Consider the following declarations: class xClass
{public:
void func( );
void print ( ) const;
xClass ( );
xClass (int, double);
private: int u;
double w;};
xClass x;
a. How many members does class xClass have?
b. How many private members does class xClass have?
c. How many constructors does class xClass have?
d. Write the definition of the member function func so that u is set to 10 and w is set to 15.3 .
e. Write the definition of the member function print that prints the contents of u and w .
f. Write the definition of the default constructor of the class xClass so that the private data members are initialized to 0 .
g. Write a C++ statement that prints the values of the data members of the object x.
h. Write a C++ statement that declares an object t of the type xClass and initializes the data members of t to 20 and 35.0 , respectively.

Answers

Answer 1

a. The class xClass has 4 members and they are:  2 member functions (func() and print()) as well as 2 private data members (u and w).

b. The class xClass has 2 private members: u and w. These members are said to be only accessible within the class .

What is the class xClass?

The xClass has 2 constructors: default (xClass()) and parameterized (xClass(int, double)). Constructors are functions called when an object is created.

The C++ statement creates an object t of type xClass and initializes its data members u and w with values 20 and 35.0. This initializes object t using an integer and a double through the parameterized constructor.

Learn more about class xClass from

https://brainly.com/question/32447549

#SPJ4

Consider The Following Declarations: Class XClass{public:void Func( );void Print ( ) Const;xClass ( );xClass

Related Questions

Consider a world in which there are only four proposition, A,B,C, and D. How many models are there for the following sentences? Justify your answer. 1. (A∧B)∨(B∧C) 2. A∨B 3. A⇔B⇔C

Answers

There are 8 models for the first sentence, 16 models for the second sentence, and 81 models for the third sentence :1. (A∧B)∨(B∧C) : 8 models2. A∨B : 4 models3. A⇔B⇔C : 81 models

There are 8 models for the first sentence, 16 models for the second sentence, and 81 models for the third sentence. Let's consider each sentence in turn:

1. (A∧B)∨(B∧C)

There are 4 possible ways of assigning truth values to A, B, and C:

ABCModel  TFTTTFFTFTTFFFTTFFTFTFFTTFTFFTTFFT

2 of these models make the sentence true: (T∧T)∨(T∧F) and (F∧T)∨(T∧F).

Since there are 2 models that make the sentence true, there are 8 models that make the sentence false.

2. A∨B There are 4 possible ways of assigning truth values to A and B:

ABModelTFFFTTTFFTFTFFTTFFT There are 3 models that make the sentence true: T∨T, T∨F, and F∨T.

Since there are 3 models that make the sentence true, there are 1+1+2=4 models that make the sentence false.3. A⇔B⇔C

There are 4 possible ways of assigning truth values to A, B, and C:

ABCModelTFTTTFFFTFTTFFFTTFFTFFTTFTFFTTFFTFFTTFFTTFFT

There are 27 models that make the sentence true: TTT, TFF, FTT, FTF, TFT, FFT, FFF.

Since there are 27 models that make the sentence true, there are 54 models that make the sentence false.

There are therefore 8 models for the first sentence, 16 models for the second sentence, and 81 models for the third sentence.

Know more about the  models

https://brainly.com/question/32021912

#SPJ11

which call below leads to a recursive call of the following method?

Answers

As per the code given, the call that leads to a recursive call of the foo method is: foo(15). The correct option is D.

A function or procedure calling itself within its own body is referred to as a recursive call.

To put it another way, a recursive call is a programming concept where a function calls itself while it is being executed to address a more manageable or straightforward subproblem of the main issue.

The else block is run and a recursive call to foo(n/2) is made when n is odd (as in the case of foo(15)).

The base case is triggered and the procedure returns 1 when this recursive call reaches the point where n is less than or equal to 0.

Therefore, only option D (foo(15)) for the options causes a recursive call.

For more details regarding recursive call, visit:

https://brainly.com/question/32201645

#SPJ4

Your question seems incomplete, the probable complete question is:

Which call below leads to a recursive call of the following method?

public static int foo(int n) {

 if (n<=0) {

   return 1;

 }

 else if (n%2 == 0) {

   return n/2;

 }

 else {

   return foo(n/2);

 }

}

Choices:

A. foo(0);

B. foo(-2);

C. foo(10);

D. foo(15);

For laminar flow of a fluid over a flat plate, if the Prandtl number is increased, the ratio of the velocity boundary layer thickness to the thermal boundary layer thickness will: increase decrease. o remain the same.

Answers

For laminar flow of a fluid over a flat plate, if the Prandtl number is increased, the ratio of the velocity boundary layer thickness to the thermal boundary layer thickness will increase.

This is because the Prandtl number is the ratio of the momentum diffusivity to the thermal diffusivity of a fluid, so an increase in the Prandtl number means that the momentum diffusivity is relatively higher compared to the thermal diffusivity.

The results in a thicker velocity boundary layer compared to the thermal boundary layer, causing the ratio of their thicknesses to increase. However, it is important to note that this relationship only holds for laminar flow and may not necessarily apply for turbulent flow.

To know more about plate visit:

https://brainly.com/question/31238877

#SPJ11

draw a mechanism for the following reaction, which involves two consecutive friedel–crafts alkylations.

Answers

The mechanism for the following reaction involves two consecutive Friedel-Crafts alkylations.

The first Friedel-Crafts alkylation occurs with the benzene ring and the alkyl halide (RX) in the presence of a Lewis acid catalyst such as AlCl3. The Lewis acid catalyst forms a complex with the alkyl halide, which makes the carbon-halogen bond more reactive. The complex then reacts with the benzene ring to form a carbocation intermediate and a chloride ion.

In a Friedel-Crafts alkylation, the electrophile is usually an alkyl halide (R-X), and the nucleophile is an aromatic ring. The Lewis acid catalyst (such as AlCl3) helps in generating the electrophile by complexing with the halogen (X) from the alkyl halide.

To know more about mechanism visit:-

https://brainly.com/question/14473316

#SPJ11

Select the term below is the best one to describe the polarization of a wave with phaser electric field given by

Answers

The electric field given by E = 2(av - jaz) is a left-hand circularly polarized wave.  (Option A)

How is this so?

The real part of the equation,  2a(v)i, represents a wave with a sinusoidal variation in the x  -direction.

The imaginary   part of the equation,2a(z)j, represents a wave with a sinusoidal variation in the z-direction. The direction of polarization of a wave is given by the direction of the electric field vector.

In this case,the electric field vector is rotating in a counterclockwise direction, which is the definition of left  -hand circular polarization.

Learn more about electric frield:
https://brainly.com/question/19878202
#SPJ1

a synchronous motor is operating under a mechanical load with a unity power factor

Answers

A synchronous motor operating under a mechanical load with a unity power factor means that the motor is using all the power that is being supplied to it to produce useful work.


The power factor of a motor is a measure of how efficiently it is using the electrical power that is being supplied to it. A power factor of 1, or unity, means that all the power that is being supplied is being used to produce useful work, while a power factor of less than 1 indicates that some of the power is being wasted in the form of reactive power, which does not contribute to the mechanical output of the motor.

A synchronous motor converts electrical power to mechanical power. Power factor is the ratio of real power (watts) to apparent power (volt-amperes). A unity power factor means that the motor is using all the electrical power supplied for converting it into mechanical power, with no wastage in the form of reactive power (VAR).

To know more about synchronous visit:-

https://brainly.com/question/31778735

#SPJ11

noConsecutives - this function takes a string as an argument and it modifies it (it does not return) so that all consecutive occurrences of the same character in the string are replaced by a single occurrence of that character. For example, the call noConsecutives("bookkeeeeper") should result in "bokeper". Remember that you control what's considered string contents with the null character. Test this function by calling it from main. While testing in main, recall one of the lecture research questions - which strings are actually modifiable in C.

Answers

The `noConsecutives()` function takes a string as an argument and modifies it so that all consecutive occurrences of the same character in the string are replaced by a single occurrence of that character.

This function does not return anything. For example, the function call `noConsecutives ("bookkeeeeper")` should result in "bokeper". Now, recall one of the lecture research questions - which strings are actually modifiable in C. In C, strings that are declared as character arrays are modifiable.

Hence, we cannot modify a string literal using the `noConsecutives()` function. It will result in a segmentation fault error when we attempt to modify a string literal.To test this function, we can call it from `main()`. Here's an example:```#include #include void noConsecutives(char str[]) {    int len = strlen(str);    int i, j;    for(i=0, j=0; i

To know more about noConsecutives visit:-

https://brainly.com/question/17137291

#SPJ11

an input cylinder with a diameter of 25 mm is connected to an output cylinder with a diameter of 100 mm. a force of 15 kn is applied to the input cylinder. what is the output force? how far would we need to move the cylinder to move the output cylinder 100mm?

Answers

The output force is 240 kN, derived from Pascal's Law, which states that the force is proportional to the area of the pistons.

How to explain this

The smaller piston must move 4 times the distance of the larger one due to the difference in areas. Hence, to move the output cylinder 100 mm, the input cylinder should be moved 400 mm.

Using Pascal's law, pressure is equal throughout a fluid in equilibrium. Given the areas ratio (16:1), force increases by the same ratio, giving an output force of 240kN.

The smaller cylinder must move four times further, hence 400mm for 100mm output.

Read more about output force here:

https://brainly.com/question/14341209

#SPJ4

Let the production Q of a company, in terms of the quantities of invested capital K and invested labour L, be given by the CES-production function Q: RRR: (K, L) (K¹/2+L¹/2)2. (Here "CES" is the abbreviation of constant elasticity of substitution.) What is the maximal production that the company can realise if they have a budget of b EUR to spend on capital and labour, given that a unit of capital costs k EUR and a unit of labour costs EUR? The answer will of course depend on the numbers b, k and , which we assume to be positive. Remark: To answer this question, you need to maximize a function subject to a constraint. If you find only one critical point, then you may assume it is the maximum that you are looking for, without checking any further conditions. Let the production Q of a company, in terms of the quantities of invested capital K and invested labour L, be given by the CES-production function Q: RRR: (K, L) (K¹/2 + L¹/2)². 4 (Here "CES" is the abbreviation of constant elasticity of substitution.) What is the maximal production that the company can realise if they have a budget of b EUR to spend on capital and labour, given that a unit of capital costs k EUR and a unit of labour costs / EUR? The answer will of course depend on the numbers b, k and , which we assume to be positive. Remark: To answer this question, you need to maximize a function subject to a constraint. If you find only one critical point, then you may assume it is the maximum that you are looking for, without checking any further conditions.

Answers

The maximal production cannot be achieved within the given budget constraint.

To find the maximal production that the company can realize given a budget of b EUR to spend on capital and labor, we need to maximize the CES-production function Q(K, L) = (K^(1/2) + L^(1/2))^2 subject to the constraint that the total cost does not exceed the budget.

Let's denote the cost of capital per unit as k EUR and the cost of labor per unit as l EUR.

The total cost equation can be written as:

Total Cost = K * k + L * l

Now, we need to formulate the problem as an optimization problem:

Maximize Q(K, L) = [tex](K^{1/2} + L^{1/2})^2[/tex]

Subject to the constraint: K * k + L * l ≤ b

To find the maximum, we can use the method of Lagrange multipliers.

Define the Lagrangian function as:

L(K, L, λ) = ([tex](K^{1/2} + L^{1/2})^2[/tex] + λ(b - K * k - L * l)

We need to find the critical points of the Lagrangian function L. Taking partial derivatives with respect to K, L, and λ and setting them to zero, we can find the critical points:

∂L/∂K = (1/2)[tex](K^{1/2} + L^{1/2})^2[/tex]  - λk = 0

∂L/∂L = (1/2)[tex](K^{1/2} + L^{1/2})^2[/tex]  - λl = 0

∂L/∂λ = b - K * k - L * l = 0

Simplifying the equations, we get:

[tex](K^{1/2} + L^{1/2})^2[/tex] = 2λk

[tex](K^{1/2} + L^{1/2})^2[/tex] = 2λl

K * k + L * l = b

Equating the two expressions for  [tex](K^{1/2} + L^{1/2})^2[/tex], we can eliminate λ:

2λk = 2λl

k = l

Substituting k = l into the constraint equation, we get:

K + L = b / (k + l)

K + L = b / (2k)

Now, we have reduced the problem to finding the critical points of K + L = b / (2k) under the constraint K * k + L * l = b.

By solving these equations simultaneously, we can find the values of K and L that correspond to the maximal production given the budget constraint.

To find the values of K and L that correspond to the maximal production given the budget constraint, we need to solve the equations K + L = b / (2k) and K * k + L * l = b simultaneously.

Substituting K = b / (2k) - L into the second equation, we have:

(b / (2k) - L) * k + L * l = b

(b - L * 2k) + L * l = b

L * (l - 2k) = 0

Since L cannot be zero (assuming positive values for b, k, and l), we have:

l - 2k = 0

l = 2k

Substituting l = 2k into K + L = b / (2k), we get:

K + 2k = b / (2k)

K = (b / (2k)) - 2k

K = (b - [tex]4k^2[/tex]) / (2k)

Now, we have an expression for K in terms of k.

To find the value of k that maximizes the production, we can take the derivative of the CES-production function Q(K, L) = [tex](K^{1/2} + L^{1/2})^2[/tex] with respect to K and set it to zero:

dQ/dK = 1/2 * [tex](K^{1/2} + L^{1/2})^{-1/2}[/tex] * (1/2) * [tex]K^{-1/2}[/tex] = 0

Simplifying the equation, we have:

[tex](K^{1/2} + L^{1/2})^{-1/2}[/tex]  *  [tex]K^{-1/2}[/tex]  = 0

Since K cannot be zero, we can disregard the first term. Thus, we have:

[tex]K^{-1/2}[/tex] = 0

This equation has no solution for K, which means there is no critical point for the CES-production function within the feasible region.

Therefore, the maximal production cannot be achieved within the given budget constraint.

Please note that the analysis provided assumes a simplified scenario based on the given equations and constraints. Additional considerations or specific numerical values for b, k, and l may result in different outcomes or solutions.

Learn more about Lagrange multipliers :

https://brainly.com/question/30776684

#SPJ11

regarding crosstalk interference on ADSL. o a. FEXT is of greater concern over NEXT, to service providers b. ADSL provides asymmetric data paths, therefore neither NEXT nor FEXT are of concern to service providers C. Service providers must ensure a proper ACR ratio to avoid NEXT or FEXT interference d. Since FDD is used on ADSL, crosstalk issues are not possible Select the correct statement(s) regarding Passive Optical Networks (PONs). a. PONS requires active amplification as the signal propagates from the CO to the subscriber b. PONS is based upon SONET, which enables high bit rate services based upon synchronous network timing c. PONS does not require the existence of active optical amplification within the fiber between the CO to the subscriber d. a and b are correct

Answers

Regarding crosstalk interference on ADSL, option C is correct.

Service providers must ensure a proper ACR ratio to avoid NEXT or FEXT interference.

ACR (Attenuation-to-Crosstalk Ratio) is a measurement used to determine the amount of signal loss in a twisted pair cable relative to the amount of crosstalk interference. A high ACR ratio means that there is minimal interference, while a low ratio indicates a high level of interference. Therefore, service providers need to ensure that the ACR ratio is high enough to avoid interference from NEXT or FEXT.

Regarding Passive Optical Networks (PONs), option C is correct.

PONS does not require the existence of active optical amplification within the fiber between the CO to the subscriber. PONs rely on passive splitters to distribute the signal to multiple subscribers, eliminating the need for active amplification. PONs are based on Ethernet technology rather than SONET, making option B incorrect.

Therefore, option D is also incorrect.

To know more about ACR visit :

https://brainly.com/question/30223624

#SPJ11

a) When comparing the quality asphaltic material provided by two plants, X and Y, for a certain highway job, sufficient samples from each plant were taken and tested. The results from Plant X, showed a peaked bell shaped distribution (Lepto Kurtosis) while those from Plant Y gave a flat shape (Platy Kurtosis). Which plant, in your opinion, has a better quality control and why?

Answers

Based solely on the information provided, it is difficult to determine which plant has better quality control. The shape of the distribution, whether peaked or flat, does not directly indicate the quality control of the asphaltic material. The kurtosis measure describes the shape of the distribution but does not provide information about the quality of the material itself.

To assess the quality control of the asphaltic material, additional information is needed, such as the mean, standard deviation, and any relevant specifications or standards. These factors would help in evaluating the consistency, uniformity, and adherence to desired quality parameters.

Without further data and analysis, it would be inappropriate to make a judgment about the quality control of the two plants based solely on the kurtosis of their respective distributions.

Based solely on the shape of the distribution of their test results, it is my opinion that Plant X has better quality control than Plant Y.

A peaked bell-shaped distribution, or Lepto Kurtosis, indicates that the data is clustered more towards the center of the distribution, with fewer extreme values. On the other hand, a flat shape, or Platy Kurtosis, suggests that the data is evenly distributed, with no significant clustering towards the center or extremes.

The peaked bell-shaped distribution of Plant X's results suggests that they have a tighter control over the consistency of their material. The fewer extreme values in the data indicate that Plant X is producing asphaltic material that meets the required specifications more consistently than Plant Y.

To know more about Plant visit:

https://brainly.com/question/13156174

#SPJ11







Which of the following about sequence flow is NOT correct? Multiple Choice It can cross pools It can cross lanes both "It can cross pools and it can cross lanes

Answers

None of the above. "It can cross pools and it can cross lanes" is actually a correct statement about sequence flow in Business Process Model and Notation (BPMN).

Therefore, the answer to this multiple choice question is "none of the above."  Sequence flow is a type of connector used in BPMN to show the order in which activities are performed in a business process. It represents the path that the process takes from one activity to the next.
Sequence flow can cross pools, which are used to represent different organizational boundaries or departments involved in the process. This allows for modeling of end-to-end processes that involve multiple organizations or departments.
Sequence flow can also cross lanes, which are used to represent different roles or responsibilities within the same pool. This allows for modeling of complex processes that involve multiple actors or participants.
In summary, both statements are true about sequence flow in BPMN. It can cross pools and it can cross lanes.

Learn more about business :

https://brainly.com/question/15826604

#SPJ11

Which of the following is not an example of Manufacturing Overhead?
Select one:
A. Electricity bill for administration building
B. Cleaning supplies for factory floor
C. Production facility rent expense
D. Manufacturing equipment depreciation
E. Factory supervisor salary

Answers

Option A), Electricity bill for administration building is not an example of Manufacturing Overhead.

Manufacturing Overhead refers to indirect costs that are incurred during the production process and cannot be easily traced back to a specific product. B, C, D, and E are all examples of Manufacturing Overhead because they are indirect costs that are incurred during the production process. To give a long answer, let's break down each option.

Electricity bill for administration building - This is not an example of Manufacturing Overhead because it is a direct cost that can be traced back to the administration building and not to the production process. Cleaning supplies for factory floor - This is an example of Manufacturing Overhead because it is an indirect cost that is incurred during the production process to maintain a clean factory floor.

To know more about Electricity visit:

https://brainly.com/question/31327406

#SPJ11

assume p= 20,000 lb and l= 30 in the aluminum rod shown below has a circular cross section with a diameter of 1.5 in. determine the tensile stress of the rod. stress-straoin

Answers

The tensile stress in the rod is 11,299 psi.

We know that Tensile Stress is given by: Stress = Force/AreaIn this question, we have a rod of length 'l' and a circular cross-section of diameter 'd'. Let's calculate its area.Area of the cross-section of the rod = πd²/4= π(1.5 in)²/4= 1.77 in²Also, we know that Force applied (F) = p (Load applied) = 20,000 lbNow, we can find out the tensile stress using the formula mentioned above.Stress = F/A = 20,000 lb/1.77 in²= 11,299 psi.

We are given the values of load (p) and length (l) of the aluminum rod. We are also given the diameter of the circular cross-section of the rod.Using the formula of area of the cross-section of a circle, we find out the area of the cross-section of the rod. Then we use the formula of stress to find out the tensile stress in the rod.

To know more about stress visit:

https://brainly.com/question/13261407

#SPJ11

1. A heat engine operates with a heat source maintained at 900 K and delivers 550 W of net mechanical power while rejecting heat at a rate of 450 W to the environment whose temperature is 300 K. a) Determine if the heat engine is a Carnot heat engine. b) Suppose the net mechanical power is used to power a completely reversible heat pump operating between the temperatures of 265 K and 300 K. At what rate is heat delivered (
Q
˙


H

) to the space maintained at the higher temperature?

Answers

Here, the temperature of the hot reservoir or source is T1 = 900 K. The temperature of the cold reservoir or sink is T2 = 300 K.

The work done by the engine is W = 550 W The heat rejected by the engine to the environment is Q2 = 450 W To find out whether the engine is a Carnot heat engine, we can use the formula of the efficiency of a heat engine. It is given by the expression:η = 1 - Q2/Q1Where Q1 is the heat absorbed by the engine from the hot reservoir.

Taking the inverse of the above expression, we get:Q1/Q2 - Q1 = 0Q1/Q2 = 1 / (1 - η)Since the efficiency of a Carnot heat engine is given by the expression:ηC = 1 - T2/T1If the efficiency of the given engine is η, then the ratio of the heat absorbed from the source to the heat rejected to the sink should be equal to T1/T2 for it to be a Carnot heat engine.

To know more about hot reservoir visit:-

https://brainly.com/question/31752075

#SPJ11

-------------------------------------------------------
Many have argued that the strength of cryptographic tools rests not with keeping the algorithm secret but instead with keeping the encryption/decryption keys secret. Others have argued it is better to keep the details of the algorithm secret.
-------------------------------------------------------

1). Indicate whether or not you agree with this perspective.
2). Identify and describe three examples of security measures that have been designed and have since been broken or bypassed.

Answers

It is important to choose the appropriate encryption technique for the data being secured and maintain a balance between the secrecy of the algorithm and the secrecy of the keys.

1) Whether or not to keep the algorithm secret or encryption/decryption keys secret is dependent on the encryption techniques that you intend to use. For example, symmetric encryption relies on the secrecy of the keys, whereas asymmetric encryption relies on the secrecy of the algorithm.


2) There are a number of security measures that have been developed over time, but have since been breached or bypassed. Here are three examples:

- Wired Equivalent Privacy (WEP): WEP was a security protocol that was commonly used to secure Wi-Fi networks. WEP used a 40- or 64-bit key, which was insufficient to secure wireless networks. It was discovered that the encryption used by WEP could be easily broken using publicly available tools.

- Secure Sockets Layer (SSL): SSL was a security protocol used to secure web traffic. It was discovered that SSL could be bypassed using the POODLE attack, which exploited a vulnerability in SSL version 3.

- MD5 Hash Function: MD5 is a widely used hash function that was designed to generate a unique fixed-length hash for a given input. It was later discovered that MD5 could be easily broken, and it was no longer considered a secure hash function.

Additionally, it is important to stay aware of potential vulnerabilities in security measures and update them as needed.

Know more about the encryption technique

https://brainly.com/question/31329259

#SPJ11

Write a query that:
Computes the average length of all films that each actor appears in.
Rounds average length to the nearest minute and renames the result column "average".
Displays last name, first name, and average, in that order, for each actor.
Sorts the result in descending order by average, then ascending order by last name.

Answers

SELECT last_name, first_name, ROUND(AVG(length)/60) as average FROM actors JOIN roles ON actors.id = roles. actor_idJOIN films ON roles.

The query to compute the average length of all films that each actor appears in, round average length to the nearest minute, and rename the result column "average" and display the last name, first name, and average, in that order, for each actor and sort the result in descending order by average, then ascending order by last name is given below:

IdGROUP BY actors. idORDER BY average DESC, last_name ASC; The SELECT statement retrieves the last name, first name of the actors, and the rounded average length of the films that the actor has appeared in.The ROUND function is used to round the average length of the films to the nearest minute. For this purpose, the length of the films has to be converted from seconds to minutes.

To know more about ROUND visit:-

https://brainly.com/question/28052236

#SPJ11

Consider a relation R(A,B,C,D,E). For which of the following sets of FDs is R in Boyce-Codd Normal Form (BCNF)?
BDE --> A, AC --> E, B --> C, DE --> A
BE --> D, B --> E, D --> E, CD --> A
ABD --> C, ACD --> E, ACE --> B, BC --> E
BCD -->E, BDE --> C, BE --> D, BE --> A

Answers

Boyce-Codd Normal Form (BCNF) is a type of normalization in database management that ensures that every determinant (a column or set of columns that uniquely identifies a row in a table) is a candidate key.

To determine which of the given sets of functional dependencies (FDs) result in R being in BCNF, we need to identify the determinants and candidate keys of each FD set.

For the first set of FDs, the determinants are BDE, AC, B, and DE. To determine if any of these are candidate keys, we can combine them in all possible ways to see if they uniquely determine all attributes of R. We find that none of these combinations result in a candidate key, as there are still remaining attributes that are not uniquely determined. Therefore, R is not in BCNF for this set of FDs.

To know more about database  visit:-

https://brainly.com/question/30163202

#SPJ11

. a gear ratio is a direct measure of the ratio of the rotational speeds of two interlocking gears. it is calculated as the ratio of the number of teeth in the driven gear to the number of teeth in the drive (smaller) gear. a mechanic wants to design the gears with a gear ratio of approximately 3.87248. if he assumes that wheels cannot have more than 50 teeth on them, how many teeth should there be on each gear?

Answers

The mechanic should design the gears with 387 teeth on the driven gear and 7 teeth on the drive gear to achieve an approximate gear ratio of 3.87248.

How to determine  how many teeth should there be on each gear

Let's assume the number of teeth on the driven gear (larger gear) is "x," and the number of teeth on the drive gear (smaller gear) is "y."

We can set up the following equation based on the given information:

x/y ≈ 3.87248

To find the closest integer values for x and y that satisfy this equation, we can multiply both sides by a common factor to eliminate the decimal approximation:

10x/10y ≈ 38.7248

Now, we can choose a common factor to scale up the equation, such as multiplying both sides by 100:

100x/100y ≈ 387.248

From this equation, it's clear that we need to find two integers close to 387.248, with one number not exceeding 50. Let's start by checking multiples of 387:

Since 387/7 is close to an integer, let's consider it as a possibility:

x = 387

y = 7

In this case, the gear ratio would be:

x/y = 387/7 ≈ 55.2857

Therefore, the mechanic should design the gears with 387 teeth on the driven gear and 7 teeth on the drive gear to achieve an approximate gear ratio of 3.87248.

Learn more about gears at  https://brainly.com/question/31655918

#SPJ4

The continuous time signal xc(t)=cos⁡(93.8πt).
is sampled with a sample period T.
x[n]=cos(πAn),−[infinity] Choose the smallest possible value of T in milliseconds/sample consistent with this information.
Provide a number as your answer with an accuracy of two decimal digits

Answers

The smallest possible value of T is 0.0107 milliseconds/sample.

The Nyquist-Shannon sampling theorem states that the sampling frequency (fs) should be at least twice the maximum frequency component of the signal (fmax). In this case, fmax is the frequency of the cosine function, which is 93.8π Hz. Therefore, the minimum sampling frequency required is 2 * 93.8π = 187.6π Hz.

Determine the highest frequency of the continuous time signal: fc = 93.8πt / 2π = 46.9 Hz Apply the Nyquist-Shannon sampling theorem: fs = 2 * fc = 2 * 46.9 Hz = 93.8 Hz. Calculate the smallest possible value of T: T = 1/fs = 1/93.8 s = 0.0106595 ms/sample. Round the answer to two decimal digits: T ≈ 0.0107 milliseconds/sample

To know more about smallest possible visit:-

https://brainly.com/question/31974966

#SPJ11

Design a beam for a 24-ft simple span to support the working uniform loads of wD 1.25 k/ft (includes beam self-weight) and w 3.0 k/ft. The maximum per- missible total load deflection under working loads is 1/360 of the span. Use 50 ksi steel and consider moment, shear, and deflection. The beam is to be braced laterally at its ends and midspan only. Determine Cb. (Ans. W24 × 62 LRFD and ASD)

Answers

Note that  the W24 × 62 beam is the lightest beam that can be used to support the loads and satisfy the deflection requirements.

How is this so?

1. Calculate the total load on the beam  -

w = wD + w

= 1.25 k/ft + 3.0 k/ft

= 4.25 k/ft

2. Calculate the moment at the end of the beam  -

M = wL^2/8

= 4.25 k/ft * 24 ft^2 / 8

= 150 ft-k

3. Calculate the shear at the end of the beam

V = wL/2 =

4.25 k/ft * 24 ft / 2

= 49 k

4. Calculate the deflection of the beam  -

deflection = L^4/384EI

= 24 ft^4 / 384 * 50 ksi * 29000 in^4

= 0.12 in

5. Select a beam that can support the moment, shear, and deflection.

The following beams can be used

* W24 × 62

* W27 × 50

* W30 × 45

6. Determine the Cb factor.

The Cb factor is a modification factor that is used to account for the effects of lateral bracing.

The value of the Cb factor depends on the type of lateral bracing and the bracing spacing.

For a beam that is braced laterally at its ends and midspan only, the value of the Cb factor is 1.0.

Therefore, the W24 × 62 beam is the lightest beam that can be used to support the loads and satisfy the deflection requirements.

The Cb factor for a beam that is braced laterally at its ends and midspan only is 1.0.

Learn more about Beam:
https://brainly.com/question/29328911
#SPJ4

void knapsack2 (int n, const int p [l, const int w[], int W int & maxprofit) { queue_of_node 0; node u, V; ( 6.1 initialize (0); // Intialize Q to be empty. v. level = 0; v. profit = 0; v. Weight = 0; // Intialize v to be the root. maxprofit = 0; enqueue (0, V); while (! empty (0) ) { dequeue (Q, v); u. level = v. level + 1; // Set u to a child of v. u. weight = v. weight + w[u. level]; // Set u to the child u. profit = v. profit + plu. level]; // that includes the // next item. if (u. weight <= W && u. profit > maxprofit) maxprofit = u. profit; if (bound (u) > maxprofit) enqueue (0, u); u. weight = V. weight; // Set u to the child that u. profit = v. profit; // does not include the if (bound(u) > maxprofit) // next item. enqueue (Q, u); } } float bound (node u) { index j, k; int totweight; float result; if (u. weight >= W) return 0; else{ result = u. profit; j = u. level + 1; totweight = u. weight; while (j <= n && totweight + W[j] <= W){ totweight = totweight + W[j]; // Grab as many items result = result p[j]; // as poss j++; } k = }; // Use if (k <=n) // with formula in text. result = result + (W - totweight) * p[k] /w[k]; // Grab fraction of kth return result; // item. } }

Answers

The algorithm has a time complexity of O(2^n) in the worst case, but the use of the bound function helps to prune the search tree and reduce the search space.

The given code is an implementation of the branch and bound algorithm for the 0/1 Knapsack problem. The problem is to fill a knapsack of capacity W with a subset of n items, such that the total weight of the items in the knapsack is less than or equal to W and the total profit (or value) of the items in the knapsack is maximum.

The code defines a node structure with level, profit and weight fields, and a queue data structure for storing the nodes. The algorithm starts by initializing the queue with the root node, which has level, profit and weight set to 0. It then repeatedly dequeues a node from the queue, expands it into two child nodes.

To know more about function visit:

https://brainly.com/question/30478824

#SPJ11

A hydrogenation catalyst is prepared by soaking alumina particles (100-150 mesh size) in aqueous NiNO3 solution. After drying and reduction, the particles contain about 7 wt% NiO. This catalyst is then made into large cylindrical pellets for rate studies. The gross measurements for one pellet are: Mass, g 3.15 Diameter, mm 25 Thickness, mm 6 Volume, cm3 3.22 The alumina particles contain micropores, and the pelleting process introduces macropores surrounding the particles. If the macropore volume of the pellet is 0.645 cm3 and the micropore volume is 0.40 cm3 /g of particles, determine: i] The density of the pellet ii] The macropore volume in cm3 /g iii] The macropore void fraction in the pellet iv] The micropore void fraction in the pellet v] The solid fraction vi] The density of the particles

Answers

i] The density of the pellet is 0.977 g/cm^{3}. ii] The macropore volume in cm^{3}/g is 0.205 cm^{3}/g. iii] The macropore void fraction in the pellet is 25.1%.iv] The micropore void fraction in the pellet is 49.0%. v] The solid fraction of the pellet is 25.9%. vi] The density of the particles is 1.222 g/cm^{3}.

i] To determine the density of the pellet, we can use the formula:

Density = Mass / Volume

Given that the mass of the pellet is 3.15 g and the volume is 3.22cm^{3}, we can calculate the density as follows:

Density = 3.15 g / 3.22 cm^{3}≈ 0.977 [tex]g/cm^{3[/tex]

ii] The macropore volume in cm3/g can be calculated by dividing the macropore volume of the pellet (0.645 cm3) by the mass of the pellet (3.15 g):

Macropore volume = 0.645 cm^{3} / 3.15 g ≈ 0.205 [tex]cm^{3} /g[/tex]

iii] The macropore void fraction in the pellet can be calculated using the formula:

Macropore void fraction = Macropore volume / Total volume of the pellet

Total volume of the pellet = Volume - Macropore volume = 3.22 cm^{3}- 0.645 cm^{3} = 2.575 cm^{3}

Macropore void fraction = 0.645 cm^{3} / 2.575 [tex]cm^{3}[/tex]≈ 0.251 or 25.1%

iv] The micropore void fraction in the pellet can be calculated using the given micropore volume of the particles (0.40 cm^{3} /g) and the mass of the pellet (3.15 g):

Micropore volume in the pellet = Micropore volume/g x Mass

Micropore volume in the pellet = 0.40 [tex]cm^{3} /g[/tex] x 3.15 g = 1.26 cm3

Micropore void fraction = Micropore volume in the pellet / Total volume of the pellet

Micropore void fraction = 1.26 [tex]cm^{3}[/tex] / 2.575 [tex]cm^{3}[/tex] ≈ 0.490 or 49.0%

v] The solid fraction of the pellet can be calculated by subtracting the sum of macropore and micropore void fractions from 1:

Solid fraction = 1 - (Macropore void fraction + Micropore void fraction)

Solid fraction = 1 - (0.251 + 0.490) ≈ 0.259 or 25.9%

vi] The density of the particles can be determined using the mass of the pellet (3.15 g) and the total volume of the particles:

Total volume of the particles = Volume - Macropore volume = 3.22 [tex]cm^{3}[/tex]- 0.645 [tex]cm^{3}[/tex] = 2.575[tex]cm^{3}[/tex]

Density of the particles = Mass / Total volume of the particles

Density of the particles = 3.15 g / 2.575[tex]cm^{3}[/tex] ≈ 1.222 [tex]g/cm^{3}[/tex]

For more questions on pellet

https://brainly.com/question/14809745

#SPJ8

in the code generation procedure, a correct lexicographical level must be set for operations such as lod, sto, cal. briefly explain how to determine a lexicographical level for these operations.

Answers

Lexicographical levels are used to determine the scope and accessibility of variables and procedures. The lexicographical level of a variable or procedure is based on its position in the nested structure of scopes.

To determine the lexicographical level for operations such as lod, sto, and cal, we must first identify the scope in which the variable or procedure is defined. The scope of a variable or procedure is determined by its declaration.

Once we have identified the scope, we can determine the lexicographical level by counting the number of nested scopes between the current scope and the scope in which the variable or procedure is defined. This number represents the difference in lexicographical levels between the two scopes.

To know more about Lexicographical  visit:-

https://brainly.com/question/30095002

#SPJ11

Consider the following actions taken by transaction T1 on database objects X and Y : R(X), W(X), W(Y)
Give an example of another transaction T2 that, if run concurrently to transaction T without some form of concurrency control, could interfere with T1.
Explain how the use of Strict 2PL would prevent interference between the two transactions.
Strict 2PL is used in many database systems. Give two reasons for its popularity.

Answers

Two reasons for the popularity of Strict 2PL are: 1. It ensures conflict serializability, which means that the outcome of concurrent transactions is equivalent to executing them in a serial manner. 2. It is simple to implement, making it appealing to database developers.

The transaction T1 takes three actions on the database objects X and Y:

Read operation (R) on X, Write operation (W) on X and another write operation (W) on Y.

An example of another transaction T2 that could interfere with T1 if run concurrently without concurrency control is as follows:

Suppose transaction T2 intends to read object Y before T1 writes it. In this scenario, the value read by T2 would be the initial value of Y, which will become outdated once T1 has updated it.

As a result, T2 may use obsolete data, resulting in inconsistencies in the database.

Strict 2PL (Two-Phase Locking) is a concurrency control mechanism that can be used to prevent interference between transactions.

In this method, each transaction has to follow two phases: a growing phase and a shrinking phase.

In the growing phase, the transaction is permitted to acquire locks but not to release them. In contrast, in the shrinking phase, the transaction can only release locks but not acquire new ones.

A transaction acquires locks for each database object it accesses and keeps them until the transaction is complete.

T2 would have to wait for T1 to release its locks before being allowed to access the shared objects.

As a result, Strict 2PL would prevent T2 from interfering with T1 by blocking T2 until T1 releases its locks.

Know more about the  database objects

https://brainly.com/question/31958744

#SPJ11

A lw is to load register $5 from location 0x0040000C in memory. Register $10 contains 0x00400000. Write the assembly language instruction: (Q15.9)

a.
lw $5,0x0C(400000)

b.
lw $10,0x0C($10)

c.
lw $10,0x0C($5)

d.
lw $5,0x0C($10)

Answers

The correct assembly language instruction for loading register $5 from location 0x0040000C in memory when register $10 contains 0x00400000 is option D: lw $5,0x0C($10).

This instruction tells the processor to load a word (4 bytes) of data from memory into register $5, starting at the memory address stored in register $10 plus an offset of 0x0C. This means that the data will be loaded from memory address 0x0040000C. The value in register $10 is used as the base address for the memory access.

Option A is incorrect because it tries to load the data directly from memory address 0x0040000C without using register $10.

Option B is incorrect because it loads the data into register $10 instead of $5.

Option C is incorrect because it uses register $5 as the base address instead of $10.

To know more about register visit :

https://brainly.com/question/31481906

#SPJ11

kb is: ∀x f(x) → (g(x) ∨ h(x)) g(a) ≡ (h(a) ∧ ¬g(a)) prove using resolution-refutation: ¬f(a).

Answers

Resolution-refutation is a proof strategy that helps in establishing that a given sentence is unsatisfiable. In other words, it shows that a given sentence cannot be true under any interpretation.

To prove the above statement using resolution-refutation, we need to follow the below

steps:

Step 1: Convert the given statement into Conjunctive Normal Form(CNF)

Step 2: Apply the resolution rule to the CNF formula until it can't be applied any further.

Step 1: Convert the given statement into CNFTo apply the resolution rule, we need to first convert the given statement into CNF form.For that, we need to use some of the following equivalences:1. De Morgan's Laws: ¬(P ∧ Q) ≡ ¬P ∨ ¬Q and ¬(P ∨ Q) ≡ ¬P ∧ ¬Q2. Distribution: P ∧ (Q ∨ R) ≡ (P ∧ Q) ∨ (P ∧ R) and P ∨ (Q ∧ R) ≡ (P ∨ Q) ∧ (P ∨ R)Using the above rules, we can convert the given statement as follows: ¬f(a) ∧ ¬g(a) ∧ ¬h(a) ∨ g(a) ∧ h(a)The above formula is in CNF form.

Step 2: Apply the resolution rule to the CNF formula until it can't be applied any further.

Now, we apply the resolution rule as follows: Clause 1: {¬f(a), ¬g(a), ¬h(a)}Clause 2: {g(a), h(a)}Resolve: {¬f(a), ¬g(a), ¬h(a), h(a)}Resolve: {¬f(a), ¬g(a)}Resolve: {¬f(a), ¬h(a)}Resolve: {¬f(a)}Hence, the proof is complete.

To know more about De Morgan's Laws visit:

https://brainly.com/question/29073742

#SPJ11

If a TCP's connection has MSS of800 bytesMSS of800 bytes and its RTT is160 msecRTT is160 msec, the resulting initial sending rate during its slow start stage is about 40 kbps, here 'k' represents 1000. true or false?

Answers

True.  During the slow start stage of a TCP connection, the sender gradually increases its sending rate until it reaches a certain threshold. This threshold is determined by the receiver's advertised window size and the network's.


The Maximum Segment Size (MSS) refers to the maximum amount of data that can be sent in a single TCP segment, excluding the TCP header. In this case, the MSS is 800 bytes.

The Round Trip Time (RTT) is the time it takes for a packet to travel from the sender to the receiver and back. In this case, the RTT is 160 msec.  The initial sending rate during slow start can be calculated using the following formula:
Initial Sending Rate = MSS / (RTT * sqrt(2))
Plugging in the values, we get:

To know more about TCP connection visit:-

https://brainly.com/question/30439999

#SPJ11

In the circuit shown in Fig. P8.49, a generator is connected to a load via a transmission line. Given that Rs = 10 12, Zline = (4 + j2) 12, and Zload = (40+ j30) 82: (a) Determine the power factor of the load, the power factor of the transmission line, and the power factor of the voltage source. (b) Specify the capacitance of a shunt capacitor C that would raise the power factor of the source to unity when connected between terminals (a, b). The source frequency is 60 Hz.

Answers

Given that Rs = 1012, Z line = (4 + j2)12, and Z load = (40+ j30)82.(a) Calculation of power factor is given as follows:

Impedance of transmission line, Z line = 4 + j2 Ω / phase Inductive impedance of the load, Z load = 40 + j30 Ω / phaseThe total load impedance, Z total = Z load + Z line = (4 + j2) 12 + (40+ j30) 82 = (736 + j284) ΩThe total load admittance, Ytotal = 1/Ztotal = 0.00123 - j0.0035 Siemens.

The equivalent generator impedance, Zgen = Rs = 1012 ΩThe total generator admittance, Ygen = 1/Rs = 10^-12 SiemensPower factor is given as cos φ = Re (S) / |S|Power factor of the load, cos φL = Re (Sload) / |Sload| = Re (Vline * IL*) / |Vline * IL*|Where Vline is the line voltage and IL* is the complex conjugate of the line currentIL* = (Vline - Vload) / (Zline + Zload)Vload = Vline - IL * Zload = Vline - (Vline - Vload) Zload / (Zline + Zload)Vload = (Vline * Zline) / (Zline + Zload)Substituting the values and simplifying, we get cos φL = 0.72 (lagging)

Power factor of the transmission line, cos φline = Re (Sline) / |Sline| = Re (Vline * IL*) / |Vline * IL*|Substituting the values and simplifying, we get cos φline = 0.994 (lagging)Power factor of the voltage source, cos φgen = Re (Sgen) / |Sgen| = Re (Vgen * Igen*) / |Vgen * Igen*

To know more about power factor visit:

https://brainly.com/question/31230529

#SPJ11

a cpu-scheduling algorithm determines an order for the execution of its scheduled processes. given n processes to be scheduled on one processor, how many different schedules are possible?

Answers

The number of possible schedules increases rapidly as the number of processes to be scheduled increases. For example, if we have four processes to be scheduled, there are 4! = 24 possible schedules.

There are several CPU scheduling algorithms available in computer science that determine the order of execution of processes scheduled on a processor. When given n processes to be scheduled on a single processor, the number of different schedules that can be created is calculated using the formula.



To understand this, let's consider a simple example where we have three processes to be scheduled: P1, P2, and P3. To calculate the number of possible schedules, we need to find the factorial of 3, which is: 3! = 3 x 2 x 1 = 6
Therefore, there are six possible schedules for three processes to be scheduled on a single processor. These schedules can be listed as follows: P1 P2 P3 P1 P3 P2 P2 P1 P3 P2 P3 P1 P3 P1 P2 P3 P2 P1.

To know more about schedules visit:

https://brainly.com/question/29988001

SPJ11

There are 120 different schedules possible when given 5 processes to be scheduled on a single processor.

The total number of different schedules possible when given n processes to be scheduled on one processor can be determined by using the factorial function. The formula for the total number of possible schedules is given by n factorial, or n!Where n represents the number of processes to be scheduled on a single processor.

A CPU-scheduling algorithm determines an order for the execution of its scheduled processes. The CPU executes each process according to its order in the queue.

The CPU scheduler selects a process from the ready queue and dispatches it to the CPU for execution.The number of possible schedules for n processes on a single processor is calculated by the factorial function. The factorial function is a mathematical function that multiplies a number by all the positive integers less than it.

Mathematically, we can represent the factorial of n as n! and it can be computed as:n! = n * (n - 1) * (n - 2) * ... * 3 * 2 * 1

Therefore, the total number of possible schedules for n processes on a single processor is given by n factorial or n!.

For example, if there are 5 processes to be scheduled on a single processor, the total number of possible schedules would be:

5! = 5 * 4 * 3 * 2 * 1 = 120.

Know more about the processor.

https://brainly.com/question/31090529

#SPJ11

Other Questions
All students must pass in order to pass the class.Bus 240 Multiple Choice Study GuideThese are the 75 topics for the 75 multiple choice questions that will be on . You will have 90 minutes. Print this Study Guide and fill in your notes. You may have it with you to help you .1. Laws and government regulations affect business2. Sources of law3. Common law development4. Final authority regarding the constitutionality of law5. State court exercise jurisdiction over an out-of-state company6. Appeals to the United States Supreme Court7. Filing a complaint and serving a summons8. Voir dire9. Relevant evidence10. Commerce clause11. Bill of Rights12. Procedural due process13. Duty-based ethical reasoning14. Utilitarian theory of ethics15. Foreign Corrupt Practices Act16. Battery17. Liability to injured.18. Comparative negligence19. Strict product liability20. Product liability recovery21. A company may be liable in product liability for22. Trademark protection23. Patent protection24. Copyright protection25. Cybersquatting26. Typosquatting.27. Monitoring employees electronic communications28. Standards of proof29. Robbery, Forgery, Larceny.30. Bribery31. The act of state doctrine, Principle of comity.32. Application of U.S. antitrust laws Internationally33. Doctrine of sovereign immunity, Foreign Corrupt Practices Act.34. Offers under the common law35. Enforceability of an agreement for release from liability36. Capacity to contract37. Delegation, Assignment, Third-party beneficiary contract.38. Fraud39. Duress, Mistake, Undue influence.40. Impossibility, Commercially impracticality.41. Compensatory damages42. UCC Article 2 covers43. Contract clause that is perceived as grossly unfair44. Merchants, Express warranty, Implied warranty, Disclaimers45. The 1980 United Nations Convention on Contracts for the International Sale of Goods (CISG)46. A new enterprise must meet legal requirements relating to47. Partnership agreement48. Partner liability49. Limited liability company member liability50. Limited liability partnership liability51. Pass-through tax entities52. Alien corporation, Close corporation, S corporation, Private corporation53. Cumulative voting54. Preemptive rights55. Apparent authority, Express authority, Implied authority56. Scope of employment57. Termination of agency relationship58. Employment-at-will doctrine, exception based on contract theory, exception based on public policy, exception based on tort theory.59. Workers compensation60. Unemployment compensation61. Employment discrimination62. Disparate-impact discrimination, Disparate-treatment discrimination.63. Americans with Disabilities Act64. Violations of Federal Labor law65. National Labor Relations Board (NLRB) rulings & appeals66. When a union may strike67. State regulation conflicts with a federal regulation68. Arbitrary and Capricious69. Administrative agencies warrantless searches70. Sherman Act rule of reason71. Per se violations of the Sherman Act72. Monopoly power violations of Sherman Act.73. Securities Act of 193374. Section 10(b) of the Securities Exchange Act of 193475. Sarbanes-Oxley Act of 2002 in outer space rock 1 with mass 5 kg and velocity m/s, struck rock 2, which was at rest. after the collision, rock 1's velocity is m/s. .Discuss the relationship between minerals senso stricto and mineral-like materials in the human body, using examples from at least two mineral classes (Dana/Strunz classes). Discuss two areas where mineralogical knowledge can be applied to the medical fields or general human health. Michael and Sarah are preparing to operate a small business which specialises in Australian country cookies. Michael tells you he plans to perform the administrative duties such as sending bills to customers and answering the phone orders. Sarah will cook and decorate the cookies. Michael and Sarah both want some involvement in the management and ownership of the business. Michael and Sarah are married but do not have any close family members. They intend to hire more staff and wish to see the business continue after their retirement. Sarah is aware that another operator has just been sued and was found liable for $1 million dollars in damages after some plastic was found in one of their specialty cookies. Michael and Sarah are unable to decide between a partnership or a company structure.Required: You are asked to provide advice in IRAC format on how the venture should be structured according to Australian corporation law. Which of the following best describes accruals?A. The payments made to suppliers for materials. B. The amount due in an accounting period which is unpaid. C. A payment made in advance of the accounting period to which it relates. D. An amount shown on the income statement to cover overheads. 10 value points on triumph of surgery class 10 Refer to Apples financial statements in Appendix A to answer the following. Required1. Assume that the amounts reported for inventories and cost of sales reflect items purchased in a form ready for resale. Compute the net cost of goods purchased for the year ended September 28, 2019.2. Compute the current ratio and acid-test ratio as of September 28, 2019, and September 29, 2018.3. Does Apples 2019 current ratio outperform or underperform the (assumed) industry average of 1.5?4. Does Apples 2019 acid-test ratio outperform or underperform the (assumed) industry average of 1.0? What is the percent by volume of 5.75 mL of ethyl acetate in 7.85 mL of solution? QUESTION 1 (45 marks) Adams Apple Traders Limited is one of the traders of iPads in South Africa. The entity got the right from the makers of iPads to trade them in South Africa. The entity is in the process of selecting two new non-executive directors. The year 2019 was not a good financial year for Adams Apple Traders Limited. The entity only managed to break even in the current year under audit even though other companies selling the same product made significant gains. As such your audit team also performed risk assessment procedures as part of the audit. While performing the risk assessment procedures the audit team noted the following system descriptions that might pose a risk of material misstatement in the revenue cycle of the company's order department. 1. 2. Some credit sales orders were not authorised by the credit manager Telephonic sales orders were accepted from non-account holders Not all sale orders were matched to picking slips and delivery notes 3. 1.1 Explain in detail with examples the nine fundamental principles of corporate and business governance that should be applied by Adams Apple Traders Limited. (20) 1.2 Adams Apple Traders Limited has tasked your audit team to draft recommendations on how the implementation of corporate governance could have prevented such risks identified (15) 1.3 Briefly discuss the role of non-executive directors (10) (a) Find all solutions of the following linear congruence: 15x 3 (mod 21) (b) Find all solutions of the following system oflinear congruences: x 18 (mod 26) x 5 (mod 39) The demand curve for a monopolistically competitive firm is:a. perfectly elastic.b. elastic.c. inelastic.d. perfectly inelastic. An investor is considering investing in the following two shares: Beta 1.4 Fortress PLC Castle PLC 0.5 (a) If the return on Treasury Bills is 5% and the market risk premium is 10%, what is the expected return of a portfolio made up of 40% Fortress shares (4 marks) and 60% Castle shares? (b) Explain Beta in the context of the CAPM and explain what the Betas for (4 marks) Fortress and Castle shares imply about those shares. (c) Shares in Empire PLC have a Beta of 0.9 and are estimated to have an expected return of 16%. Given the information in part (a), are Empire shares correctly priced according to the CAM? Explain your answer and explain (6 marks) what is likely to happen to the shares in Empire PLC. (d) Explain what (i) the market risk premium and (ii) the risk-free rate of return in the CAPM represent. (4 marks) (e) Explain why it is difficult to empirically test the CAPM. (7 marks) what is the significance of military tribunals in today's environment Bidump Corporation is evaluating two mutually exclusive capital budgeting projects. Project W2, which costs $130,000, is expected to generate $41,000 for five years and Project H5, which costs $174,000, is expected to generate $54,600 for five years. Bidump's required rate of return is 13 percent. What is t the internal rate of return (IRR) of the project the company should purchase? Do not round intermediate calculations. Round your answer to two decimal places. -Select should be purchased. Its IRR is A company is about to invest in a joint venture research and development project with another company. The project is expected to last eight years, but yearly payments the company makes will begin immediately (i.e., a payment is made today, and the last payment is eight years from today). Salaries will account for S40 000 of each payment. The remainder of each payment will cover equipment costs and facility overhead. The initial (immediate) equipment and facility cost is $26 000. Each subsequent year the figure will drop by S3000 until a cost of S14 000 is reached, after which the costs will remain constant until the end of the project. (a) Draw a cash flow diagram to illustrate the cash flows for this situation. (b) At an interest rate of 7%, what is the total future worth of all project payments at the end of the eight years? Suppose TV broadcasting is a duopoly. The market demand for TV broadcasting is P = 5000 - Q. The marginal cost of TV broadcasting is zero. What level of output would be produced by each firm in a Cournot duopoly in the long run? What will the price be? Y" - 4y= Cosh (2x) Recall: Cos X = ex te-t 2 a) write the complimentary Yo function b) write the form of the Particular Solution Yp Using the unditermined coefficients Method, But do not solve for the D When estimating cost of debt, the coupon rate is used as the cost of debt. O True False Question 9 7 pts The cost of capital often stays constant as a firm raises more and more capital. True False Q the relationship between gender and somatic symptom disorder generally is that: Apanel of judges A and B graded seven debaters and independentlyawarded the marks. On the basis of the marks awarded followingresults were obtained: EX = 252, IV = 237, X2 = 9550, V2 = 8287,ESA3545 Weight:1 7) A panel of judges A and B graded seven debaters and independently awarded the marks. On the basis of the marks awarded following results were obtained: X = 252, Y = 237, x = 9550,