Questions
The wastewater treatment plant will also treat wastewater originating from the industrial activity of pulp and...

The wastewater treatment plant will also treat wastewater originating from the industrial activity of pulp and paper in the near future. Proposed and describe appropriate unit processes that can be added to the plant.

In: Civil Engineering

A professor in the accounting department of a business school claims that there is much more...

A professor in the accounting department of a business school claims that there is much more variability in the final exam scores of students taking the introductory accounting course as a requirement than for students taking the course as part of a major in accounting. Random samples of 16 non-accounting majors (group 1) and 15 accounting majors (group 2) are taken from the professor's class roster in his large lecture, and the following results are computed based on the final exam scores:

n1 = 16, S12 = 154.6,    n2 = 15, S22 = 48.5

(a) At the 0.05 level of significance, is there evidence to support the professor's claim?

(b) What assumptions do you make here about the two populations in order to justify your use of the F test?

In: Math

Question 1: The Cost-Less Corp. supplies its four retail outlets from its three plants. The shipping...

Question 1: The Cost-Less Corp. supplies its four retail outlets from its three plants. The shipping cost per shipment from each plant to each retail outlet is given below.

R1

R2

R3

R4

P1

30

10

25

20

P2

15

25

30

10

P3

20

30

15

20

Part a) Formulate this problem as an assignment problem and solve it to find the best strategy for assigning production plants to retail outlets. (No need to show your steps, only list all possible assignments and minimum assignment cost)

Part b) Each plant can produce up to 150 products per month. Retail outlets 1, 2, and 3 need to receive 100, 120, 150, and 100 products per month. The company makes a revenue of 110 in for the manufacture of each unit of product. (Only show the table)

Part c) Use the minimum cost rule to construct an initial BF solution and calculate its transportation cost. (Show the final solution)

In: Operations Management

Myrtle Air Express decided to offer direct service from Cleveland to Myrtle Beach. Management must decide...

  1. Myrtle Air Express decided to offer direct service from Cleveland to Myrtle Beach. Management must decide between a full-price service using the company’s new fleet of jet aircraft and a discount service using smaller capacity commuter planes. It is clear that the best choice depends on the market reaction to the service Myrtle Air offers. Management developed estimates of the contribution to profit for each type of service based upon two possible levels of demand for service to Myrtle Beach: strong and weak. The following table shows the estimated quarterly profits (in thousands of dollars):

    Demand for Service
    Service Strong Weak
    Full price $1440 -$530
    Discount $1000 $480
    1. What is the decision to be made, what is the chance event, and what is the consequence for this problem?

      The input in the box below will not be graded, but may be reviewed and considered by your instructor.



      How many decision alternatives are there?

      Number of decision alternatives = ___

      How many outcomes are there for the chance event?

      Number of outcomes = ___
    2. If nothing is known about the probabilities of the chance outcomes, what is the recommended decision using the optimistic, conservative and minimax regret approaches?
      Optimistic approach
      Conservative approach
      Minimax regret approach
    3. Suppose that management of Myrtle Air Express believes that the probability of strong demand is 0.7 and the probability of weak demand is 0.3. Use the expected value approach to determine an optimal decision.

      Optimal Decision :  (Full Price Service/ Discount Service)
    4. Suppose that the probability of strong demand is 0.8 and the probability of weak demand is 0.2. What is the optimal decision using the expected value approach?

      Optimal Decision :  (Full Price Service/ Discount Service)
    5. Determine the range of demand probabilities for which each of the decision alternatives has the largest expected value. If required, round your answer to four decimal places.

      (Full Price Service/ Discount Service) is the best choice if probability of strong demand is less than or equal to____ . For values of "p" greater than____ , the full price service is (best/worst) choice.

In: Operations Management

I WANT THIS CODE TO BE SIMPLE BECAUSE I AM NEW TO CODING AND I WANT...

I WANT THIS CODE TO BE SIMPLE BECAUSE I AM NEW TO CODING AND I WANT TO KNOW THE DETAILS! straight C Program. write a quiz game where a number of questions are asked and the user will win each time he answers right. and he loses each time he answers wrong.

the type of questions asked can be about sports or anything else. You can put 5 quiz questions.

It should only include the following: #include <stdio.h> and #include <stdlib.h>

because it is a simple code.

In: Computer Science

Alan Legler requires an estimate of the cost of goods lost by fire on March 9....

Alan Legler requires an estimate of the cost of goods lost by fire on March 9. Merchandise on hand on January 1 was $38,600. Purchases since January 1 were $65,700; freight-in, $3,300; purchase returns and allowances, $2,200. Sales are made at 33 1/3% above cost and totaled $99,900 to March 9. Goods costing $10,000 were left undamaged by the fire; remaining goods were destroyed.

Compute the cost of goods destroyed. (Round gross profit percentage and final answer to 0 decimal places, e.g. 15% or 125.)

Cost of goods destroyed

$

Compute the cost of goods destroyed, assuming that the gross profit is 33 1/3% of sales. (Round ratios for computational purposes to 5 decimal places, e.g. 78.72345% and final answer to 0 decimal places, e.g. 28,987.)

Cost of goods destroyed

$

In: Accounting

11 consider the following information for Evans, Inc. when the company entered bankruptcy proceedings: Account Balance...

11

consider the following information for Evans, Inc. when the company entered bankruptcy proceedings:

Account Balance per Books
Dr (Cr)
Cash $31,700
Accounts receivable 646,800
Inventory 320,000
Prepaid expenses 10,600
Buildings, net 750,000
Equipment, net 123,500
Goodwill 88,000
Wages payable (77,300)
Taxes payable (30,900)
Accounts payable (967,300)
Notes payable (205,400)
Common stock (1,200,000)
Retained earnings—deficit 510,300
Total $0

Inventory with a book value of $240,000 and realizable value of $175,000 is security for notes payable of $145,000. The equipment secures the remaining notes payable. Expected realizable values of the assets are:

Accounts receivable $300,000
Inventory 200,000
Buildings 250,000
Equipment 40,000

The prepaid expenses and goodwill have a realizable value of zero. The entire wages payable balance is a priority liability.

Required

Compute the estimated deficiency to unsecured creditors.

Do not use negative signs with any of your answers below.

Assets pledged to fully-secured creditors $Answer
Less: Liabilities to fully-secured creditors Answer
Available as free assets Answer
Unpledged assets Answer
Less: Unsecured liabilities with priority Answer
Net free assets $Answer
Liabilities to partially-secured creditors $Answer
Less: Assets pledged to partially-secured creditors Answer
Unsecured portion Answer
Unsecured liabilities Answer
Total unsecured liabilities $Answer
Estimated deficiency to unsecured creditors $Answer

In: Accounting

Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure...

Software vulnerabilities in cyberspace can range from the simple outdated security patches on national critical infrastructure systems to poorly designed defense missile control systems. When these industrial control systems, military weapon control systems, or air control transportation systems are designed without security built into the software, their security vulnerabilities are paramount to the national security, economy, and human health.

Do research on the latest prominent software vulnerabilities and share your literature review findings with the class.

In: Computer Science

What is the formal impeachment process? Was Bill Clinton impeached? Why or why not? Has any...

What is the formal impeachment process? Was Bill Clinton impeached? Why or why not? Has any President been impeached? If so, who, when, how and why? If not, were any presidents close to being impeached?

In: Psychology

1. What type of commands can you issue through the command line process? Start-> IBM DB2COPY1...

1. What type of commands can you issue through the command line process?

Start-> IBM DB2COPY1 (Default) -> DB2 Command Line Processor

In: Computer Science

1/ On January 1, 2018, Badger Inc. adopted the dollar-value LIFO method. The inventory cost on...

1/ On January 1, 2018, Badger Inc. adopted the dollar-value LIFO method. The inventory cost on this date was $100,300. The ending inventory, valued at year-end costs, and the relative cost index for each of the next three years is below:

Year-end Ending inventory at
year-end costs
Cost Index
2018 $ 126,945 1.05
2019 144,320 1.10
2020 154,860 1.20


What inventory balance would Badger report on its 12/31/2020 balance sheet?

Multiple Choice

  • $129,050.

  • $130,895.

  • $154,860.

  • None of these answer choices are correct.

2/ Nu Company reported the following pretax data for its first year of operations.

Net sales 2,960
Cost of goods available for sale 2,450
Operating expenses 820
Effective tax rate 40 %
Ending inventories:
If LIFO is elected 830
If FIFO is elected 1,220

What is Nu's net income if it elects LIFO?

Multiple Choice

  • $546.

  • $910.

  • $520.

  • $312.

NextVisit question map

Question 2 of 5 Total 2 of 5

Prev

In: Accounting

STEP 1: In a discussion post of 200-400 words, demonstrate your understanding of concepts learned in...

STEP 1: In a discussion post of 200-400 words, demonstrate your understanding of concepts learned in this module by responding to the following prompt: Pick an age: 1, 3, 7, 12, 15, 22, 35, 50, or 75. Think of your own experience or the experiences of those you know at this age. Consider the major developmental theories you learned about in this module (psychosexual, psychosocial, cognitive, and moral), and apply them to the age of your choosing. Describe either your own experiences, experiences of someone else, or an imagined situation at this age and use appropriate terms and definitions from the module to describe that stage of development. Do you agree with the developmental theories that describe this age? Why or why not?

In: Psychology

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv");...

how to read a csv file in php not using fgetscsv or fgets. Just using file("Stores.csv"); or fopen("Stores.csv", "r"); and making into a html table? It print but it keeps saying Notice: Undefined offset: , Notice: Undefined offset: 2, etc at the top.

Acme,Walmart,Ross,BJs,Target,Marshalls,Foot Locker,Giant,Charming Charlie

142,160,28,10,5,3,60,0.28,3167

175,180,18,8,4,1,12,0.43,4033

129,132,13,6,3,1,41,0.33,1471

138,140,17,7,3,1,22,0.46,3204

232,240,25,8,4,3,5,2.05,3613

135,140,18,7,4,3,9,0.57,3028

150,160,20,8,4,3,18,4.00,3131

207,225,22,8,4,2,16,2.22,5158

271,285,30,10,5,2,30,0.53,5702

89,90,10,5,3,1,43,0.30,2054

153,157,22,8,3,3,18,0.38,4127

87,90,16,7,3,1,50,0.65,1445

234,238,25,8,4,2,2,1.61,2087

106,116,20,8,4,1,13,0.22,2818

175,180,22,8,4,2,15,2.06,3917

165,170,17,8,4,2,33,0.46,2220

166,170,23,9,4,2,37,0.27,3498

136,140,19,7,3,1,22,0.63,3607

148,160,17,7,3,2,13,0.36,3648

151,153,19,8,4,2,24,0.34,3561

180,190,24,9,4,2,10,1.55,4681

293,305,26,8,4,3,6,0.46,7088

167,170,20,9,4,2,46,0.46,3482

190,193,22,9,5,2,37,0.48,3920

184,190,21,9,5,2,27,1.30,4162

157,165,20,8,4,2,7,0.30,3785

110,115,16,8,4,1,26,0.29,3103

135,145,18,7,4,1,35,0.43,3363

567,625,64,11,4,4,4,0.85,12192

180,185,20,8,4,2,11,1.00,3831

183,188,17,7,3,2,16,3.00,3564

185,193,20,9,3,2,56,6.49,3765

152,155,17,8,4,1,33,0.70,3361

148,153,13,6,3,2,22,0.39,3950

152,159,15,7,3,1,25,0.59,3055

146,150,16,7,3,1,31,0.36,2950

170,190,24,10,3,2,33,0.57,3346

127,130,20,8,4,1,65,0.40,3334

265,270,36,10,6,3,33,1.20,5853

157,163,18,8,4,2,12,1.13,3982

128,135,17,9,4,1,25,0.52,3374

110,120,15,8,4,2,11,0.59,3119

123,130,18,8,4,2,43,0.39,3268

212,230,39,12,5,3,202,4.29,3648

145,145,18,8,4,2,44,0.22,2783

129,135,10,6,3,1,15,1.00,2438

143,145,21,7,4,2,10,1.20,3529

247,252,29,9,4,2,4,1.25,4626

111,120,15,8,3,1,97,1.11,3205

133,145,26,7,3,1,42,0.36,3059

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<!-- title for web page -->

<title>Stores</title>

<link rel="stylesheet" href="style.css">

</head>

<body>

<h1>Stores</h1>

<table>

<?php

$Stores = file("homes.csv");

foreach($Stores as $key => $data) {

$Stores[$key] = explode(",", $data);

}

foreach($Stores as $key => $data)

print "".$Homes[$key][0]. "";

print "".$Homes[$key][1]. "";

print "".$Homes[$key][2]. "";

print "".$Homes[$key][3]. "";

print "".$Homes[$key][4]. "";

print "".$Homes[$key][5]. "";

print "".$Homes[$key][6]. "";

print "".$Homes[$key][7]. "";

print "".$Homes[$key][8]. "";

print "";

}

print "";

?>

In: Computer Science

The questions are at the bottom It was 4:56 P.M. on the surgical floor of Collins...

The questions are at the bottom

It was 4:56 P.M. on the surgical floor of Collins Memorial Hospital. Nurse Rhoda Fleming, an efficient head nurse with 15 years of experience, was in charge of the floor that afternoon. As is the case in many hospitals, she had responsibility for several patients herself as well as assuming supervisory responsibilities over other floor nurses. Making a final room check of her own patients prior to the arrival of her 5:00 P.M. relief, in Room 406 she found that Mr. Henry Youstra, who had undergone surgery the week before and not done well, had died. She pulled the sheet over the face of the body and made a mental note to tell her relief to empty the room for a new patient, bed space being especially important at this time in the hospital.

After finishing her check she returned to the floor desk. The evening shift supervisor, Anne Simmons, had already arrived, and was waiting at the desk.

“Hi, Anne. 406 just died, so that room's all set to go again. Too bad. We can certainly use the space, though.”

“That's for sure. Has 411 had her shot yet? Dr. Alpers really climbed on me yesterday about it. You know how he is.”

“No, not yet. You'd better do that right away.”

“Does the office know that 406 is ready?”

“No, you'll need to call them after you get things taken care of.”

Nurse Supervisor Fleming then left, and Simmons gave 411 her shot and went about other duties, dropping in on her own patients, and chatting with nurses on the shift.

At 5:45 P.M. she called the office and told them that room 406 was ready for occupancy, though she had not checked the room herself. She was told that a patient would be moved from recovery and would ultimately occupy 406.

Visitors' hours began at 7:00 P.M. at the hospital. As she had been doing three times daily throughout the week, as the fourth floor elevator doors opened, Mrs. Henry Youstra walked out and went down the hall to visit her husband.

At 8:00 P.M., the end of visiting hours, Nurse Supervisor Simmons checked each of her assigned patient rooms to see that visitors had left. In room 406 she found Mrs. Youstra dead on the floor beside the bed containing her husband's body.

Case Questions

  1. Explain how “noise” impeded accurate communication between Shift Supervisors Fleming and Simmons in this incident.
  2. What barriers to communication existed in the situation?
  3. How might this miscommunication have been avoided?
  4. What lessons might we learn from this case to help us understand the importance of communication to high performing workgroups?

In: Operations Management

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating...

Discuss an IT-related system that could be adopted at AIT to eliminate impersonation during exams, indicating where it would be located/placed and how each component of the system functions. .

In: Computer Science