Questions
An incinarator with (0.5) inch steel walls in lined with (6) inch of firebrick to protect...

An incinarator with (0.5) inch steel walls in lined with (6) inch of firebrick to protect the steel and has (3.5) inch of magnesia insulation on the outside. When the gas temperature is (1550)°F, the inside wall of the firebrick is at (1250) °F as measured by an optical pyrometer.

Take thermal conductivities as below:
kfirebrick = 0.98 Btu/hr-ft°F , ksteel = 26 Btu/hr-ft°F, kmagnesia = 0.034 Btu/hr-ft°F.
Assume A = 1 ft2 Assume the outside surface of magnesia is 120°F

(a) What is the total resistance?
RTotal =  °F hr/Btu

(b) What is the rate of heat transfer?
Q/A =  Btu/hr. ft2

(c) What is the temperature of the steel wall? (between fire brick and steel)
T =  °F

(d) How much insulation would be needed to raise the inside wall temperature to 1400. °F ?
The heat transfer rate Q/A would be slightly reduced, but assume it is unchanged.

x =  in

In: Other

What are the four phases of website design and what is involved with each phase?

What are the four phases of website design and what is involved with each phase?

In: Operations Management

Explain what the stroop test is, how its performed and what are the strengths of its...

Explain what the stroop test is, how its performed and what are the strengths of its research.

In: Psychology

How are you practicing what you believe? How are you applying what God has taught you...

How are you practicing what you believe? How are you applying what God has taught you through others in your daily life? Be a doer of the word!

In: Psychology

the college wants to keep track of the semester schedules across years. i.e. Departments, their Courses...

the college wants to keep track of the semester schedules across years. i.e. Departments, their Courses as they exist in the College catalog, and the course section offerings across the years and their semesters. From a catalogue perspective:

A department has a unique name (Finance, Management and Marketing, Math, ABC-Law, etc.) and offers multiple courses.

A course has a unique name, which is a hyphenated prefix-Number like (BUAN-310, CIS-205, FIN315, MATH-153, etc.), a long name like “principles of Data management”, a long description and a number of credit (leave prerequisites out for now).

During any given semester (Fall, Spring, Summer-1, Summer-2, Winter), Zero-Or-More-sections of a given course are offered. For example, For BUAN-227 and for the Fall of 2019, 4 sections (1, 2, 3 and 61, I made it up) were offered.

Each section has a CRN, which is a unique identifier and a capacity to indicate the max number of students that can sign-up for the course (Leave time and room out for now).

We leave students who register for courses out for now

Your reverse engineered schema looks similar

Write the SQL code that creates the tables and enforces Primary and foreign key constraints.

Your SQL Code Goes Below:


#All Fields are required

#It is your call if any of the fields is Unique.

use ……..; #Your database Schema Name instead

SET FOREIGN_KEY_CHECKS=0;

DROP TABLE Department CASCADE;

Create TABLE Department (

…….

);

#

DROP TABLE Course CASCADE;

CREATE TABLE Course(

…….

);

#

DROP TABLE CourseSection CASCADE;

CREATE TABLE CourseSection(

…….

);

#

SET FOREIGN_KEY_CHECKS=1;

Insert 5-Department Records into the Department table. Your SQL Code Goes Below:

Enter 10 Courses into the Course table; make sure you assign them to different departments. Your SQL Code Goes Below:

Enter 20 course-sections into the courseSection table across different years and semesters. No more than 3 course sections for a given year and a given semester. Your SQL Code Goes Below:

MY SQL workbench

In: Computer Science

QUESTION 1 Even though an investee may be an associate of an investor, if the shares...

QUESTION 1

  1. Even though an investee may be an associate of an investor, if the shares of that associate are traded in an active market, AASB128 Investment in Associates and Joint Ventures requires the application of the:

    market valuation.

    consolidation method.

    equity method.

    valuation made by an independent evaluator.

QUESTION 2

  1. Indicia of an investor’s incapacity to exert significant influence over the policy-making decisions of an investee include:

    the existence of a small group of ‘non-investor’ shareholders representing the majority of voting power in the investee.

    the investor attempting to gain, but not gaining, board representation.

    the investor attempting to gain, but not gaining, the financial information necessary to calculate its equity in the fair value of the investee’s net assets at the date of acquisition, or its equity in the post-acquisition earnings of the investee.

    all of the above.

QUESTION 3

  1. The accounting method applied to investments in associates, known as the equity method, is also known as the:

    significant influence method.

    multi-line consolidation method.

    entity method of consolidation.

    one-line consolidation method.

QUESTION 4

  1. Goodwill acquired in an associate is:

    amortised across its useful life.

    carried as a separate asset in the accounting records of the investor.

    written off immediately against the carrying amount of the investment.

    not subject to amortisation.

QUESTION 5

  1. Red Limited acquired a 30% investment in Blue Limited for $1,000,000. Blue declared and paid a dividend of $20,000 during the current year. Red Limited prepares consolidated financial statements. Which of the following is the appropriate entry for Red Limited to record this dividend?

    DR    Dividends payable                   $6,000

                   CR                  Cash                                 $6,000

    DR    Dividend revenue         $6,000

                   CR                  Investment in associate      $6,000

    DR    Cash                                        $6,000

                   CR                  Dividend revenue         $6,000

    DR    Cash                                           $6,000

                   CR                  Investment in associate      $6,000

  

In: Accounting

Hi-Tek Manufacturing, Inc., makes two types of industrial component parts—the B300 and the T500. An absorption...

Hi-Tek Manufacturing, Inc., makes two types of industrial component parts—the B300 and the T500. An absorption costing income statement for the most recent period is shown:

Hi-Tek Manufacturing Inc.
Income Statement
Sales $ 1,757,400
Cost of goods sold 1,238,900
Gross margin 518,500
Selling and administrative expenses 610,000
Net operating loss $ (91,500 )

Hi-Tek produced and sold 60,100 units of B300 at a price of $21 per unit and 12,700 units of T500 at a price of $39 per unit. The company’s traditional cost system allocates manufacturing overhead to products using a plantwide overhead rate and direct labor dollars as the allocation base. Additional information relating to the company’s two product lines is shown below:

B300 T500 Total
Direct materials $ 400,600 $ 162,200 $ 562,800
Direct labor $ 120,100 $ 42,600 162,700
Manufacturing overhead 513,400
Cost of goods sold $ 1,238,900

The company has created an activity-based costing system to evaluate the profitability of its products. Hi-Tek’s ABC implementation team concluded that $56,000 and $105,000 of the company’s advertising expenses could be directly traced to B300 and T500, respectively. The remainder of the selling and administrative expenses was organization-sustaining in nature. The ABC team also distributed the company’s manufacturing overhead to four activities as shown below:

Manufacturing
Overhead
Activity
Activity Cost Pool (and Activity Measure) B300 T500 Total
Machining (machine-hours) $ 207,400 90,200 62,300 152,500
Setups (setup hours) 144,900 75 270 345
Product-sustaining (number of products) 100,800 1 1 2
Other (organization-sustaining costs) 60,300 NA NA NA
Total manufacturing overhead cost $ 513,400

Required:

1. Compute the product margins for the B300 and T500 under the company’s traditional costing system.

2. Compute the product margins for B300 and T500 under the activity-based costing system.

3. Prepare a quantitative comparison of the traditional and activity-based cost assignments.

In: Accounting

Consider the titration of a 36.0 mL sample of 0.170 M HBr with 0.200 M KOH....

Consider the titration of a 36.0 mL sample of 0.170 M HBr with 0.200 M KOH. Determine each of the following:

Part A

the initial pH

Express your answer using three decimal places.

Part B

the volume of added base required to reach the equivalence point

Express your answer in milliliters.

Part C

the pH at 12.0 mL of added base

Express your answer using three decimal places.

Part D

the pH at the equivalence point

Express your answer as a whole number.

Part E

the pH after adding 5.0 mL of base beyond the equivalence point

Express your answer using two decimal places

In: Chemistry

in java pls Write a program for spiritual lumberjacks who want to show their appreciation for...

in java pls

Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' by celebrating its years of life.

  1. Ask the lumberjack how many trees he wants to cut. Verify you got the number correctly by printing it to output.

  2. Write a loop that iterates over all the trees the lumberjack wants to cut down. Print the tree number to the screen to make sure your loop is working correctly.

  3. Query the lumber jack for how many rings are in this tree and print this number to make sure you got the correct number of rings.

  4. Write an inner loop that iterates over the years of the tree. Print each year to make sure you are iterating correctly and hitting each year that it lived.

  5. Change the necessary print statements and to match the correct formatting from the output examples.

input: 2 3 4

expected output:

How many trees do you want to cut down?

2

0

How many rings are in tree 0?

3

We humbly respect tree number 0 and celebrate its 1 birthday.

We humbly respect tree number 0 and celebrate its 2 birthday.

We humbly respect tree number 0 and celebrate its 3 birthday. 1

How many rings are in tree 1?

4

We humbly respect tree number 1 and celebrate its 1 birthday.

We humbly respect tree number 1 and celebrate its 2 birthday.

We humbly respect tree number 1 and celebrate its 3 birthday.

We humbly respect tree number 1 and celebrate its 4 birthday.

In: Computer Science

1. Service quality is not always consistent, largely because services are often performed by human beings.  Provide...

1. Service quality is not always consistent, largely because services are often performed by human beings.  Provide an example of what employers could do to reduce service variability.

2. Generally, when advertising to one’s supply chain, the objective is a ____________________ strategy, in which the goal is to motivate sellers– wholesalers, distributors, or salespeople – to highlight the product, rather than the competitors, and thereby induce consumers to buy the product

3. When determining how to best convey the message in a marketing campaign, often one will determine the unique selling proposition (USP). What is a USP intended to do?

4. In the early stages of an ad campaign, the objectives are established. After the campaign has run, to determine if those objectives are met, the marketer will _____________________.

5. Describe the difference between financial and non-financial incentives.

6.In the B2B buying process the ___________________________ is an activity through which buying organizations invite alternative suppliers to bid on supplying their required goods.

7. Name and explain three “rule-of-thumb” methods of setting Integrated Marketing Communications budgets.

In: Operations Management

How would a financial manager determine optimal capital structure? How this would fit in with the...

How would a financial manager determine optimal capital structure? How this would fit in with the company's capital expenditures, growth plans and operating results?

In: Operations Management

In C++ Complete the following code without the use of auto. Write a function, getAverages, that...

In C++

Complete the following code without the use of auto.

  1. Write a function, getAverages, that will prompt the user for a series of exam averages for an unspecified number of students in a class. The user should enter a negative exam average to indicate the end of data. Exam averages should be stored in the vector indicated by the reference parameter.
  2. Write a function, storeAverages, that will accept two parameters, a vector containing exam averages and a string containing the name of a file. The function should store the averages to the file specified in the filename parameter, one average per line. If a file with that filename already exists, its contents should be overwritten. The function should not be able to modify the averages stored in the vector. This function should use the range-based for loop.
  3. Write a function, curveAverages, that will accept two parameters, a vector containing exam averages to be curved and a floating-point number which should be added to each average. The function must be able to modify the averages in the vector. The function should use a regular for loop and the at() member function.
  4. Write a function, calculateClassAverage, that will accept a single parameter, the vector containing the students' exam averages. The function should compute and return the average of the class' exams. The function should not be able to modify the averages stored in the vector.
  5. Include code in the main that will allow the user to specify the exam averages, the number of points to curve each average and a file name for storing the averages. The code should curve the averages, calculate the class average, which should then be displayed to the screen, and then store the exam averages in the file specified by the user.

In: Computer Science

Provide a comparison and contrast between dialogue and discussion. Which can be used in strategic conversation?...

Provide a comparison and contrast between dialogue and discussion. Which can be used in strategic conversation? Use examples to demonstrate your understanding.

In: Operations Management

Flow chart and IPO chart ( no handwritten please ) #include <stdio.h> #include <string.h> #include <conio.h>...

Flow chart and IPO chart ( no handwritten please )

#include <stdio.h>
#include <string.h>
#include <conio.h>
#include <ctype.h>

char vs[26][26];

void encrypt(char input[], char key[], char cipher[]) {

char inputWithoutSpaces[50], repeatedKeyWord[50], tempCipher[50];

int cnt = 0, i = 0, keyLen = strlen(key), len3 = strlen(input);

// loop to remove the spaces from input & store in other char array inputWithoutSpaces
for (i = 0; i < len3; ++i) {
if (input[i] != ' ') {
inputWithoutSpaces[cnt++] = toupper(input[i]);
}
}
inputWithoutSpaces[cnt] = '\0';

int len1 = strlen(inputWithoutSpaces);

// loop to repeat the key until it becomes equal to the length of input without spaces
i = 0;
while (i < len1) {
repeatedKeyWord[i] = toupper(key[i % keyLen]);
i++;
}
repeatedKeyWord[i] = '\0';


// form the temp cipher
for (i = 0; i < len1; ++i) {
tempCipher[i] = vs[inputWithoutSpaces[i] % 'A'][repeatedKeyWord[i] % 'A'];
}

tempCipher[i] = '\0';

// modify the passed cipher by adding spaces in temp cipher wherever needed
cnt = 0;
for (i = 0; i < len3; ++i) {
if (input[i] == ' ')
cipher[i] = ' ';
else
cipher[i] = tempCipher[cnt++];
}
cipher[i] = '\0';


}

void decrypt(char cipher[], char key[], char plaintext[]) {

printf("%s\n", key);
char cipherWithoutSpaces[50], repeatedKeyWord[50], tempPlainText[50];

int cnt = 0, i = 0, keyLen = strlen(key), len3 = strlen(cipher);

// loop to remove the spaces from cipher & store in other char array cipherWithoutSpaces
for (i = 0; i < len3; ++i) {
if (cipher[i] != ' ') {
cipherWithoutSpaces[cnt++] = toupper(cipher[i]);
}
}
cipherWithoutSpaces[cnt] = '\0';

int len1 = strlen(cipherWithoutSpaces);

// loop to repeat the key until it becomes equal to the length of input without spaces
i = 0;
while (i < len1) {
repeatedKeyWord[i] = toupper(key[i % keyLen]);
i++;
}
repeatedKeyWord[i] = '\0';

// form the temp plaintext
cnt = 0;
for (i = 0; i < len1; ++i) {
for (int j = 0; j < 26; ++j) {
if (vs[repeatedKeyWord[i] % 'A'][j] == cipherWithoutSpaces[i])
tempPlainText[cnt++] = 'A' + j;
}
}
tempPlainText[cnt] = '\0';

// modify the passed plaintext by adding spaces in temp plaintext wherever needed
cnt = 0;
for (i = 0; i < len3; ++i) {
if (cipher[i] == ' ')
plaintext[i] = ' ';
else
plaintext[i] = tempPlainText[cnt++];
}
plaintext[i] = '\0';

}

int main(void) {

char selection;

char plaintext[50], cipher[50], key[10];

// making the table
for (int i = 0; i < 26; ++i)
for (int j = 0; j < 26; ++j)
vs[i][j] = ('A' + ((i + j) % 26));

// taking first selection
fflush(stdin);
printf("Enter e for encryption, d for decryption, x for exit: ");
scanf("%c", &selection);
  
// run loop till user enters 'x'
while (selection != 'x') {

// condition for encryption
if (selection == 'e') {

// taking plaintext
fflush(stdin);
printf("Enter the plaintext: ");
scanf("%50[a-zA-Z ]", plaintext);

// taking key
fflush(stdin);
printf("Enter the key: ");
scanf("%50[a-zA-Z ]", key);

// encrypting and displaying cipher
encrypt(plaintext, key, cipher);
fflush(stdin);
printf("Cipher text: %s\n\n", cipher);
}
else {

// taking encrypted text
fflush(stdin);
printf("Enter the encrpted text: ");
scanf("%50[a-zA-Z ]", cipher);

// taking key
fflush(stdin);
printf("Enter the key: ");
scanf("%50[a-zA-Z ]", key);

// decrypting and displaying plain text
decrypt(cipher, key, plaintext);
fflush(stdin);
printf("Plain Text: %s\n\n", plaintext);
}

fflush(stdin);
printf("Enter e for encryption, d for decryption, x for exit: ");
scanf("%c", &selection);
}

return 0;
}

In: Computer Science

In the Digital Marketing era it is easier market entry for smaller, more nimble competitors to...

In the Digital Marketing era it is easier market entry for smaller, more nimble competitors to compete head-to-head with established brands. Agree ? Yes or no and why?

In: Operations Management