Questions
Problem 1-04A Skysong Inc., a provider of consulting services, was founded on October 1, 2022. At...

Problem 1-04A Skysong Inc., a provider of consulting services, was founded on October 1, 2022. At the end of the first month of operations, the company decided to prepare an income statement, retained earnings statement, and balance sheet using the following information. Accounts payable $ 3,700 Supplies $ 2,650 Interest expense 350 Supplies expense 360 Equipment (net) 48,000 Depreciation expense 260 Salaries and wages expense 2,800 Service revenue 19,540 Bonds payable 21,800 Salaries and wages payable 590 Unearned service revenue 4,190 Common stock 9,900 Accounts receivable 1,450 Interest payable 150 Cash 4,000 Using the information, answer the following questions. Prepare an income statement for the month of October 2022. SKYSONG INC. Income Statement choose the accounting period select an opening name for section one enter an income statement item $ enter a dollar amount select an opening name for section two enter an income statement item $ enter a dollar amount enter an income statement item enter a dollar amount enter an income statement item enter a dollar amount enter an income statement item enter a dollar amount select a closing name for section two enter a subtotal amount for section two select a closing name for this statement $ enter a total net income or loss amount Show List of Accounts Link to Text Prepare a retained earnings statement for the month of October 2022. SKYSONG INC. Retained Earnings Statement choose the accounting period select an opening name $ enter a dollar amount select between addition and deduction : select an item enter a dollar amount select a closing name $ enter a total amount Show List of Accounts Link to Text Prepare a balance sheet as of October 31, 2022. (List assets in order of liquidity.) SKYSONG INC. Balance Sheet enter an accounting period Assets enter a balance sheet item $ enter a dollar amount enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount select a closing name for the first part of the balance sheet $ enter a total amount for the first part of the balance sheet Liabilities and Stockholders' Equity select an opening name for section one enter a balance sheet item $ enter a dollar amount enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount select a closing name for section one $ enter a subtotal of the two previous amounts select an opening name for section two enter a balance sheet item enter a dollar amount enter a balance sheet item enter a dollar amount select a closing name for section two enter a subtotal of the two previous amounts select a closing name for the second part of the balance sheet $ enter a total amount for the second part of balance sheet Click if you would like to Show Work for this question: Open Show Work Show List of Accounts Link to Text

In: Accounting

1. Define the four types of chips observed in machining. Explain how different chips are obtained...

1. Define the four types of chips observed in machining. Explain how different chips are obtained from materials of different ductility. 2. According to the Merchant Equation, an increase in rake angle would have which of the following results, if all remaining factors are constant (more than one correct answer): a. Decrease in friction angle b. Decrease in power requirements c. Decrease in shear plane angle d. Increase in cutting temperature e. Increase in shear plane angle 3. State and describe the orthogonal cutting model. Define chip ratio and explain why chip ratio is always < 1.0. 4. Explain the effect of cutting temperature in machining on the chip formation and finish of the machined parts. 5. Describe and state the difference between roughing and finishing in machining operations. 6. Define (a) cutting power, (b) Gross Power, and (c) Specific Power along with pertinent equations. 7. State and briefly describe the 3 stages of Tool Wear Rate using a plot. 8. Turning tests have resulted in a 1 minute tool life for cutting speed v = 4 m/s and a 20 minute tool life at a speed v = 2 m/s. a. Determine the values of n and C in the Taylor tool life equation ( , T = tool life [min], v = cutting speed [m/min]) b. Project how long the tool would last at a speed of v = 1 m/s 9. What are the 3 time components of the total production cycle for a part? What is the equation for the cycle time (Tc)? 10. Whatarethe4mainingredientsofacuttingfluid?Whatarethe3mainmethodsbywhichcutting fluids are introduced in a machining operation? 11. Whatarethe4maincosts(withequations)involvedwithproductionofapart?Howiscycletime related to the unit cost of production?

In: Mechanical Engineering

Use the following information for questions 4-5: i. increase in unemployment within the wheat sector ii....

Use the following information for questions 4-5:
i. increase in unemployment within the wheat sector
ii. increase in migration of unskilled laboreres in Country X
iii. increase in productivity associated with producing wheat
iv. increase in demand for wheat during a period of full employment
v. increase in capital stock within Country X
vi. improvement in technology associated with producing corn

4. Which of the event(s) listed above would not shift Country X's PPC?
A. events i and iv
B. events i and ii
C. events i, ii, and iv
D. event iv
E. none of the above

5. Which event(s) listed above would shift Country X's PPC along both axes?
A. event i
B. event i, ii and v
C. events i, iii and vi
D. events ii, iv, v and vi
E. events ii and v

6. The negative slope of the PPC directly illustrates which of the following:
A. any country has only a limited number of fixed factors to use and producing goods and services
B. that country faces opportunity cost when making production-related decisions
C. that a country has fixed rates of productivity associated with producing goods and services
D. The country is incapable of producing outside of their PPC

7. If a country's PPC gets increasingly steeper over time, then:
A. this shift could be explained by an increase in unemployment in the machinery or oil sector
B. this shift could be explained by an increase in demand within the machinery or oil sector
C. this shift could be explained by technological change within the machinery or oil sector
D. The shift could be explained by general increase in productivity within that country
E. both A and B are correct

In: Economics

Electromagnetics Question B1. (a) A generator with Vg = 300 V, and Zg = 50 Ω...

Electromagnetics

Question B1.

(a) A generator with Vg = 300 V, and Zg = 50 Ω is connected to a load ZL =75 Ω through a 50-Ω lossless transmission line of length, l = 0.15λ. Determine the,

(i) Zin, the input impedance of the line at the generator end;

(ii) input current I i and voltage Vi ;

(iii) time-average power delivered to the line, = 0.5 x Re{V .I*};

(iv) load voltage VL, and current, IL; and

(v) the time-average power delivered to the load, = 0.5 x Re{VL .IL*};how does compare to ? Explain?

(vi) compute the time average power delivered by the generator, Pg , and the time average power dissipated in Zg . Is conservation of power satisfied?. [12 marks]

(b) A team of scientists is designing a radar as a probe for measuring the depth of the ice layer over the antarctic land mass. In order to measure a detectable echo due to the reflection by the ice-rock boundary, the thickness of the ice sheet should not exceed three skin depths. If ε' = 3 a n d ε'' = 10-2 for ice and if the maximum anticipated ice thickness in the area under exploration is 1.2 km, what frequency range is useable with the radar? [6 marks]

(c) A 0.5-MHz antenna carried by an airplane flying over the ocean surface generates a wave that approaches the water surface in the form of a normally incident plane wave with an electricfield amplitude of 3,000 (V/m). Sea water is characterized by μr = 1, εr = 72, and σ = 4 S/m. The plane is trying to communicate a message to a submarine submerged at a depth d below the water surface. The submarine’s receiver requires a minimum signal of 0.01 μV/m amplitude, what is the maximum depth d to which successful communication is still possible? [7 marks]

In: Electrical Engineering

UNIX ONLY -- DIFFICULT LAB ASSIGNMENT This is an extremely difficult subject for me. Could you...

UNIX ONLY -- DIFFICULT LAB ASSIGNMENT

This is an extremely difficult subject for me. Could you please give step by step instructions on how to write a script called "encrypt_password.sh" and say line by line what the code should be to complete the assignment according to the instructions and examples below?

The assignment will be done entirely in Terminal on Mac

Our Lab assignment is as follows:

In this lab, you will write a script called encrypt_password.sh to encrypt passwords. The script will ask user to enter user name and password repeatedly and will store it in file unencrypted. Then the script will read the user names and the corresponding passwords from the unencrypted file one line at a time, encrypt the password, and store the name and the encrypted password in another file. The objective of this lab is to familiarize and gain proficiency with the following:

• Use of loops (while and for)

• Read input from keyboard

• Read from file line by line

• Use of md5sum utility to generate md5 hash

The md5sum utility (command) computes and checks a MD5 message digest of a file. Message digest is the cryptographic hash of a clear text. Cryptographic hash or message digest is a one-way encryption; once encrypted the hash cannot be decrypted to get the original text. There are many algorithms for generating message digest or hash from text. MD5 is one such algorithm. Other algorithms are SHA256, SHA512etc. Unix/Linux has utilities(commands) to generate message digest using these algorithms. MD5 uses 128-bit encryption and is considered not secured. SHA 256 or SHA 512 is more secured than MD5. Following is the command to create a hash of a file called “input.txt” using MD5algorithm is

md5sum input.txt

The command to create a hash of the string “CSC2500 is fun and interesting” is

echo CSC2500 is fun and interesting | md5sum

Your script should accept two command line arguments. The 1st argument should be number of users and the 2nd argument should be the name of the unencrypted file.

Your script should do the following

1. Accept user name and password using for loop repeatedly (as many times as the 1st argument).

2. Write the user name and password to the designated file (2nd argument) separated by colon (:) as it reads the inputs from user.

3. Once all the names and passwords are written into the file; read the unencrypted name and password one line at a time from the unencrypted file and encrypt the password and write the username and the encrypted password into the encrypted file (separated by colon). The name of the encrypted file should be same as the unencrypted file with an extension .enc. For example, if the name of the unencrypted file is “user”, the name of the encrypted file should be “user.enc”

Following is an example of the execution of the script

./encrypt_password.sh 3 userInfo

Enter Name: user23

Enter Password: lol

Enter Name: user21

Enter Password: hehe

Enter Name: Mike

Enter Password: password

After the successful execution of the script the current directory should contain two files name userInfo and userInfo.enc

The content of userInfo should be

user23:lol

user21:hehe

Mike:password

The content of the userInfo.enc should be

user23:59bcc3ad6775562f845953cf01624225

user21:f68277605308bf967037423eb4f03fcf

Mike:11408e6f3846af9379b7ca60cbf1b913

Following is an example script that reads lines from a file called input.txt and will print 1st and 3rd words of all the lines.

#!/bin/bash

while read -r line #line is a variable which will store the line read from the file

do

first=$(echo $line | cut -d ' ' -f 1)

third=`echo $line | cut -d ' ' -f 3`

echo $first $third done

THANKS!

In: Computer Science

home / study / business / operations management / operations management questions and answers / Mr....

home / study / business / operations management / operations management questions and answers / Mr. And Mrs. Burton Opened A Joint Bank Account With Davidson State Bank In February Of 2013. ...

Your question has been answered

Let us know if you got a helpful answer. Rate this answer

Question: Mr. and Mrs. Burton opened a joint bank account with Davidson State Bank in February of 2013. The...

Mr. and Mrs. Burton opened a joint bank account with Davidson State Bank in February of 2013. The names on the account were listed as Benjie F. Burton and Debbie C. Burton. A short time after opening the account, the couple purchased a lawn equipment business in the nearby town of Plum Creek. From January of 2014 until October of 2016 the Burtons executed and delivered five separate promissory notes to the bank. In each note, they promised to pay the bank the amount of the note plus interest. For each of these notes the

bank prepared a UCC-1 form giving the bank a security interest in one or more the assets owned by the Burtons, whether consumer goods or an asset of the lawn equipment business. The Burtons signed each of these UCC-1 forms at the time of the loan. All of the loan agreements, notes, and the UCC-1 forms were signed in the names “Benjie F. Burton” and “Debbie C. Burton.” The bank filed each UCC-1 financing statement in the correct office (the Secretary of State for the Commonwealth of Virginia in Richmond, VA) for each of the security agreements. In each filing, the bank listed the debtors as “Benjie F. Burton” and “Debbie C. Burton,” and each was signed by the couple in those names. All five of the agreements were in effect at the time of the lawsuit.

In November of 2016 the Burtons were seeking additional financing from City Bank & Trust. City Bank & Trust agreed to extend them credit, prepared a promissory note, security agreement, and UCC-1, and had each signed by the Burtons. Mr. Burton signed these documents “Benjamin Burton,” and his wife signed as “Debbie C. Burton.” City Bank & Trust then properly filed the UCC-1 in the appropriate office.

In July of 2017 the Burtons defaulted on their loans from Davidson State Bank and from City Bank & Trust. Each bank claimed priority on the collateral. Davidson State Bank asserted that it was “first in time and first in right.” City Bank & Trust asserted that, while State Bank had indeed filed first, it filed incorrectly. According to City Bank & Trust, Mr. Burton’s legal name, as shown on his birth certificate and his Social Security card was Benjamin Burton. Davidson State Bank had filed a financing statement against a “Benjie F. Burton,” and no such person existed. Last State Bank countered that Mr. Burton’s driver’s license, and federal income tax returns were acquired and/or filed under the name “Benjie F. Burton,” making its filing sufficiently accurate and legally effective.

Required: How should this case be resolved? Which Bank should prevail against the Burtons? Be certain that you adequately explain and justify your answer.

In: Operations Management

In November 24, 2014, Netflix filed a lawsuit against its former vice president of IT operations,...

In November 24, 2014, Netflix filed a lawsuit against its former vice president of IT operations, Mike Kail, alleging fraud, breach of fiduciary duties, and other charges. Here is an excerpt from the lawsuit filing in Superior Court of the State of California, Santa Clara County:.

“…During his tenure at Netflix, including as Netflix’s Vice President of Information Technology Operations, Kail was a trusted senior-level Netflix employee.  Kail’s job responsibilities at Netflixincluded negotiating and executing contracts on behalf of Netflix to acquire IT-related products and services…approving invoices for payments that third parties would request related to IT products and services purchased by Netflix….after Kail approved such invoices, Netflix would pay the third parties for these approved invoices. Kail was a trusted, senior-level Netflix employee, with authority to enter into appropriate contracts and approve appropriate invoices.” (See entire legal document at http://www.scribd.com/doc/248259590/Netflix-v-Kail.)

Netflix is suing Mr. Kail for fraud, breach of fiduciary duties, and other actions. Mr. Kail was in charge of entering into and authorizing contracts for Netflix’s tech vendors, which included two companies, Vistara IT and Netenrich (both founded/owned by Mr. Raju Chekuri.) At the same time, Mr. Kail had his own company on the side called Unix Mercenary, which he did not disclose to Netflix.

Mr. Kail’s company Unix Mercenary received 12 – 15% commissions on all contract invoices paid by Netflix to Vistara IT and Netenrich. Part of the evidence that Netflix outlines in its lawsuit are emails between Mr. Kail and employees of Netenrich which refer to “referral fees” from Netenrich to Unix. Here is an excerpt from an email from Netenrich to Kail (from the above-mentioned lawsuit filing):

…”[We] discussed getting you paid and I just need to ensure the payments from Netflix are in Netenrich’s bank account…I suggest we employ the following process to ensure you receive your referral fees on a timely basis…”

Over a three year period, Netflix paid approximately $3.7 million to Vistara IT and Netenrich, which would translate into commission payments of between $440,000 - $550,000 to Unix Mercenary. The lawsuit only mentions specific payments of $76,000 to Unix Mercenary.

Incidentally, Mike Kail left Netflix in August 2014 to become Yahoo’s Chief Information Officer (CIO).

Respond to the following questions in the MODULE 6 Discussion Forum

What internal control principle(s) does it appear was (were) violated at Netflix?

How might Netflix have designed its internal processes differently to avoid the situation that arose with Mr. Kail?

Should Mr. Kail be held totally liable for this situation? Does Netflix have any degree of responsibility in this situation?

Specifications

In: Accounting

Complete the Module 6 Discussion Forum In November 24, 2014, Netflix filed a lawsuit against its...

Complete the Module 6 Discussion Forum

In November 24, 2014, Netflix filed a lawsuit against its former vice president of IT operations, Mike Kail, alleging fraud, breach of fiduciary duties, and other charges. Here is an excerpt from the lawsuit filing in Superior Court of the State of California, Santa Clara County:.

“…During his tenure at Netflix, including as Netflix’s Vice President of Information Technology Operations, Kail was a trusted senior-level Netflix employee.  Kail’s job responsibilities at Netflix included negotiating and executing contracts on behalf of Netflix to acquire IT-related products and services…approving invoices for payments that third parties would request related to IT products and services purchased by Netflix….after Kail approved such invoices, Netflix would pay the third parties for these approved invoices. Kail was a trusted, senior-level Netflix employee, with authority to enter into appropriate contracts and approve appropriate invoices.” (See entire legal document at http://www.scribd.com/doc/248259590/Netflix-v-Kail.)

Netflix is suing Mr. Kail for fraud, breach of fiduciary duties, and other actions. Mr. Kail was in charge of entering into and authorizing contracts for Netflix’s tech vendors, which included two companies, Vistara IT and Netenrich (both founded/owned by Mr. Raju Chekuri.) At the same time, Mr. Kail had his own company on the side called Unix Mercenary, which he did not disclose to Netflix.

Mr. Kail’s company Unix Mercenary received 12 – 15% commissions on all contract invoices paid by Netflix to Vistara IT and Netenrich. Part of the evidence that Netflix outlines in its lawsuit are emails between Mr. Kail and employees of Netenrich which refer to “referral fees” from Netenrich to Unix. Here is an excerpt from an email from Netenrich to Kail (from the above-mentioned lawsuit filing):

…”[We] discussed getting you paid and I just need to ensure the payments from Netflix are in Netenrich’s bank account…I suggest we employ the following process to ensure you receive your referral fees on a timely basis…”

Over a three year period, Netflix paid approximately $3.7 million to Vistara IT and Netenrich, which would translate into commission payments of between $440,000 - $550,000 to Unix Mercenary. The lawsuit only mentions specific payments of $76,000 to Unix Mercenary.

Incidentally, Mike Kail left Netflix in August 2014 to become Yahoo’s Chief Information Officer (CIO).

Respond to the following questions in the MODULE 6 Discussion Forum

What internal control principle(s) does it appear was (were) violated at Netflix?

How might Netflix have designed its internal processes differently to avoid the situation that arose with Mr. Kail?

Should Mr. Kail be held totally liable for this situation? Does Netflix have any degree of responsibility in this situation?

In: Accounting

Give the formula if the name of the compounds are a. Vanadium (III) hydroxide b. Aluminium...

Give the formula if the name of the compounds are

a. Vanadium (III) hydroxide

b. Aluminium phosphide

Give the correct formula and the name of the compounds formed between

a. Ni2+ and SO32-

b. Ca2+ and N3-

Write the electronic configuration for Co3+.

( please help me how to do this.

In: Chemistry

Please write (typed) 2-3 paragraphs about teamwork in my organization (Finance department). like how was the...

Please write (typed) 2-3 paragraphs about teamwork in my organization (Finance department). like how was the teamwork at my organization and how successfull we were in it. Don't name any specifc organizaton name. It should refer to my organization.

In: Finance