Q2. a) Explain the penetration test carried out on bitumen, state its significance and draw the test apparatus.
b). Mention the main factors considered in the choice of construction materials at the design office – is any of them more important than the other?
c). What factors affect the weldability of steel?
d). Consider the iron value chain from material extraction to disposal, at what point according to your assessment is the most energy used? As a design engineer, at what stage do you think is your intervention most important and what role can you play in making iron more sustainable?
In: Civil Engineering
Use MATLAB to determine the intersection point for the sets of equations shown below. Use the backslash when possible.Graph the equations with different colors, and plot the intersection point with a red star marker. If the equations do not intersect, graph them anyway.
Include a legend:
a) -4x1 + 2x2 = 10 b)-4x1+2x2^3 = 10
x1 + x2 = -8 x1+ x2 = -8
In: Mechanical Engineering
9.) Write a MATLAB script that will read the Pressure and Temperature columns from the provided Excel file. Use a loop to calculate the linear best fit line for the data. You may only use the built-in functions sum, size, and length. Plot both the individual data points (red) and the fit line (blue) on the same graph. Include a title and axes labels.
In: Computer Science
|
The Red Mill Inn is in need of a new roof. A local contractor, Jack Hammer, has been asked to |
||
|
submit a bid to do the work. Jack measured the roof and determined he would need 50 cases |
||
|
of roofing material. The cost per case is $45. Jack also determined it would take a four-man |
||
|
crew four 8-hour work days to complete the job. Each worker is paid $15 per hour. Before the |
||
|
year began, Jack estimated his total overhead costs to be $152,000. He applies overhead to jobs |
||
|
based on the amount of direct labour hours the job takes. Jack estimated the total direct labour |
||
|
hours for the year to be 10,000 hours. |
||
|
a) What is Jack's predetermined overhead rate for the year? |
||
|
b) How much overhead was charged to the Red Mill Inn job? |
||
|
c) What was the total cost of the Red Mill Inn job? |
||
|
DM |
||
|
DL |
||
|
OH |
||
|
Total Cost |
||
|
d) If Jack charges his customers an amount equal to 25% above his cost, what would his |
||
|
bid to replace the roof on the Red Mill Inn? |
||
In: Accounting
Exercise 18: Running Ex. 16 You will write exercise 16 into a program and make it run. Note that there are two parts, 16A and 16B. Type 16A into a program called Exercise16A and type 16B into a program called Exercise16B. Be sure label each section using comments. You may notice that additional code needs to be written for the program to run. For example, Section I assumed that an array was already declared and initialized. Here, you will have to declare and initialize an array with random values to test it.
Section A. Declare and initialize an array firstNames containing the following names: Jane, Jim, Beth, Mary, Sara, and Bob. Remember to choose the correct data type for the array elements.
Section B. Using a FOR loop, output the elements of the array firstNames so that they are displayed on the same line and separated by a space. Use .length to get the length of the array.
In: Computer Science
Distribution Strategy on TOPIC NIKE
What is your current distribution strategy? What missed opportunities or disconnects are you seeing in this distribution approach? Make recommendations about your future distribution strategy based on the following:
In: Operations Management
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. It is usually on of the more interesting topics we can discuss. Take the following scenario and map out the chain of custody (in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence) that needs to be followed if you are going to preserve the integrity of the evidence. Scenario: A co-worker is suspected of surfing the Internet on their work machine and downloading pornographic material and printing some of it on the department printer during the evening hours when most people have gone home. You are responsible to collect data to support the worker's dismissal. Describe the data you need to obtain, the methods you would use to get it, and the chain of custody of the data once collected. Don't just list the steps the book gives you for the chain of custody, explain in detail where/how/who will hold the evidence at which step and why it is important to follow each step. What could happen to the data at each step if the chain of custody is not followed? Make sure your paper is two pages long not including references. Be sure to cite and list your sources.
In: Computer Science
1. Describe how to protect and use corporate data – employees, customers, suppliers, and business partners.
2. Define privacy in common sense.
In: Operations Management
** Please answer all parts and explain!
1. Assume the economy is currently experiencing a recessionary gap.
a. How should the Fed use the three monetary policy tools to close this gap? (0.6 point)
b. What will happen to money supply, AD, AD curve, aggregate output (real GDP), and the price level when the above policy tools are used? Explain. (0.6 point)
2. a. What is the equation of exchange? (0.1 point)
b. What does the quantity theory of money predict about the effect of an increase in money supply on the overall economy in the long run? (0.1 point)
In: Economics
Assume you have been tasked to explain the need for Group Policy in your organization. Describe how your organization (or any organization about which you have knowledge) can benefit from implementing Group Policy. Provide examples and elaboration in your answer. What are some best practices to consider when implementing Group Policy?
In: Computer Science