Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The report must be prepared in memo format, maximum 3 pages, Times New Roman, fo

ID: 347459 • Letter: T

Question

The report must be prepared in memo format, maximum 3 pages, Times New Roman, font 12, double-spaced. The memo should include the following five sections: (1) facts, (2) issue, (3) authorities, (4) conclusion, and (5) analysis

Research Module #2

Scenario.

Tony and Stella resided in Utah at the time their petition was filed. Before 2006 they had a job with a business in his locality. Sometime in 2005 he learned that his employer planned to move the business to Costa Rica. In anticipation of that event Tony sought to find another source of income and decided that he would become a professional gambler. Stella also worked, and Tony thought that another source of income would allow her to stay home with their child. Before Tony’s decision to become a professional gambler, they had been casual gamblers but they did not wager large amounts. Sometime during 2005 they began to invest heavily in gambling (mainly playing slot machines). They were born in Vietnam, and their religious and cultural beliefs were derived from their Vietnamese background. They believed in Feng Shui. Because of this belief and other religious and cultural beliefs, they expected that certain days were “lucky days” or days on which their chances of successful gambling increased. They were cognizant that slot machine odds favored the casinos but expected to overcome those odds by attempting to gamble on their “lucky days”. In addition, they would watch other slot machine players; and if they had excessive losses, they believed that taking over machines of losing players provided more opportunity. That was their plan for making a profit. Initially, their Feng Shui/cultural approach resulted in success. Accordingly, they increased the amounts wagered in 2005 and continued doing so through 2006 and part of 2007. In early 2007 they realized that they were about $200,000 in debt and that their attempt to make a profit had failed. they had withdrawn money from their retirement funds and borrowed against various assets to finance their attempt to make a profit from gambling. During 2006 they were employed in West Jordan, Utah, and traveled approximately 130 miles to Nevada to pursue gambling. During 2006 they traveled 130 miles each way to Nevada casinos on Friday afternoons and gambled for long hours, sleeping only a few hours per night. They did this every weekend and on legal holidays when they were off work. Tony and Stella, because of their “lucky day” beliefs, generally limited their slot machine playing to one of the two individuals—the one with the more favorable “lucky day” indicators. During 2006 they reported combined winnings of $852,230. That included $586,038 of winnings that the casinos reported to the IRS on Forms W-2G, Certain Gambling Winnings (winnings in excess of $1,200), and $266,192 of winnings that were not reflected on Forms W-2G (winnings in amounts less than $1,200). Of the $586,038, Tony’s Forms W-2G reflected $500,490 and Stella’s Forms W-2G reflected $85,548. For 2006 their losses exceeded their gains by approximately $200,000. 2 On the 2006 return Tony claimed that he was a professional gambler (gambled for profit). He reported his 2006 gambling winnings and losses on a Schedule C, Profit or Loss From Business, but did not claim a loss in excess of winnings for the year.

Explanation / Answer

Error detection is most commaonly realized using a correct hash function. A hash function adds a fixed-length tag to a message.

this is occured by following cases:

1.Repetition codes: A repetition code is a coding scheme that repetition the bits across a channel to attain error-free communication. Given a stream of data to be transmitted, the data are divided into blocks of bits. Each block is carry some predetermined number of times.

2.Parity bits: A parity bit is a bit that is combined to a group of source bits to provide that the number of set bits in the outcome is even or odd. It is a very easy scheme that can be used to identify single or any other odd number of errors in the output. An even number of flipped bits will make the parity bit appear correct even though the data is false.

3.Checksums: A checksum of a message is a standard arithmetic sum of message code words of a fixed word length.

Example : byte values

4. Cyclic redundancy checks: A cyclic redundancy check is a non-secure hash function create to detect accidental changes to digital data in computer networks; as a result, it is not suitable for noticing maliciously introduced errors.

5. Cryptographic hash functions: The output of a cryptographic hash function, also known as a message digest, can maintain strong assurances about data integrity, whether changes of the data are accidental due to transmission errors.

6. Error-correcting codes: An error-correcting code can be used for error finding. A code with minimum Hamming distance, d, can detect up to d 1 errors in a code word. Using minimum-distance-based error-correcting codes for error finding can be suitable if a strict limit on the minimum number of errors to be found is desired.

DCP/IP operation or working:

The Internet works by using a protocol called TCP/IP, or Transmission Control Protocol/Internet Protocol. ... In base points, TCP/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location.

TCP: there are 2 layers to TCP/IP. The top layer, TCP, is responsible for catching large amounts of data, compiling it into packets and sending them on their way to be received by a fellow TCP layer, which turns the packets into useful information.

IP: IP, is the locational aspect of the pair granting the packets of information to be sent and received to the correct location

In simple words, TCP is the data and IP is the Internet location GPS.

The Four Layers Embedded in TCP/IP and work in the following way:

The Link Layer is the physical network machinery used to combine nodes and servers.

The Internet Layer connects hosts to one another across networks.

The Transport Layer resolves all host-to-host communication.

The Application Layer is handle to ensure communication between applications on a network.