Questions
A magazine uses a survey of readers to obtain customer satisfaction ratings for the nation's largest...

A magazine uses a survey of readers to obtain customer satisfaction ratings for the nation's largest retailers. Each survey respondent is asked to rate a specified retailer in terms of six factors: quality of products, selection, value, checkout efficiency, service, and store layout. An overall satisfaction score summarizes the rating for each respondent with 100 meaning the respondent is completely satisfied in terms of all six factors. Sample data representative of independent samples of Retailer A and Retailer B customers are shown below.

Retailer A Retailer B

n1 = 25

n2 = 30

x1 = 79

x2 = 71

Assume that experience with the satisfaction rating scale of the magazine indicates that a population standard deviation of 11 is a reasonable assumption for both retailers. Conduct the hypothesis test.

Find the value of the test statistic. (Round your answer to two decimal places.)

Find the p-value. (Round your answer to four decimal places.)

p-value =

Provide a 95% confidence interval for the difference between the population mean customer satisfaction scores for the two retailers. (Round your answers to two decimal places.)

to

In: Math

Early in 2017, Dobbs Corporation engaged Kiner, Inc. to design and construct a complete modernization of...

Early in 2017, Dobbs Corporation engaged Kiner, Inc. to design and construct a complete modernization of Dobbs's manufacturing facility. Construction was begun on June 1, 2017 and was completed on December 31, 2017. Dobbs made the following payments to Kiner, Inc. during 2017:

Date                                                Payment

June 1, 2017                                 $2,000,000

August 31, 2017                             3,000,000

December 31, 2017                        2,500,000

In order to help finance the construction, Dobbs issued

  1. $1,700,000 of 10-year, 9% bonds payable, issued at par on May 31, 2017, with interest payable annually on May 3
  2. 300,000 shares of no-par common stock, issued at $10 per share on October 1, 2017

In addition to the 9% bonds payable, the only debt outstanding during 2017 was a $425,000, 12% note payable dated January 1, 2013 and due January 1, 2023, with interest payable annually on January 1.

Instructions

Compute the amounts of each of the following (show computations):

  1. Weighted-average accumulated expenditures qualifying for capitalization of interest cost.
  2. Avoidable interest incurred during 2017.
  3. Total amount of interest cost to be capitalized during 2017.

In: Accounting

The Pew Research Center found that 38.6% of adult Americans believe that marriage is now obsolete....

The Pew Research Center found that 38.6% of adult Americans believe that marriage is now obsolete. Suppose a random sample of 550 American adults is asked whether marriage is obsolete. Describe the sampling distribution of " role="presentation">pˆ by using the " role="presentation">N(mean,sd) notation and reporting the mean and standard deviation of the sample proportion of American adults who believe that marriage is now obsolete. What is the probability that in a random sample of 550 American adults that less than 35% believe that marriage is obsolete? Explain your method and TI calculation. What is the probability that in a random sample of 550 American adults that between 45% and 50% believe that marriage is obsolete? Explain your method and TI calculation. Would it be unusual for a random sample of 550 American adults to result in 260 or more who believe marriage is obsolete? How would you determine this?

In: Statistics and Probability

Organizational Unit diagram Active Directory: Design an OU Structure for your company. You should have at...

Organizational Unit diagram Active Directory:

Design an OU Structure for your company.

You should have at least 4 separate IT Sub-groups that will need to be delegated access to their own OU sub-structures.

Plan for separating Users, Computers, Groups, and resources like Printers.

Also plan to have a separated Privileged IT Accounts section.

You also have a Helpdesk Group. Plan for appropriate rights for them.

They will need to reset User Passwords.

A diagram of the OU hierarchy A list of OUs For each OU

In: Computer Science

- What SQL command would you use to make a table for products that includes three...

- What SQL command would you use to make a table for products that includes three columns: a product’s ID, a product’s cost, and a product’s selling price?

- What SQL command would you use to make a table for telephone directory that contains a person’s full name, a person’s cellphone number, and a person’s home phone number?

- What SQL command would you use to make a table for an inventory of network equipment that includes the following: the device name, the physical location, the device’s primary IP address, and date of purchase?

In: Computer Science

my_list = {} Dictionary holding all the lists. s_files = [] # Files with size UNDER...

my_list = {} Dictionary holding all the lists. s_files = [] # Files with size UNDER 50 KB. m_files = [] # Files with size AT LEAST 50 KB and UNDER 5 MB . l_files = [] # Files with size AT LEAST 5 MB, no upper limit. directories = [] # Directories, regardless of size. Write a program using python that loops over each file in a specified directory and checks the size of each file.Create 2-tuple with the filename and size, should append the 2-tuple to a list, and then store all the lists in a dictionary according to the size

In: Computer Science

Create a shell script called (Main.sh). The script must call the following scripts (FileS.sh), (Work.sh), (Ether.sh),...


Create a shell script called (Main.sh). The script must call the following scripts (FileS.sh), (Work.sh), (Ether.sh), (Arch.sh) and (Buzz.sh). The first script Main.sh must have two subroutines.
The First Subroutine will display the following messages on the screen:
1-Display User login name, date and time.
2-Display System boot time.
3-Working path and Shell type
4-Display Home directory and number of files and directories in your Home.
5-Message describing briefly the requited tasks.

In: Computer Science

1. Show how to redirect the standard output of the date command to a file named...

1. Show how to redirect the standard output of the date command to a file named currentdate.

2. Continuing from the previous question: Show how to append the standard output of the who command to the file currentdate.

3. The password file (/etc/passwd) contains one line for each userid registered with the system. Show how to display the number of userids in the passwd file on the screen.

4. Employ a pipe to combine the who and the wc commands to show the number of userids currently logged into the system.

5. Write a Unix command line to list only the 20th last file in the directory /etc.

6. Write a Unix command line to to count how many files and directories you have the execute permission for in your home directory.

7. In the following pipeline, the find command searches all the directories under /etc looking for files owned by userid root. The names of all such files are then written to standard output, one per line. The output of find is piped to wc -1 to count the lines:

find /etc -type f -user root -print | wc -l

As find does its work, it will generate various error messages you don’t want to see. Your goal is to rewrite the pipeline to throw away the error messages without affecting the rest of the output. Show how to do this for BASH shell.

In: Computer Science

QUESTION 1 Match the following LINUX/UNIX commands with what they do. du    whereis users who...

QUESTION 1

Match the following LINUX/UNIX commands with what they do.

du

  

whereis

users

who am i

A.

display a compact list of users currently logged in

B.

locate the binary, source, and manual page files for a command

C.

summarize disk usage

D.

who am i currently logged in as on the Linux server.

QUESTION 2

What rm command option (flag) would you use to remove a file that begins with a - (hyphen)?

-f

-p

--    (read this as dash dash)

-i

QUESTION 3

Execute the finger command as the following: finger fveglian

The output will contain the following line of text: Project: I have three projects to complete by the end of the semester.

From what file in my home directory is the finger command getting that line of text?
Provide only the correct file name.

QUESTION 4

There is a file called lynx in my home directory. It has an i-node number of 16161.

There are two file entries  and  that are hard linked to lynx and have the same i-node number.

What are the two files by name?

QUESTION 5

Reference the man page for the who command.

Which flags (options) when used with the who command will generate the following output?

The output will resemble the following. The date and time may be different.

         system boot 2015-05-16 09:04
         run-level 2 2015-05-16 09:04

In: Computer Science

import java.util.*; import java.security.*; import javax.crypto.*; import java.nio.file.*; public class CryptoApp {    public static void...

import java.util.*;
import java.security.*;
import javax.crypto.*;
import java.nio.file.*;

public class CryptoApp {

   public static void main(String[] args) throws Exception {

Crypto crypto = new BasicCrypto();

       String welcome = "Hello 2043-er's! Let's try this again :-)";
System.out.println(welcome);

// First, where are we?
//Let's print out our current working directory
       Path cwd = FileSystems.getDefault().getPath("").toAbsolutePath();
System.out.println("Current Working Directory: " + cwd);

// Read in our file to encrypt
   byte[] originalData = Files.readAllBytes(Paths.get(System.getProperty("user.home"), "C-2044-Sample/Crypto/src/encrypt.txt"));
// Encrypt it and save into a byte array
byte[] encryptedData = crypto.encrypt(originalData);
       // Decrypt it and save it into another byte array
byte[] decryptedData = crypto.decrypt(encryptedData);

// Write the encrypted text into the original file
Files.write(Paths.get(System.getProperty("user.home"), "test"), encryptedData);
// Write the decrypted text into the decrypted text file
   Files.write(Paths.get(System.getProperty("user.home"), "C-2044-Sample/Crypto/src/decrypt.txt"), decryptedData);

String sendoff = "It's a wrap!";
System.out.println(sendoff);
   }
  
}

Ok so for this code I changed the name of the file from java-2022 to C-2044 to intentionally create an exception.

Exception in thread "main" java.nio.file.NoSuchFileException: /home/runner/C-2044-Sample/Crypto/src/encrypt.txt

so how would I write a try/catch/finally cause to catch one or more specific exception objects.

In: Computer Science