizational conflicts in Nigeria emerge due to the inability of the system to fulfill the collective agreement with the employees (Ekong, 2000). This leads to employees quitting from the job. Another source of conflict exists between employees; arguments and competition for promotion, position . .en Best Suits to Address Research Problems and Questions. The qualitative method and research design chosen for this study best suit to answer the research questions and addresses the research problems. This is because:†¢ The statistic to be used will generate the finding.†¢ It often helps to reduce and restructure any complex problem to a limited number of variables.†¢ It will look at all the relationship between variables and will establish cause and effect in highly controlled circumstances. †¢ It will assume sample is representative of the population.Conclusion The descriptive research method is ideal for quantitative research and will not likely lead to any flaws in the reasoning process, which invalidate the results. It describes or summarizes, data, while the inferential statistics use methods to infer conclusions about a population from the sample.

Thursday, November 28, 2019

10 Types of Marriage Records for Family History

10 Types of Marriage Records for Family History The different types of marriage records that might be available for your ancestors, and the amount and kind of information they contain,  will vary depending on the location and time period, as well as sometimes the parties religion. In some localities, a marriage license may include the most details, while in a different locality and time period more information might be found in the marriage register. Locating all available marriage record types increases the chance of learning additional information- including confirmation that the marriage actually took place, the names of parents or witnesses, or the religion of one or both parties to the marriage. Records of Intentions to Marry Marriage Banns - Banns, sometimes spelled bans, were public notice of an intended marriage between two specified persons on a particular date. Banns began as a church custom, later proscribed by English common law, that required the parties to give advance public notice of their intention to marry over three consecutive Sundays, either in church or a public place. The purpose was to give anyone who might have an objection to the marriage, to state why the marriage should not take place. Usually, this was because one or both of the parties was too young or already married, or because they were more closely related than allowed by law.Marriage Bond - a monetary pledge or guarantee given to the court by the intended groom and a bondsman to affirm  that there was no moral or legal reason why the couple could not be married, and also that the groom would not change his mind. If either party declined to go through with the union, or of one of the parties was found to be ineligible- for example, already married, too closely related to the other party, or underage without parental approval- the bond money was generally forfeit. The bondsman, or surety, was often a brother or uncle to the bride, although he could also be a relative of the groom, or even a neighbor of  a  friend of either of the two parties. The use of marriage bonds was especially common in the southern and mid-Atlantic states through the first half of the nineteenth century. In colonial Texas, where Spanish law required colonists to be Catholic, a marriage bond was used in a slightly different fashion- as a pledge to local authorities in situations where there was no Roman Catholic priest available that the couple agreed to have their civil marriage solemnized by a priest as soon as the opportunity came available.Marriage License -   Perhaps the most commonly found record of a marriage is the marriage license. The purpose of a marriage license was to ensure that the marriage conformed to all legal requirements, such as both parties being of lawful age and not too closely related to one another.  After confirming there were no impediments to the marriage, a  license form was issued by a local public official (usually the county clerk) to the couple intending to marry, and granted permission to anyone authorized to solemnize marriages (minister, Justice of the Peace, etc.) to perform the ceremony.  The marriage was usually- but not always- performe d within a few days after the granting of the license. In many localities both the marriage license and the marriage return (see below) are found recorded together. Marriage Application - In some jurisdictions and time periods, law required that a marriage application to be filled out before a marriage license could be issued. In such situations, the application often required more information than was recorded on the marriage license, making it especially useful for family history research. Marriage applications may be recorded in separate books, or might be found with the marriage licenses.   Consent Affidavit - In most jurisdictions, individuals under the lawful age could still be married with  the consent of a parent or guardian as long as they were still above a minimum age. The age at which an individual required consent varied by locality and time period, as well as whether they were male or female. Commonly, this might be anyone under the age of twenty-one; in some jurisdictions, lawful age was sixteen or eighteen, or even as young as thirteen or fourteen for females. Most jurisdictions also had a minimum age, not allowing children under the age of twelve or fourteen to marry, even with parental consent. In some cases, this consent may have taken the form of a written affidavit, signed by the parent (usually the father) or legal guardian. Alternatively, the consent may have been given verbally to the county clerk in front of one or more witnesses, and then noted along with the marriage record. Affidavits were also sometimes recorded to affirm that both individuals were of legal age. Marriage Contract or Settlement - While much less common than the other marriage record types discussed here, marriage contracts have been recorded since colonial times. Similar to what we would now call a prenuptial agreement, marriage contracts or settlements were agreements made prior to marriage, most commonly when the woman owned property in her own name or wished to ensure that property left by a former husband would go to his children and not the new spouse. Marriage contracts might be found filed among the marriage records, or recorded in the deed books or records of the local court.In areas governed by civil law, however, marriage contracts were much more common, used as a means for both parties to protect their property, regardless of their economic or social status. Marriage licenses, bonds,  and  banns all indicate that a marriage was  planned  to take place, but not that it actually happened. For proof that a marriage actually took place, youll need to look for any of the following records: Records Documenting That a Marriage Took Place Marriage Certificate  - A marriage certificate confirms a marriage and is signed by the person officiating at the marriage. The downside is, that the original marriage certificate ends up in the hands of the bride and groom, so if it hasnt been passed down in the family, you may not be able to locate it. In most localities, however, the information from the marriage certificate, or at least verification that the marriage actually took place, is recorded at the bottom or on the back of the marriage license, or in a separate marriage book (see  marriage register  below). Marriage Return / Ministers Return  - Following the wedding, the minister or officiant would complete a paper called a  marriage return indicating that he had married the couple and on what date. He would later return it to the local registrar as proof that the marriage occurred. In many  localities,  you can find this return  recorded at the bottom or on the back of the marriage license. Alternatively, the information may be located in a Marriage Register (see below) or in a separate volume of ministers returns. The lack of an actual marriage date or  marriage  return does not always mean the marriage didnt take place, however. In some  cases,  the minister or officiant may have simply forgotten to drop off the return, or it wasnt recorded for whatever reason. Marriage Register  - Local clerks generally recorded the marriages they performed in a marriage register or book. Marriages performed by another officiant (e.g.  minister, justice of the peace, etc.) were also generally recorded, following receipt of the  marriage  return. Sometimes marriage registers incorporate information from a variety of marriage documents, so may include the names of the couples; their ages, birthplaces, and current locations; the names of their parents, the names of witnesses, the name of the officiant and the date of marriage. Newspaper Announcement  - Historical newspapers are a rich source for information on marriages, including those which may predate the recording of marriages in that locality. Search  historical newspaper archives  for engagement announcements and marriage announcements, paying special attention to clues such as the location of the marriage, the name of the officiant (may indicate religion), the members of the marriage party, the names of guests, etc. Dont overlook religious or ethnic newspapers if you know the ancestors religion, or if they belong to a specific ethnic group (e.g. the local German-language newspaper).

Sunday, November 24, 2019

Information Security Standards for Internal Revenue Service

Information Security Standards for Internal Revenue Service Information Revenue Service (IRS) is an American agency that collects taxes and enforces the tax laws that guide the entire process. Since the agency is handling information deemed confidential, it has employed numerous securities standards in enhancing confidentiality of their data.Advertising We will write a custom research paper sample on Information Security Standards for Internal Revenue Service specifically for you for only $16.05 $11/page Learn More The information security standards at IRS have abroad perspective; the security components include physical security program, Privacy, Information Protection and Data Security (PIPDS), Information Technology (IT) Security, and National and Personal Security Information (Internal Revenue Manual, n.d.). Information privacy at IRS remains a key issue in enhancing taxpayers’ confidence. The purpose of physical security program is to offer protection to the lives of employees and the entire management of IRS. IRS protects its information through data security, physical security, and sensitive procedures of handling documents. These complex procedures ensure that these resources are not accessible to third parties. Third parties ease to data accessibility can cause risk and harm. In enhancing information security, IRS ensures that the security procedures are in line with the federal regulations of disclosure, access, disposition, and use of information. Under this program, there are authorities that ensure the employees and contractors meet the outlined standards fully. For instance, The Privacy Act of 1974 prohibits information disclosure from public records without a written acceptance from the concerned person. The Act follows a specified rule regarding allowing an individual to access any information. The rule clarifies on the timing fee and location under which the body can authenticate one to view the data (Internal Revenue Manual, n.d.). Although one has a right to get access to any of the agency’s records, an exemption prohibits information access by the public. If on request for information availability on a format that is already available, the agency is free to supply such information on a format that is reproducible. Additionally, IRS conducts annual security briefings to its employees in order to familiarize them with their security responsibilities. The agency only grants access to sensitive information on a need-to-know basis, and the employees remain responsible for providing security to all information to enhance trust among the public. The agency has a Physical Security Handbook that outlines guidelines on minimum information security standards that allow flexibility for developing higher standards for meeting different requirements. The management at IRS implements these policies on physical security.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In Information Technology (IT) Security, IRS’s systems and applications are secured (Internal Revenue Manual, n.d.). The IT Security creates, updates, and maintains information. This system enhances the security of information that the taxpayers have given to IRS thus averting issues of unauthorized information access. Clearly, information security starts with improving physical security of the organization. On Privacy, Information Protection, and Data Security (PIPDS), IRS uses modern technological applications to protect the taxpayers’ personal identifiable information. The agency uses these data according to the applicable laws and Presidential Directives (Internal Revenue Service (IRS), 2013). This step enhances confidence among the American taxpayers. Notably, PIPDS Programs and Policies carry out implementation of varied programs that boost information security standards. For instance, the Privacy Impact Assessments (PIAs) carries out th e overall assessment of both the internal and external threats that can compromise information confidentiality. This program follows the guidelines in the E-Government Act of 2002. Further, Information Protection program protects taxpayers from identity theft. The policies and procedures avoid access of data by hackers. Incident Management Program (IMP) is a program that takes necessary steps and responses in case of data losses especially personally identifiable data. IMP also responds to data disclosure, breach, and theft. IRS prevents third parties from accessing taxpayers’ private information. IRS launched IMP after the President’s Identity Theft Task Force recommendations of data loss notification. Notably, it is a requirement for employees to report any disclosure, theft, and loss of information within an hour. This reporting time limit is meant to minimize the possibility of compromising personal information thus can be used in committing fraudulent activities. However, an employee has to confirm the identity of the caller before reporting the incident within the stipulated one hour. This step helps in confirming if the caller is a taxpayer or not (US Tax Center, n.d.). The PIPDS office monitors and regulates Live Data Testing Reviews. The regulations restrict live data testing without prior written approval; this responsibility lies with the PIPDS office. Taxpayers who perform online transactions through computers are protected from fraudulent cases by the Online Fraud Detection Prevention. The launched phishing program conducts a global monitoring of those who access their websites; in case of malicious occurrences, the program reports to the central system for immediate intervention.Advertising We will write a custom research paper sample on Information Security Standards for Internal Revenue Service specifically for you for only $16.05 $11/page Learn More Markedly, IRS has ensured safety of their data by usin g these programs. In addition, IRS assigns pseudonyms to all their employees. Pseudonyms are false identity names; they ensure safety of employees. In online transactions, such names make it difficult for trackers to identify the personal information of the employees. IRS policies require that an employee must give adequate justifications to why he/she wants to use the pseudonym. Employees have to register these pseudonyms with the managers; this is for accountability purposes. IRS also runs the Unauthorized Access (UNAX) program. UNAX program offers employees’ awareness on consequences of compromising data like losing the public’s confidence (Internal Revenue Manual, n.d.). There is also strict legislation on breaching of Personally Identifiable Information (PII). Personal safety also comprises of harassment, taxpayer contacting an employee with no legitimate communication, and taxpayer’s aggression towards IRS employees. The well-guided procedure on the use of pseudonyms shows the extent at which IRS puts into concern its information security standards. On its key principles, IRS works towards protecting individuals’ rights to privacy. IRS can distribute these data only when they are authorized by federal legislation. The employees can be allowed to access these taxpayers’ data. In case of information leakage to wrong or unauthorized persons during this process, these groups of people become liable. The law requires them not to leak any taxpayer’s information in any format, either electronic formats or hardcopy documents, to any person. The agency goes ahead to conduct in-house trainings to these groups of people in order to remind them of their daily expectations. Moreover, the senior management is always in the forefront in ensuring that the employees adhere to the privacy policy and data security procedures. In case of non-compliance, the senior management applies penalties in line with the IRS policy and guidelin es. The IRS Privacy Principles include the following: It is a public trust to protect employees and taxpayers’ privacies, information are only collected upon request from the tax management, these information are used for a specific purpose, and reliable information are to be obtained from individuals who relate to them (Internal Revenue Service Topics Page, n.d.). In their services and roles, IRS stipulates that its employees, visitors and contractors must adhere to the federal privacy guidelines. IRS system owners are expected to be formulating and promoting effective and efficient information protection, employee and taxpayer policy, and information security programs.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The different divisions in IRS enhance service delivery as specialization does increases work output. The information security standard is enhanced through IRS partnership with Government Liaison and Disclosure. The partnership ensures that the privacy policy applied in the agency is in accordance with the Privacy Act of 1974. It also facilitates the development and distribution of periodical reviews that update the changes on information protection policy. The Information Security Standards for IRS uphold privacy of data. However, monitoring of people as they access information in the internet shows that privacy is at the same time not fully upheld. The idea of tracking for collecting statistical data is revoking the same provisions of information security as it results to tracking (IRS Has Improved Controls but Needs to Resolve Weaknesses, 2013). From this point of view, information in the World Wide Web seems to expose a persons privacy such as location and computer information l ike internet protocol address. Although IRS has made tremendous steps towards achieving total information protection, it still requires effective implementation of the information security program. Some of the components of security, which have not met their targets or operated effectively, include the IRS procedure of testing on the financial system. Data privacy is essential in element in any organization. IRS should ensure that all their security programs are effective thus working towards meeting their objectives. In the end, the improved services will raise taxpayers’ confidence, trust, and loyalty. References IRS Has Improved Controls but Needs to Resolve Weaknesses. (2013, March 15).U.S. Government Accountability Office (U.S. GAO). Web. Internal Revenue Manual. (n.d.).  Internal Revenue Service. Web. Internal Revenue Service (IRS). (2013, March 7).  USA.gov: The U.S. Governments Official Web Portal. Web. Internal Revenue Service Topics Page. (n.d.).  USA TODAY: L atest World and US News USATODAY.com. Web. US Tax Center. (n.d.).  US Tax Center | File Your Tax Return Online, Tax Extension, Tax Forms, Tax Help. Web.

Thursday, November 21, 2019

Financial services for corporate clients ( Financial analysis + Speech or Presentation

Financial services for corporate clients ( Financial analysis + financial calculations) - Speech or Presentation Example It may be because the inventory turnover was lower and it increased the cost of sales therefore they should focus on their supply chain management. All the businesses need to finance their operations in order to make it a going concern otherwise it will be liquidated or bankrupt. Short- term financing refers to financing the day to day operations or expenses such as purchase of raw materials, paying administrative and rental expenses or paying electricity bills. Since as it can be seen from the net cash flow from operating activities table, that the firm has a positive net cash flow from operating activities therefore it can meet those operating needs easily thus short term financing needs could be easily met by the business if it generates sufficient sales in the future. The company can utilize trade credits by using discounts since they already have positive cash flows and can save a great deal of amount. Medium term financing requirements generally expand from a period exceeding one year but have a time horizon of lesser than five years. These types of financing are used to modernize the machineries or equipment or used to improve the facilities. The company needs to incur medium term costs but it is self sufficient and it can finance its medium term needs from its positive cash flows. Long term financing is used to finance fixed assets or used for capital budgeting purpose. To expand its operations, Gulf trading needs long term financing and it can use the various options available to it. Since it has a positive profitability with an average debt-equity ratio, it would be a feasible option to finance through bonds. It can raise debt since it has a very higher time to interest ratio than the industry implying that it can redeem its dues in a timely manner. However, it should be understand that the debt to equity ratio should not exceed the