Questions
summer/** * This Object-Oriented version of the "Summer" class * is a simple introduction to constructors...

summer/**
* This Object-Oriented version of the "Summer" class
* is a simple introduction to constructors /
* private data members / static vs. not static / and the
* "toString" method.
*
* SKELETON FOR LAB TEST.
*
* @author Raymond Lister
* @version April 2015;
*/
public class SummerOO
{
public static int numSummers = 0;
// The above variable is used to count the number of
// instances of the class SummerOO that have been created.
// (i.e. the number of objects that have been created.)
//
// Note: "numSummers" is declared as "static". It is a
// variable that belongs to the class, not an
// individual object.
// See Parsons page 117,
// section "6.8 Static Fields and Methods"
// See https://docs.oracle.com/javase/tutorial/java/ ...
// ... javaOO/classvars.html
// Or google java tutorial static fields

/*
* The instance variables follow (i.e. not static). These
* are also called "fields? or ?private data members?.
* Each object has its own copy of these variables.
*/

public int sum; // sum of all integers received
public int count; // number of integers received

/**
* The constructors now follow. There are two constructors.
* Both constructors have the same name, since all
* constructors always have the same name as the class.
* The constructors are distinguishable because one of the
* constructors requires zero parameters while the other
* constructor requires a single integer parameter.
* See Parsons, page 105,
* section 6.3.1 "Overloaded Constructors"
*/

/**
* This is a ?dangerous? constructor, since the average is
* undefined when the object is created.
*
* This constructor and the method reset()
* are similar. The differences are that:
* (1) The constructor can only be used once, when the
* object is created.
* (2) The method reset() can't create an object, but it can
* be used whenever we like, as many times as we like,
* after the object has been created.
*/
public SummerOO()
{
sum = 0;
count = 0;
NumSummers = NumSummers;
}

/**
* This is a safer constructor, since the average is
* well defined when the object is created.
*
* This constructor and the method reset(int firstNumber)
* are similar. The differences are that:
* (1) The constructor can only be used once, when the
* object is created.
* (2) The method reset() can't create an object, but can
* be used whenever we like, as many times as we like,
* after the object has been created.
*
* @param firstNumber The first number of a series
*/
public SummerOO(int firstNumber)
{
sum = firstNumber;
count = 1;
NumSummers = NumSummers + 1;
}

/**
* Receives and processes a new number in the series.
*
* NOTE TO STUDENTS: When studying this code, experiment in
* BlueJ, by adding "static" into "public void putNumber".
* When you compile, you'll get an error message ...
*
* "non-static variable sum cannot be referenced from a
* static context".
*
* In other words a "static" method (which belongs to the
* class, not an individuaual object), can't access the
* variables in an object. This is for two reasons:
* (1) If we haven't created ANY objects yet, then there is
* no variable "sum" to access!
* (2) If multiple objects ("instances") of this
* class exist, then there are multiple versions of
* the "sum" variable, one version of "sum" in each
* object. The static method (which belongs to the
* class) cannot choose from the many versions of "sum".
* The same applies to the variable "count". The error
* message singled out "sum" because it occured before
* "count".
*
* @param newNumber a new number in the series
*/
public /* not static! */ void putNumber(int newNumber)
{
// This method is complete. No changes are required to
// "putNumber" in the lab test.
  
sum = sum + newNumber; // could write "sum += newNumber"
count = count + 1; // could write "++count"
}

/*
* A number of the methods from the "static" version
* have been left out of this object-oriented version.
* That's because Raymond did not wish to test you on
* those methods a second time, having already tested
* your knowledge of those methods in the "static"
* version.
*
* All those methods would appear in a complete
* version of this object-oriented version of the
* class, with the *ONLY* change being that the reserved
* word "static" would be deleted from the method
* header.
*
* The method putNumber() has been copied across to support
* the experiment of adding "static" to its header,
*/

/**
* Note that this is a static method.
*
* @return The number of objects that have been created.
*/
public static int getNumSummers()
{
return NumSummers;
}

/**
* It is common practise to supply a "toString" method
* in an object-oriented class. In fact, if you don't
* explicitly supply such a method, Java produces an
* implicit, simplistic "toString" method which produces
* a String like "SummerOO@1edd1f0". The word before
* the "@" is the name of the class. The hexadecimal
* number after the "@" is called the objects "hash code".
*
* Note: Method "toString" method is NOT "static". It
* can't be static, since the values in the data members
* may vary between objects of this class.
*
* See Nielsen, page 78,
* section "5.2.4 The toString Method"
* See Nielsen, page 165,
* section "8.2.1 Overriding the toString Method"
*
*@return The state of this "class instance" / "object"
*/
public string toString()
{
return "sum = " + sum + " count = " + count;
}

/**
* The purpose of this main method is to reinforce the
* lesson that anything that can be done through a BlueJ
* menu can also been done in some Java code.
*
* @param args Isn't used. Its here because PLATE always expects to see "main" methods which accepts as a parameter an array of Strings.
*/
public static void main(String [] args)
{
ClassName summer1 = new nameOfConstructor();
// the above line used the zero parameter constructor.

summer1.putNumber(17);
summer1.putNumber(1);

System.out.println(summer1.toString());
// in the above line, the ".toString()" can be omitted,
// to give just ...
// System.out.println(summer1);
//
// When the name of an object is given where a String
// is required (and println requires a String), Java
// automatically calls the "toString()" method of the
// object.

// Repeat for a second set of numbers
System.out.println();

ClassName summer2 = new nameOfConstructor(3);
// above line used the constructor that takes a parameter

summer2.putNumber(5);
summer2.putNumber(7);
System.out.println(summer2);
// in the above line, Java automatically calls the
// "toString()" method of the "summer2" object.

} // method main

} // class SummerOO

In: Computer Science

Morrow Enterprises Inc. manufactures bathroom fixtures. The stockholders’ equity accounts of Morrow Enterprises Inc., with balances...

Morrow Enterprises Inc. manufactures bathroom fixtures. The stockholders’ equity accounts of Morrow Enterprises Inc., with balances on January 1, 2016, are as follows:

Common stock, $20 stated value; 500,000 shares authorized, 352,000 issued $7,040,000
Paid-In Capital in Excess of Stated Value—Common Stock 774,400
Retained Earnings 32,153,000
Treasury Stock (25,200 shares, at cost) 478,800

The following selected transactions occurred during the year:

Jan. 22 Paid cash dividends of $0.05 per share on the common stock. The dividend had been properly recorded when declared on December 1 of the preceding fiscal year for $16,340.
Apr. 10 Issued 73,000 shares of common stock for $25 per share.
Jun. 6 Sold all of the treasury stock for $27 per share.
Jul. 5 Declared a 5% stock dividend on common stock, to be capitalized at the market price of the stock, which is $25 per share.
Aug. 15 Issued the certificates for the dividend declared on July 5.
Nov. 23 Purchased 25,000 shares of treasury stock for $18 per share.
Dec. 28 Declared a $0.08-per-share dividend on common stock.
31 Closed the credit balance of the income summary account, $1,223,000.
31 Closed the two dividends accounts to Retained Earnings.
Required:
A. Enter the January 1 balances in T accounts for the stockholders’ equity accounts listed.
B. Journalize the entries to record the transactions, and post to the eight selected accounts. No post ref is required in the journal. Refer to the Chart of Accounts for exact wording of account titles.
C. Prepare a retained earnings statement for the year ended December 31, 2016. Enter all amounts as positive numbers. The word “Less” is not required.*
D. Prepare the Stockholders’ Equity section of the December 31, 2016, balance sheet. “Less” or “Deduct” will automatically appear if it is required. *
* Refer to the list of Amount Descriptions provided for the exact wording of the answer choices for text entries.

Chart of Accounts

CHART OF ACCOUNTS
Morrow Enterprises Inc.
General Ledger
ASSETS
110 Cash
120 Accounts Receivable
131 Notes Receivable
132 Interest Receivable
141 Merchandise Inventory
145 Office Supplies
151 Prepaid Insurance
181 Land
193 Equipment
194 Accumulated Depreciation-Equipment
LIABILITIES
210 Accounts Payable
221 Notes Payable
226 Interest Payable
231 Cash Dividends Payable
236 Stock Dividends Distributable
241 Salaries Payable
261 Mortgage Note Payable
EQUITY
311 Common Stock
313 Paid-In Capital in Excess of Stated Value-Common Stock
315 Treasury Stock
321 Preferred Stock
322 Paid-In Capital in Excess of Par-Preferred Stock
331 Paid-In Capital from Sale of Treasury Stock
340 Retained Earnings
351 Cash Dividends
352 Stock Dividends
390 Income Summary
REVENUE
410 Sales
610 Interest Revenue
EXPENSES
510 Cost of Merchandise Sold
515 Credit Card Expense
520 Salaries Expense
531 Advertising Expense
532 Delivery Expense
533 Selling Expenses
534 Rent Expense
535 Insurance Expense
536 Office Supplies Expense
537 Organizational Expenses
562 Depreciation Expense-Equipment
590 Miscellaneous Expense
710 Interest Expense

Amount Descriptions

Amount Descriptions
Cash balance, July 31, 2016
Common stock, $20 stated value; 500,000 shares authorized, 352,000 issued
Common stock, $20 stated value; 500,000 shares authorized, 421,250 issued
Common stock, $20 stated value; 500,000 shares authorized, 446,250 issued
Decrease in retained earnings
Dividends
Excess of issue price over stated value
For the Year Ended December 31, 2016
From sale of treasury stock
Increase in retained earnings
Net income
Net loss
Retained earnings
Retained earnings, December 31, 2016
Retained earnings, January 1, 2016
Total
Total paid-in capital
Total stockholders’ equity

T Accounts

A. Enter the January 1 balances in T accounts for the stockholders’ equity accounts listed. Post the journal entries from part B to the eight selected accounts. No post ref is required in the journal.

Common Stock
Jan. 1 Bal.
Apr. 10
Aug. 15
Dec. 31 Bal.
Paid-In Capital in Excess of Stated Value-Common Stock
Jan. 1 Bal.
Apr. 10
Jul. 5
Dec. 31 Bal.
Retained Earnings
Dec. 31 Jan. 1 Bal.
Dec. 31
Dec. 31 Bal.
Treasury Stock
Jan. 1 Bal. Jun. 6
Nov. 23
Dec. 31 Bal.
Paid-In Capital from Sale of Treasury Stock
Jun. 6
Stock Dividends Distributable
Aug. 15 Jul. 5
Stock Dividends
Jul. 5 Dec. 31
Cash Dividends
Dec. 28 Dec. 31

Journal

B. Journalize the entries to record the transactions. No post ref is required in the journal. Refer to the Chart of Accounts for exact wording of account titles.

PAGE 10

JOURNAL

DATE DESCRIPTION POST. REF. DEBIT CREDIT

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

Retained Earnings Statement

C. Prepare a retained earnings statement for the year ended December 31, 2016. Enter all amounts as positive numbers. The word “Less” is not required. Refer to the list of Amount Descriptions provided for the exact wording of the answer choices for text entries.

Morrow Enterprises

Retained Earnings Statement

For the Year Ended December 31, 2016

1

2

3

4

5

Stockholders’ Equity

D. Prepare the Stockholders’ Equity section of the December 31, 2016 balance sheet. “Less” or “Deduct” will automatically appear if it is required. Refer to the list of Amount Descriptions provided for the exact wording of the answer choices for text entries.

Stockholders’ Equity

1

Paid-in capital:

2

3

4

5

6

7

8

9

In: Accounting

Royal Barton started thinking about an electric fishing reel when his father had a stroke and...

Royal Barton started thinking about an electric fishing reel when his father had a stroke and lost the use of an arm. To see that happen to his dad, who had taught him the joys of fishing and hunting, made Barton realize what a chunk a physical handicap could take out of a sports enthusiast’s life. Being able to cast and retrieve a lure and experience the thrill of a big bass trying to take your rig away from you were among the joys of life that would be denied Barton’s father forever. Barton was determined to do something about it, if not for his father, then at least for others who had suffered a similar fate. So, after tremendous personal expense and years of research and development, Barton perfected what is sure to be the standard bearer for all future freshwater electric reels. Forget those saltwater jobs, which Barton refers to as “winches.” He has developed something that is small, compact, and has incredible applications. He calls it the Royal Bee. The first word is obviously his first name. The second word refers to the low buzzing sound the reel makes when in use. The Royal Bee system looks simple enough and probably is if you understand the mechanical workings of a reel. A system of gears ties into the spool, and a motor in the back drives the gears attached to the triggering system. All gearing of the electrical system can be disengaged so that you can cast normally. But pushing the button for “retrieve” engages two gears. After the gears are engaged, the trigger travels far enough to touch the switch that tightens the drive belt, and there is no slipping. You cannot hit the switch until the gears are properly engaged. This means that you cast manually, just as you would normally fish, then you reengage the reel for the level wind to work. And you can do all that with one hand! The system works on a 6-volt battery that you can attach to your belt or hang around your neck if you are wading. If you have a boat with a 6-volt battery, the reel can actually work off of the battery. There is a small connector that plugs into the reel, so you could easily use more than one reel with the battery. For instance, if you have two or three outfits equipped with different lures, you just switch the connector from reel to reel as you use it. A reel with the Royal Bee system can be used in a conventional manner. You do not have to use it as an electric reel unless you choose to do so. Barton believes the Royal Bee may not be just for handicapped fishermen. Ken Cook, one of the leading professional anglers in the country, is sold on the Royal Bee. After he suffered a broken arm, he had to withdraw from some tournaments because fishing with one hand was difficult. By the time his arm healed, he was hooked on the Royal Bee because it increased bassing efficiency. As Cook explains, “The electric reel has increased my efficiency in two ways. One is in flipping, where I use it all the time. The other is for fishing top water, when I have to make a long cast. When I’m flipping, the electric reel gives me instant control over slack line. I can keep both hands on the rod. I never have to remove them to take up slack. I flip, engage the reel, and then all I have to do is push the lever with my thumb to take up slack instantly.” Cook’s reel (a Ryobi 4000) is one of several that can be converted to the electric retrieve. For flipping, Cook loads his reel with 20- pound test line. He uses a similar reel with lighter line when fishing a surface lure. “What you can do with the electric reel is eliminate unproductive reeling time,” Cook says. A few extra seconds may not mean much if you are out on a neighborhood pond just fishing on the weekend. But it can mean a lot if you are in tournament competition, where one extra cast might keep you from going home with $50,000 tucked in your pocket. “Look at it this way,” Cook explains. “Let’s suppose we’re in clear water and it’s necessary to make a long cast to the cover we want to fish with a top water lure. There’s a whole lot of unproductive water between us and the cover. With the electric reel, I make my long cast and fish the cover. Then, when I’m ready to reel in, I just press the retrieve lever, so the battery engages the necessary gears, and I’ve got my lure back ready to make another cast while you’re still cranking.” When Royal Barton retired from his veterinary supply business, he began enjoying his favorite pastimes: hunting, fishing, and developing the Royal Bee system. He realized he needed help in marketing his product, so he sought professional assistance to learn how to reach the broadest possible market for the Royal Bee system.

Questions

1. What business research problem does Royal Barton face? Outline some survey research objectives for a research project on the Royal Bee system.

2. What type of survey—personal interview, telephone interview, or mail survey—should be selected? Why?

3. What sources of survey error are most likely to occur in a study of this type?

4. Suppose the speed limits in 13 countries in miles per hour are as follows:

Country    Highway Miles per Hour

Italy. 87

France 81

Hungary 75

Belgium 75 \

Portugal 75

Great Britain 70

Spain 62

Denmark 62

Netherlands 62

Greece 62

Japan 62

Norway 56

Turkey. 56

a) What is the mean, median, and mode for these data?

b) Calculate the standard deviation for the data.

c) Calculate the expected value of the speed limit with a confidence interval of 98%.

5. Suppose a survey researcher studying annual expenditures on lipstick wishes to have a 99 percent confidence level and a range of error (E) of less than $2. If the estimate of the standard deviation is $29, what sample size is required for this?

In: Operations Management

Overview Your assignment is to complete a network diagram for a small company. You will place...

Overview Your assignment is to complete a network diagram for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators, and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated. ABC Corporation’s Network Description ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber. There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor. The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces. The first floor has the shipping/receiving department, manufacturing department, and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are twenty people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex, and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles. The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server. Layer 2/3 Network Devices Each floor needs to have an Ethernet switch in its network closet. Determine the number of ports that are needed on each floor. Don’t forget the basement. The server farm and DMZ each will need to have its own switch, separated from the users’ network. Each switch connects to a centralized router on a different interface, giving one subnetwork for each floor of the network, plus one for the server farm, one for the DMZ, and one for the Internet. Determine how many ports the router needs. IP Address Assignments The router will perform Network Address Translation between the local network and the Internet. Therefore, for each sub-network, assign a CIDR /24 sized network from the IANA private range of 172.28.0.0/16. One network should get 172.28.1.0/24, the next should get 172.28.2.0/24, the next should get 172.28.3.0/24 etc. While you could optimize the use of the IP range by using smaller subnets, this is not required in this assignment. Create a Network Diagram Your network diagram needs to include the following elements: • An Internet Service Provider Network (represented as a cloud) • Router with enough ports to meet the needs of the organization • A switch for each floor – you will need to identify how many ports each switch on each floor needs to have • You DO NOT need to show every single computer on your diagram. However, you need to show groups of computers, plus their use. So, if there are 5 people in the same department, you can show all 5 computers with one icon/glyph and label it appropriately. • Each grouping of computers needs to have the IP Address range documented on the diagram. Assign the x.x.x.1 address of each network to the appropriate port on the router. Network Documentation Your network design document needs to explain each element of the network. Each Layer two (switch) and Layer three (Router) device needs to be described in terms of number of ports. The number of computers for each department and floor also needs to be documented. The IP address ranges need to be explained – including the IP Address range that you assigned, the number of IP Addresses that the subnetwork will use, and the number of IP addresses that remain unused in that subnet. What to Turn In For assignments that require you to submit Visio work, please export your file and submit as a PDF. Also, please submit your original Visio file. You also need to turn in a Word document (.doc or .docx) file that explains your network diagram elements. Include snapshots from your network diagram in your Word document – and annotate your diagram snapshots to better help your explanation of your network.

In: Computer Science

The purpose of creating an abstract class is to model an abstract situation. Example: You work...

The purpose of creating an abstract class is to model an abstract situation.

Example:

You work for a company that has different types of customers: domestic, international, business partners, individuals, and so on. It well may be useful for you to "abstract out" all the information that is common to all of your customers, such as name, customer number, order history, etc., but also keep track of the information that is specific to different classes of customer. For example, you may want to keep track of additional information for international customers so that you can handle exchange rates and customs-related activities, or you may want to keep track of additional tax-, company-, and department-related information for business customers.

Modeling all these customers as one abstract class ("Customer") from which many specialized customer classes derive or inherit ("InternationalCustomer," "BusinessCustomer," etc.) will allow you to define all of that information your customers have in common and put it in the "Customer" class, and when you derive your specialized customer classes from the abstract Customer class you will be able to reuse all of those abstract data/methods.This approach reduces the coding you have to do which, in turn, reduces the probability of errors you will make. It also allows you, as a programmer, to reduce the cost of producing and maintaining the program.

In this assignment, you will analyze Java™ code that declares one abstract class and derives three concrete classes from that one abstract class. You will read through the code and predict the output of the program.

Read through the linked Java™ code carefully.

Predict the result of running the Java™ code. Write your prediction into a Microsoft® Word document, focusing specifically on what text you think will appear on the console after running the Java™ code.

In the same Word document, answer the following question:

  • Why would a programmer choose to define a method in an abstract class, such as the Animal constructor method or the getName() method in the linked code example, as opposed to defining a method as abstract, such as the makeSound() method in the linked example?

CODE:

/**********************************************************************

*           Program:          PRG/421 Week 1 Analyze Assignment

*           Purpose:           Analyze the coding for an abstract class

*                                   and two derived classes, including overriding methods

*           Programmer:     Iam A. Student

*           Class:               PRG/421r13, Java Programming II

*           Instructor:        

*           Creation Date:   December 13, 2017

*

* Comments:

* Notice that in the abstract Animal class shown here, one method is

* concrete (the one that returns an animal's name) because all animals can

* be presumed to have a name. But one method, makeSound(), is declared as

* abstract, because each concrete animal must define/override the makeSound() method

* for itself--there is no generic sound that all animals make.

**********************************************************************/

package mytest;

// Animal is an abstract class because "animal" is conceptual

// for our purposes. We can't declare an instance of the Animal class,

// but we will be able to declare an instance of any concrete class

// that derives from the Animal class.

abstract class Animal {

// All animals have a name, so store that info here in the superclass.

// And make it private so that other programmers have to use the

// getter method to access the name of an animal.

private final String animalName;

// One-argument constructor requires a name.

public Animal(String aName) {

animalName = aName;

}

// Return the name of the animal when requested to do so via this

// getter method, getName().

public String getName() {

return animalName;

}

// Declare the makeSound() method abstract, as we have no way of knowing

// what sound a generic animal would make (in other words, this

// method MUST be defined differently for each type of animal,

// so we will not define it here--we will just declare a placeholder

// method in the animal superclass so that every class that derives from

// this superclass will need to provide an override method

// for makeSound()).

public abstract String makeSound();

};

// Create a concrete subclass named "Dog" that inherits from Animal.

// Because Dog is a concrete class, we can instantiate it.

class Dog extends Animal {

// This constructor passes the name of the dog to

// the Animal superclass to deal with.

public Dog(String nameOfDog) {

super(nameOfDog);

}

// This method is Dog-specific.

@Override

public String makeSound() {

return ("Woof");

}

}

// Create a concrete subclass named "Cat" that inherits from Animal.

// Because Cat is a concrete class, we can instantiate it.

class Cat extends Animal {

// This constructor passes the name of the cat on to the Animal

// superclass to deal with.

public Cat(String nameOfCat) {

super(nameOfCat);

}

// This method is Cat-specific.

@Override

public String makeSound() {

return ("Meow");

}

}

class Bird extends Animal {

// This constructor passes the name of the bird on to the Animal

// superclass to deal with.

public Bird (String nameOfBird) {

super(nameOfBird);

}

// This method is Bird-specific.

@Override

public String makeSound() {

return ("Squawk");

}

}

public class MyTest {

public static void main(String[] args) {

// Create an instance of the Dog class, passing it the name "Spot."

// The variable aDog that we create is of type Animal.

Animal aDog = new Dog("Spot");

// Create an instance of the Cat class, passing it the name "Fluffy."

// The variable aCat that we create is of type Animal.

Animal aCat = new Cat("Fluffy");

// Create an instance of (instantiate) the Bird class.

Animal aBird = new Bird("Tweety");

//Exercise two different methods of the aDog instance:

// 1) getName() (which was defined in the abstract Animal class)

// 2) makeSound() (which was defined in the concrete Dog class)

System.out.println("The dog named " + aDog.getName() + " will make this sound: " + aDog.makeSound());

//Exercise two different methods of the aCat instance:

// 1) getName() (which was defined in the abstract Animal class)

// 2) makeSound() (which was defined in the concrete Cat class)

System.out.println("The cat named " + aCat.getName() + " will make this sound: " + aCat.makeSound());

System.out.println("The bird named " + aBird.getName() + " will make this sound: " + aBird.makeSound());

}

}

In: Computer Science

Story: "Rice" The daughter of Indian immigrants, Jhumpa Lahiri was born in London in 1967. Her...

Story: "Rice"

The daughter of Indian immigrants, Jhumpa Lahiri was born in London in 1967. Her family moved to the United States, where she attended Barnard College and received multiple graduate degrees, including a Ph.D. in Renaissance studies from Boston University. She is the author of three books, including Interpreter of Maladies (1999) and The Namesake (2003), as well as many short stories. Lahiri has won several literary awards, including a Pulitzer Prize and a PEN/Hemingway Award. Her fiction often explores Indian and Indian-American life and culture — as does this personal essay, which originally appeared in the New Yorker magazine. Background on rice Along with corn and wheat, rice remains one of the most important crops in the world, especially in Asia, where it has been cultivated for thousands of years. Rice accounts for between 35 percent and 85 percent of the calories consumed by billions of people living in India, China, and other Asian countries. Indeed, the ancient Indian word for rice (“dhanya”) means “sustainer of the human race.” But rice can be symbolic as well: we throw rice at weddings because it suggests fertility and prosperity. For Lahiri, the significance of rice is personal rather than universal. She describes her father’s pulao dish as both an expression of his idiosyncratic personality and a symbol that binds her family together. My father, seventy-eight, is a methodical man. For thirty-nine years, he has had the same job, cataloguing books for a university library. He drinks two glasses of water first thing in the morning, walks for an hour every day, and devotes almost as much time, before bed, to flossing his teeth. “Winging it” is not a term that comes to mind in describing my father. When he’s driving to new places, he does not enjoy getting lost. In the kitchen, too, he walks a deliberate line, counting out the raisins that go into his oatmeal (fifteen) and never boiling even a drop more water than required for tea. It is my father who knows how many cups of rice are necessary to feed four, or forty, or a hundred and forty people. He has a reputation for andaj — the Bengali word for “estimate” — accurately gauging quantities that tend to baffle other cooks. An oracle of rice, if you will. But there is another rice that my father is more famous for. This is not the white rice, boiled like pasta and then drained in a colander, that most Bengalis eat for dinner. This other rice is pulao, a baked, buttery, sophisticated indulgence, Persian in origin, served at festive occasions. I have often watched him make it. It involves sautéing grains of basmati in butter, along with cinnamon sticks, cloves, bay leaves, and cardamom pods. In go halved cashews and raisins (unlike the oatmeal raisins, these must be golden, not 1 2 3 08_KIR_67684_CH7_151_210.indd 172 Achorn International 11/04/2011 03:45PM 08_KIR_67684_CH7_151_210.indd 173 Achorn International 11/04/2011 03:45PM lahiri /Rice 173 black). Ginger, pulverized into a paste, is incorporated, along with salt and sugar, nutmeg and mace, saffron threads if they’re available, ground turmeric if not. A certain amount of water is added, and the rice simmers until most of the water evaporates. Then it is spread out in a baking tray. (My father prefers disposable aluminum ones, which he recycled long before recycling laws were passed.) More water is flicked on top with his fingers, in the ritual and cryptic manner of Catholic priests. Then the tray, covered with foil, goes into the oven, until the rice is cooked through and not a single grain sticks to another. Despite having a superficial knowledge of the ingredients and the technique, I have no idea how to make my father’s pulao, nor would I ever dare attempt it. The recipe is his own, and has never been recorded. There has never been an unsuccessful batch, yet no batch is ever identical to any other. It is a dish that has become an extension of himself, that he has perfected, and to which he has earned the copyright. A dish that will die with him when he dies. In 1968, when I was seven months old, my father made pulao for the first time. We lived in London, in Finsbury Park, where my parents shared the kitchen, up a steep set of stairs in the attic of the house, with another Bengali couple. The occasion was my annaprasan, a rite of passage in which Bengali children are given solid food for the first time; it is known colloquially as a bhath, which happens to be the Bengali word for “cooked rice.” In the oven of a stove no more than twenty inches wide, my father baked pulao for about thirty-five people. Since then, he has made pulao for the annaprasans of his friends’ children, for birthday parties and anniversaries, for bridal and baby showers, for wedding receptions, and for my sister’s Ph.D. party. For a few decades, after we moved to the United States, his pulao fed crowds of up to four hundred people, at events organized by Prabasi, a Bengali cultural institution in New England, and he found himself at institutional venues — schools and churches and community centers — working with industrial ovens and stoves. This has never unnerved him. He could probably rig up a system to make pulao out of a hot-dog cart, were someone to ask. There are times when certain ingredients are missing, when he must use almonds instead of cashews, when the raisins in a friend’s cupboard are the wrong color. He makes it anyway, with exacting standards but a sanguine hand. When my son and daughter were infants, and we celebrated their annaprasans, we hired a caterer, but my father made the pulao, preparing it at home in Rhode Island and transporting it in the trunk of his car to Brooklyn. The occasion, both times, was held at the Society for Ethical Culture, in Park Slope. In 2002, for my son’s first taste of rice, my father warmed the trays on the premises, in the giant oven in the basement. But by 2005, when it was my daughter’s turn, the representative on duty would not permit my father to use the oven, telling him that he was not a licensed cook. My father transferred the pulao from his aluminum 4 5 6 7 08_KIR_67684_CH7_151_210.indd 174 Achorn International 11/04/2011 03:45PM 08_KIR_67684_CH7_151_210.indd 175 Achorn International 11/04/2011 03:45PM trays into glass baking dishes, and microwaved, batch by batch, rice that fed almost a hundred people. When I asked my father to describe that experience, he expressed no frustration. “It was fine,” he said. “It was a big microwave.”

Comprehension

1. How does Lahiri describe her father? What is his most important character trait?

2. According to Lahiri, what is special about pulao? Why is it served just on festive occasions?

3. What is an annaprasan? Why is this occasion so important to Bengalis?

4. Why, according to Lahiri, would she never try to make pulao?

5. What does Lahiri mean when she says that pulao is a dish for which her father “has earned the copyright” (4)?

Purpose and Audience

1. How much does Lahiri assume her readers know about Bengali culture? How can you tell?

2. Is this essay simply about rice — more specifically pulao — or is it also about something else? Explain.

3. Does this essay have an explicitly stated or an implied thesis? What dominant impression do you think Lahiri wants to convey?

Style and Structure

1. Why does Lahiri begin her essay by describing her father?

2. This essay is divided into three parts: the first describes Lahiri’s father; the second describes the making of pulao; and the third describes the occasions on which her father cooked pulao. How does Lahiri signal the shift from one part of the essay to another? What other strategies could she have used?

3. Why does Lahiri go into so much detail about her father’s pulao recipe?

4. What does pulao mean to Lahiri? Does it have the same meaning for her father? Explain.

5. Why does Lahiri end her essay with a quotation? Is this an effective closing strategy? What other strategies could she have used? 174 Description 08_KIR_67684_CH7_151_210.indd 174 Achorn International 11/04/2011 03:45PM 08_KIR_67684_CH7_151_210.indd 175 Achorn International 11/04/2011 03:45PM Lahiri /Rice 175

Vocabulary Projects

1. Define each of the following words as it is used in this selection. methodical (1) colander (3) deliberate (2) sanguine (6) oracle (2) 2. Throughout her essay, Lahiri uses several Bengali words. What might she have gained or lost if she had used English equivalents?

Journal Entry

What food do you associate with a specific member of your family? Why do you think this food has the association it does?

In: Psychology

Please post two email usage guidelines that you feel are most important to follow and tell...

Please post two email usage guidelines that you feel are most important to follow and tell us why you feel those guidelines are important (guidelines may be found online or from your experience).

1. Be concise and to the point.

Do not make an e-mail longer than it needs to be. Remember that reading an e-mail is harder than reading printed communications and a long e-mail can be very discouraging to read.

2. Answer all questions, and pre-empt further questions.

An email reply must answer all questions, and pre-empt further questions – If you do not answer all the questions in the original email, you will receive further e-mails regarding the unanswered questions, which will not only waste your time and your customer’s time but also cause considerable frustration. Moreover, if you are able to pre-empt relevant questions, your customer will be grateful and impressed with your efficient and thoughtful customer service. Imagine for instance that a customer sends you an email asking which credit cards you accept. Instead of just listing the credit card types, you can guess that their next question will be about how they can order, so you also include some order information and a URL to your order page. Customers will definitely appreciate this.

3. Use proper spelling, grammar & punctuation.

This is not only important because improper spelling, grammar and punctuation give a bad impression of your company, it is also important for conveying the message properly. Emails with no full stops or commas are difficult to read and can sometimes even change the meaning of the text. And, if your program has a spell checking option, why not use it?

4. Make it personal.

Not only should the e-mail be personally addressed, it should also include personal i.e. customized content. For this reason auto replies are usually not very effective. However, templates can be used effectively in this way, see next tip.

5. Use templates for frequently used responses.

Some questions you get over and over again, such as directions to your office or how to subscribe to your newsletter. Save these texts as response templates and paste these into your message when you need them. You can save your templates in a Word document, or use pre-formatted emails. Even better is a tool such as ReplyMate for Outlook (allows you to use 10 templates for free).

6. Answer swiftly.

Customers send an e-mail because they wish to receive a quick response. If they did not want a quick response they would send a letter or a fax. Therefore, each e-mail should be replied to within at least 24 hours, and preferably within the same working day. If the email is complicated, just send an email back saying that you have received it and that you will get back to them. This will put the customer's mind at rest and usually customers will then be very patient!

7. Do not attach unnecessary files.

By sending large attachments you can annoy customers and even bring down their e-mail system. Wherever possible try to compress attachments and only send attachments when they are productive. Moreover, you need to have a good virus scanner in place since your customers will not be very happy if you send them documents full of viruses!

8. Use proper structure & layout.

Since reading from a screen is more difficult than reading from paper, the structure and lay out is very important for e-mail messages. Use short paragraphs and blank lines between each paragraph. When making points, number them or mark each point as separate to keep the overview.

9. Do not overuse the high priority option.

We all know the story of the boy who cried wolf. If you overuse the high priority option, it will lose its function when you really need it. Moreover, even if a mail has high priority, your message will come across as slightly aggressive if you flag it as 'high priority'.

10. Do not write in CAPITALS.

IF YOU WRITE IN CAPITALS IT SEEMS AS IF YOU ARE SHOUTING. This can be highly annoying and might trigger an unwanted response in the form of a flame mail. Therefore, try not to send any email text in capitals.

11. Don't leave out the message thread.

When you reply to an email, you must include the original mail in your reply, in other words click 'Reply', instead of 'New Mail'. Some people say that you must remove the previous message since this has already been sent and is therefore unnecessary. However, I could not agree less. If you receive many emails you obviously cannot remember each individual email. This means that a 'threadless email' will not provide enough information and you will have to spend a frustratingly long time to find out the context of the email in order to deal with it. Leaving the thread might take a fraction longer in download time, but it will save the recipient much more time and frustration in looking for the related emails in their inbox!

12. Add disclaimers to your emails.

It is important to add disclaimers to your internal and external mails, since this can help protect your company from liability. Consider the following scenario: an employee accidentally forwards a virus to a customer by email. The customer decides to sue your company for damages. If you add a disclaimer at the bottom of every external mail, saying that the recipient must check each email for viruses and that it cannot be held liable for any transmitted viruses, this will surely be of help to you in court (read more about email disclaimers). Another example: an employee sues the company for allowing a racist email to circulate the office. If your company has an email policy in place and adds an email disclaimer to every mail that states that employees are expressly required not to make defamatory statements, you have a good case of proving that the company did everything it could to prevent offensive emails.

13. Read the email before you send it.

A lot of people don't bother to read an email before they send it out, as can be seen from the many spelling and grammar mistakes contained in emails. Apart from this, reading your email through the eyes of the recipient will help you send a more effective message and avoid misunderstandings and inappropriate comments.

14. Do not overuse Reply to All.

Only use Reply to All if you really need your message to be seen by each person who received the original message.

15. Mailings > use the Bcc: field or do a mail merge.

When sending an email mailing, some people place all the email addresses in the To: field. There are two drawbacks to this practice: (1) the recipient knows that you have sent the same message to a large number of recipients, and (2) you are publicizing someone else's email address without their permission. One way to get round this is to place all addresses in the Bcc: field. However, the recipient will only see the address from the To: field in their email, so if this was empty, the To: field will be blank and this might look like spamming. You could include the mailing list email address in the To: field, or even better, if you have Microsoft Outlook and Word you can do a mail merge and create one message for each recipient. A mail merge also allows you to use fields in the message so that you can for instance address each recipient personally. For more information on how to do a Word mail merge, consult the Help in Word.

16. Take care with abbreviations and emoticons.

In business emails, try not to use abbreviations such as BTW (by the way) and LOL (laugh out loud). The recipient might not be aware of the meanings of the abbreviations and in business emails these are generally not appropriate. The same goes for emoticons, such as the smiley :-). If you are not sure whether your recipient knows what it means, it is better not to use it.

17. Be careful with formatting.

Remember that when you use formatting in your emails, the sender might not be able to view formatting, or might see different fonts than you had intended. When using colors, use a color that is easy to read on the background.

18. Take care with rich text and HTML messages.

Be aware that when you send an email in rich text or HTML format, the sender might only be able to receive plain text emails. If this is the case, the recipient will receive your message as a .txt attachment. Most email clients however, including Microsoft Outlook, are able to receive HTML and rich text messages.

19. Do not forward chain letters.

Do not forward chain letters. We can safely say that all of them are hoaxes. Just delete the letters as soon as you receive them.

20. Do not request delivery and read receipts.

This will almost always annoy your recipient before he or she has even read your message. Besides, it usually does not work anyway since the recipient could have blocked that function, or his/her software might not support it, so what is the use of using it? If you want to know whether an email was received it is better to ask the recipient to let you know if it was received.

21. Do not ask to recall a message.

Biggest chances are that your message has already been delivered and read. A recall request would look very silly in that case wouldn't it? It is better just to send an email to say that you have made a mistake. This will look much more honest than trying to recall a message.

22. Do not copy a message or attachment without permission.

Do not copy a message or attachment belonging to another user without permission of the originator. If you do not ask permission first, you might be infringing on copyright laws.

23. Do not use email to discuss confidential information.

Sending an email is like sending a postcard. If you don't want your email to be displayed on a bulletin board, don't send it. Moreover, never make any libelous, sexist or racially discriminating comments in emails, even if they are meant to be a joke.

24. Use a meaningful subject.

Try to use a subject that is meaningful to the recipient as well as yourself. For instance, when you send an email to a company requesting information about a product, it is better to mention the actual name of the product, e.g. 'Product A information' than to just say 'product information' or the company's name in the subject.

25. Use active instead of passive.

Try to use the active voice of a verb wherever possible. For instance, 'We will process your order today', sounds better than 'Your order will be processed today'. The first sounds more personal, whereas the latter, especially when used frequently, sounds unnecessarily formal.

26. Avoid using URGENT and IMPORTANT.

Even more so than the high-priority option, you must at all times try to avoid these types of words in an email or subject line. Only use this if it is a really, really urgent or important message.

27. Avoid long sentences.

Try to keep your sentences to a maximum of 15-20 words. Email is meant to be a quick medium and requires a different kind of writing than letters. Also take care not to send emails that are too long. If a person receives an email that looks like a dissertation, chances are that they will not even attempt to read it!

28. Don't send or forward emails containing libelous, defamatory, offensive, racist or obscene remarks.

By sending or even just forwarding one libelous, or offensive remark in an email, you and your company can face court cases resulting in multi-million dollar penalties.

29. Don't forward virus hoaxes and chain letters.

If you receive an email message warning you of a new unstoppable virus that will immediately delete everything from your computer, this is most probably a hoax. By forwarding hoaxes you use valuable bandwidth and sometimes virus hoaxes contain viruses themselves, by attaching a so-called file that will stop the dangerous virus. The same goes for chain letters that promise incredible riches or ask your help for a charitable cause. Even if the content seems to be bona fide, the senders are usually not. Since it is impossible to find out whether a chain letter is real or not, the best place for it is the recycle bin.

30. Keep your language gender neutral.

In this day and age, avoid using sexist language such as: 'The user should add a signature by configuring his email program'. Apart from using he/she, you can also use the neutral gender: ''The user should add a signature by configuring the email program'.

31. Don't reply to spam.

By replying to spam or by unsubscribing, you are confirming that your email address is 'live'. Confirming this will only generate even more spam. Therefore, just hit the delete button or use email software to remove spam automatically.

32. Use cc: field sparingly.

Try not to use the cc: field unless the recipient in the cc: field knows why they are receiving a copy of the message. Using the cc: field can be confusing since the recipients might not know who is supposed to act on the message. Also, when responding to a cc: message, should you include the other recipient in the cc: field as well? This will depend on the situation. In general, do not include the person in the cc: field unless you have a particular reason for wanting this person to see your response. Again, make sure that this person will know why they are receiving a copy.

In: Operations Management

Amritha Singh is a middle manager with Coaster Plus Ltd(Coasters), a company that designs and...

Amritha Singh is a middle manager with Coaster Plus Ltd (Coasters), a company that designs and manufactures roller coasters for amusement parks across North America. She has been appointed one of the project managers for the design and delivery of a special roller coaster for the Ultimate Park Ltd, an American customer. A major component of the project is the steel tracking, and one possible source is Trackers Canada Ltd (Trackers). Amritha’s supervisor has asked her to negotiate the necessary contract. Amritha began negotiations with Jason Hughes. Jason is a representative of Trackers, the steel tracking manufacturer willing to supply tracking to Coasters, Amritha’s employer. Amritha provided Jason with the plans and specifications for the roller coaster, and they negotiated a number of points, including price, delivery dates, and tracking quality. A short time later, Jason offered to sell Coasters a total of 900 metres of track in accordance with the plans and specifications provided. Jason’s offer contained, among other matter, the purchase price ($1.5 million), delivery date, terms of payment, insurance obligations concerning the track, and a series of warranties related to the quality and performance of the tracking to be supplied. There was also a clause, inserted at Amritha’s express request, which required Trackers to pay $5000 to Coasters for every day it was late in delivering the tracking.

After renewing the offer several days, Amritha for several days, Amritha contacted Jason and said, “You drive a hard bargain, and there are aspects of your offer that I’m not entirely happy with. However, I accept your offer on behalf of my company. I’m looking forward to doing business with you.”

Within a month, Trackers faced a 20% increase in manufacturing costs owing to an unexpected shortage in steel. Jason contacted Amritha to explain this development and worried aloud that without an agreement from Coasters to pay 20% more for the tracking, Trackers would be unable to make its delivery date. Amritha received instructions from her supervisor to agree to the increased purchase price in order to ensure timely delivery. Amritha communicated this news to Jason, who thanked her profusely for being so cooperative and understanding.

Jason kept his word and the tracking was delivered on time. However, Coasters has now determined that its profit margin on the American deal is lower than expected, and it is looking for ways to cut costs Amritha is told by her boss to let Jason know that Coasters will not be paying the 20% price increase and will remit payment only in the amount set out in the contract. Jason and Trackers are stunned by this development.

Applying the relevant principle(s) of contract law discuss the following questions:

a) Whether the negotiations between Jason and Amritha have legal consequences. (3 marks)

b) Discuss specific applicable ways by which each party mentioned above could have avoided the contract and as well as the implications of each way identified. (4 marks)

c) Discuss the consequences of the instruction of Amritha’s boss to the effect that Coasters will not be paying the 20% price increase and will remit payment only in the amount set out in the contract. (4 marks)

In: Economics

1. For their uniforms, the Vikings soccer team has a choice of six different styles for...

1. For their uniforms, the Vikings soccer team has a choice of six different styles for the shirts, five for the shorts, and five colours for their socks. How many different uniforms are possible? A) 16 B) 150 C) 60 D) 55

2. The Niagara Ice Dogs have 4 people trying out for goal. Their coach wants to try a different goalie in each of the three periods of an exhibition game. In how many ways can the coach choose the three different goalies for the game? A) 12 B) 24 C) 7 D) 55 E) 20

3. How many arrangements of the word ALGORITHM begin with a vowel and end with a consonant? A) 18 B) 5040 C) 90720 D)181440 E) 362880

4. From a class of 14 boys and 9 girls, how many ways can I choose a committee of 6 to analyze classroom productivity with and equal number of boys and girls? A) 126 B) 252252 C) 30576 D) 448

5.A bag contains three green Christmas ornaments and four gold ornaments. If you randomly pick a single ornament from the bag, what is the probability that it will be green? A) 3/4 B)3/7 C)4/7 D)4/3

6. A bag contains three green Christmas ornaments and four gold ornaments. If you randomly pick two ornaments from the bag, at the same time, what is the probability that both ornaments will be gold?
A) 4/7 B) 2/7 C)3/7 D) none of the above

7. How many 4 digit number can be made using 0 -7 with no repeated digits allowed?
A) 5040 B) 4536 C) 2688 D) 1470

8. A coin is tossed three times. What is the probability of tossing three heads in a row?
A) 3/8 B)1/8 C)1/2 D)7/8

9. Two standard dice are rolled. What is the probability of rolling doubles (both the same number)?
A) 1/6 B)1/4 C)1/36 D) 5/36

10. There are 50 competitors in the men’s ski jumping. 30 move on to the qualifying round. How many different ways can the qualifying round be selected? A) 50! B) 30! C) 80 D) 1500 E) 1.25 × 1046

11. How many ways can the manager of a baseball team put together a batting order of his nine players, if the shortstop must bat 3rd?
A) 40320 B) 504 C) 362880 D) 120960

12. If a CD player is programmed to play the CD tracks in random order, what is the probability that it will play six songs from a CD in order from your favourite to your least favourite? A)1/6 B)2/3 C)1/720 D)5/6 E) 1/360

13. A group of eight grade 11 and five grade 12 students wish to be on the senior prom committee. The committee will consist of three students. What is the probability that only grade 12 students will be elected, assuming that all students have an equal chance of being elected?

In: Statistics and Probability

Business Analytics, Assignment on Clustering As part of the quarterly reviews, the manager of a retail...

Business Analytics, Assignment on Clustering As part of the quarterly reviews, the manager of a retail store analyzes the quality of customer service based on the periodic customer satisfaction ratings (on a scale of 1 to 10 with 1 = Poor and 10 = Excellent). To understand the level of service quality, which includes the waiting times of the customers in the checkout section, he collected data on 100 customers who visited the store; see the attached Excel file: ServiceQuality. 1. Using Data Mining > Cluster, apply K-Means Clustering with the following Selected Variables: Wait Time (min), Purchase Amount ($), Customer Age, and Customer Satisfaction Rating. In Step 2 of the k-Means Clustering procedure, normalize (standardize) input data, assume k = 5 clusters, 50 iterations, and Fixed start with the default Centroid Initialization seed of 12345. In Step 3, select the checkboxes “Show data summary” and “Show distances from each cluster center”. a. What is the most homogenous cluster? What is the number of customers in this cluster? For this cluster, what is the average standardized Euclidean distance between its observations and its centroid (center)? What is the centroid of this cluster (expressed in standardized data)? Using the cluster centroids, how would you characterize the customers in the most homogenous cluster in comparison with the customers in the remaining clusters? b. Which two clusters are most distinct and why? Using their centroids, how would you compare the customers of the two clusters? 2. Using Data Mining > Cluster, apply Hierarchical Clustering with the following Selected Variables: Wait Time (min), Purchase Amount ($), Customer Age, and Customer Satisfaction Rating. In Step 2 of the Hierarchical Clustering procedure, normalize (standardize) input data and apply Ward’s clustering method, while in Step 3, select the checkboxes “Show dendrogram”, “Show Cluster Membership”, and assume k = 5 clusters. a. Show the obtained dendrogram. b. What are the sizes of the created clusters? c. What are the centroids of the created clusters expressed in original data. Hint: To answer Questions 2b and 2c, in the worksheet HC_Clusters, you may first add the four columns with original data, and sort the column Cluster by clicking Data in the Ribbon and selecting . Then you can easily find the cluster sizes, and the four variable averages characterizing each cluster. 3. Based on your findings, what reasons do you see for low customer satisfaction ratings? Provide some recommendations for improving customer satisfaction. Write a managerial report in MS Word; do not attach any separate Data Mining and/or Excel outputs. Instead paste into your report the Data Mining outputs with answers to Questions in Tasks 1 and 2a, and Excel results related to Tasks 2b and 2c. Showing these outputs/results is crucial because without them I will not be able to verify your answers. Note 1. The use of other software is unacceptable! Note 2. To better prepare for the assignment, study the clustering example KTC in the slides, and the questions on Exhibit 4.4 in Test Bank.

In: Statistics and Probability