An incinarator with (0.5) inch steel walls in lined with (6)
inch of firebrick to protect the steel and has (3.5) inch of
magnesia insulation on the outside. When the gas temperature is
(1550)°F, the inside wall of the firebrick is at (1250) °F as
measured by an optical pyrometer.
Take thermal conductivities as below:
kfirebrick = 0.98 Btu/hr-ft°F , ksteel = 26
Btu/hr-ft°F, kmagnesia = 0.034 Btu/hr-ft°F.
Assume A = 1 ft2 Assume the outside surface of magnesia
is 120°F
(a) What is the total resistance?
RTotal = °F hr/Btu
(b) What is the rate of heat transfer?
Q/A = Btu/hr. ft2
(c) What is the temperature of the steel wall? (between fire brick
and steel)
T = °F
(d) How much insulation would be needed to raise the inside wall
temperature to 1400. °F ?
The heat transfer rate Q/A would be slightly reduced, but assume it
is unchanged.
x = in
In: Other
What are the four phases of website design and what is involved with each phase?
In: Operations Management
Explain what the stroop test is, how its performed and what are the strengths of its research.
In: Psychology
In: Psychology
the college wants to keep track of the semester schedules across years. i.e. Departments, their Courses as they exist in the College catalog, and the course section offerings across the years and their semesters. From a catalogue perspective:
A department has a unique name (Finance, Management and Marketing, Math, ABC-Law, etc.) and offers multiple courses.
A course has a unique name, which is a hyphenated prefix-Number like (BUAN-310, CIS-205, FIN315, MATH-153, etc.), a long name like “principles of Data management”, a long description and a number of credit (leave prerequisites out for now).
During any given semester (Fall, Spring, Summer-1, Summer-2, Winter), Zero-Or-More-sections of a given course are offered. For example, For BUAN-227 and for the Fall of 2019, 4 sections (1, 2, 3 and 61, I made it up) were offered.
Each section has a CRN, which is a unique identifier and a capacity to indicate the max number of students that can sign-up for the course (Leave time and room out for now).
We leave students who register for courses out for now
Your reverse engineered schema looks similar
Write the SQL code that creates the tables and enforces Primary and foreign key constraints.
Your SQL Code Goes Below:
#All Fields are required
#It is your call if any of the fields is Unique.
use ……..; #Your database Schema Name instead
SET FOREIGN_KEY_CHECKS=0;
DROP TABLE Department CASCADE;
Create TABLE Department (
…….
);
#
DROP TABLE Course CASCADE;
CREATE TABLE Course(
…….
);
#
DROP TABLE CourseSection CASCADE;
CREATE TABLE CourseSection(
…….
);
#
SET FOREIGN_KEY_CHECKS=1;
Insert 5-Department Records into the Department table. Your SQL Code Goes Below:
Enter 10 Courses into the Course table; make sure you assign them to different departments. Your SQL Code Goes Below:
Enter 20 course-sections into the courseSection table across different years and semesters. No more than 3 course sections for a given year and a given semester. Your SQL Code Goes Below:
MY SQL workbench
In: Computer Science
QUESTION 1
Even though an investee may be an associate of an investor, if the shares of that associate are traded in an active market, AASB128 Investment in Associates and Joint Ventures requires the application of the:
market valuation. |
||
consolidation method. |
||
equity method. |
||
valuation made by an independent evaluator. |
QUESTION 2
Indicia of an investor’s incapacity to exert significant influence over the policy-making decisions of an investee include:
the existence of a small group of ‘non-investor’ shareholders representing the majority of voting power in the investee. |
||
the investor attempting to gain, but not gaining, board representation. |
||
the investor attempting to gain, but not gaining, the financial information necessary to calculate its equity in the fair value of the investee’s net assets at the date of acquisition, or its equity in the post-acquisition earnings of the investee. |
||
all of the above. |
QUESTION 3
The accounting method applied to investments in associates, known as the equity method, is also known as the:
significant influence method. |
||
multi-line consolidation method. |
||
entity method of consolidation. |
||
one-line consolidation method. |
QUESTION 4
Goodwill acquired in an associate is:
amortised across its useful life. |
||
carried as a separate asset in the accounting records of the investor. |
||
written off immediately against the carrying amount of the investment. |
||
not subject to amortisation. |
QUESTION 5
Red Limited acquired a 30% investment in Blue Limited for $1,000,000. Blue declared and paid a dividend of $20,000 during the current year. Red Limited prepares consolidated financial statements. Which of the following is the appropriate entry for Red Limited to record this dividend?
DR Dividends payable $6,000 CR Cash $6,000 |
||
DR Dividend revenue $6,000 CR Investment in associate $6,000 |
||
DR Cash $6,000 CR Dividend revenue $6,000 |
||
DR Cash $6,000 CR Investment in associate $6,000 |
In: Accounting
Hi-Tek Manufacturing, Inc., makes two types of industrial component parts—the B300 and the T500. An absorption costing income statement for the most recent period is shown:
Hi-Tek Manufacturing Inc. Income Statement |
|||
Sales | $ | 1,757,400 | |
Cost of goods sold | 1,238,900 | ||
Gross margin | 518,500 | ||
Selling and administrative expenses | 610,000 | ||
Net operating loss | $ | (91,500 | ) |
Hi-Tek produced and sold 60,100 units of B300 at a price of $21 per unit and 12,700 units of T500 at a price of $39 per unit. The company’s traditional cost system allocates manufacturing overhead to products using a plantwide overhead rate and direct labor dollars as the allocation base. Additional information relating to the company’s two product lines is shown below:
B300 | T500 | Total | ||||
Direct materials | $ | 400,600 | $ | 162,200 | $ | 562,800 |
Direct labor | $ | 120,100 | $ | 42,600 | 162,700 | |
Manufacturing overhead | 513,400 | |||||
Cost of goods sold | $ | 1,238,900 | ||||
The company has created an activity-based costing system to evaluate the profitability of its products. Hi-Tek’s ABC implementation team concluded that $56,000 and $105,000 of the company’s advertising expenses could be directly traced to B300 and T500, respectively. The remainder of the selling and administrative expenses was organization-sustaining in nature. The ABC team also distributed the company’s manufacturing overhead to four activities as shown below:
Manufacturing Overhead |
Activity | |||||
Activity Cost Pool (and Activity Measure) | B300 | T500 | Total | |||
Machining (machine-hours) | $ | 207,400 | 90,200 | 62,300 | 152,500 | |
Setups (setup hours) | 144,900 | 75 | 270 | 345 | ||
Product-sustaining (number of products) | 100,800 | 1 | 1 | 2 | ||
Other (organization-sustaining costs) | 60,300 | NA | NA | NA | ||
Total manufacturing overhead cost | $ | 513,400 | ||||
Required:
1. Compute the product margins for the B300 and T500 under the company’s traditional costing system.
2. Compute the product margins for B300 and T500 under the activity-based costing system.
3. Prepare a quantitative comparison of the traditional and activity-based cost assignments.
In: Accounting
Consider the titration of a 36.0 mL sample of 0.170 M HBr with 0.200 M KOH. Determine each of the following:
Part A
the initial pH
Express your answer using three decimal places.
Part B
the volume of added base required to reach the equivalence point
Express your answer in milliliters.
Part C
the pH at 12.0 mL of added base
Express your answer using three decimal places.
Part D
the pH at the equivalence point
Express your answer as a whole number.
Part E
the pH after adding 5.0 mL of base beyond the equivalence point
Express your answer using two decimal places
In: Chemistry
in java pls
Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' by celebrating its years of life.
Ask the lumberjack how many trees he wants to cut. Verify you got the number correctly by printing it to output.
Write a loop that iterates over all the trees the lumberjack wants to cut down. Print the tree number to the screen to make sure your loop is working correctly.
Query the lumber jack for how many rings are in this tree and print this number to make sure you got the correct number of rings.
Write an inner loop that iterates over the years of the tree. Print each year to make sure you are iterating correctly and hitting each year that it lived.
Change the necessary print statements and to match the correct formatting from the output examples.
input: 2 3 4
expected output:
How many trees do you want to cut down?
2
0
How many rings are in tree 0?
3
We humbly respect tree number 0 and celebrate its 1 birthday.
We humbly respect tree number 0 and celebrate its 2 birthday.
We humbly respect tree number 0 and celebrate its 3 birthday. 1
How many rings are in tree 1?
4
We humbly respect tree number 1 and celebrate its 1 birthday.
We humbly respect tree number 1 and celebrate its 2 birthday.
We humbly respect tree number 1 and celebrate its 3 birthday.
We humbly respect tree number 1 and celebrate its 4 birthday.
In: Computer Science
1. Service quality is not always consistent, largely because services are often performed by human beings. Provide an example of what employers could do to reduce service variability.
2. Generally, when advertising to one’s supply chain, the objective is a ____________________ strategy, in which the goal is to motivate sellers– wholesalers, distributors, or salespeople – to highlight the product, rather than the competitors, and thereby induce consumers to buy the product
3. When determining how to best convey the message in a marketing campaign, often one will determine the unique selling proposition (USP). What is a USP intended to do?
4. In the early stages of an ad campaign, the objectives are established. After the campaign has run, to determine if those objectives are met, the marketer will _____________________.
5. Describe the difference between financial and non-financial incentives.
6.In the B2B buying process the ___________________________ is an activity through which buying organizations invite alternative suppliers to bid on supplying their required goods.
7. Name and explain three “rule-of-thumb” methods of setting Integrated Marketing Communications budgets.
In: Operations Management
How would a financial manager determine optimal capital structure? How this would fit in with the company's capital expenditures, growth plans and operating results?
In: Operations Management
In C++
Complete the following code without the use of auto.
In: Computer Science
Provide a comparison and contrast between dialogue and discussion. Which can be used in strategic conversation? Use examples to demonstrate your understanding.
In: Operations Management
Flow chart and IPO chart ( no handwritten please )
#include <stdio.h>
#include <string.h>
#include <conio.h>
#include <ctype.h>
char vs[26][26];
void encrypt(char input[], char key[], char cipher[]) {
char inputWithoutSpaces[50], repeatedKeyWord[50], tempCipher[50];
int cnt = 0, i = 0, keyLen = strlen(key), len3 = strlen(input);
// loop to remove the spaces from input & store in other
char array inputWithoutSpaces
for (i = 0; i < len3; ++i) {
if (input[i] != ' ') {
inputWithoutSpaces[cnt++] = toupper(input[i]);
}
}
inputWithoutSpaces[cnt] = '\0';
int len1 = strlen(inputWithoutSpaces);
// loop to repeat the key until it becomes equal to the length
of input without spaces
i = 0;
while (i < len1) {
repeatedKeyWord[i] = toupper(key[i % keyLen]);
i++;
}
repeatedKeyWord[i] = '\0';
// form the temp cipher
for (i = 0; i < len1; ++i) {
tempCipher[i] = vs[inputWithoutSpaces[i] % 'A'][repeatedKeyWord[i]
% 'A'];
}
tempCipher[i] = '\0';
// modify the passed cipher by adding spaces in temp cipher
wherever needed
cnt = 0;
for (i = 0; i < len3; ++i) {
if (input[i] == ' ')
cipher[i] = ' ';
else
cipher[i] = tempCipher[cnt++];
}
cipher[i] = '\0';
}
void decrypt(char cipher[], char key[], char plaintext[]) {
printf("%s\n", key);
char cipherWithoutSpaces[50], repeatedKeyWord[50],
tempPlainText[50];
int cnt = 0, i = 0, keyLen = strlen(key), len3 = strlen(cipher);
// loop to remove the spaces from cipher & store in other
char array cipherWithoutSpaces
for (i = 0; i < len3; ++i) {
if (cipher[i] != ' ') {
cipherWithoutSpaces[cnt++] = toupper(cipher[i]);
}
}
cipherWithoutSpaces[cnt] = '\0';
int len1 = strlen(cipherWithoutSpaces);
// loop to repeat the key until it becomes equal to the length
of input without spaces
i = 0;
while (i < len1) {
repeatedKeyWord[i] = toupper(key[i % keyLen]);
i++;
}
repeatedKeyWord[i] = '\0';
// form the temp plaintext
cnt = 0;
for (i = 0; i < len1; ++i) {
for (int j = 0; j < 26; ++j) {
if (vs[repeatedKeyWord[i] % 'A'][j] ==
cipherWithoutSpaces[i])
tempPlainText[cnt++] = 'A' + j;
}
}
tempPlainText[cnt] = '\0';
// modify the passed plaintext by adding spaces in temp
plaintext wherever needed
cnt = 0;
for (i = 0; i < len3; ++i) {
if (cipher[i] == ' ')
plaintext[i] = ' ';
else
plaintext[i] = tempPlainText[cnt++];
}
plaintext[i] = '\0';
}
int main(void) {
char selection;
char plaintext[50], cipher[50], key[10];
// making the table
for (int i = 0; i < 26; ++i)
for (int j = 0; j < 26; ++j)
vs[i][j] = ('A' + ((i + j) % 26));
// taking first selection
fflush(stdin);
printf("Enter e for encryption, d for decryption, x for exit:
");
scanf("%c", &selection);
// run loop till user enters 'x'
while (selection != 'x') {
// condition for encryption
if (selection == 'e') {
// taking plaintext
fflush(stdin);
printf("Enter the plaintext: ");
scanf("%50[a-zA-Z ]", plaintext);
// taking key
fflush(stdin);
printf("Enter the key: ");
scanf("%50[a-zA-Z ]", key);
// encrypting and displaying cipher
encrypt(plaintext, key, cipher);
fflush(stdin);
printf("Cipher text: %s\n\n", cipher);
}
else {
// taking encrypted text
fflush(stdin);
printf("Enter the encrpted text: ");
scanf("%50[a-zA-Z ]", cipher);
// taking key
fflush(stdin);
printf("Enter the key: ");
scanf("%50[a-zA-Z ]", key);
// decrypting and displaying plain text
decrypt(cipher, key, plaintext);
fflush(stdin);
printf("Plain Text: %s\n\n", plaintext);
}
fflush(stdin);
printf("Enter e for encryption, d for decryption, x for exit:
");
scanf("%c", &selection);
}
return 0;
}
In: Computer Science
In the Digital Marketing era it is easier market entry for smaller, more nimble competitors to compete head-to-head with established brands. Agree ? Yes or no and why?
In: Operations Management