Prepare journal entries to record the December transactions in the General Journal Tab in the excel template file "Accounting Cycle Excel Template.xlsx". Use the following accounts as appropriate: Cash, Accounts Receivable, Supplies, Prepaid Insurance, Equipment, Accumulated Depreciation, Accounts Payable, Wages Payable, Common Stock, Retained Earnings, Dividends, Service Revenue, Depreciation Expense, Wages Expense, Supplies Expense, Rent Expense, and Insurance Expense. 1-Dec Began business by depositing $7000 in a bank account in the name of the company in exchange for 700 shares of $10 per share common stock. 1-Dec Paid the rent for the current month, $600 . 1-Dec Paid the premium on a one-year insurance policy, $720 . 1-Dec Purchased Equipment for $4800 cash. 5-Dec Purchased office supplies from XYZ Company on account, $300 . 15-Dec Provided services to customers for $5800 cash. 16-Dec Provided service to customers ABC Inc. on account, $3100 . 21-Dec Received $1700 cash from ABC Inc., customer on account. 23-Dec Paid $170 to XYZ company for supplies purchased on account on December 5 . 28-Dec Paid wages for the period December 1 through December 28, $4760 . 30-Dec Declared and paid dividend to stockholders $200 . #2. Post all of the December transactions from the “General Journal” tab to the T-accounts under the “T-Accounts” tab in the excel template file "Accounting Cycle Excel Template.xlsx". Assume there are no beginning balances in any of the accounts. #3. Compute the balance for each T-account after all of the entries have been posted. These are the unadjusted balance as of December 31. #4. Prepare the unadjusted trial balance under the “Unadjusted Trial Balance” tab in the excel template file "Accounting Cycle Excel Template.xlsx" . Provide the total of the credit column from the Unadjusted Trial Balance #5. Record the following four transactions as adjusting entries under the “General Journal” tab. 31-Dec One month’s insurance has been used by the company $60. 31-Dec The remaining inventory of unused office supplies is $90. 31-Dec The estimated depreciation on equipment is $80. 31-Dec Wages incurred from December 29 to December 31 but not yet paid or recorded total $510. #6. Post all of the adjusting entries to the T-accounts under the “T-Accounts” tab. Compute the balance for each T-account after all of the adjusting entries have been posted. These are the adjusted balance as of December 31. #7. Prepare the adjusted trial balance under the “Adjusted Trial Balance” tab as of December 31 in the excel template file "Accounting Cycle Excel Template.xlsx" . Provide the following accounts balances from the Adjusted Trial Balance: Cash Accounts Receivable Supplies Prepaid Insurance Equipment Accumulated Depreciation Accounts Payable Wages Payable Common Stock Retained Earnings #8. Prepare Income Statement, Statement of Stockholder’s Equity, and Classified Balance Sheet under the “Financial Statements” tab for the month ended December 31, 20XX in the excel template file "Accounting Cycle Excel Template.xlsx". Provide the following amount from the Income Statement: Service Revenue Depreciation Expense Wages Expense Supplies Expense Rent Expense Insurance Expense Net Income Provide the following account balance from the Statement of Stockholders' Equity: Dividends Provide the following account balances from the Balance Sheet: Current Assets Long-Term Assets Total Liabilities Total Stockholder’s Equity Cash #9. Record the closing entries under the “General Journal” tab. #10. Post all of the closing entries to the T-accounts under the “T-Accounts” tab. Compute the balance for each T-account after all of the closing entries have been posted. Provide the ending balance of Cash at December 31 from the T-account Provide the balance of the Retained Earnings T-account after closing entries have been posted. Does the ending balance of the Retained Earnings T-account agree with the balance of Retained Earnings on the Balance Sheet? Check Point: Total Assets $ 10,120.00
In: Accounting
LP3.1 Assignment: Using Advanced SQL
This assignment will assess the competency 3. Construct advanced SQL queries.
Directions: Using the sample dataset, create three queries including a search, outer join and subquery. Create a table on how to use the query optimizer with these queries. Include screenshots and an explanation on why and when to use the optimizer.
.
In: Computer Science
You are given two arrays A1 and A2, each with n elements sorted in increasing order. For simplicity, you may assume that the keys are all distinct from each other. Describe an o(log n) time algorithm to find the (n/2) th smallest of the 2n keys assuming that n is even.
In: Computer Science
In: Economics
You are to modify the Pez class so that all errors are handled by exceptions. The constructor must be able to handle invalid parameters. The user should not be able to get a piece of candy when the Pez is empty. The user should not be able to put in more candy than the Pez can hold. I would like you to do 3 types of exceptions. One handled within the class itself, one handled by the calling method and one custom made exception. Be sure to comment in the program identifying each type of exception. You have the freedom of choosing which exception style you use where. You will need to submit 3 files, the Pez class, the custom exception class, and a tester program demonstrating that all of your exceptions work properly.
public class Pez { private int candy; private final int MAX_PIECES = 12; public Pez() { candy = 0; } public Pez(int pieces) //this will need to be error-proofed { candy = pieces; } public int getCandy() { return candy; } public void setCandy(int pieces) //this will need to be error-proofed { candy = pieces; } public void getAPieceOfCandy() //this will need to be error-proofed { candy = candy - 1; } public int fillPez() { int piecesNeeded = MAX_PIECES - candy; candy = MAX_PIECES; return piecesNeeded; } public int emptyPez() { int currentPieces = candy; candy = 0; return currentPieces; } public void addPieces(int pieces) //this will need to be error-proofed { candy = candy + pieces; } public String toString() { String thisPez = "This Pez has " + candy + " pieces of candy"; return thisPez; } public boolean equals(Pez pez2) { if(this.candy == pez2.candy) return true; return false; } }
In: Computer Science
This code must be written in Java. This code also needs to include a package and a public static void main(String[] args)
Write a program named DayOfWeek that computes the day of the week for any date entered by the user. The user will be prompted to enter a month, day, and year. The program will then display the day of the week (Sunday..Saturday). The following example shows what the user will see on the screen:
This program calculates the day of the week for any dates.
Enter month (1-12): 9
Enter day (1-31): 25
Enter year: 1998
The day of the week is Friday.
Hint: Use Zeller's congruence to compute the day of the week. Zeller's congruence relies on the following quantities:
J is the century (19, in our example)
K is the year within the century (98, in our example)
m is the month (9, in our example)
q is the day of the month (25, in our example)
The day of the week is determined by the following formula:
h = (q + 26(m + 1) / 10 + K + K / 4 + J / 4 + 5J) mod 7
where the results of the divisions are truncated. The value of h will lie between 0 (Saturday) and 6 (Friday).
Note: Zeller's congruence assumes that January and February are treated as months 13 and 14 of the previous year; this affects the values of K and m, and possibly the value of J. Note that the value of h does not match the desired output of the program, so some adjustment will be necessary. Apply Exception Handling.
In: Computer Science
Write a program that reads a text file and reports the total count of words of each length. A word is defined as any contiguous set of alphanumeric characters, including symbols. For example, in the current sentence there are 10 words. The filename should be given at the command line as an argument. The file should be read one word at a time. A count should be kept for how many words have a given length. For example, the word “frog” is 4 bytes in length; the word “turtle” is 6 bytes in length. The program should report the total word counts of all lengths between 3 and 15 bytes. Words with lengths outside that range should not be counted
In: Computer Science
19.0-L tank of carbon dioxide gas (CO2) is at a pressure of 9.40 ✕ 105 Pa and temperature of 18.0°C. (a) Calculate the temperature of the gas in Kelvin. K (b) Use the ideal gas law to calculate the number of moles of gas in the tank. mol (c) Use the periodic table to compute the molecular weight of carbon dioxide, expressing it in grams per mole. g/mol (d) Obtain the number of grams of carbon dioxide in the tank. g (e) A fire breaks out, raising the ambient temperature by 224.0 K while 82.0 g of gas leak out of the tank. Calculate the new temperature and the number of moles of gas remaining in the tank. temperature K number of moles mol (f) Using the ideal gas law, find a symbolic expression for the final pressure, neglecting the change in volume of the tank. (Use the following as necessary: ni, the initial number of moles; nf, the final number of moles; Ti, the initial temperature; Tf, the final temperature; and Pi, the initial pressure.) Pf = (g) Calculate the final pressure in the tank as a result of the fire and leakage. Pa
In: Physics
(1) Explain that a counter-controlled loop is useful when you know how many times a set of statements needs to be executed.
(2) Discuss the implementations of the Fibonacci Number program at the end of this section to consolidate the students’ understanding of the while loop repetition structures.
In: Computer Science
Should drug abuse be treated as a crime? Under what situations should the response be diversion to treatment rather than incarceration? Should all inmates have access to jail or prison-based drug treatment? Why is there such a difference in response to drug offenders based on their race? What should be done about this?
Please type the answer, do not use handwritten notes. Thanks
In: Psychology
Bond X is noncallable and has 20 years to maturity, a 10% annual coupon, and a $1,000 par value. Your required return on Bond X is 11%; if you buy it, you plan to hold it for 5 years. You (and the market) have expectations that in 5 years, the yield to maturity on a 15-year bond with similar risk will be 9.5%. How much should you be willing to pay for Bond X today? (Hint: You will need to know how much the bond will be worth at the end of 5 years.) Do not round intermediate calculations. Round your answer to the nearest cent.
In: Finance
Which condition applies to all special needs exceptions?
a. They involve highly regulated businesses.
b. They are based on probable cause.
c. They are not initiated by the police.
d. They are based on good faith.
The right to privacy can be described as a(n) __________.
a. privilege
b. anticipatory expectation
c. misnomer
d. penumbra
What legal standard applies to a warrantless search of probationer and parolee homes?
a. anticipatory seizure
b. reasonable grounds
c. neutral circumstances
d. reasonable suspicion
In: Psychology
How dangerous is radioactivity? Discuss the real and imagined dangers. Give examples, along with numbers. Which risks are known from direct observation, and which are known only from calculations? What assumptions are made in calculating risk?
In: Physics
6. In the 192.168.0.0/16 address block there are a total of __________ IP version 4 addresses.
65,536
16,777,216
4,096
1,048,576
7. Given the IPv4 address and network mask 134.124.133.139/22, identify the broadcast address in that network (the last address). [you may use the ip_addressing_basics spreadsheet, see "IPv4 Address, Network ID, etc." sheet]
134.124.132.0/22
134.124.133.255/22
134.124.132.255/24
134.124.135.255/22
8. Express the CIDR mask /18 using the dotted decimal notation.
255.255.192.0
255.192.0.0
255.255.255.0
255.255.240.0
9.
Host A has IP address/network mask: 192.168.3.222/27
Host B has IP address/network mask: 192.168.3.225/27
Given the information above, it can be inferred that:
Both host A and host B are on the same network
Host A and Host B are on different networks
Host A and Host B will have the same routing tables
Host A and Host B will be able to communicate directly without an intervening router.
10. A Host (the sending host) is trying to send a packet to another host (the destination host). The sending host knows the IP address of destination host. In deciding how to forward the packet toward destination host, the sending host will:
take the Destination IP address and perform a Logical AND operation with its own (sending hosts') Network Mask to determine if the destination host is on the same network as the sending host.
take the Destination IP address and perform a Logical AND operation with destination host's Network Mask to determine if the destination host is on the same network as the sending host.
always forward all packets to the default gateway and not be concerned with determining if the destination host is on the same network as the sending host.
never forward any packets to the default gateway and not be concerned with determining if the destination host is on the same network as the sending host.
In: Computer Science
In: Biology