XYZ Enterprises Corporation's single product appear below:

Selling Price Per Unit |
Rs. 150 |

Variable Expense Per Unit |
90 |

Fixed Expenses for the month |
424,840 |

Total Sales in amount to attain the company's monthly target profit of Rs. 50,000 is closest to:

In: Computer Science

A proton moves perpendicular to a uniform magnetic field B at a speed of 1.30 x 10^7 m/s and experiences an acceleration of 2.40 x 10^13 m/s^2 in the positive x direction when its velocity is in the positive z direction. Determine the magnitude and direction of the field?

In: Computer Science

Lueckenhoff Corporation uses a job-order costing system with a single plantwide predetermined overhead rate based on direct labor-hours. The company based its predetermined overhead rate for the current year on total fixed manufacturing overhead cost of $497,000, variable manufacturing overhead of $2.40 per direct labor-hour, and 70,000 direct labor-hours. The company has provided the following data concerning Job T498 which was recently completed:

Number of units in the job |
40 |

Total direct labor-hours |
80 |

Direct materials |
$ 950 |

Direct labor cost |
$ 2,720 |

The unit product cost for Job T498 is closest to:

In: Computer Science

During the month of September, the following transactions occurred. The applicable sales tax rate is 6%.

Sept. 2 | Sold merchandise on account to Sam Larson, $1,400, plus sales tax. | |

7 | Sold merchandise on account to David Mitchell, $1,900, plus sales tax. | |

12 | Issued credit memorandum to Sam Larson for $689, including sales tax of $39. | |

22 | Sold merchandise on account to Matt Feustal, $500, plus sales tax. | |

28 | Sold merchandise on account to Ana Cardona, $850, plus sales tax. |

Enter the transactions in the general journal. If an amount box does not require an entry, leave it blank.

In: Computer Science

A random variable \(X\) is said to follow the Weibull distribution with shape parameter \(\alpha\) and scale parameter \(\beta\), written \(W(\alpha, \beta)\) if its p.d.f. is given by

$$ f(x)=\frac{\alpha}{\beta^{\alpha}} x^{\alpha-1} e^{-\left(\frac{g}{3}\right)^{\alpha}} $$

for \(x>0\). The Weibull distribution is used to model lifetime of item subject to failure. If \(\alpha \in(0,1),\) it is used to model decreasing failure rate overtime, whereas if \(\alpha>1,\) one models increasing failure rate over time. It is easy to show that the c.d.f. of \(X\) is given by

$$ F(x)=1-e^{-\left(\frac{x}{b}\right)^{\alpha}} $$

(a) Show that \(Y=X^{\alpha} \sim \operatorname{EXP}\left(\beta^{\alpha}\right),\) that is \(E(Y)=\beta^{\alpha}\).

(b) Let \(X_{1}, \ldots, X_{n}\) be a random sample of size \(n\) from \(X\). What is the distribution of

$$ Q=\frac{2 n \sum_{i=1}^{n} Y_{i}}{\beta^{\alpha}} $$

Conclude that \(Q\) is a pivot.

(c) It is of interest to compare the failure rate of two different types of electronics whose lifetimes \(X\) and \(Y\) are assumed to follow \(W\left(\alpha_{1}, 2\right)\) and \(W\left(\alpha_{2}, 2\right)\) respectively. To compare the two failure times, one can compare the failure rates \(2^{\alpha_{1}}\) and \(2^{\alpha_{2}}\) via their ratio or difference. To that end, consider a random sample of size \(n_{1}\left(X_{1}, \ldots X_{n_{2}}\right)\) and \(n_{2}\left(Y_{1}, \ldots, Y_{m_{2}}\right)\) from Population 1 and 2 of electronics respectively. Show that

$$ \frac{2^{\infty_{2}} 2 n_{1} \sum_{i=1}^{n_{1}} X_{i}^{\alpha_{1}}}{2^{\alpha_{1}} 2 n_{2} \sum_{i=1}^{m_{2}} Y_{i}^{\alpha_{2}}} $$

is a pivotal quantity and give its distribution.

(d) Based on your answer in (c), derive a \((1-\alpha) \%\) confidence interval for \(\frac{2^{\infty_{2}}}{2^{\prime \prime}}\).

(e) From your answer in (d), deduce a confidence interval for \(\left(\alpha_{2}-\alpha_{1}\right)\) by passing to logarithm and interpret it.

(f) Application: A random sample of size \(n_{1}=20\) and \(n_{2}=17\) electronics from Type 1 and Type 2 electronics are taken respectively. Derive and interpret the \(95 \%\) confidence interval for \(\left(\alpha_{2}-\alpha_{1}\right)\) and interpret it. What can you really say about that interval in terms of the rate of failure of one type versus the other?

In: Computer Science

Complete the following program skeleton. When finished, the program will ask the user for a length (in inches), convert that value to centimeters, and display the result. You are to write the function convert. (Note: 1 inch = 2.54 cm. Do not modify function main.)

#include #include using namespace std;// Write your function prototype here.int main(){ double measurement; cout ≪ "Enter a length in inches, and I will convert\n"; cout ≪ "it to centimeters: "; cin ≫ measurement; convert(&measurement); cout ≪ fixed ≪ setprecision(4); cout ≪ "Value in centimeters: " ≪ measurement ≪ endl; return 0;}

//

// Write the function convert here.

//

In: Computer Science

Write a function that accepts an int array and the array's size as arguments. The function should create a copy of the array, except that the element values should be reversed int the copy. The function should return a pointer to the new array. Demonstrate the function in a complete program.

In: Computer Science

A 30 nC charge experiences a 0.035 N electric force. What is the magnitude of electric field at the position of this charge?

In: Computer Science

CAN YOU OPEN THE LOCK USING THESE CLUES?

**682** ONE DIGIT IS RIGHT AND IN ITS PLACE

**614** ONE DIGIT IS RIGHT BUT IN THE WRONC PLACE

**206** TWO DIGITS ARE RIGHT BUT BOTH ARE IN THE WRONG PLACE.

**738** ALL DIGITS ARE WRONG

**380** ONE PICIT IS RIGHT BUT IN THE WRING PLACE.

In: Computer Science

How can I fix this MATLAB error Index in position 2 is invalid. Array indices must be positive integers or logical values?

In: Computer Science

Create shell in C which meets the requirements below:

1. The shell must support the following internal commands:

i.

cd - Change the current default directory to

If the argument is not present, report the current directory. If the directory does not exist an appropriate error

should be reported. This command should also change the

PWD environment variable.

ii. clr - Clear the screen.

iii. dir - List the contents of directory.

iv.

environ - List all the environment strings.

v. echo - Display on the display followed by a newline (multiple spaces/tabs may be reduced to a single space).

vi. help - Display the user manual using the more filter.

vii. pause - Pause operation of the shell until 'Enter' is pressed.

viii.

quit - Quit the shell.

ix.

The shell environment should contain shell=/myshell where

/myshell is the full path for the shell executable (not a

the hardwired path back to your directory, but the one from which it was executed).

In: Computer Science

Design a state diagram that detects the 7-bit ASCII code of the last alphabet of your full name from a sequence of incoming bits. Derive the truth table and draw the circuit diagram of this system using D-Flip Flops.

Note: “Muhammad Ali” than you have to detect ASCII code for “i”.

Note : Do this for "i"

In: Computer Science

2. RESEARCH TASK BLOG 3. What different software packages are available to help entrepreneurs with their different record-keeping and control activities (try to find at least two different packages - go beyond the basic Microsoft Office examples)? How effective do you believe software can be for each of these tasks? Write a blog on the ECN (a few paragraphs) about the questions above by Saturday at 5 pm (cite external sources). Before you start writing your blog, read the blogs of the other students in the class that have posted previous to you and come up with different examples than the ones your colleagues already wrote about. This means there is a definite advantage to completing your blog as soon as possible in the module.

In: Computer Science

Java Language

Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detected should print a separate statement followed by a newline. Ex: If passCode is "9a", output is:

Alphabetic at 1

**import** java.util.Scanner;

public class FindAlpha {

public static void main (String [] args) {

Scanner scnr = **new** Scanner(System.in);

String passCode;

passCode = scnr.next();

/* Your solution goes here */

}

}

In: Computer Science

Set hasDigit to true if the 3-character passCode contains a digit. (in C)

#**include** <stdio.h>

#**include** <string.h>

#**include** <stdbool.h>

#**include** <ctype.h>

int main(void) {

bool hasDigit;

char passCode[50];

hasDigit = **false**;

scanf("%s", passCode);

/* Your solution goes here */

**if** (hasDigit) {

printf("Has a digit.\n");

}

**else** {

printf("Has no digit.\n");

}

**return** 0;

}

In: Computer Science