Questions
The muon is a subatomic particle with the same charge as an electron but with a...

The muon is a subatomic particle with the same charge as an electron but with a mass that is 207 times greater: m?=207me. Physicists think of muons as "heavy electrons." However, the muon is not a stable particle; it decays with a half-life of 1.5 ?s into an electron plus two neutrinos. Muons from cosmic rays are sometimes "captured" by the nuclei of the atoms in a solid. A captured muon orbits this nucleus, like an electron, until it decays. Because the muon is often captured into an excited orbit (n>1), its presence can be detected by observing the photons emitted in transitions such as 2?1 and 3?1.
Consider a muon captured by a carbon nucleus (Z=6). Because of its large mass, the muon orbits well inside the electron cloud and is not affected by the electrons. Thus the muon "sees" the full nuclear charge Ze and acts like the electron in a hydrogen-like ion.

Part 1: What is the orbital radius of a muon in the n=1 ground state? Note that the mass of a muon differs from the mass of an electron? Solving for r1

Part 2: What are the speed of a muon in the n=1 ground state? Solving for v1

Part 3: What is the wavelength of the 2?1 muon transition? solving for lambda

Part 4: How many orbits will the muon complete during 1.5 ?s? Solve for N

In: Physics

what is monitoring and controlling processes and outputs?

what is monitoring and controlling processes and outputs?

In: Computer Science

Weston Industries has a debt–equity ratio of 1.1. Its WACC is 8.2 percent, and its pretax...

Weston Industries has a debt–equity ratio of 1.1. Its WACC is 8.2 percent, and its pretax cost of debt is 6.4 percent. The corporate tax rate is 35 percent.

  

a.

What is the company’s cost of equity capital? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

  

  Cost of equity capital %  
b.

What is the company’s unlevered cost of equity capital? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

  

  Unlevered cost of equity capital %  

  

c-1.

What would the cost of equity be if the debt–equity ratio were 2? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

  

  Cost of equity %  

  

c-2.

What would the cost of equity be if the debt–equity ratio were 1.0? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

  

  Cost of equity %  

  

c-3.

What would the cost of equity be if the debt–equity ratio were zero? (Do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)

  

  Cost of equity %  

In: Finance

1. Acting Secretary Modly violated one of the accepted principles of good leadership, “praise in public...

1. Acting Secretary Modly violated one of the accepted principles of good leadership, “praise in public and criticize in private” (ideally one-on-one). What are a few likely reasons that some leaders succumb to the impulse to be harsh and criticize subordinates in public?

2. Before his apology, Acting Secretary Modly issued a statement earlier in the day about his remarks aboard the ship, saying he spoke from the heart and that his words were meant for the crew. “I stand by every word I said, even, regrettably any profanity that may have been used for emphasis,” he said. “Anyone who has served on a Navy ship would understand.” In other words, it’s OK to use profanity in the Navy Why do leaders often use the “acted-of-normalcy” defense (i.e., this is how it’s done around here) to justify their bad actions?

3. Acting Secretary Modly told the crew of the USS Roosevelt not to speak to the media, which he said holds a political agenda. Mr. Modly himself has conducted interviews with Reuters and the Washington Post and published the letter to the editor in the New York Times. Why do some leaders feel that they can operate under different rules than those whom they lead? What steps can a leader take to protect him/herself from these types of tendencies?

In: Operations Management

Risk managers use a number of methods for managing risk. For each of the following, what...

Risk managers use a number of methods for managing risk. For each of the following, what method for handling risk is used?Explain your answer.

a. The decision not to carry earthquake insurance on a firm's manufacturing plant

b. The installation of an automatic sprinkler system in a hotel.

c. The decision not to produce a product that might result in a product liability lawsuit.

d. Requiring retailers who sell the firm's product to sign an agreement releasing the firm from liability if the product injures someone.

In: Operations Management

No handwriting and photo (managerial accounting) a-To makes income taxable, income must be realized and recognized....

No handwriting and photo (managerial accounting)

a-To makes income taxable, income must be realized and recognized. Explain in your own words the difference between income realization and income recognition, then provide a short numerical example to indicate the difference

b-Illustrate the concept of ROI with a suitable numerical example. How ROI is different from Residual Income? Explain in your own words

In: Accounting

Write a Python program to: ask the user to enter two integers: int1 and int2. The...

Write a Python program to: ask the user to enter two integers: int1 and int2. The program uses the exponential operator to calculate and then print the result when int1 is raised to the int2 power. You also want to calculate the result when int1 is raised to the .5 power; however, you realize that it is not possible to take the square root of a negative number. If the value for int1 that is entered is a negative number, print a message to the user explaining why you cannot complete the task. Otherwise, calculate the square root and print it. Finish the program by printing the values of int1 and int2.

In: Computer Science

The IRS is concerned with improving the accuracy of tax information given by its representatives over...

The IRS is concerned with improving the accuracy of tax information given by its representatives over the telephone. Previous studies involved asking a set of 25 questions of a large number of IRS telephone representatives to determine the proportion of correct responses. Historically, the average proportion of correct responses has been 72 percent. Recently, IRS representatives have been receiving more training. On April 26, the set of 25 tax questions were again asked of 20 randomly selected IRS telephone representatives. The numbers of correct answers were 18, 16, 19, 21, 20, 16, 21, 16, 17, 10, 25, 18, 25, 16, 20, 15, 23, 19, 21, and 19.

What are the upper and lower control limits for the appropriate p-chart for the IRS? Use z=3.

Is the tax information process in statistical control?

use 3-σ control limits; base your interpretation of the results of the current study using a control chart analysis with the control chart UCL and LCL based on the information from the historical data

In: Operations Management

Hey can you please answer this question in detail and explanation in your own word i...

Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board

  1. You are working as a system analyst for a consulting firm contracted by a college to create a management system for its students. During the process you create a state transition diagram for an object called Students. What are the possible states of a student? And what happens to a student who stops attending the college for a time and then decides to return a some point in the future to continue his or her studies?
  2. Do you believe it is harder for experience analysts to learn UML and other object-oriented techniques, since they are accustomed to thinking about data and processes as separate OR do you believe analytical knowledge and experience are transferable and useful in the newer, object-oriented approach? What are the reasons for your conclusion?
  3. The text talks about system analysts and coders creating objects and code modules. Why do analysts and programmer utilize objects and code modules? What are the benefits and costs of this approach? Is the benefits worth the cost?

Be sure to give thought to each assigned question before posting.

In: Computer Science

Identifying Fallacies This week’s lecture focused on applying some of the intellectual standards discussed in previous...

Identifying Fallacies

This week’s lecture focused on applying some of the intellectual standards discussed in previous weeks and applying them to the news media. This week’s lecture also focused on the different fallacies that individuals make when trying to persuade you. Think of some of the disagreements or arguments you have had in the past – either at a personal, educational or professional level. Describe the disagreement or argument. What kinds of fallacies did you or they use as part of the argument? Was it persuasive? Did you feel good critical thinking was used in any of your examples?

Your work should be at least 500 words, but mostly draw from your own personal experience. This should be written in first person and give examples from your life. Be sure if you are using information from the readings that you properly cite your readings in this, and in all assignments.

IN YOUR OWN WORDS!!!!!! NO PLAGIARISM PLEASE!!!!!

In: Psychology

This week you will utilize various variable and functions to develop the first functionality for the...

This week you will utilize various variable and functions to develop the first functionality for the Employee Management System Project. For this assignment, write a Python script to allow users to enter the following string values: employeeName, employeeSSN*, employeePhone, employeeEmail, and employeeSalary.

*(employeeSSN = Employee Social Security Number. For example, 123121234)

Once you have entered your values, you should display it in the following format:

---------------------------- Mike Smith -----------------------------

SSN: 123123123

Phone: (111)222-3333

Email: mike@ g m a i l. com

Salary: $6000

----------------------------------------------------------------------------

Once you have completed Functionality 1, you must provide the following in a Word document:

  • An explanation of how you used variables, functions, selection, and/or repetition to build your Python script for Functionality 1.
  • A brief description of the purpose of this functionality or what this program does.
  • The script for this functionality .

In: Computer Science

Add the following methods to the singly list implementation below. int size(); // Returns the number...

Add the following methods to the singly list implementation below.

int size(); // Returns the number of nodes in the linked list
bool search(string query); // Returns if the query is present in the list
void add(List& l); // // Adds elements of input list to front of "this" list (the list that calls the add method)

#include <string>

#include "slist.h"

using namespace std;

Node::Node(string element) : data{element}, next{nullptr} {}

List::List() : first{nullptr} {}

// Adds to the front of the list

void List::pushFront(string element) {

Node* new_node = new Node(element);

if (first == nullptr) {// List is empty

first = new_node;

} else {

new_node->next = first;

first = new_node;

}

}

Iterator List::begin() {

Iterator iter;

iter.position = first;

iter.container = this;

return iter;

}

Iterator List::end() {

Iterator iter;

iter.position = nullptr;

iter.container = this;

return iter;

}

// Returns number of elements in the list

int List::size() {

// Q1: Your code here

}

// Returns if query is present in list (true/false)

bool List::search(string query) {

// Q2: Your code here

}

// Adds elements of input list to front of "this" list

void List::add(List& l) {

// Q3. Your code here

}

Iterator::Iterator() {

position = nullptr;

container = nullptr;

}

string Iterator::get() const {

return position->data;

}

void Iterator::next() {

position = position->next;

}

bool Iterator::equals(Iterator other) const {

return position == other.position;

}

------------------------------------------------------------------------------------Header File

/* Singly linked list */

#ifndef LIST_H

#define LIST_H

#include <string>

using namespace std;

class List;

class Iterator;

class Node

{

public:

Node(string element);

private:

string data;

Node* previous;

Node* next;

friend class List;

friend class Iterator;

};

class List

{

public:

List();

void pushFront(string element);

Iterator begin();

Iterator end();

int size();

bool search(string query);

void add(List& l);

private:

Node* first;

friend class Iterator;

};

class Iterator

{

public:

Iterator();

string get() const;

void next();

bool equals(Iterator other) const;

private:

Node* position;

List* container;

friend class List;

};

#endif

-------------------------------------------------------------------------------------------------------test file

#include <string>

#include <iostream>

#include "slist.h"

using namespace std;

int main()

{

List names1;

names1.pushFront("Alice");

names1.pushFront("Bob");

names1.pushFront("Carol");

names1.pushFront("David");

// names1 is now - David Carol Bob Alice

int numele = names1.size(); // Q1: TO BE COMPLETED

cout << "Number of elements in the list: " << numele << endl;

string query = "Eve";

bool present = names1.search(query); // Q2: TO BE COMPLETED

if (present) {

cout << query << " is present" << endl;

} else {

cout << query << " is absent" << endl;

}

List names2;

names2.pushFront("Eve");

names2.pushFront("Fred");

// names2 is now - Fred Eve

// Insert each element of input list (names1) to front of calling list (names2)

names2.add(names1); // Q3: TO BE COMPLETED

// Print extended list

// Should print - Alice Bob Carol David Fred Eve

for (Iterator pos = names2.begin(); !pos.equals(names2.end()); pos.next()) {

cout << pos.get() << " ";

}

cout << endl;

return 0;

}

In: Computer Science

I need to write java program that do replace first, last, and remove nth character that...

I need to write java program that do replace first, last, and remove nth character that user wants by only length, concat, charAt, substring, and equals (or equalsIgnoreCase) methods.

No replace, replaceFirst, last, remove, and indexOf methods and letter case is sensitive.

if user's input was "be be be" and replace first 'b'

replace first should do "e be be"

replace last should do "be be e"

remove nth character such as if user want to remove 2nd b

it should be like "be e be"

In: Computer Science

Five mutually-exclusive projects consisting of reinforcing dams, levees, and embankments are available for funding by a...

Five mutually-exclusive projects consisting of reinforcing dams, levees, and embankments are available for funding by a certain public agency. The following tabulation shows the equivalent annual benefits and costs for each: Project Annual Benefits Annual Costs A $1,800,000 $2,000,000 B $5,600,000 $4.200,000 C $8,400,000 $6,800,000 D $2,600,000 $2,800,000 E $6,600,000 $5,400,000 Assume that the projects are of the type for which the benefits can be determined with considerable certainty and that the agency is willing to invest money in any project as long as the B-C ratio is at least one. Determine the annual worth (AW) of the best project that the public agency will select. The agency’s MARR is 10 % per year and the project lifetimes are each 15 years.

In: Mechanical Engineering

1. Select the answer that declares a variable named c that is a C character, initialized...

1. Select the answer that declares a variable named c that is a C character, initialized to the value A.

char *c = 'A';

char c = 'A';

char c = "A";

char *c = "A";

2. Fill in the missing code to produce the desired output:

int a = 0;
int b = 1;
int c;
// Missing code goes here
printf("%d", c);

Desired output:

1

-c = a && b;

-c = a || b;

-Answer not given

-c = a || !b;

3. What is the output of the following code segment:

int a = 1;
  int b = 2;
  int c = a + b;
  printf("%d", c);

-2

-3

-0

-1

4. You need to use printf() and scanf(). What line of code should you include in your code?

#include <stdio.h>

include stdio.h

#include "stdio.h"

import <stdio.h>

5. Select the C language built-in floating-point data types.

float, double

char, short, int, long

hex, float, double

float

6. What is the output of the following code:

int a = 1;
  int b = 2;
  if (a < b) {
    printf("A");
    if (b < a) {
      printf("B");
    } else {
      printf("C");
    }
  }

-ABC

-A

-AB

-AC

7. Fill in the missing code to produce the desired output:

for (/*Missing code goes here*/) {
    printf("%d ", i);
  }

Desired output:

0 1 2

-int i = 1; i < 3; i++

-int i = 1; I <= 3; i++

-int i = 0; i < 3; i++

-Answer not listed

8. Suppose the following code tries to open a file that is not present. How do you handle the error condition?

FILE *f = fopen("exam.ext", "w");
if (/*Missing code goes here*/) {
  //Handle error condition here...
}

-f == nil

-f == NULL

-f != NULL

-f != void

In: Computer Science