In: Computer Science
15. |
The marketing efforts for convenience and specialty goods are
essentially the same. |
16. |
Shopping goods and services are purchased only after consumers
compare value, quality, style, and price of competing goods and
services. |
17. |
Successful marketing of convenience and specialty goods require
different marketing mixes. |
18. |
Most consumers view specialty goods as having a variety of
acceptable substitutes. |
19. |
The classification of goods or services into a particular class
depends on the individual consumer. |
20. |
A shopping good for one consumer could be a specialty good for
another consumer. |
||
21. |
Organizations that assist in moving goods and services from
producers to business and consumer users are called supply-side
transition specialists. |
||
22. |
Agents and brokers and wholesalers are types of marketing
intermediaries. |
23. |
Wholesalers are marketing intermediaries who sell goods or
services to ultimate consumers. |
24. |
A channel of distribution consists of the marketing
intermediaries who join together to transport and store goods in
their path from producers to consumers. |
25. |
Brokers are marketing intermediaries that do not take title to
the goods they help distribute. |
26. |
Retailers are marketing intermediaries who sell to ultimate
consumers. |
27. |
Some manufacturers sell directly to consumers or businesses
rather than relying on marketing intermediaries.
|
In: Operations Management
Problem 4 (designed to be used with the NORMDIST tutorial)
The following table represents a plan for a project:
JOB NO. |
PREDECESSOR JOB(S) |
a |
m |
b |
A |
- |
5 |
6 |
7 |
B |
A |
3 |
4 |
5 |
C |
A |
6 |
7 |
14 |
D |
A |
4 |
5 |
12 |
E |
B |
1 |
4 |
7 |
F |
C |
2 |
3 |
4 |
G |
D |
6 |
9 |
15 |
H |
E,F |
4 |
6 |
8 |
I |
H |
3 |
7 |
17 |
J |
G |
4 |
5 |
6 |
K |
I,J |
6 |
8 |
10 |
USE AN EXCEL FILE
In: Operations Management
Draw the red-black BST that results when you insert letters A through K int order into an initially empty tree, then describe what happens in general when trees are built by insertion of keys in ascending order. What about descending order?
In: Computer Science
The following CPM network has estimates of the normal time in weeks listed for the activities:
Activity |
Immediate Pred |
Weeks |
A |
- |
7 |
B |
A |
2 |
C |
A |
4 |
D |
B, C |
5 |
E |
B, C |
2 |
F |
D, E |
4 |
G |
F |
5 |
Activity |
Normal Time |
Crash Time |
Normal Cost |
Crash Cost |
A |
7 |
6 |
$7,000 |
$8,000 |
B |
2 |
1 |
5,000 |
7,000 |
C |
4 |
3 |
9,000 |
10,200 |
D |
5 |
4 |
3,000 |
4,500 |
E |
2 |
1 |
2,000 |
3,000 |
F |
4 |
2 |
4,000 |
7,000 |
G |
5 |
4 |
5,000 |
8,000 |
USE AN EXCEL FILE
In: Operations Management
Imagine that whenever your boss asks for feedback, she/he defensively argues with anyone who offers criticism, so people have stopped offering feedback. You decide to talk to your boss about this and hope to keep the conversation relaxed and professional. Explain how you would approach the conversation and list some points you would want to make when you discuss this issue.
In: Operations Management
what are the activities we can use with preschoolers to teach them math espcially in the kitchen?
In: Nursing
1. Write the set { x | x ∈ R, x2 = 4 or x
2 = 9} in list form.
2. {x: x is a real number between 1 and 2} is an
a) finite set
b) empty set
c) infinite set
3. Write set {1, 5, 15, 25,…} in set-builder form.
4. What is the cardinality of each of these sets?
a) {{a}}
b) {a, {a}}
c) {a, {a}, {a, {a}}}
d) {∅}
e) {∅, {∅}, {∅, {∅}}}
5. Suppose that A is the set of sophomores at your school and B is
the set of students in
discrete mathematics at your school. Express the following set in
terms of A and B:
"the set of students at your school who either are not sophomores
or are not taking discrete
mathematics"
a. A
c ∩ Bc
b. A
c U B
c
c. B-A
d. A-B
6. Let A be the set of students who live within one mile of school
and let B be the set of
students who walk to classes. Describe the set B-A.
a. The set of students who walk to classes but live more than 1
mile away from school.
b. The set of students who walk to classes but live within 1 mile
away from school.
c. The set of students who walk to classes.
7. What is the power set of the set {1, a, b}?
8. Let S = {∅, ?,{?}}Determine whether each of these is an element
of S, a subset of S, neither,
or both.
a) {?}
b) {{?}}
c) ∅
d) { {∅ }, ?}}
8. Determine whether each of these statements is true or
false.
a) 0 ∈ ∅
b) ∅ ∈ {0}
c) {0} ⊂ ∅
d) ∅ ⊂ {0}
e) {0} ∈ {0}
f) {0} ⊂ {0}
g) {∅} ⊆ {∅}
9. Let A = {a, b, c}, B = {x, y}, and C = {0, 1}.
Find A × B × C.
10. Find A2
if A = {0, a, 3}.
In: Computer Science
A construction project is broken down into the following 10 activities:
Activity |
Immediate Pred |
Weeks |
A |
- |
6 |
B |
A |
3 |
C |
A |
4 |
D |
A |
2 |
E |
B, C |
4 |
F |
C |
3 |
G |
D |
7 |
H |
E |
3 |
I |
F, G |
5 |
J |
H, I |
7 |
QUESTION A: PLEASE DRAW THE SKETCH
QUESTIONS B,C,D: USE AN EXCEL FILE
In: Operations Management
You are experiencing issues when trying to transfer files between two computers using FTP. What could be the potential cause(s) of the issue? Select all that apply.
Server is not able to resolve the client IP address |
|
Inbound port UDP 21 is blocked in the server |
|
The remote host does not allow connections on high ports 49152 - 65535 |
|
Inbound port TCP 21 is blocked in the server |
|
Client is not able to resolve the remote IP address |
Which of the following best describes the function of the TTL/hop limit for IP packages?
Prevents a computer from keeping the same IP forever, which could potentially cause IP address conflicts in the network (perhaps due to incorrect DHCP configuration) |
|
Tells the client for how long it should cache the local ephemeral port used in a TCP connection to allow fast reconnections |
|
Indicates to the server for how long it should keep a TCP connection with a specific client to mitigate denial-of-service (DoS) attack |
|
Prevents IP packets from getting stuck in infinite routing loops (perhaps due to incorrect routing tables) |
In: Computer Science
Research Basics: Lesson 1 ENGLISH 1021-41 ESSAY
FUNDAMENTAL
INSTRUCTIONS:
This week you will be looking at these sections/links:
What is Research?
Information Lifecycle
Planning: Keywords and Search Strings - Learn how to identify keywords from a research topic and format them into search strings.
NOTE: This link may have words on the web page AND a video. Make sure to view and summarize/give top 4 take always from all included content (what you see/read)
In: Operations Management
Use VB.net to create a loop that posts the first 100 prime numbers. Then, write code to confirm the numbers are prime.
In: Computer Science
Background: The GC owners have questions and need clarification about several contract concepts and issues related to their new business. Specifically, they have questions about:
Generally, contracts for the sale of goods must be in writing, and the writing must be signed by the parties to the agreement, and the parties must be sufficiently identified. GC will be selling goods via the internet, and the owners are wondering whether these electronic contracts are valid and enforceable.
Background Facts You Need To Know: Company X, a company in Illinois, contracted via the internet with Windows Bright, a small window washing business in Missouri to purchase four cases of Shiny Lite window cleaning solution at $200 per case. Company X paid via the internet with a company credit card. The contract stated that the four cases of Shiny Lite would be shipped to Company X’s place of business in Illinois via UPS. Once UPS delivered the Shiny Lite, the contract required Windows Bright to clean Company X's windows.
Winne and Ralph have asked you to prepare examples and explanations of the statute of frauds and electronic contracts.
To respond to the GC's questions and concerns, you must prepare a fact scenario and be prepared to discuss the scenarios in a meeting with TLG and the GC owners.
A. Discuss whether the contract between X and Windows Bright is subject to the Uniform Commercial Code Statute of Frauds.
B. Analyze and explain whether the internet electronic contract between X and Windows Bright satisfies the “writing” requirements for the Statute of Frauds? If so, how and why?
In: Operations Management
Pre-Assignment
hom
Before you start, create a new Eclipse project and create one package in that project. The package should be called “HW3”
Problem 1
Create a class called “Person”. This class should have, at minimum, the following members and methods. I advise you to add others as you see fit.
// Members
firstName (string)
lastName (string)
age (int)
pAddress (Address) // This is composition! I suggest using the Address class we defined earlier!
pDOB (Date) // This is composition! I suggest using the Date class we defined earlier!
// Constructors
Person() // Default with age = 0, names null, and DOB and Address default for those classes
Person(firstName, lastName, age) // Address and DOB will be default for those classes
Person( Person x) // Copy constructor that does a DEEP COPY of the person object.
// Setters
setFirstName(String firstName)
setLastName(String lastName)
SetName(String firstName, String lastName)
setAge(int newAge)
setAddress(String houseNum, String street, String city, String state, String zip)
setDOB (int day, int month, in year)
// Getters
toString() // Print out the name, age, dob, and address (use toString from DOB and Address)
getAge() // return the age
getFirstName() // return the first name
getLastName() // return the last name
getDOB() // Return a COPY OF the date object HINT: Use the date copy constructor!
getAddress() // Return a COPY OF the address object HINT: Use the Address copy constructor!
Problem 2
Test your Person class by creating a new class (in the same “HW3” package and then use the methods to make sure they work properly. I provide no guidance on this since all you need to do is test the methods to make sure they work. Call each and make sure they don’t report errors or fail to execute correctly. Fix any bugs you find. Ask for help if you need it!!!
Problem 3
Create a new class file and call it “Student”. This class will EXTEND on the Person class by adding new data members and methods. Note that students are, in fact, people. This extension makes sense!
// Data members
stuID (String)
major (string)
level (int) // 0 = first-year, 1 = sophomore, 2 = junior, 3 = senior, 4 = post-grad
// Constructors
Student(String id, String lastName, String firstName, String major, int level)
Student( Student x) // Copy constructor that makes a DEEP COPY of Student x object
// Setters
Provide one setter for major, one setter for stuID, and one setter for level. Note that the “level” method should check the input to make sure it makes sense. If something besides a 0, 1, 2, 3, or 4 is provided, the setter should write a warning to screen and refuse to make the change.
// Getters
Provide one getter for major, one getter for stuID, and one getter for level.
// Provide an overrided toString method and use super to also use the inherited toString
toString (String)
// This method should write to screen something like this:
// “Jones, Mary, 21, 544 S Winston St., Kemble, KY 00000, Computer Science, 3”
// Note that you want to use the inherited toString() method here by saying super.toString()
// somewhere in your returned expression.
Problem 4
Create a new class in “HW3” package and call it “testStudent”. Use this class to create multiple student objects and person objects. Test all the methods for accuracy. Make sure you have correct behavior for all of your methods/constructors. Watch out for the copy constructors!!!!
In: Computer Science
In: Mechanical Engineering