A machine is out of order for major work. Define
controls
exercised in Maintenance Department required for its
Maintenance.
In: Mechanical Engineering
Business law question:
Many actions can be a tort and a crime (like the OJ example in the video). As the video discusses, he was found "not guilty" of the crime of murder but was found "liable" for the tort of wrongful death. Share your thought on whether we should consolidate criminal and tort law so a person can only be held responsible for one or whether it is "right" to have two different systems for evaluating the same activity.
In: Operations Management
Cookie Monster wants to merge his cookie manufacturing business with the milk business that is owned by Matilda Milk, Inc. Cookie Monster would like for you to explain the difference between buying the stock of Matilda Milk, Inc or buying the assets of Matilda Milk, Inc. Please explain the general differences between a stock acquisition or an asset acquisition.
Answer:
In: Finance
STRATEGIC MANAGEMENT COURSE
Soft Drink Exercise - relates to chap 7 mostly marketing strategy
You are the COO for Jones Soda Company and are considering a new high end bottled water product. In preparation, you are doing marketing research to consider competition and are developing a strategy. Consider the company website.
You are developing a plan to decide what should you do and how should you approach this. Respond to the following questions in a paragraph:
Explain the marketing segmentation of customers for this possible product. What is the positioning in terms of the 4 P’s of marketing? What role could or should social media play in the product? Develop a perceptual map and what are your findings.
In: Operations Management
JAVA
(1) Create two files to submit:
Build the ItemToPurchase class with the following specifications:
(2) In main(), prompt the user for two items and create two
objects of the ItemToPurchase class. Before prompting for the
second item, call scnr.nextLine(); to allow the
user to input a new string. (2 pts)
Ex:
Item 1 Enter the item name: You entered: Chocolate_Chips Enter the item price: You entered: 3 Enter the item quantity: You entered: 1 Item 2 Enter the item name: You entered: Bottled_Water Enter the item price: You entered: 1 Enter the item quantity: You entered:10
(3) Add the costs of the two items together and output the total
cost. (2 pts)
Ex:
TOTAL COST Chocolate_Chips 1 @ $3 = $3 Bottled_Water 10 @ $1 = $10 Total: $13
In: Computer Science
A random sample of 23 items is drawn from a population whose standard deviation is unknown. The sample mean is x¯ = 840 and the sample standard deviation is s = 15. Use Appendix D to find the values of Student’s t.
(a) Construct an interval estimate of
μ with 98% confidence. (Round your answers to 3
decimal places.)
The 98% confidence interval is from __to__
(b) Construct an interval estimate of μ
with 98% confidence, assuming that s = 30. (Round
your answers to 3 decimal places.)
The 98% confidence interval is from __to__
(c) Construct an interval estimate of μ
with 98% confidence, assuming that s = 60. (Round
your answers to 3 decimal places.)
The 98% confidence interval is from __to__
(d) Describe how the confidence interval changes
as s increases.
The interval stays the same as s increases.
The interval gets wider as s increases.
The interval gets narrower as s increases.
In: Math
4. DNS hijacking is a common technique that is used by censors (i.e., networks who perform censoring actions), where fake DNS responses can be injected. As a DNS request could traverse a number of routers along the path, each router along the path could inject a fake DNS response. In the paper “The Collateral Damage of Internet Censorship by DNS Injection”, authors use a technique similar to traceroute to identify the router that actually injects the fake DNS response. Authors deliberately decrease the TTL (time-to-live) value in the IP header to monitor ICMP packet and fake DNS response to decide the router that injects fake response. In this paper, DNS is built on UDP. However, DNS can also be built on top of TCP. This expands the attack surface for attackers. Specifically, the censors inject RST packets to both the client and the server in one TCP connection if a DNS query in this connection carries “sensitive” information. Different from UDP, TCP requires three-way handshake. Therefore, the packet that carries sensative information (e.g., a TCP-based DNS query) will be the packet that comes later than packets for three-way handshake. Let us make the following assumptions for this question 1. We assume that DNS over TCP is using a publicly-known port number. 2. Censors are stateless, which means that they will not consider whether a TCP packet belongs to an established connection. They make decision based on each individual packet instead of packets belonging to the same connection. In order to make the method discussed in “The Collateral Damage of Internet Censorship by DNS Injection” to be useful in this new setting, we need to make a few changes of this method. Question: Please verify whether each of the following changes is needed or not (1 Point). And please justify your answer (1 Points). a. When you select a target IP to send honey queries, this IP should never respond you with TCP RST packets if you send a TCP-based DNS query to this IP. b. When you send out a honey query (a TCP-based DNS query with a sensitive domain) to a target IP, you can directly send this TCP-based DNS query to this target IP without establishing a TCP connection with the target IP (i.e., through 3-way handshake). c. You should now expect RST packets from the censor rather than a forged DNS response.
In: Computer Science
For full load operation of 60Hz, 380V, 4 pole 30kW
induction motor,
the speed is 1746rpm, input current 56.2A power factor 90%.
In no load operation, input current 17.3A, power factor
13.5%.
In full load operation, assume that the mechanical loss is 25% of
the total loss and no other losses.
a) Iron loss load efficiency
b) Find a rotor copper loss under full load
c) Iron loss
d) Find a fixed automatic hand under full load
e) Find the proportion of fixed loss, iron loss, rotor copper loss
and machine loss in total losses.
answer -
a) 90.1%
b) 953W
c) 714W
d) 801W
e) 24.3%
In: Electrical Engineering
Should animals be used in psychological and medical research? Why or why not?
In: Psychology
Allocating joint cost
Keiffer Production manufactures three joint products in a single
process. The following information is available for August:
Sales Value | ||||
---|---|---|---|---|
at Split-Off | Cost after | Final Selling | ||
Product | Gallons | per Gallon | Split-Off | Price |
JP-4539 | 11,700 | $14.00 | $4.00 | $24.00 |
JP-4587 | 46,800 | 25.00 | 5.00 | 35.00 |
JP-4591 | 35,100 | 18.00 | 2.00 | 22.00 |
Allocate the joint cost of $1,450,800 to the production based on the following:
a. number of gallons.
Note: Round proportions to the nearest tenth of a
percentage (i.e. round 13.45% to 13.5%) and dollar amounts to the
nearest whole dollar.
JP-4539 | ? |
JP-4587 | ? |
JP-4591 | ? |
Total | ? |
b. sales value at split-off.
Note: Round proportions to the nearest whole
percentage (i.e. round 13.45% to 13%) and dollar amounts to the
nearest whole dollar.
JP-4539 | ? |
JP-4587 | ? |
JP-4591 | ? |
Total | ? |
c. approximated net realizable values at split-off.
Note: Round proportions to the nearest whole
percentage (i.e. round 13.45% to 13%) and dollar amounts to the
nearest whole dollar.
JP-4539 | ? |
JP-4587 | ? |
JP-4591 | ? |
Total | ? |
In: Accounting
Problem Description: Game: Bean Machine or Galton Box
To figure out if the ball falls to Left or Right, you can generate a random number using Math.random(). If this random number is greater than or equal to 0.5 we assume the ball falls to the Right otherwise it falls to the Left (or vise versa).
If there are 8 slots, the ball should hit 7 nails (8 -1), thus you should run a loop 7 times to figure out the path for that ball. If you have N balls, this whole process should be repeated N times. Here is a basic algorithm.
# of balls = N
# of slots = K
array of K elements
for ( i = 0 to N) {
int R = 0;
for (j = 0 to K-1) {
if ( random number >= 0.5)
R++;
}//end loop j
array[R] ++;
}// end loop i
Output the array to show how many balls are in each slot.
Things to DO!!!!!
Analysis: (3 points)
(Describe the problem including inputs and outputs in your own words.)
Design: (3 points)
(Describe the major steps in your algorithm for solving the problem.)
Coding: Write a well documented and properly indented Java source program. Your program should have a block comment with your name and a statement of purpose at the very top. Use meaningful variable names. You must have proper labels and informative statements for all inputs and outputs. (10 points)
Testing: (Describe how you test this program, you should use your own input data to test not just the test cases given in sample runs.) (4 points)
Test your program according to following test schedule and generate output to show the number of balls in each slot.
N | K |
10 | 8 |
50 | 10 |
100 | 20 |
500 | 30 |
What to Submit:
In: Computer Science
Financial information for Powell Panther Corporation is shown below:
Powell Panther Corporation: Income Statements for Year Ending December 31 (Millions of Dollars)
2019 | 2018 | |||
Sales | $ | 2,970.0 | $ | 2,700.0 |
Operating costs excluding depreciation and amortization | 2,525.0 | 2,295.0 | ||
EBITDA | $ | 445.0 | $ | 405.0 |
Depreciation and amortization | 81.0 | 70.0 | ||
Earnings before interest and taxes (EBIT) | $ | 364.0 | $ | 335.0 |
Interest | 65.3 | 59.4 | ||
Earnings before taxes (EBT) | $ | 298.7 | $ | 275.6 |
Taxes (25%) | 119.5 | 110.2 | ||
Net income | $ | 179.2 | $ | 165.4 |
Common dividends | $ | 161.3 | $ | 132.3 |
Powell Panther Corporation: Balance Sheets as of December 31 (Millions of Dollars)
2019 | 2018 | |||
Assets | ||||
Cash and equivalents | $ | 35.0 | $ | 30.0 |
Accounts receivable | 386.0 | 297.0 | ||
Inventories | 535.0 | 486.0 | ||
Total current assets | $ | 956.0 | $ | 813.0 |
Net plant and equipment | 807.0 | 702.0 | ||
Total assets | $ | 1,763.0 | $ | 1,515.0 |
Liabilities and Equity | ||||
Accounts payable | $ | 238.0 | $ | 216.0 |
Accruals | 304.0 | 243.0 | ||
Notes payable | 59.4 | 54.0 | ||
Total current liabilities | $ | 601.4 | $ | 513.0 |
Long-term bonds | 594.0 | 540.0 | ||
Total liabilities | $ | 1,195.4 | $ | 1,053.0 |
Common stock | 500.0 | 412.3 | ||
Retained earnings | 67.6 | 49.7 | ||
Common equity | $ | 567.6 | $ | 462.0 |
Total liabilities and equity | $ | 1,763.0 | $ | 1,515.0 |
Write out your answers completely. For example, 25 million should be entered as 25,000,000. Round your answers to the nearest dollar, if necessary. Negative values, if any, should be indicated by a minus sign.
What was net operating working capital for 2018 and 2019? Assume the firm has no excess cash.
2018: $
2019: $
What was the 2019 free cash flow?
$
How would you explain the large increase in 2019 dividends?
In: Finance
A high carbon steel shaft is used in an engine and subjected to
different loads. In order to analyse the stress in the shaft,
consider a rectangular element within the material. This element is
subjected to compressive stress of 135 MPa and shear stress of
166MPa in the vertical direction. The compressive stress in the
horizontal direction is 166MPa with a shear stress of 115MPa.
a. Sketch the state of stress on this element.
b. Determine the maximum and minimum normal and shear stresses and
their plane of orientation.
c. If the yield strength of the material is 350MPa, Poison’s ratio
is 0.32, and factor of safety is 5, determine the diameter of the
shaft to avoid failure.
In: Mechanical Engineering
one can tell by comparing nodes between two given trees whether
they relate to each other, by having a reflected symmetric
structure (i.e. being mirror images of each other), having
identical structure, or not being related at all. In this
assignment, you are asked to implement the following
features.
Hard-code some paired lists of integers.
Build binary search trees from each list
Print the binary search trees in the three orders discussed in
class.
Determine if the two binary search trees are identical, mirrors of
each other, or neither
Remove a number in each tree at random and compare the tree pair
again
Further, since the methods of the binary search tree class have been presented with recursive function calls, it is now up to you to implement these recursive functions with iterative loops.
You must write a Class Node, a class TreeChecker and a class
BinarySearchTree. For Java users, they must implement the following
interfaces respectively:
public interface INode {
//Getter of node data
T getData();
//Setter of node data
void setData(T data);
INode getLeftChild() ;
void setLeftChild(INode leftChild) ;
INode getRightChild() ;
void setRightChild(INode rightChild);
}
public interface ITree {
void setRoot(INode root);
INode getRoot();
void preorder(); // print tree in a preorder
traversal
void inorder(); // print tree in an inorder
traversal
void postorder(); // print tree in a postorder
traversal
INode insert(INode root, T data); // insert data into tree
INode remove(INode root, T data); //search/remove node
with data
T search(INode root, T data); //search and return data
if it exists
INode getMax(INode root); //return node with maximum
value of subtree
INode getMin(INode root); //return node with minimum
value of subtree
}
public interface ITreeChecker {
boolean isMirror(ITree root1, ITree root2); // check if two trees
are mirror
// images
boolean isSame(ITree root1, ITree root2); // check if
two trees are identical
}
Then if you could run the code in this main class.
public class Main {
public static void main(String[] args) throws
IOException {
// build a tree for the following
lists
// int array1[] = [4,1,9,12,3,2,8,7,16,20,13,11];
// int array2[] =
[4,1,9,12,3,2,8,7,16,20,13,11];
//add more examples here
Bst1 = new
BinarySearchTree();
Bst2 = new
BinarySearchTree();
//more trees for each example
treeChecker = new TreeChecker();
//build each BST
//print each tree with each order of traversal
//compare bst1 and bst2 as
mirror images with tree checker
If(treeChecker.isMirror(bst1,
bst2))
Print messages
saying the trees are mirrors of each other
// compare bst1 and bst2 as being
identical with tree checker
Else If(treeChecker.isSame(bst1,
bst2))
Print messages
saying the trees are identical to each other
Else
Print message
saying the trees are not related
//randomly remove a number from
each tree
//compare bst1 and bst2 again
// more code here to finish regarding comparing the other BST
pairs…
}
In: Computer Science
Forecasted Statements and Ratios Upton Computers makes bulk purchases of small computers, stocks them in conveniently located warehouses, ships them to its chain of retail stores, and has a staff to advise customers and help them set up their new computers. Upton's balance sheet as of December 31, 2016, is shown here (millions of dollars):
Cash $ 3.5 Accounts payable $ 9.0
Receivables 26.0 Notes payable 18.0
Inventories 58.0 Line of credit 0
Total current assets $ 87.5 Accruals 8.5
Net fixed assets 35.0 Total current liabilities $ 35.5
Mortgage loan 6.0
Common stock 15.0
Retained earnings 66.0
Total assets $122.5 Total liabilities and equity $122.5
Sales for 2016 were $325 million and net income for the year was $9.75 million, so the firm's profit margin was 3.0%. Upton paid dividends of $3.9 million to common stockholders, so its payout ratio was 40%. Its tax rate was 40%, and it operated at full capacity. Assume that all assets/sales ratios, (spontaneous liabilities)/sales ratios, the profit margin, and the payout ratio remain constant in 2017. Do not round intermediate calculations. If sales are projected to increase by $100 million, or 30.77%, during 2017, use the AFN equation to determine Upton's projected external capital requirements. Enter your answer in millions. For example, an answer of $1.2 million should be entered as 1.2, not 1,200,000. Round your answer to two decimal places. $ million
In: Finance