Questions
In C++, Write a function to reverse the nodes in a linked list. You should not...

In C++, Write a function to reverse the nodes in a linked list. You should not create new nodes when you reverse the the linked list.

The function prototype:          void reverse(Node*& head);

Use the following Node definition:

struct Node

{

   int data;

   Node *next;

}

In: Computer Science

Choose a company, find its code of ethics and evaluate it. Do you think it is...

Choose a company, find its code of ethics and evaluate it. Do you think it is well written or do you see potential issues? If you owned a small business, would you develop a code of business conduct? If yes, what variables would you include? If no, how would you ensure that your employees were following ethical business standards?

In: Operations Management

Please type answer for i can copy it. Thank you very much. -Question Respond to the...

Please type answer for i can copy it. Thank you very much.

-Question

Respond to the following in a minimum of 175 words:

Discuss the following:  

  • Differences, advantages, and disadvantages of Java® compared to another language of your choice (e.g., C++, Python, Ruby)
  • Database connectivity and file handling in Java® and in your other chosen language  

In: Computer Science

P1) Duplicated code P2) Feature Envy P3) Long Method P4) Intimacy (same questions for each) 1)...

P1) Duplicated code
P2) Feature Envy
P3) Long Method
P4) Intimacy
(same questions for each)
1) What is this ? What problem will it cause?
2) Can you show any example for this problem?
3) What is you solution? Show an example.

In: Computer Science

Identify and briefly discuss two of the financial performance indicators from the following list. Why are...

Identify and briefly discuss two of the financial performance indicators from the following list. Why are they important to a company's performance and why did you choose those two to review? If a company is doing poorly on these indicators, what actions should they take?

  • Operating profit margin
  • Return on total assets
  • Current ratio
  • Working capital
  • Long-term debt-to-capital

In: Operations Management

A regional transit company wants to determine whether there is a relationship between the age of...

A regional transit company wants to determine whether there is a relationship between the age of a bus and the annual maintenance cost. A sample of 10 buses resulted in the following data: spss

Age of Bus (years)

Annual Maintenance Cost ($)

1

350

2

370

2

480

2

520

2

590

3

550

4

750

4

800

5

790

5

950

Instructions:

  1. Input the data into an SPSS work sheet making sure that all your variables are labelled appropriately
  2. Create a scatter plot for these data.
  3. What does the scatter plot indicate about the relationship between the age of a bus and its annual maintenance costs?
  4. What is the correlation coefficient between the age of a bus and annual maintenance cost?
  5. Estimate a regression model that could be used to predict the annual maintenance cost given the age of the bus.
  6. What is the equation of the estimated model?
  7. Test whether each of the regression parameters β0 and β1 is equal to zero at the 0.05 level of significance testing.
  8. What is the correct interpretations of these parameters?
  9. How much of the variation in the sample values of annual maintenance costs does the regression model you estimated explain?
  10. What do you predict the annual maintenance cost to be for a 4.5 year old bus?
  11. Save all your commands to a syntax file

In: Computer Science

Verizon’s free cash flows to the firm are projected to be as follows for the next...

  1. Verizon’s free cash flows to the firm are projected to be as follows for the next 5 years (all figures in billions):

2020

2021

2022

2023

2024

12.36

12.93

13.62

14.36

14.97

How will your confidence in these assumptions change which model you listen to? For instance, if you were 60% confident of your assumptions for each of the P/E, DDM, and DCF models, which one would you rely on? Think about how much a change in your assumptions changes share prices. There isn’t necessarily a mathematically correct answer to this last question. There is, however, an economically reasonable way to justify your thinking regardless of the model you choose to rely on. The internal consistency between what you pick and how you justify it will matter. Would your decision change if you were 60%, 70%, and 80% of the three models, respectively (i.e. less confident of your assumptions for the P/E model relative to the other two)?

In: Finance

What are some of the benefits of batch scripting? What are some of the limitations? How...

What are some of the benefits of batch scripting? What are some of the limitations? How does batch scripting help us when dealing with large scale windows administration tasks such as creating users or modifying group policy?

In: Computer Science

For this Discussion, explain two important risks facing an organization by its employees using corporate e-mail...

For this Discussion, explain two important risks facing an organization by its employees using corporate e-mail (Microsoft Exchange, for example). What privacy safeguards and countermeasures would you suggest to the organization to protect e-mails going outside the company, and address junk mail, phishing attacks, and malicious links and attachments in incoming e-mail? Justify your selections.

In: Computer Science

How can a company incorporate organizational culture into their strategic plan. Why would culture be important...

How can a company incorporate organizational culture into their strategic plan. Why would culture be important when implementing a new change which is intended to meet one of their goals?

In: Operations Management

Let Ajay and Bijay public key is certified by a CA. Both of them uses secure...

Let Ajay and Bijay public key is certified by a CA. Both of them uses secure DHKE with parameters α and p for encrypting/decrypting messages with a symmetric algorithm such as AES. Now assume Ranjit hold the CA’s signature algorithm (and especially its private key), which was used to generate certificates. Can Ranjit decrypt old cipher-texts which were exchanged between Ajay and Bijay before the CA signature algorithm and private key was compromised, which Ranjit had stored? Explain.

In: Computer Science

A uniform supersonic airflow traveling at passes over a wedge (as Figure). An oblique shock, making...

A uniform supersonic airflow traveling at passes over a wedge (as Figure). An oblique shock, making an angle of 40° with the flow direction, is attached to the wedge under these flow conditions. If the static pressure and temperature in the uniform flow are 20k Pa, -10 °C, respectively. Determine the static pressure and temperature behind the wave, the Mach number of the flow passing over the wedge, and the wedge half-angle.

In: Mechanical Engineering

List and describe the four methods used to account for inventory? What effect does each inventory...

List and describe the four methods used to account for inventory?

What effect does each inventory method used have on the firm’s reported profits and ending inventory levels?

Which inventory method should be used if management anticipates a period of inflation? Why?

What are some specific inventory carrying costs? Are these costs fixed or variable?

In: Finance

Explain what factors come into play when selecting a particular cloud service model and a cloud...

Explain what factors come into play when selecting a particular cloud service model and a cloud deployment model for a given organization.

In: Computer Science

objectivity is one of the characteristics of scientific research.explain how to test for it in each...

objectivity is one of the characteristics of scientific research.explain how to test for it in each of the steps of the hypothetico deductive method(be clear and precise)?

In: Operations Management