Questions
2. The IQ of humans is approximately normally distributed with a mean 100 and standard deviation...

2. The IQ of humans is approximately normally distributed with a mean 100 and standard deviation of 15. A. What is the probablitlty that a randomly selected person has an IQ greater than 105? B. What is the probablitlty that a SPS of 60 randomly selected people will have a mean IQ greater than 105?

3. A 95% confidence interval for a population mean is (57,65). Can you reject the null hypothesis the mean= 68 at the 5% significance level why or why not?

In: Math

Consider the following information for three stocks, Stocks A, B, and C. The returns on the...

Consider the following information for three stocks, Stocks A, B, and C. The returns on the three stocks are positively correlated, but they are not perfectly correlated. (That is, each of the correlation coefficients is between 0 and 1.)

Stock Expected Return Standard Deviation Beta
A 9.10 % 15 % 0.8
B 10.45 15 1.1
C 12.70 15 1.6

Fund P has one-third of its funds invested in each of the three stocks. The risk-free rate is 5.5%, and the market is in equilibrium. (That is, required returns equal expected returns.) The data has been collected in the Microsoft Excel Online file below. Open the spreadsheet and perform the required analysis to answer the questions below.

Open spreadsheet

  1. What is the market risk premium (rM - rRF)? Round your answer to two decimal places.

    %

  2. What is the beta of Fund P? Do not round intermediate calculations. Round your answer to two decimal places.

  3. What is the required return of Fund P? Do not round intermediate calculations. Round your answer to two decimal places.

    %

  4. Would you expect the standard deviation of Fund P to be less than 15%, equal to 15%, or greater than 15%?

    1. less than 15%
    2. greater than 15%
    3. equal to 15%

    _____IIIIII

In: Finance

Read the “IBM at the Crossroads” case. Answer the following question fully. Will continuing the existing...

Read the “IBM at the Crossroads” case. Answer the following question fully.

Will continuing the existing strategy enable IBM to achieve and sustain a competitive advantage? (200 words minimum)

In: Operations Management

How can I find out the tangency portfolio base on the info state.

How can I find out the tangency portfolio base on the info state.

In: Finance

13. Which e-mail protocol transfers information from the mail server to the user's desktop? 14. List...

13. Which e-mail protocol transfers information from the mail server to the user's desktop?

14. List six Internet top level domain suffixes.

15. Which are the three SNMP management modes?

16. Will typing in you browser's Address line the command "http://telnet.westnetinc.com allow FTP access?

In: Computer Science

2. A researcher wishes to determine whether there is a difference in the average age of...

2. A researcher wishes to determine whether there is a difference in the average age of elementary school, high school, and community college teachers. Teachers are randomly selected from each group. Their ages are recorded below. Test the claim that at least one mean is different from the others. Use α = 0.01.
Resource: The One-Way ANOVA

  1. Identify the null hypothesis, Ho, and the alternative hypothesis, Ha.
  2. Determine whether the hypothesis test is left-tailed, right-tailed, or two-tailed.
  3. Find the critical value(s) and identify the rejection region(s).
  4. Find the appropriate standardized test statistic. If convenient, use technology.
  5. Decide whether to reject or fail to reject the null hypothesis.
  6. Interpret the decision in the context of the original claim.

Elementary School Teachers

High School Teachers

Community College Teachers

23
28
27
25
52
37

41
36
38
47
42
31

39
45
36
61
45
35

In: Math

1. You are to do a preliminary design study for a small demonstration steam turbine power...

1. You are to do a preliminary design study for a small demonstration steam turbine power plant.
- Steam will be provided by a small steam generator fired by natural gas.   - Your system will take in steam at 30 bar and 400 oC.
- The steam passes through a two stage turbine. At a pressure of 10 bars, the steam leaves the first stage of the turbine and will pass through a reheat loop in the steam generator which will boost the temperature back up to 400 oC at this pressure. The steam will then enter the second stage of the turbine.
- When the steam leaves the turbine, the quality should be at least 95% at the turbine exit / condenser inlet.
- The design condenser pressure is 0.70 bar.   
- Heat is removed from the condenser and rejected to the environment through a cooling tower.
a) Assuming isentropic expansion, what are the temperature, enthalpy, and entropy of the steam when it leaves the first stage of the turbine? (5 pts)

b) What are the enthalpy and the entropy of the steam as it leaves the reheater and enters the second stage of the turbine? How much heat (kJ/kg) goes into the steam in the reheat process? (10 pts)

c) Based on an isentropic expansion, what will the quality be at the exit? Will it meet this design limit? (10 pts)
For the following parts use the design turbine power output of 2.5 kW.
d) What mass flow rate is required? (10 pts)

e) At what rate must heat be produced by natural gas burners in the steam generator to produce the steam at the turbine inlet, and how much heat must be produced to reheat the steam between the stages? For a heating rate range of 950-1150 BTU/scf and a cost of $8 per 100 cubic feet, what is the fuel cost per hour to run this unit? (10 pts)

f) What is the feed water pump power demand, and what is the BWR? (10 pts)


2. A refrigeration machine has been designed based on R134a. The design capacity is 15 tons.   The evaporator coil design temperature is 8 oC. The refrigerant enters the compressor as a slightly superheated vapor at 15 oC. The condenser coil design pressure is 14 bar. Refrigerant enters the expansion valve as a compressed (subcooled) liquid at 44 C. Note that the temperature of the air passing over the tubing in the evaporator coil will be higher than 8 oC and the temperature of the air passing over the condenser coil will be lower than the coil temperature. Use 80% for the compressor isentropic efficiency.
a. Calculate the power required to run the compressor under these design conditions and the required mass flow rate of R134a. (30 pts)

b. Find the rate of heat transfer for the condenser (high pressure side) of the system. (15 pts)

c. Find the quality of the refrigerant as it enters the evaporator. (10 pts)



3. A small gas turbine engine is used to produce power for auxiliary systems. This is a simple gas turbine open to the atmosphere. Air enters the compressor at 1 bar, 300 K. The compressor pressure ratio is 3.5:1. After passing through the combustion chamber, the air enters the turbine at a temperature of 1300 K. Determine the mass flow rate of air needed for the turbine to produce 60 kW of power. Also determine the heat that must be generated in the combustors. (30 pts) Solar collector …

In: Mechanical Engineering

Create a class Ledger that will record the sales for a store. It will have the...

Create a class Ledger that will record the sales for a store. It will have the attributes ■ sale—an array of double values that are the amounts of all sales ■ salesMade—the number of sales so far ■ maxSales—the maximum number of sales that can be recorded and the following methods: ■ Ledger(max)—a constructor that sets the maximum number of sales to max ■ addSale(d)—adds a sale whose value is d ■ getNumberOfSales—returns the number of sales made ■ getTotalSales—returns the total value of the sales, Lastly define the following methods for the class Ledger, as described in the previous exercise: ■ getAverageSale()—returns the average value of all the sales ■ getCountAbove(v)—returns the number of sales that exceeded v in value.

In: Computer Science

a) Discuss four (4) reasons why training evaluation is important.

a) Discuss four (4) reasons why training evaluation is important.

In: Operations Management

17. You wish to subnet your class C network address, 222.45.145.0, to support 28 hosts per...

17. You wish to subnet your class C network address, 222.45.145.0, to support 28 hosts per subnet. Your resulting subnet mask appears as follows: 255.255.255.224. Will the above subnet mask provide the necessary number of host addresses?

18. Your customer owns a Class B address, 147.80.0.0. They want to subnet this address to provide the greatest possible number of host addresses. Which subnet mask provides the greatest total number of hosts across all subnets?

19. Your customer wants to subnet their Class C network to support a maximum of 24 hosts per subnet. What will be the resulting subnet mask?

20. Due to recent business growth, your employer has leased office space in a new building across town. While transitioning, they wish to provide WAN communications between offices. One of your tasks is to subnet their current Class C network address to support the two offices. What subnet mask will support the two subnets, while providing the maximum number of usable host addresses on both subnets?

In: Computer Science

In Non-probability samples – specific elements from the population are selected in a non-random manner, in...

In Non-probability samples – specific elements from the population are selected in a non-random manner, in non-randomness, population elements are selected on the basis of convenience, because they are easy or inexpensive to reach.
True or false

In: Operations Management

Please answer part d). A string is tied between two posts sticking out of the wall....

Please answer part d).

A string is tied between two posts sticking out of the wall. The posts are separated by 1.20 m. A 5.00-cm-long snippet of the string weighs 1.50 grams. You attach a machine to one of the posts, so that the post can vibrate up and down at a frequency set on the machine. (You can still consider the string attached to this post as a node - the machine does not create a high amplitude right at the post.)

a) You slowly turn up the frequency of the machine, and at 41.7 Hz you see the standing-wave pattern corresponding to the fundamental frequency of the system. What is the tension in the string? Express the answer in newtons (N). ANSWER: T = 300 N

b) You continue to increase the frequency of the machine, and at a higher frequency you observe that nodes form every 10 cm, and the antinodes have an oscillation amplitude of 5.2 mm. What is the frequency of this oscillation? Express the answer in hertz (Hz). ANSWER: f = 500 Hz

c) Another standing wave pattern appears when the machine is set to 167 Hz. The amplitude of the string's oscillation at the antinodes is 5.2 mm. How many antinodes n does the pattern have? ANSWER: n = 4.00

d) You keep the conditions set as they are in part C. What is the amplitude of the string's oscillation 40 cm from the post that the machine is oscillating? Express the answer in millimetres (mm).

this q has been posted before and all answers correct with exception to d

In: Physics

This question concerns a synchronous sequential counter, which counts an arbitrary sequence. The properties of the...

This question concerns a synchronous sequential counter, which counts an arbitrary
sequence. The properties of the counter include the following:
1. The counter has two inputs, input X and CLK (Clock), and three outputs, A, B and
C. A is the most significant digit in the counting value, and C is the least
significant digit.
2. The counter counts under a POSITIVE clock edge.
3. When X is 0, the counting sequence is:
1, 6, 3, 2, 5, 1, 6, 3, 2, 5, 1, …
When X is 1, the counting sequence is:
1, 5, 7, 0, 3, 1, 5, 7, 0, 3, 1, …

(a) Write down the state table of your counter. You can assume that the states that do
not occur are don’t care conditions.
(b) Design the counter using positive-edged triggered JK flip-flops. Show your design
steps clearly in your work. As the final result, draw the logic circuit diagram of
your counter.

In: Electrical Engineering

Part A: (Chapter 8) Make the following updates to the original code below: Override the toString()...

Part A: (Chapter 8) Make the following updates to the original code below:

  • Override the toString() method and equals() method inside your class [2 points]
  • Create a Copy Constructor in your class [2 point]
  • Create a static field in your class called counter. It should increment every time an object is created. [1 point]
  • Create a static method that displays the counter value. Also call this method at the end of your main method. [1 point]
  • Use the "this" reference in all your setter (mutator) methods and also use the "this" reference in your default constructor to call the parameterized constructor. [1 point]
  • Demonstrate that the copy Constructor, toString, and equals methods work in your main method [2 point]

Part B : (Chapter 10) Make the following updates to your Assignment 1

  • Create a sub class that inherits everything from your base class. (For example, if Car is the base class then SportsCar could be your sub class) [1 point]
  • Provide at least one additional attribute to your subclass [1 point]
    • Create gettter/setter methods for it.
  • Create a default constructor for the subclass, that uses super to call the base class default constructor. [1 point]
    • It should set all attributes in the subclass as well as the super class to default values
  • Create a parameterized constructor for the subclass, that uses keyword super to pass the inherited parameters to the base class. [2 point]
    • It should set all attributes in the subclass as well as the super class to the values that are passed in to the constructor.
  • Override the display() method to print out all the instance variable values from the base class, and also from the sub class. [2 point]
  • In your main method, create 2 new object using your subclass, set the data, and call the display method.
    • Create one object using the no-arg (default) constructor of your sub-class. [1 point]
      • Call the set methods to set all attribute data associated to that object.
      • Call the display method for that object
    • Create one object using the parameterized constructor of your sub-class. [1 point]
      • Call the display() method for this object too
  • Add all these objects from Assignment 2 to the same array you created in Assignment 1, and loop through all objects to call the display method. (This demonstrates polymorphism)  [2 point]

----

Original Code:

public class Coffee {
    private int Number;
    private double price;
    private String title;

    public Coffee() {
    }

    public Coffee (int Number, double price, String title) {
        this.Number = Number;
        this.price = price;
        this.title = title;
    }

    public void display() {
        System.out.println("Coffee [price=" + this.price + ", title=" + this.title + ", Number=" + this.Number + "]");
    }

    public String getTitle() {
        return this.title;
    }

    public void setTitle(String title) {
        this.title = title;
    }

    public int getNumber() {
        return this.Number;
    }

    public void setNumber(int Number) {
        this.Number = Number;
    }

    public double getPrice() {
        return this.price;
    }

    public void setPrice(double price) {
        this.price = price;
    }
}

-----

Driver (demo) code:

public class Driver {

        public static void main(String[] args) {
            Coffee C1 = new Coffee();
            C1.setPrice(2.50);
            C1.setTitle("Black");
            C1.setNumber(1);
            System.out.println("C1:");
            C1.display();

            Coffee C2 = new Coffee (2, 6.00, "Latte");
            System.out.println("\nC2:");
            C2.display();
        }
}

---------------

Result:

C1: Coffee [price=2.5, title=Black, Number=1]

C2: Coffee [price=6.0, title=Latte, Number=2]

Process finished with exit code 0

In: Computer Science

Association for Molecular Pathology v. Myriad Genetics, Inc. 133 S.Ct. 2107, 2013 U.S. Lexis 4540 (2013)...

Association for Molecular Pathology v. Myriad Genetics, Inc. 133 S.Ct. 2107, 2013 U.S. Lexis 4540 (2013) Supreme Court of the United States
“Laws of nature, natural phenomena, and abstract ideas are not patentable.” —Thomas, Justice
Facts
After substantial research and expenditure of money and resources, Myriad Genetics, Inc. (Myriad) dis-covered the precise location and sequence of two naturally occurring segments of deoxyribonucleic acid (DNA) known as BRCA1 and BRCA2. Mutations in these genes can dramatically increase a female’s risk of developing breast and ovarian cancer. The average American woman has a 12 to 13 percent risk of developing breast cancer, but in a woman with the genetic mutations discovered by Myriad, the risk can range between 50 and 80 percent for breast cancer and between 20 and 50 percent for ovarian cancer. Before Myriad’s discovery of the BRCA1 and BRCA2 genes, scientists knew that heredity played a role in
establishing a woman’s risk of developing breast and ovarian cancer, but they did not know which genes were associated with those cancers. For women who are tested and found to have the dangerous muta-tions of BRCA1 and BRCA2, medical measures can be taken to reduce the risks of breast and ovarian cancer developing.
Myriad obtained a patent from the U.S. Patent and
Trademark Office based on its discovery. The Asso-ciation for Molecular Pathology sued Myriad, seek-ing a declaration that Myriad’s patent was invalid. The U.S. district court held that Myriad’s claim was invalid because it covered a product of nature and was therefore not patentable. The Federal Circuit Court of Appeals held that the isolated DNA was pat-ent eligible. The U.S. Supreme Court granted review.
Issue
Is a naturally occurring segment of DNA patent eligible ?
Language of the U.S. Supreme Court Laws of nature, natural phenomena, and abstract ideas are not patentable. It is undis-puted that Myriad did not create or alter any of the genetic information encoded in the BRCA1 and BRCA2 genes. The location and order of the nucleotides existed in nature before Myriad found them. Nor did Myriad create or alter the genetic structure of DNA. Instead, Myriad’s prin-cipal contribution was uncovering the precise location and genetic sequence of the BRCA1 and BRCA2 genes. Myriad did not create anything. To be sure, it found an important and useful gene, but separating that gene from its surrounding genetic material is not an act of invention.
137
Decision The U.S. Supreme Court held that a naturally occurring DNA segment is a product of nature and not patent eligible merely because it has been iso-lated. The U.S. Supreme Court reversed the deci-sion of the Federal Circuit Court of Appeals on this issue.
Critical Legal Thinking Questions Will the Supreme Court’s decision affect the amount of research that is conducted to find naturally occurring, disease-causing DNA sequences? Should Myriad be compensated by the government for its research costs?
Patent Period
In 2011, Congress passed the Leahy-Smith America Invents Act (AIA).4 The act stipulates a first-to-file rule for determining the priority of a patent. This means that the first party to file a patent on an invention receives the patent even though some other party was the first to invent the invention. Previously, the United States followed the first-to-invent rule, whereby the party that first invented the invention was awarded the patent even if another party had previ-ously filed for and received the patent. The adoption of the first-to-file rule is a major change in U.S. patent law. Utility patents for inventions are valid for 20 years. The patent term begins to run from the date the patent application is filed. After the patent period runs out, the invention or design enters the public domain, which means that anyone can produce and sell the invention without paying the prior patent holder.
Example January 12, 2018, an inventor invents a formula for a new prescription drug. On March 1, 2018, the inventor files for and is eventually granted a 20-year patent for this invention. Twenty years after the filing of the patent application, on March 1, 2038, the patent expires. The next day, the patent enters the public domain and anyone can use the formula to produce the same prescription drug.
Patent Infringement
Patent holders own exclusive rights to use and exploit their patents. Patent infringement occurs when someone makes unauthorized use of another’s patent. Patent infringement claims must be brought in the U.S. district court that has jurisdiction to hear the case. Patent decisions of the U.S. district courts can be appealed to the U.S. Court of Appeals for the Federal Circuit. In a suit for patent infringement, a successful plaintiff can recover (1) money damages equal to a reasonable royalty rate on the sale of the infringed articles, (2) other damages caused by the infringement (e.g., loss of customers), (3) an order requiring the destruction of the infringing article, and (4) an injunction preventing the infringer from such action in the future. The court has the discre-tion to award up to treble damages if the infringement was intentional. It costs between several hundred thousand dollars to several million dollars to bring an infringement case to trial.
patent infringement Unauthorized use of another’s patent. A patent holder may recover damages and other remedies against a patent infringer.
Leahy-Smith America Invents Act (AIA)
A federal statute that signi

In: Operations Management