BSBOPS504 Student Assessment Tasks (1)
.docx
keyboard_arrow_up
School
Federation University *
*We aren’t endorsed by this school
Course
ITECH 3208
Subject
Business
Date
May 3, 2024
Type
docx
Pages
22
Uploaded by MasterSteel10444 on coursehero.com
STUDENT ASSESSMENT
TASKS
MANAGE BUSINESS RISK
BSBOPS504
First published 2021
Version 2.0
This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as
expressed in the RTO Works License Agreement.
The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.
Business Works is a series of training and assessment resources developed for qualifications within the Business Services Training Package.
Contents
Introduction
4
Assessment Task 1: Knowledge questions
5
Assessment Task 1: Checklist
9
Assessment Task 2: Project
10
Assessment Task 2: Checklist
17
Final results record
21
Introduction
The assessment tasks for BSBOPS504 Manage business risk are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you
have learnt during your course. Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the Business Works Student User Guide
. The Student User Guide provides important information for you relating to completing assessment successfully.
Assessment for this unit
BSBOPS504 Manage business risk
describes skills and knowledge required to manage business risks in a range of contexts across an organisation or for a specific business unit or area in any industry setting.
For you to be assessed as competent, you must successfully complete two assessment tasks:
Assessment Task 1: Knowledge questions – You must answer all questions correctly.
Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio. Trinity Institute
BSBOPS504 Manage business risk |
4
Assessment Task 1: Knowledge questions Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
review the advice to students regarding answering knowledge questions in the Business Works Student User Guide
comply with the due date for assessment which your assessor will provide
adhere with your RTO’s submission guidelines
answer all questions completely and correctly
submit work which is original and, where necessary, properly referenced
submit a completed cover sheet with your work
avoid sharing your answers with other students.
Assessment information
Information about how you should complete this assessment can be found in Appendix
A of the Business Works Student User Guide
.
Refer to the appendix for information on:
where this task should be completed
the maximum time allowed for completing this assessment task
whether or not this task is open-book. Note
: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.
Trinity Institute
BSBOPS504 Manage business risk |
5
i
Questions
Provide answers to all of the questions below:
Provide answers to all of the questions below:
1.
Explain the risk management process. You may answer using a labelled diagram or in words (or both) and must include:
a definition of risk management.
a list or illustration of the steps in a risk management process.
a description of what each step involves.
2.
Describe a current risk management standard. In your answer:
name the standard.
explain the purpose of the standard.
list key elements of the standard.
3.
Complete the table below to describe the types of business risk.
Type of risk
Description
Example
Key responsibility
(at least two people)
Strategic risk
Compliance
risk
Financial risk
Operational
risk
Trinity Institute
BSBOPS504 Manage business risk |
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
You are a consulting project manager and have been contracted by an investment bank to run a large information technology project that is expected to last 15 months. During the Direct and Manage Project Work process, you discover that several regulatory requirements have not been addressed in the project management plan. Failure to meet these requirements could result in legal action against the company. However, implementing the technology to comply with these regulations exceeds the budget and scope of the project, and could result in the cancellation of the project. As a project manager what are some of the critical issues that you will undertake?
arrow_forward
You are required to assess key functions including risk management and compliance for the Bank of America, and present a written report based on the Bank of America on the following in 2,000 words:
Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the institution (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used.
Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, the institution’s approaches/ strategies to combat money laundering and terrorist financing issues.
Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that the financial institution must be compliant with.
arrow_forward
You are required to assess key functions including risk management and compliance for J.P Morgan Chase, and present a written report based on J.P Morgan Chase on the following in 2,000 words:
Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the J.P Morgan Chase (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used.
Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, J.P Morgan Chase approaches/ strategies to combat money laundering and terrorist financing issues.
Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that J.P Morgan Chase must be compliant with.
arrow_forward
The copyright owner has the right to allow someone else to use their song and is often asked to grant a license for various kinds of uses. It can be very difficult to figure out which license(s) to grant, as requests often require several kinds of licenses. Learning to think through answers to questions regarding the song usage is a practiced skill, and often a valuable tool in making sure all appropriate licenses are being utilized and revenues are earned.
Each request for usage presents a unique scenario for the license administrator to process. In this discussion, you will gain some practical experience in such a scenario and explain how you determined the licenses necessary to fulfill the licensee’s request and comply with copyright law.
Read the Licensing Request Example 1 below.
You will then ascertain the license(s) you believe the administrator should grant.
In your initial thread, explain in your thought process for each license you believe should be granted and why you…
arrow_forward
A preparer e-file hardship waiver might be granted for which of the following reasons?
• A) The preparer is in a Presidentially Declared Disaster Area
B) The preparer does not have software that would facilitate e-file
C) The preparer believes the e-file program is a government conspiracy to spy on citizens
D) The preparer doesn't want to participate in e-file
arrow_forward
An engineer has developed a machine that turns coal into diamond. This
should be protected by:
a.
Trademark
b.
None of these
C.
Trade secret
d.
Copyright
arrow_forward
You are an engineer and it is known that your project activities/plant production had caused an adverse health, safety and/or environmental (HSE) impact. To improve the HSE quality, you must cease your project activities/plant production for a period, resulting in the inability to meet the required schedule and targets.(i)Ethical behavior
(ii)Identifying the moral issues
arrow_forward
Copyright Patents and Trademarks all last for the lifetime of the creator? True or false
It is up to the person who creates a product to choose whether they want a patent, copyright or trademark for their creation. True or False.
In terms of legal complexity in obtaining the protection, the most difficult to secure is a:
A. Trademark
B. Copyright
C. Patent
D. Trade Secret
arrow_forward
The Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…
arrow_forward
The Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…
arrow_forward
During a consulting engagement involving the development of a new accounts payable system, an internal auditor identified a control weakness. Although the weakness was reported to the manager of the systems development project, the manager decided to accept the risk because, in the manager's opinion, the risk was not significant. Six months after the implementation of the new system, the disbursements process was audited by another internal auditor who determined that the control weakness had impacted payment processing. The auditor reviewing the disbursements process should do which of the following?
None of the choices.
Report the control weakness to management and the audit committee
Discuss the control weakness with the manager of the accounting system, but do not report the finding
Disregard the control weakness because management previously decided to accept the risk
Request that the manager of the systems development project fix the system
arrow_forward
17
Identify the first principle in the process of risk assessment?
a.
Management specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to its objectives.
b.
Management identifies and analyses risks to the achievement of its objectives and uses that as a basis for determining how the risks should be managed.
c.
Management considers the potential for fraud in assessing risks to the achievement of its objectives.
d.
Management identifies, analyses, and responds to changes that could significantly impact its system of internal control.
arrow_forward
107 Locking file cabinets, keeping passwords
private and encrypting sensitive customer
information are basic practices used to protect
borrowers personal information and comply with
the:
A) Gramm-Leach-Bliley Act.
B) Truth in Lending Act (TILA).
C) Home Mortgage Disclosure Act (HMDA).
D) Real Estate Settlement Procedures Act
(RESPA),
arrow_forward
A benefit of risk management is:
O A. It discourages the acceptance of financially unsound projects
O B. Risks can be transferred to other people at no cost
O C. It will justify high contingency
O D. The risks can be managed by the project team
arrow_forward
A civil association has not provided information on the distribution of profits to its partners, which would amount to 30% of the profits generated; however, since its operations are non-profit, this causes discomfort in the community and legal action will be taken against its partners for not making the use of resources and contributions of each member of the association transparent.
a. Identifies the activities that are omitted according to the components of the COSO model.
b. Describes the types of risks that unfair practices imply for the association.
c. Suppose you are a member of the board of directors and establish activities to avoid the possibility of fraud.
arrow_forward
John, a recent university graduate has been hired by a Web design consultancy company to interview their staff to ascertain their current knowledge. The aim of the study is to inform the company about the type of training courses they need to implement. The objective is to highlight areas of overall weakness as opposed to individual shortcomings. Despite this, the type of data John collects will be able to identify individual staff weaknesses. Informed consent clearly states that comments made to John by interviewees are to remain private. Following the study, the Vice President of the company approaches John, asking him “who did well in the study?” John, afraid he will lose his job, proceeds to give the vice-president the key findings, including those identifying individual staff weaknesses.
Analyse whether John’s relay of his findings from the staff interview process is an ethical action according to the Enlightenment theories and Virtue ethics. Consider how all stakeholders are…
arrow_forward
You are a product manager for the EPA and you are concerned about the risks posed
by Bug Bomb products. Several cases of misuse have led to property damage and
some injuries, but as yet no one has been killed. Would you: A) Continue to allow
the product to be used without change? B) Seek modifications? C) Ban their use?
List the pros and cons of each decision. Defend your decision to the manufacturer
and the public. (1 Paragraph)
arrow_forward
Creative Worx, Inc., develops, makes, and markets new computer programs for businesses and consumers. Generally, copyright protection extends to
Group of answer choices
the “look and feel” of the software.
those parts of the software that can be read by humans.
all aspects of the software.
all of the choices.
arrow_forward
Another commonly used phrase, “I only work here,” implies that one is not personally accountable for the company rules because one does not make them. It also suggests that one wishes to restrict one’s area of responsibility within tight bounds as defined by those rules. In light of the discussion in Engineering as Experimentation, respond to the potential implications of this phrase and the attitude it represents when exhibited by engineers.
arrow_forward
Types of funding for product development are including:
I Government grant
II Bank loans
II Business angels
IV Venture capital
V Strategic alliance
A.
All of above
В. О
III and IV
C.
I and II
D.
IV and V
arrow_forward
Which of the following statements about the Time Limit on Certain Delonses provelion wan Persoon
A
It specifies the period of time after which an insurance company can dorry a claim on the basis of the claim having pre-cadded bolore the effective date of coverage
It specifies the period of time during which the insured must submit Proof of Loss
w policy to CORRECT
B
ec
OD
It prohibits legal actions against the insurance company after a specified penod of time
It prevents an insurance company from making any changes to a policy aller it is issued
arrow_forward
28. Which of the following are not the safeguards to offset the threats To Fundamental Principles?
a) Educational, training and experience requirements for entry into the profession
b) Continuing professional development requirements
c) Corporate non - governance regulations
d) Professional standards
e) Professional or regulatory monitoring and disciplinary procedures
f) Internal review by a legally empowered third party of the reports, returns, communications or information produced by a member.
a. Only b) and c)
b. Only c) and f)
c. Only c)
d. Only a) and b)
arrow_forward
THE FOLLOWING ARE INTELLECTUAL RESOURCES EXCEPT:
a.Copyrights
b.Patents
c.Brands
d.Capital
arrow_forward
You are about to establish a start-up company, with a new creative/innovative software product(s)
From a legal point of view, explain what and how you need to protect your company’sintellectual property (trademark, copyright and/or patent).
arrow_forward
A few days before the end of the term of a two-year NDA (non-disclosure agreement) he signed with a startup company related to a possible patent, Frank interviewed with another startup and divulged information covered by the agreement. The interview had been scheduled for a week later, in which case it wouldn't have been an issue, but had been moved up when another job applicant dropped out and the company had an opening for an earlier interview. Frank reasoned that he had met the spirit of the NDA, and a few days early wouldn't really matter. Besides, as it turned out, the company he interviewed with wasn't interested in that information, although they did hire him. What would have been done to make it right by Frank?
arrow_forward
You are a senior public relation officer. The citizens in the country are suffering financially due tothe prolonged pandemic. As part of the company’s corporate social responsibility (CSR), you arerequired to survey the needs of two (2) charitable groups. Then, propose three (3) suitable waysthe company can give back to the society.In your proposal to the head of public relation department,• state the purpose of your proposal;• identify two (2) charitable groups of your choice;• describe the needs of the two (2) charitable groups;• suggest three (3) ways the company can help the two (2) charitable groups;• provide details of the activities (such as cost, time needed, justification of its suitability,and manpower required); and• describe the benefits of those activities to the staff members and company. Provide two (2)benefits of those activities to the staff members and two (2) benefits of those activities tothe company.Your proposal should be about 800-1200 words
arrow_forward
(i) When we talk about information technology, it has a significant hand in improving the status in the fields of environmental education and human health as compared to that of the other respective areas such as business, economics, and culture or politics. Justify.
(ii) A disaster is an unforeseen event, which can overwhelm the capacity of the affected people to manage its impact. Many people are periodically exposed to natural disasters in their life, and most disasters, cannot be prevented. However, their effects can be mitigated. In this regard, discuss the key aspects of Natural Disaster Management.
arrow_forward
Which of the following are not the safeguards to offset the threats To Fundamental Principles?
a) Educational, training and experience requirements for entry into the profession
b) Continuing professional development requirements
c) Corporate non - governance regulations
d) Professional standards
e) Professional or regulatory monitoring and disciplinary procedures
f) Internal review by a legally empowered third party of the reports, returns, communications or information produced by a member.
Only a) and b)
Only c) and f)
Only c)
Only b) and c)
arrow_forward
A friend contacts you about joining her company, Anonymous Remailers Anonymous. She would like you to lead the technical staff and offers you a 20 percent increase in salary and benefits over your current position. Your initial project would be to identify and implement changes necessary to provide increased protection for users of the company's anonymous remailer service. After discussing the opportunity with your friend, you suspect that some of the firm's customers are criminal types and purveyors of pornography and hate mail. Although your friend cannot be sure, she admits it is possible that hackers and terrorists may use her firm's services. Would you accept the generous job offer? Why or why not?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education
Related Questions
- You are a consulting project manager and have been contracted by an investment bank to run a large information technology project that is expected to last 15 months. During the Direct and Manage Project Work process, you discover that several regulatory requirements have not been addressed in the project management plan. Failure to meet these requirements could result in legal action against the company. However, implementing the technology to comply with these regulations exceeds the budget and scope of the project, and could result in the cancellation of the project. As a project manager what are some of the critical issues that you will undertake?arrow_forwardYou are required to assess key functions including risk management and compliance for the Bank of America, and present a written report based on the Bank of America on the following in 2,000 words: Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the institution (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used. Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, the institution’s approaches/ strategies to combat money laundering and terrorist financing issues. Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that the financial institution must be compliant with.arrow_forwardYou are required to assess key functions including risk management and compliance for J.P Morgan Chase, and present a written report based on J.P Morgan Chase on the following in 2,000 words: Risk management framework – Conduct an analysis of the risk management process/ framework implemented at the J.P Morgan Chase (including risk assessment and risk control mechanisms). You are required to report on key risks that the institution is exposed to and explain aspects of the framework, emphasizing the effectiveness of the risk management strategies used. Anti-Money Laundering and Terrorist Financing Strategies – Discuss with examples, J.P Morgan Chase approaches/ strategies to combat money laundering and terrorist financing issues. Statutory legislation and compliance - Explain the importance of financial institutions meeting regulatory requirements. Comment on specific legislation that J.P Morgan Chase must be compliant with.arrow_forward
- The copyright owner has the right to allow someone else to use their song and is often asked to grant a license for various kinds of uses. It can be very difficult to figure out which license(s) to grant, as requests often require several kinds of licenses. Learning to think through answers to questions regarding the song usage is a practiced skill, and often a valuable tool in making sure all appropriate licenses are being utilized and revenues are earned. Each request for usage presents a unique scenario for the license administrator to process. In this discussion, you will gain some practical experience in such a scenario and explain how you determined the licenses necessary to fulfill the licensee’s request and comply with copyright law. Read the Licensing Request Example 1 below. You will then ascertain the license(s) you believe the administrator should grant. In your initial thread, explain in your thought process for each license you believe should be granted and why you…arrow_forwardA preparer e-file hardship waiver might be granted for which of the following reasons? • A) The preparer is in a Presidentially Declared Disaster Area B) The preparer does not have software that would facilitate e-file C) The preparer believes the e-file program is a government conspiracy to spy on citizens D) The preparer doesn't want to participate in e-filearrow_forwardAn engineer has developed a machine that turns coal into diamond. This should be protected by: a. Trademark b. None of these C. Trade secret d. Copyrightarrow_forward
- You are an engineer and it is known that your project activities/plant production had caused an adverse health, safety and/or environmental (HSE) impact. To improve the HSE quality, you must cease your project activities/plant production for a period, resulting in the inability to meet the required schedule and targets.(i)Ethical behavior (ii)Identifying the moral issuesarrow_forwardCopyright Patents and Trademarks all last for the lifetime of the creator? True or false It is up to the person who creates a product to choose whether they want a patent, copyright or trademark for their creation. True or False. In terms of legal complexity in obtaining the protection, the most difficult to secure is a: A. Trademark B. Copyright C. Patent D. Trade Secretarrow_forwardThe Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…arrow_forward
- The Electronic Privacy at ABC Control Case: The notice of termination would arrive seemingly out of the blue. Suddenly and unexpectedly Barbara Hanley and Jim Sampson, who worked for ABC Control (a fictitious company), would be told that they had been terminated from the firm—Barbara for sending personal email from her company computer and Jim for spending too much time surfing the Web at recreational sites and downloading pornography. Both would be stunned. They had received no warning. They did not know they were in violation of company policy—since none had been promulgated. They did not know they were being monitored. And their productivity and work output had not diminished since they were favorably rated at their last annual evaluation. “I hate to do this,” Sarah Hanson, vice president of Human Resources (HR), argued to Alan Stephens, executive vice president of ABC Control. “Somehow it doesn’t seem fair. We’ve not warned them, and they have been good productive employees up…arrow_forwardDuring a consulting engagement involving the development of a new accounts payable system, an internal auditor identified a control weakness. Although the weakness was reported to the manager of the systems development project, the manager decided to accept the risk because, in the manager's opinion, the risk was not significant. Six months after the implementation of the new system, the disbursements process was audited by another internal auditor who determined that the control weakness had impacted payment processing. The auditor reviewing the disbursements process should do which of the following? None of the choices. Report the control weakness to management and the audit committee Discuss the control weakness with the manager of the accounting system, but do not report the finding Disregard the control weakness because management previously decided to accept the risk Request that the manager of the systems development project fix the systemarrow_forward17 Identify the first principle in the process of risk assessment? a. Management specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to its objectives. b. Management identifies and analyses risks to the achievement of its objectives and uses that as a basis for determining how the risks should be managed. c. Management considers the potential for fraud in assessing risks to the achievement of its objectives. d. Management identifies, analyses, and responds to changes that could significantly impact its system of internal control.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education