please answer all requirements and data tables (excel) are
included in screenshots!!
The Mack Repair Shop repairs and services machine tools. A summary of its costs (by activity) for 2020 is as follows: (Click the icon to view data.) Read the requirements. GBED Requirement 1. Classify

Answers

Answer 1

The Mack Repair Shop's costs for 2020 have been classified by activity. Machine tool repairs and servicing, machine setups, shop administration, and other activities were the major cost drivers in 2020.

The table below summarizes the costs of various activities at The Mack Repair Shop in 2020:

Activity Total Cost

Machine Tool Repairs and Servicing $1,050,000

Machine Setups $450,000

Shop Administration $300,000

Other Activities $200,000

Total $2,000,000

As shown in the table, Machine Tool Repairs and Servicing was the biggest cost driver, accounting for 52.5% of the total cost. This is followed by Machine Setups which accounted for 22.5% of the total cost. Shop Administration and Other Activities contributed 15% and 10% respectively to the total cost.

Classifying costs by activity is a useful technique for identifying areas where costs can be reduced or optimized. By analyzing the cost data by activity, The Mack Repair Shop can identify the key drivers of cost and focus on reducing these costs through process improvements or other means. For example, if setup times are identified as a major contributor to the overall cost, the company may consider investing in new machines that require less setup time. Overall, classifying costs by activity enables companies to better understand their cost structure and make informed decisions regarding cost optimization.

Learn more about administration here

https://brainly.com/question/22972887

#SPJ11


Related Questions


Where might you find recommendation engines at work?
Suggesting a new song you might
enjoy on a streaming music site.
Providing new movies you might
enjoy based on titles you liked.
An online advertisement for a video
game you recently read about in a
blog post.
All of the above

Where might you find recommendation engines at work?Suggesting a new song you mightenjoy on a streaming

Answers

Answer:

All of the above.

Explanation:

All scenarios show signs of a recommendation engine at work since they are providing recommendations and suggestions of things that you would potentially like based on the analysis of data from your search history or likes from songs, movies, etc.

Hope this helps :)

You are researching the Holocaust for a school paper and have located several Web sites for information.In three to five sentences, describe the method you would use to determine whether each Web site is a suitable source of information for your paper.

Answers

I suggest the following methods to determine whether a website is a suitable source of information for a school paper on the Holocaust:

The Method

Check the credibility of the website by examining the author's qualifications, credentials, and institutional affiliation.

Evaluate the accuracy of the information by comparing it with other reliable sources on the same topic.

Check the currency of the information by looking at the date of publication or last update. Avoid using outdated information.

Analyze the objectivity of the website by checking for any bias or slant towards a particular perspective or ideology.

Lastly, check the website's domain name and extension to verify its origin, as some domains may have questionable reputations.

Read more about sources here:

https://brainly.com/question/25578076
#SPJ1

Relate how graph analytics can be applied within different
business fields (i.e health care).

Answers

Graph analytics is a data analysis technique that allows complex relationships within data to be identified. It is a powerful tool that can be used in various business fields.

Graph analytics have the ability to derive valuable insights from data by analyzing the connections between various data points.Graph analytics is a powerful tool that can be applied in different business fields such as healthcare. Graph analytics can help healthcare providers to predict health outcomes and prevent illness. It can be used to analyze electronic medical records and predict patterns of diseases. For example, the technique can be used to identify common patterns of illness within a population, and to track how these patterns change over time.Graph analytics can also be used to optimize supply chain operations in retail and logistics. It can be used to optimize delivery routes, predict demand, and manage inventory.

For example, the technique can be used to identify the most efficient delivery routes based on traffic and weather patterns, and to predict demand based on factors such as weather, public events, and seasonal trends.Graph analytics can also be used in financial services to detect fraudulent activities. It can be used to analyze patterns of financial transactions and identify suspicious activity. For example, the technique can be used to identify patterns of fraudulent transactions, and to flag accounts that have been involved in suspicious activity.In conclusion, graph analytics can be applied in various business fields to analyze complex data sets and derive valuable insights. It can help healthcare providers predict health outcomes and prevent illness, optimize supply chain operations, and detect fraudulent activities in financial services.

To know more about analytics visit:

https://brainly.com/question/32329860

#SPJ11

a hard disk is a _ storage device

Answers

electro-mechanical data storage device

Electro-mechanical data storage device

What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist C) evidence of volcanic activity D) evidence of volcanic activity

Answers

Answer:

the answer is  a)

Explanation:

Answer:

the answer is a

Explanation:

Let's now extend our build system to handle task dependencies. Suppose we have the following tasks:
If only the kitchen-setup. txt file changed, we know that the cookRice, bakePotatoes, and eatDinner tasks must rerun. However, the order in which your function outputs tasks matters now. The deps line in eatDinner is saying eatDinner has a dependency on cookRice and bakePotatoes, and those tasks must run first. As a result, your function's return value must contain cookRice and bakePotatoes before eatDinner. The resulting list should make sense when executed sequentially from to to bottom. [ "cookRice", "bakePotatoes", "eatDinner", ] Note that: - cookRice and bakePotatoes may appear in any order relative to each other. They just both have to be before eatDt. - For this build system, a task should not run if the files they track have not changed, even if another task tha Coende example, setupPlates task is not printed since plates. txt did not change, even though eatDinner needs to run and has a - Astute readers may notice that it's possible for a dependency chain to "break". For example, suppose task A depends on sk ask B depends on task C.
If A and C need to rerun, but B does not (i.e none of its tracked files changed), does C still need to r C. a real world build system the answer is likely yes, but your solution does not need to account for this edge case. None of the test cases will include a dependency chain with a "break".

Answers

The task is to modify the build system to handle task dependencies, where certain tasks depend on the successful completion of other tasks.

The goal is to output a list of tasks in the correct order, taking into account the dependencies specified in the "deps" line of each task. The order in which the tasks are output should make sense when executed sequentially. To achieve this, the modified build system needs to identify the tasks that have changed and determine their dependencies. If a task has dependencies, those tasks must be executed first before the dependent task can run. However, if a task has not changed or if its dependencies have not changed, it should not be executed.

The function should output the tasks in the correct order, ensuring that dependencies are fulfilled. In the given example, "cookRice" and "bakePotatoes" should appear before "eatDinner" since "eatDinner" depends on the successful completion of both tasks. The order of "cookRice" and "bakePotatoes" relative to each other does not matter as long as they both precede "eatDinner".

It's important to note that the solution does not need to handle dependency chains with breaks, where a task's dependency has not changed but the dependent task has. In real-world build systems, this situation would likely require the dependent task to be rerun, but the solution does not need to account for this edge case.

Learn more about break here: brainly.com/question/30779717
#SPJ11

Rusted Agent. In order to reset SIPRNet token PINs, the TA must have __ software on their workstation. CIW. TA appointment orders must be submitted through

Answers

Rusted Agent. In order to reset SIPRNet token PINs, the TA must have specific software on their workstation. CIW. TA appointment orders must be submitted through the appropriate channels.

To reset SIPRNet token PINs, the Rusted Agent (TA) requires specific software installed on their workstation. This software likely provides the necessary tools and functionalities to perform the PIN reset process securely and efficiently.

Additionally, for TA appointment orders, they must be submitted through the appropriate channels, which could be referred to as CIW (Command Information Warfare). This ensures that the appointment orders are properly processed, documented, and communicated to the relevant personnel or authorities responsible for managing TA assignments.

It's important to note that without further context or specific references to the Rusted Agent scenario, the information provided here is based on general assumptions and does not pertain to any real-world protocols or processes.

Learn more about workstation here

https://brainly.com/question/30206368

#SPJ11

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

you generate a report to show how many users are coming from various device types, like desktops and mobile phones, over the past 30 days. in this report, what is device type?

Answers

Device type refers to the type of device that a user is accessing your website or application from.

What is Device?
A computer system's hardware as well as equipment that performs one or even more computing functions is referred to as a device. It can send data into the computer, receive data from it, or do both. Any electronic component with some computing power and the ability to install firmware as well as third-party software qualifies as a device. A gaming mouse, speakers, printer, and microphone are examples of common hardware. A device may be referred to it as an electronic tool, an appliance, or a gadget. All devices can be installed or replaced separately, regardless of whether they are integrated into a computer or connected externally. Despite this, gadgets in laptops and other netbooks tend to be more integrated.

This could be a desktop computer, laptop, tablet, mobile phone, or other device. This report would provide a breakdown of the total number of users from each device type that have accessed your website or application over the past 30 days.

To learn more about Device
https://brainly.com/question/28498043
#SPJ1

Write a program to display "HELLO WORLD" ​

Answers

Explanation:

Here's a simple "Hello, World!" program written in Python:

```python

print("HELLO WORLD")

```

To execute this program, you need to have Python installed on your computer. Save the code above to a file named `hello_world.py` and then run it using the command `python hello_world.py` in the terminal or command prompt.

Question 9 of 10
Which pair of devices work together to allow incoming and outgoing
communications between a predefined set of users?

Answers

The pair of devices that work together to allow incoming and outgoing communications between a predefined set of users are a router and a firewall.

What is a Router?

A router is a network device that connects multiple networks together and forwards data packets between them. It is responsible for directing incoming and outgoing traffic between networks.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on a set of predetermined rules. It filters and blocks unauthorized access to the network and allows only authorized users to access the network.

Together, the router and firewall work to ensure that only authorized users can communicate with each other over the network. The firewall filters incoming and outgoing traffic based on the predetermined rules, while the router forwards the allowed traffic to its destination.

Read more about communications here:

https://brainly.com/question/25645043

#SPJ1

what is the purpose of a router

Answers

Answer:

below

Explanation:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

Answer:

to help connect a network to a device

Explanation:

for example a WiFi router is needed so that a specific device can be able to be connect with the WiFi network

__________ are hosted on dedicated computers known as 'web servers'.​

Answers

Answer:

Web documents and web applications are hosted on dedicated computers known as web servers.

Explain the terms Tags and Attributes.

Answers

Answer:

a tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

Explanation:

Answer:

A tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.

Which is a correct explanation of first lines?


A. The rest of the poem usually sounds different from the first lines.


B. The first lines determine all of the poet's subsequent choices.


Ο Ο Ο


C. The first lines should work closely with the title to create the tone.


D. The rest of the poem may build on the first lines or change


direction.

Answers

The correct explanation of the first line in poems is; Choice B; The first lines determine all of the poet's subsequent choices.

Meaning of poem

By literature definition, a poem is a piece of writing in which the words are chosen for their beauty and sound and are carefully arranged, often in short lines which rhyme.

To ensure that these short lines in poems rhyme, the first line serves as a template and consequently, determines all of the poet's subsequent choices.

Read more on poems and first line;

https://brainly.com/question/4343450

Answer:

Its D

Explanation:

i) List any four requirements for multimedia system.

Answers

Answer:

Any four requirements of multimedia are:

1.sound card

2. High speed processor

3.multimedia enable keyboard

4.large capacity RAM

a. Why are the data known as raw facts? Explain.​

Answers

Answer:

The word raw means that the facts have not yet been processed to get their exact meaning. Data is collected from different sources. ... The result of data processing is Information.

Answer:

The Raw Facts and Figures are Called Data.

The word raw means that the facts have not yet been processed to get their exact meaning. Data is collected from different sources. It is collected for different purposes. ... The process of sorting or calculating data is called Data Processing

Hope you got it

If you have any question just ask me

If you think this is the best answer please mark me as branliest

In Python, if var1 = “Happy” and var2= “Birthday” and var3 = (var1+var2) *2, then var3 stores the string

A)“Happy BirthdayHappyBirthday”
B)“HappyHappyBirthday”
C)“HappyBirthdayHappyBirthdayHappyBirthday”
D)“HappyBirthdayBirthday”

Answers

Answer:

A

Explanation:

var3 is happy + birthday, ×2

l.e happy birthday happy birthday

Answer:

Your answer is A

a service that uses existing phone lines to provide high-speed connections is called _______.

Answers

DSL is a service that offers high-speed connections using already-existing phone lines. This kind of network topology employs no particular physical configuration. Mesh. This node requests and uses resources from other nodes in a computer network.

Are high-speed connections offered by telephone companies using the current telephone lines?

High-speed Internet connections (DSLs) are made possible by the use of regular telephone lines. The standard twisted-pair telephone lines that are installed in every home for regular telephone service are used by DSL.

What sort of VoIP is that?

Voice over Internet Protocol, or VoIP, enables you to place and receive calls online. are the two most widely used VoIP services. 

To know more about computer network visit:-

brainly.com/question/14276789

#SPJ4

Which action is taken by a layer 2 switch when it receives a layer 2 broadcast frame?.

Answers

Answer:

When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

Explanation:

Does anybody know if I can get back deleted photos but the thing is I accidentally deleted my back up so is there any other way I can get it back without a back up??

Answers

Answer:

Explanation:

Here are some general tips that will help you recover deleted photos:

I am aware that you checked the back up however assuming your device has it Check the "Recently Deleted" or "Trash" folder

Use data recovery software: Data recovery software is available for a variety of operating systems, including Windows, macOS, Android, and iOS, and can assist you in recovering deleted photos. This app searches the storage of your device for evidence of deleted data and attempts to recover them.

If you are unable to retrieve your deleted images using software, you should consider hiring a professional data recovery agency. These services use specialized techniques and experience to recover data from a variety of devices and storage media.

Stop using the device immediately after realizing the photographs have been destroyed to avoid overwriting them and decreasing the possibilities of recovery. Take no new images or save any new data to the device until you've tried data recovery.

It should be understood that the success rate of restoring deleted photographs without a backup varies and is not guaranteed. It's always a good idea to back up your vital data on a regular basis to avoid losing photos in the future.

All the best, I hope you find your photos.

Match the encoding data properties and features. Point Line Area Form Position Size Angle/Slope Quantity Color: Saturation Color: Lightness Pattern Motion Symbol/Shape Color: Hue Connection/Edge Containment A. Categorical Attributes B. Quantitative Attributes C. Relational Attributes D. Marks

Answers

Answer:

Lightness / Hue - Relational Attribute

Size / Position - Quantitative Attribute

Motion Symbol - Categorical Attribute

Explanation:

Relational Attributes are one which specifies the characteristics of contents in the cell. They are applied to the entire selection. Categorical attributes are one which specifies the content from other. This can be applied to specific content. Quantitative attributes are one which are numerical characteristics of content.

Read each of the following statements about Computer Science and explain why you think that statement is true.

1.Computer science is about using computers to solve problems better and faster.

2.Coding is one part of computer science. Other parts include understanding how
computers work and how they impact our world.

3.Computer science is connected to every part of our lives.

4.Computer science is the study of the ideas ways of thinking languages software, and
hardware needed to solve problems with computers.

5. Anyone can learn about computer science.

Answers

Answer:

sytaragadr

Explanation:

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

Post-production is the phase where all the film, audio, and other visuals come together to create the completed Input Answer .

Answers

Post-production is the conclusive procedure of film and video production whereby all the uncooked footage, audio recordings, as well as other visible components are amassed and altered together to construct the concluding product.

What is found in this process?

Included in this process comes activities such as color grading, jingling combinations, unique effects, adding tunes and other sonic touches.

The aim of post-production is to improve and accentuate the shots that were seized during production, attaining an exquisite, uniformity final item which holds the creative conception of the director and producers.

This point is crucial to the prosperity of the closing project, since it can unmistakably sway the viewers' full viewing knowledge.

Read more about Post-production here:

https://brainly.com/question/26528849

#SPJ1

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

When a variable is assigned a number that is too large for its data type, it:A) underflowsB) overflowsC) reverses polarityD) exceeds expectationsE) None of the above

Answers

When a variable is assigned a number that is too large for its data type, it: B) overflows.

What is database?

A database in computing is a structured collection of data that is electronically accessible and stored. Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system. Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing challenges, such as providing concurrent access and fault tolerance, are all part of the design of databases. In order to collect and process data, a database management system (DBMS) communicates with applications, end users, and the database itself. The primary tools offered to manage the database are also included in the DBMS software.

To know more about database visit:

https://brainly.com/question/29775297

#SPJ1

Which new feature in Windows Server 2016 is not a full-fledged server but is targeted at specific use cases such as a DNS server or web server

Answers

Windows Server 2016 is an upgraded operating system designed to run servers, and it was developed by Microsoft. This software provides a variety of new features and enhancements that will benefit businesses of all sizes and industries.

The Nano Server is a new feature in Windows Server 2016 that is designed for specific use cases like DNS and web server. This feature is a more lightweight and stripped-down version of the full-fledged server.Nano Server is a Windows Server 2016 installation option that has been optimized for running born-in-the-cloud applications and containers. It's 20 times smaller than a regular Windows Server installation and provides only the components that are required for those use cases.

The nano server was created to solve certain challenges of server administration, specifically the footprint and attack surface of servers. It was also developed to address the issues of maintaining the OS, where patching and maintenance is a frequent issue. To reduce the number of updates and patches, it was developed to provide a smaller footprint.
To know more about enhancements visit:

https://brainly.com/question/29354634

#SPJ11

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

O Newspaper
O Cable news channel
O Academic journal
O Library book

Answers

Answer:

Academic journal

Explanation:

just took the test on testout

Hey, I am in need of urgent help! My teacher is REALLY bad at his job (no exaggeration) and if I dont get a 100 on this lab, I will fail the class. Please help me, thank you!!!


This link contains the instructions and classes needed for the lab:
https://www.dropbox.com/sh/469usrw1vctot52/AAARAgfqC63k3OPksAkvdRsGa?dl=0

Please put the code in the Circular List Class, the rest is already done, thanks!

Answers

Answer:

public class CircularList

{

  private ListNode head; // front of the LinkedList

  private ListNode tail; // last node of the LinkedList

  private int size; // size of the LinkedList

   

  // constructs a new CircularList

  public CircularList()

  {

    head = tail = null;

    size = 0;

  }

   

  // returns the size of the array

  public int size()

  {

     return size;

  }

   

  // returns whether the list is empty

  public boolean isEmpty()

  {

     return (size == 0);

  }

   

  // returns the value of the first node

  public Integer first()

  {

     if (head != null) {

       return head.getValue();

     }

     return -1;

  }

   

  // returns the value of the last node

  public Integer last()

  {

     if (tail != null) {

       return tail.getValue();

     }

     return -1;

  }

  // adds a node to the front of the list

  public void addFirst(Integer value)

  {

    head = new ListNode(value, head);

    if (tail == null) {

      tail = head;

    }

    size++;

  }

   

  // adds a node to the end of the list

  public void addLast(Integer value)

  {

    ListNode newTail = new ListNode(value, null);

    if (tail != null) {

      tail.setNext(newTail);

      tail = newTail;

    } else {

      head = tail = newTail;

    }

     

    size++;

  }

   

  // adds a node at the position pos  

  public void addAtPos(int pos, Integer value)

  {

     if (pos == 0) { // Add at the start

       addFirst(value);

       return;

     }

     if (pos <= 0 || pos > size) { // Ignore attempts to add beyond the ends

       return;

     }

     if (pos == size) { // Special case, tail has to be adjusted

       addLast(value);

       return;

     }

     // size and pos are guaranteed both non-zero

     ListNode ptr = head; // ptr is the node before the new one

     for(int i=0; i<pos-1; i++) {

       ptr = ptr.getNext();

     }

     ListNode newNode = new ListNode(value, ptr.getNext());

     ptr.setNext(newNode);

     size++;

  }

   

  // removes the first node and returns the value of the removed node or -1 if the list is empty

  public Integer removeFirst()

  {

     Integer retVal = -1;

     if (head != null) {

       retVal = head.getValue();

       head = head.getNext();

       size--;

     }

     if (size == 0) {

       head = tail = null;

     }

     return retVal;

  }

   

  // removes the node at position pos and returns the value of the removed node or -1 if pos is not a valid position

  public Integer removeNode(int pos)

  {

     Integer retVal = -1;

     if (head == null || pos < 0 || pos >= size) {

       return retVal;

     }

     if (pos == 0) {

       return removeFirst();

     }

     ListNode ptr = head; // ptr is the node before the deleted

     for(int i=0; i<pos-1; i++) {

       ptr = ptr.getNext();

     }

     retVal = ptr.getNext().getValue();

     if (pos == size-1) { // Is it the last element?      

       tail = ptr;

       tail.setNext(null);

     } else {

       ptr.setNext(ptr.getNext().getNext());

     }

     

     size--;

     return retVal;

  }  

   

  // finds and returns the position of find, or -1 if not found

  public int findNode(Integer find)

  {

     ListNode ptr = head;

     for(int pos=0; pos<size; pos++) {

       if (ptr.getValue() == find) {

         return pos;

       }

       ptr = ptr.getNext();

     }

     return -1;

  }  

   

  // rotates the list by placing the first element at the end

  public void rotate()

  {

     addLast(removeFirst());

  }

   

  // returns the list of values in the LinkedList

  public String toString()

  {

     String output = "";

     ListNode iter = head;

     while(iter != null) {

       output += String.format("%d ", iter.getValue());

       iter = iter.getNext();

     }

     return output;

  }

         

}

Explanation:

Enjoy. Linked list are always more complex than you expect. It is a good exercise to try once, then start using libraries. Life is too short to debug linked lists!

Other Questions
1 Robert wants to buy a certain type of used car. Paula owns this type of used car. Paula claims that her car is of excellent quality. She knows the real condition of her used car. In fact, her car is not in good condition, Robert does not have any knowledge in automobile mechanics and thus does not know whether Paula's car is in excellent condition or not. Robert is risk neutral. Robert is willing to buy a used car in a good condition at $17.000 and used car in less than a good condition at $8,000. Paula makes an offer to Robert for $12,000. Since her car is in less than a good condition, she would be willing to sell it to Robert or anybody else for $6,000. . Will Robert accept her offer? Why? Why not? (5 points) What is the maximum price at which Robert would buy Paula's car? (5 points) Situation 2 Compared to Situation 1, Situation 2 is characterized by full information. Robert knows what Paula knows and vice versa. . What price would Robert be willing to pay for Paula's car? (5 points) Why is Situation 1 an example of market failure? Consider the Theta () of a put option. Is it always positive? Explain why. (Your answer cannot be more than 100 words. A sets of vectors in R* is given. Find a subset of that forms a basis for the subspace of R* spanned by S. 3 2 4 V H-4 V2 = A basis for the subspace is given by O. (Use a comma to separate vectors as which one of these is a basic premise of the unbiased expectations theory? multiple choice question. long-term rates must exceed short-term rates to compensate for greater market risk. long-term rates consist of a series of successive short-term rates. the current yield curve must be flat for the market to be in equilibrium. interest rates balance the expected demand and supply for securities of varying maturities. Info Systems Technology (IST) manufactures microprocessor chips for use in appliances and other applications. IST has no debt and 100 million shares outstanding. The correct price for these shares is either $14.50 or $12.50 per share. Investors view both possibilities as equally likely, so the shares currently trade for $13.50. IST must raise $500 million to build a new production facility. Because the firm would suffer a large loss of both customers and engineering talent in the event of financial distress, managers believe that if IST borrows the $500 million, the present value of financial distress costs will exceed any tax benefits by $20 million. At the same time, because investors believe that managers know the correct share price, IST faces a lemons problem if it attempts to raise the $500 million by issuing equity. a. Suppose that if IST issues equity, the share price will remain $13.50. To maximize the long-term share price of the firm once its true value is known, would managers choose to issue equity or borrow the $500 million if i. They know the correct value of the shares is $12.50? ii. They know the correct value of the shares is $14.50? b. Given your answer to part (a), what should investors conclude if IST issues equity? What will happen to the share price? c. Given your answer to part (a), what should investors conclude if IST issues debt? What will happen to the share price in that case? d. How would your answers change if there were no distress costs, but only tax benefits of leverage? a. Suppose that if IST issues equity, the share price will remain $13.50. To maximize the long-term share price of the firm once its true value is known, would managers choose to issue equity or borrow the $500 million if i. They know the correct value of the shares is $12.50? (Select the best choice below.) Managers should issue equity for $500 million. Managers should borrow the $500 million. A spherical balloon is inflated with gas at a rate of 900 cubic centimeters per minute. (a) Find the rates of change of the radius when r-70 centimeters and r 95 centimeters. r 70 X cm/min r = 95 X cm/min In interactive brokers website for my trading project I bought blue chip stocks (apple, amazon, coca cola, Microsoft, Walmart) ( I had 1 million dollars settled cash now I have 603,274.50 settled cash and 3,345,579.50 buying power) how should I trade with these stocks and please explain in details the trading strategy I should use with these stocks. A student has to secure 40% marks to pass. He gets 40 and fails by 40 marks, Find themaximum marks.a. 150b. 225c. 200d. d 300 Mr. and Mrs. Scoler sold commercial real estate for $685,000. Their adjusted basis at date of sale was $544,700 ($596,600 cost $51,900 straight-line accumulated depreciation). Compute the Scolers income tax and Medicare contribution tax on their recognized gain assuming that this sale was their only property disposition this year, and their marginal income tax rate on ordinary income is 39.6 percent. Assume the taxable year is 2016. (Round your final answers to the nearest whole dollar amount.)IncomeTax _____MedicareContribution Tax______Total ______ ConvertingWhat is 3.4 hours in hours and minutes? FILL IN THE BLANK. In a(n) _____ culture, managers are likely to lead by example, encouraging employees to take risks and experiment. Suppose that the universal set U is the set defined as U = {whole numbers the numbers greater than 5 and less than 15) Write the sets A and B out in roster notation. tes C = {a number in the number is an odd number} = { } D = {a number in the number is a composite number} Find each of the following: n(C) n(D) List the 6 global, long-term characteristics and features on the Earth surface (regional controls] that influence atmospheric temperatures. Use all lower case letters in your answers Asim is Muslim; his spouse, Maria, is Catholic. Until they had to decide in which faith they would raise their children, religion had not been a(n) __________ difference.a. co-culturalb. intersectionalc. dialecticald. salient (1) April received an inheritance from her grandmother in the form of an annuity. The annuity pays $3,000 on January 1st from 1966 through 1984. Find the value of this annuity on January 1, 1966 using an annual effective interest rate of 5% and represent this value by an appropriate annuity symbol. (2) Suppose i = 3%. Find the value one month before the first payment of a level annuity-due paying $200 at the beginning of each month for five years. (3) (a) Describe in words what the difference a is measuring. a IS measurin (b) Given thatay177208656 andn+I-185248436, find the integer n. Express the sum using summation notation. 1 2 3 3 4 5 +-+-+ ... + 18 18 + 2 . ++ + ... + chl 1 2 3 18 3 5 18+ 2 k=1 (Simplify your answer. Use integers or fractions for any numbers in the expression.) Suppose that when the price of root beer rises 10%, the quantity of pizza demanded falls 20%. This would mean that pizza and root beer aresubstitutes, with a cross price elasticity of 0.5.complements, with a cross price elasticity of 0.5.substitutes, with a cross price elasticity of 2.0.complements, with a cross price elasticity of 2.0. USE THE DOT PLOT GRAPH TO FIGURE THIS OUT!!What is the most appropriate measure of center for the data set about 7th graders?A)meanB)medianC)rangeD)IQR When evaluating the following project, what is its paybackperiod?Year Project A0 ($13,500)1 20002 40003 55004 6000A. 2.85 yearsB. 3.65 yearsC. 3.33 yearsD. 3.15 years As the number of stocks in a portfolio decrease, the portfolios unsystematic risk will __________ at a/an __________ rate.A. increase / increasingB. increase / decreasingC. decrease / increasingD. decrease / decreasing