Which of the following are included in calculating this year's GDP?
a. Interest received on a security of the U.S. government
b. The purchases of a new automobile
c. The services of a gardener in weeding her garden
d. The purchase of a life insurance poliy
e. The money received by John when he sells his computer to Mary
f. The purchases of new office equipment by the U.S government
g. Unempolyment compensation benefits received by a former autoworker
h. A new apartment building built by a construction firm
i. Travel by people in Canada to the United States to visit Disneyland
Why do economics prefer to compare real GDP figures for different years instead of nominal GDP figures?
In: Economics
In: Anatomy and Physiology
in. java
Write a program that reads a string from the user, and creates another string with the letters from in reversed order. You should do this using string concatenation and loops. Do not use any method from Java that does the work for you. The reverse string must be built. Do not just print the letters in reversed order. Instead, concatenate them in a string.
--- Sample run: This program will create a string with letters in reversed order. Enter a string: banana The reversed string is: ananab Bye --- Sample run: This program will create a string with letters in reversed order. Enter a string: what the heck The reversed string is: kceh eht tahw Bye
In: Computer Science
COMPLETE IN EXCEL SHOWING EQUATIONS
Variable Growth Valuation Model Given:
Most recent annual cash flow (CFo) $1,000
Stage 1 annual growth rate (gt) 0.15
Stage 2 annual growth rate (gm) 0.05
Duration of stage 1 growth (years) 3
Required return (k) 0.10
Steps in solution:
1) Estimate future cash flows for the duration of the stage 1 growth period:
CF(0) = given $1,000
CF(1) = CF(0) * (1+gt) $1,150
CF(2) = CF(1) * (1+gt) $1,323
CF(3) = CF(2) * (1+gt) $1,521
2) Use EXCEL's built-in NPV function to find the present value of these cash flows.
RATE 0.10
NPV (rate, CF1:CF3) $3,281.09
3) Use the constant growth formula to estimate the value of the firm at the end of the rapid growth period (V3) where:
CF4 = CF3 (1+gm)
CF4 = $1,597
V3 = $1,597 / (0.10-0.05)
Ve = $31,938
4) Use EXCEL's built-in PV function to find the present value of the amount determined in step 3.
FV $31,938
RATE 0.10
NPER 3
PV ($23,996)
(You may ignore the negative sign for this answer. Recall that EXCEL mandates that the amounts entered for PV and FV must have opposite signs.)
5) Add the amounts found in step 2 (the PV of the rapid growth cash flows ) and step 4 (the PV of the normal growth cash flows).
PV of rapid growth cash flows $3,281
PV of normal growth cash flows $23,996
value of the firm $27,277
In: Finance
The following is in C++. The instructions for completion are at the bottom.
#include
#include
#include
#include
#include
#include
// function to determine if a token
vector is_token(const string& s) {
}
int main() {
// make this into a loop such that, like a terminal, input is
accepted until the user hits CTRL+d
string str;
cout<<">";
getline(cin, str);
//vector to store the strings or characters returned by
is_token() function
vector tokens;
tokens = is_token(str);
}
Modify the main() function to loop until the user exits (e.g. by pressing CTRL+d).
Write a function named is_token() that accepts a string of user
input and determines what is a token (see below for token
determination rules).
The function must return the separated tokens.
Determining if something is a token:
1. Whitespace (space, tab, etc) ends a token and is skipped
unless it is in quotes (see below). You will find the function int
isspace(char) useful for detecting whitespace characters.
2. Some characters are considered special tokens: | ; < >
&. When one of these characters is encountered, the token being
built is completed and a new token consisting of the character is
created.
3. The character \ is a special character, i.e. an escape
character. The next character will be part (or the start) of a
token.
4. Items between single or double quotes are treated as parts of
the current token.
5. Characters that do not meet the above rules are added on to the
current token being built.
Some examples to test your output:
Input: > we\'ll do some "crazy \"air quotes\""
Output (tokens separated by commas): we'll, do, some, crazy "air
quotes"
Input: > ls | sort >sorted_files.txt
Output (tokens separated by commas): ls, |, sort, >,
sorted_files.txt
Input: > "now\;is"
Output: now;is
In: Computer Science
1. Which of the following statements is NOT true about the
Revenue Management?
a. Revenue management is based on setting and updating
prices.
b. Revenue management is originated in the airline industry.
c. Through revenue management, the firms can allocate their
capacity to different fare classes over time in order to maximize
revenue.
d. Revenue management focuses on shaping demand via controlling
supply under the limited capacity.
2. According to the Littlewood’s Rule, which of the following
does NOT generate pressure to increase the booking limit?
a. Increase in the full-fare price
b. Increase in the discount-fare price
c. Increase in the plane capacity
d. Decrease in the average full-fare demand
3. A hotel has 200 rooms and the historical show rate is 90%.
What will be the (closest) optimal overbooking level given by the
deterministic overbooking heuristic?
a. 222
b. 180
c. 200
d. None of the above
e. 220
In: Finance
A survey found that women's heights are normally distributed with mean 62.6 in. and standard deviation 2.6 in. The survey also found that men's heights are normally distributed with a mean 67.6 in. and standard deviation 2.7. Complete parts a through c below.
a. Most of the live characters at an amusement park have height requirements with a minimum of 4 ft 9 in. and a maximum of 6 ft 3 in. Find the percentage of women meeting the height requirement.
The percentage of women who meet the height requirement is__%.
(Round to two decimal places as needed.)
b. Find the percentage of men meeting the height requirement.
The percentage of men who meet the height requirement is__%.
(Round to two decimal places as needed.)
c. If the height requirements are changed to exclude only the tallest 5% of men and the shortest 5% of women, what are the new height requirements?
The new height requirements are at least__in. and at most__in.
(Round to one decimal place as needed.)
In: Statistics and Probability
The GDP is an inaccurate measure of wellbeing because:
|
It ignores the black-market |
||
|
"It places no value on activites takes place outside of the marketplace, like giing to the park with the kids" |
||
|
Envirnmental degradation is not accounted for |
||
|
All of the above |
Which of the following items is counted toward US GDP
|
Computer software written in Seattle and sold in India |
||
|
Stock sold in the US stockmarket by a US company to a US buyer. |
||
|
Taxes collected by the US government. |
||
|
The sale of a used car by a North Little Rock used car dealer. |
A used textbook buyer who has been laid off because students can sell used textbooks online is an example of
|
Frictional unemployment |
||
|
Structural unemployment |
||
|
Cyclical unemployment |
||
|
None of the above |
Full employment means
|
Everyone who wants a job has one |
||
|
Everyone has a job regardless of whether they want one |
||
|
"The only unemployed workers are the seasonal, frictional, and structurally unemployed" |
||
|
Everyone in the labor force has a job |
In: Economics
Computer Dynamics (p. 175 of your textbook) is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The LANs in each building are similar, but one building has the data center on the second floor. There are no other office locations. The current network is poorly designed for its current needs and must be completely replaced.
1. Develop a logical design for this enterprise campus that considers the seven network architecture components. There are no other campuses, so you can omit WAN access.
2. Document the assumptions you made in approaching this design.
3. Explain why you have designed the network in this way. Make sure your answers are numbered based on the question presented. Submit as a Microsoft Word document to the correct dropbox by the due date and time posted on the D2L course calendar.
In: Computer Science
In: Biology