a. Write an application that counts by five from 5 through 500 inclusive, and that starts a new line after every multiple of 50 (50, 100, 150, and so on). Save the file as CountByFives.java.
b. Modify the CountByFives application so that the user enters the value to count by. Start each new line after 10 values have been displayed. Save the file as CountByAnything.java.

Answers

Answer 1

The application "CountByFives. java" counts by five and starts a new line after every multiple of 50. "CountByAnything. java" allows user-defined counting values and new lines after 10 values.


The application "CountByFives. java" counts by five from 5 to 500, starting a new line after every multiple of 50. In "CountByAnything. java," the user enters the value to count by, and a new line starts after 10 values are displayed.

In "CountByFives. java," you can write a loop that starts at 5 and increments by 5 until it reaches 500. Inside the loop, you can use an if statement to check if the current value is a multiple of 50, and if so, print a new line character. This way, a new line will be printed after every multiple of 50.

In "CountByAnything. java," you can modify the application to accept user input for the counting value. Instead of hardcoding the increment value as 5, you can prompt the user to enter the value to count by. Additionally, you can keep track of a counter variable and print a new line after every 10 values using another if statement inside the loop.

By making these modifications, you can create applications that count by any desired value and display new lines at specific intervals, providing flexibility and customization to the counting process.

To learn more about java click here

brainly.com/question/32809068

#SPJ11


Related Questions

Is someone lives In Poland like I do plz send me good websites where I can buy the MacBook Air 2017 plz I’ll give brainlist

Answers

Apple? I would assume but you could try eBay or Amazon







How do you repair a USB?

Answers

Answer:

.Take it to the mechanic

Aaron keeps texting throughout his study session. Why should he minimize such distractions? Answers: 1. to recognize his priorities, 2. to avoid breaks, 3. to maintain his to-do list, 4. No or to stay focused. Can someone answer this in less than a hour.

Answers

Answer:

1

Explanation:

realize his priorites show him what was the wrong thing to do do so he realize he should focused on his study

He should stay focused to minimize such distractions. The correct option is D.

What is staying focused mean?

To remain focused simply means to continue working on the current project.

To keep working toward whatever it is that you need to accomplish and to make sure that you maintain focus on that one task. Not multitasking at all.

A person is paying attention to something when they are focused on it. When a camera lens or your eyes are focused, the necessary corrections have been performed for clear vision. A beam of light is beaming on something when it is focused on it.

Aaron continues to text when he is studying. In order to reduce these distractions, he needs maintain focus.

Thus, the correct option is D.

For more details regarding staying focused, visit:

https://brainly.com/question/15633749

#SPJ6

Using the supplied VMs, install the Router-FW, DNS Server, Webserver, and CEO PC, ensuring they are connected to the correct network segment.

Answers

Install Router-FW, DNS Server, Webserver, and CEO PC on the correct network segments. Ensure connectivity between the devices for proper functioning of network services.

To set up the network with the provided VMs, follow these steps:

Install Router-FW: Deploy a virtual machine with a router-firewall software. Configure its interfaces and IP addresses based on the network topology. Connect the appropriate interfaces to the corresponding network segments.

Install DNS Server: Set up another virtual machine as a DNS server. Install the DNS software and configure it with the desired DNS records. Assign an IP address within the DNS network segment and connect it to the network.

Install Webserver: Create a virtual machine for the webserver. Install a web server software like Apache or Nginx. Configure the web server with the necessary website content. Assign an IP address within the webserver network segment and connect it to the network.

Install CEO PC: Create a virtual machine representing the CEO's PC. Install the desired operating system and necessary applications. Assign an IP address within the CEO network segment and connect it to the network.

Ensure that the devices are connected to the correct network segments, and their IP configurations are consistent with the network topology. This allows proper communication between the devices and enables the network services to function as intended.

Learn more about DNS server here: brainly.com/question/32474101

#SPJ11

Given main() in the Inventory class, define an insertAtFront() method in the InventoryNode class that inserts items at the front of a linked list (after the dummy head node).
Ex. If the input is:
4
plates 100
spoons 200
cups 150
forks 200
the output is:
200 forks
150 cups
200 spoons
100 plates
import java.util.Scanner;
public class Inventory {
public static void main (String[] args) {
Scanner scnr = new Scanner(System.in);
InventoryNode headNode;
InventoryNode currNode;
InventoryNode lastNode;
String item;
int numberOfItems;
int i;
// Front of nodes list
headNode = new InventoryNode();
lastNode = headNode;
int input = scnr.nextInt();
for(i = 0; i < input; i++ ) {
item = scnr.next();
numberOfItems = scnr.nextInt();
currNode = new InventoryNode(item, numberOfItems);
currNode.insertAtFront(headNode, currNode);
lastNode = currNode;
}
// Print linked list
currNode = headNode.getNext();
while (currNode != null) {
currNode.printNodeData();
currNode = currNode.getNext();
}
}
}

Answers

The `InventoryNode` class needs an `insertAtFront()` method to insert items at the front of a linked list.

To define the `insertAtFront()` method in the `InventoryNode` class, we need to modify the class to include this method. Here's an updated version of the `InventoryNode` class with the `insertAtFront()` method:

```java

public class InventoryNode {

   private String item;

   private int numberOfItems;

   private InventoryNode next;

   // Constructors, getters, and setters omitted for brevity

   public void insertAtFront(InventoryNode headNode, InventoryNode newNode) {

       newNode.setNext(headNode.getNext());

       headNode.setNext(newNode);

   }

   public void printNodeData() {

       System.out.println(numberOfItems + " " + item);

   }

}

```

The `insertAtFront()` method takes two parameters: `headNode`, which represents the dummy head node of the linked list, and `newNode`, which represents the node to be inserted at the front. Within the method, we update the references of the `newNode` and the `headNode` to properly insert the new node at the front of the list.

In the `main()` method of the `Inventory` class, we create an instance of `headNode` as the dummy head node and iterate over the input to create new `InventoryNode` instances. Then, we call the `insertAtFront()` method to insert each node at the front of the linked list. Finally, we traverse the linked list and print the data of each node using the `printNodeData()` method.

To learn more about java click here

brainly.com/question/9325300

#SPJ11

ou need to let everyone know that they should clean their cubicles in preparation for the CEO's office visit. Which is the best subject line for the email you intend to send? CEO Cleaning Cleaning Our Workspaces Ahead of Our CEO's Visit CLEANING YOUR CUBICLE!!!! VERY IMPORTANT!!! Because the CEO is Visiting Us on Monday, Clean Your Cubicle Before You Leave for the Weekend on Friday and Remember to Lock Your Drawers

Answers

1. Clarity: The subject line clearly states the task at hand, which is cleaning workspaces before the CEO's visit. It avoids unnecessary capitalization or excessive exclamation marks.



2. Inclusiveness: By using the term "our workspaces," it emphasizes that everyone is responsible for cleaning their own cubicles. This promotes a sense of shared responsibility and encourages participation from all employees.
Relevance.


3. Professionalism: The subject line maintains a professional tone, ensuring that the email is taken seriously by employees. It avoids excessive punctuation and capitalization that may make the email seem less professional.
Remember, when sending the email, it's important to provide clear instructions on what needs to be cleaned and any specific guidelines or expectations.

To know more about CEO's visit:

https://brainly.com/question/30163830

#SPJ11

Question #11
What are two reasons for using an address book?

Answers

Answer:

order and so you wont forget

Explanation:

Melanie is an IT security professional for a large bank. She got an alert that the bank website received a funds transfer request from a legitimate customer who was authenticated at the time, but the

Answers

Melanie, an IT security professional, for a large bank got an alert that the bank website received a funds transfer request from a legitimate customer who was authenticated at the time, but the transaction raised a red flag because it was from an unusual location and for an abnormally high amount.

Therefore, it is likely to be a fraudulent transaction.

The bank has measures in place to protect customers from such activities.

These measures could include transaction limits, 2-factor authentication, and geolocation.

Cybercriminals are increasingly using sophisticated techniques to bypass these measures, such as using stolen credentials or impersonating legitimate users.

To mitigate such incidents, the bank should have a comprehensive cybersecurity framework.

The cybersecurity framework includes policies, procedures, technologies, and training to protect its assets, including customer data.

Read more about IT Security.

https://brainly.com/question/31684033

#SPJ11

The company ‘BestHotels’ has numerous hotels around the world. BestHotels uses profiling data gathered by an app called ‘MagicApp’ which is used for enhancing customers' hotel experiences. The data collected by the app is also used in targeted marketing. By holding the smartphone (with the MagicApp open) up to sensors around the company’s hotels, customers can access all areas in their hotels, pay for food and merchandise, book various tourist experiences and check in at reserved attractions. Personal information linked to the MagicApp is also used to make recommendations on local attractions that customers could visit within the close vicinity of the hotels.

As a family friendly hotel chain, BestHotels has asked you to apply an ethical lens to the collection, use and disposal of their customer data.

Question 4a: Explain which aspects discussed in PAPA (Mason, 1986) and Data Ethics (Chalcraft, 2018) are relevant to BestHotels.

Question 4b: Compile a list of recommendations you would advise BestHotels managers to act upon to ensure the company is acting responsibly with clients’ personal data.

Answers

Question 4a: The aspects discussed in PAPA (Mason, 1986) and Data Ethics (Chalcraft, 2018) that are relevant to BestHotels in the context of collecting, using, and disposing of customer data are as follows:

Privacy: BestHotels needs to consider the privacy of its customers and ensure that the collection and use of personal data through the MagicApp are done in a transparent and consensual manner. Customers should have control over their personal information and be informed about how it will be used.

Accuracy: BestHotels should ensure that the customer data collected through the MagicApp is accurate and up to date. Inaccurate data can lead to incorrect recommendations and personalized experiences, potentially impacting customer satisfaction.

Property: The data collected through the MagicApp is considered the property of the customers. BestHotels should respect the ownership rights of customers over their personal data and ensure that it is not shared or used for purposes beyond what is agreed upon.

Accessibility: BestHotels should provide customers with access to their personal data collected through the MagicApp and allow them to update or delete their information as required. Customers should have control over their data and the ability to manage their privacy settings.

Security: BestHotels needs to implement appropriate security measures to protect the customer data collected through the MagicApp. This includes safeguards against unauthorized access, data breaches, and ensuring data encryption during transmission and storage.

Question 4b: Recommendations for BestHotels to ensure responsible handling of customer data:

Obtain informed consent: Clearly communicate to customers the purpose and scope of data collection through the MagicApp and obtain their explicit consent before collecting their personal information.

Transparent data practices: Provide customers with a clear privacy policy that outlines how their data will be collected, used, and stored. Inform them about the types of data collected, who will have access to it, and the measures taken to protect their privacy.

Data minimization: Only collect the necessary data required for enhancing the hotel experience and targeted marketing. Avoid collecting excessive or irrelevant personal information.

Anonymization and pseudonymization: Whenever possible, anonymize or pseudonymize customer data to protect individual identities and ensure privacy.

Data security measures: Implement robust security measures to protect customer data from unauthorized access, data breaches, and cyber threats. This includes encryption, secure data storage, regular security audits, and employee training on data protection.

Regular data audits: Conduct regular audits of data practices to ensure compliance with privacy regulations and ethical standards. This includes reviewing data collection processes, data storage and retention policies, and the use of customer data for targeted marketing.

Third-party data sharing: If sharing customer data with third parties, such as tour operators or local attractions, ensure that appropriate data sharing agreements are in place to safeguard customer privacy and comply with applicable data protection regulations.

Data retention and disposal: Establish clear policies for the retention and disposal of customer data. Only retain data for as long as necessary and securely dispose of it when no longer needed.

Customer rights: Provide customers with the ability to access, update, and delete their personal data. Respond promptly to customer requests regarding their data and respect their preferences regarding data usage.

By considering aspects such as privacy, accuracy, property, accessibility, and security, BestHotels can ensure the responsible collection, use, and disposal of customer data through the MagicApp. Implementing the recommendations mentioned above will help protect customer privacy, build trust, and uphold ethical standards in handling personal data.

To know more about PAPA (Mason, 1986) visit

https://brainly.com/question/29310382

#SPJ11

In which situations would a text-to-speech tool be useful? Check all that apply. A reader needs to hear a word pronounced. O A student is reading difficult material. A student needs to take notes about a text. A reader needs to know the definition of a word. O A student is reading a new language.​

Answers

Answer:

a,b,e

Explanation:

edge 2020

Answer:

a b and e

Explanation:

I took the assignment

When you cut and then paste a file, what are you doing?
copying it and placing a duplicate in another location
compressing it and placing the compressed version in another location
renaming it, and then saving it with the new file name
removing it from its current location and placing it in another

Answers

Answer:

removing it from it's current location and placing it in another

Answer:

The answer would be d.

Explanation:

Which hexadecimal number is equivalent to the decimal number 11?

Answers

1011, hope that helps.

Could someone please help me with on how to ask the user to enter two integer numbers, then between the two numbers inclusive, use a while loop to print the square of each number on the same line deprecated by a space?

I can send an example if needed
(And in edhesive please)

Answers

In python 3:

number1 = int(input("Enter a number: "))

number2 = int(input("Enter a number: "))

x = number1

while x in range(number1, number2+1):

   print(x**2, end=" ")

   x += 1

I think this is what you're looking for. Best of luck.

Approximately how many viewers watch the Super Bowl each year? How does the audience size compare to other television events?

Answers

Answer:

Ok

Explanation:

About 100 Million people watch the Super Bowl, both on tv and in stadium, most other events are watched by close to 20 Million is what Google says

Explain why it is important to use the correct spatial
referencing method, map projection and datum in a GIS project

Answers

Answer:

Using the correct spatial referencing method, map projection, and datum in a Geographic Information System (GIS) project is crucial for several reasons:

Explanation:

Accurate Geospatial Analysis: GIS projects involve analyzing and visualizing spatial data. Choosing the appropriate spatial referencing method ensures that the data aligns accurately with the real-world geographic coordinates. It enables accurate geospatial analysis, such as measuring distances, calculating areas, and performing spatial queries.

Data Integration and Interoperability: GIS projects often involve combining datasets from various sources and integrating them into a common spatial framework. Using consistent map projections and datums ensures that different datasets align properly and can be integrated seamlessly. It facilitates data interoperability, allowing different GIS layers to be overlaid and analyzed together accurately.

Avoiding Distortions and Errors: Different map projections introduce distortions in representing the curved Earth surface on a flat map. Each map projection has its own strengths and limitations, and choosing the appropriate one for a specific project minimizes distortions and errors. Using an unsuitable map projection can lead to inaccuracies, such as misshapen features, distorted distances, or incorrect spatial relationships.

Coordinate Transformation and Data Sharing: GIS projects often require sharing data with others or integrating data from different regions or coordinate systems. By using the correct datum and coordinate transformation techniques, data can be accurately converted between different spatial referencing systems, ensuring seamless data sharing and integration. It facilitates collaboration among different stakeholders and allows for the proper analysis of data across different geographic areas.

Standardization and Consistency: Following established spatial referencing methods, map projection standards, and datums ensures consistency across GIS projects and promotes interoperability with existing geospatial datasets and systems. It enables data sharing, comparison, and analysis between different projects and organizations, fostering a standardized and compatible geospatial data environment.

String firstName = in.next();
String lastName = in.NextLine();
System.out.print("\n");

Answers

Answer:

1 & 2 does not contain error

Explanation:

for 3 System.out.println("\n"); is right way to print

group of answer choices color brown to reddish-brown hardness [ choose ] cleavage [ choose ] luster [ choose ] name hematite

Answers

Hematite is a mineral that is brown to reddish-brown in color. It has a hardness of [choose], meaning it is relatively hard. Hematite does not have cleavage, which means it does not break along distinct planes. Instead, it tends to fracture irregularly.


In terms of hardness, hematite has a rating of 5.5-6.5 on the Mohs scale, which means it is harder than materials like glass but can be scratched by harder substances like quartz. This makes hematite a durable mineral.

While hematite does not exhibit cleavage, it does have a characteristic red-brown streak. When hematite is scratched against a rough surface, it leaves behind this reddish-brown streak, which helps distinguish it from other minerals.
To know more about Hematite visit:

https://brainly.com/question/21095731

#SPJ11

design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the numeric average of the numbers entered.

Answers

The program uses an array to store 20 numbers entered by the user, calculates the average, and displays each number with its difference from the average.

Logic for the program:

1. Initialize variables sum and count to 0.

2. Create an array to store the 20 numbers entered by the user.

3. Use a loop to iterate 20 times:

  a. Prompt the user to enter a number and store it in the array.

  b. Add the entered number to the sum.

  c. Increment the count variable.

4. Calculate the average by dividing the sum by the count.

5. Use a loop to iterate through the array:

  a. Display each number.

  b. Calculate the difference between the number and the average.

  c. Display the difference.

6. End the program.

The logic for the program involves using an array to store the 20 numbers entered by the user. A loop is used to iterate through the array and perform calculations for each number.

The sum variable keeps track of the total sum of the numbers, and the count variable keeps track of the number of entries. After the loop, the average is calculated by dividing the sum by the count. Another loop is used to iterate through the array again, displaying each number and its difference from the average.

The difference is calculated by subtracting the average from each number. By implementing this logic, the program will allow the user to enter 20 numbers and display each number along with its difference from the average.

To learn more about program  click here

brainly.com/question/14368396

#SPJ11

Consider a datagram network using 8-bit host address. Suppose a router uses longest prefix matching and has the following forwarding table:

Prefix Match || Link Interface

10 || 0

11 || 1

110 || 2

For interface 2, what are the associated range of destination host addresses and the number of addresses in the range?

a. 11 000000 ~ 11 111111, there are 64 addresses

b. 110 00000 ~ 110 11111, there are 32 addresses

c. 10 000000 ~ 10 111111, there are 64 addresses

d. 110 00000 ~ 110 11111, there are 64 addresses

Answers

The associated range of destination host addresses and the number of addresses in the range is b) "11000000" to "11011111", and there are 32 addresses.

Based on the given forwarding table, the prefix "110" is associated with link interface 2.

To determine the range of destination host addresses and the number of addresses in the range for interface 2, we need to consider the longest prefix match.

In an 8-bit host address system, the destination host addresses are represented by 8 bits. The prefix "110" implies that the first three bits of the destination address must match "110" for the forwarding to interface 2.

The remaining 5 bits can be any combination of 0s or 1s.

Therefore, the associated range of destination host addresses for interface 2 is from "11000000" to "11011111".

The first three bits are fixed as "110", and the remaining five bits can take any value.

To calculate the number of addresses in this range, we need to consider that each bit has two possible values (0 or 1).

Since there are 5 variable bits in the range, the total number of addresses can be calculated as 2^5 = 32.

So, the correct answer is (b) 110 00000 ~ 110 11111, and there are 32 addresses in the range for interface 2.

For more questions on host addresses

https://brainly.com/question/29509736

#SPJ8

which part of a resume gives an account of past jobs and internships
Education
Experience
Skills
Reference

Answers

Answer:

experience. shows work history

Answer:

the answer is: Experience

The following algorithm accepts 3 integer values from the user, and then prints the maximum value entered. Some lines are missing.
Complete the program by inserting instructions after Line 4
1. OUTPUT (“Please enter 3 values. “)
2. Input (x, y, z)
3. MaxValue  x
4. IF y > MaxValue THEN
MaxValue  y

Answers

Answer:

1. OUTPUT (“Please enter 3 values. “)

2. Input (x, y, z)

3. MaxValue = x

4. IF y > MaxValue THEN

5. MaxValue = y

6. IF z > MaxValue THEN

7. MaxValue = z

8. OUTPUT("Maximum value is: ", MaxValue)

A summer camp organization sent a satisfaction survey to parents of children who attended one or more of their weekly camps. The survey indicated that a 5 meant "Very Satisfied", but the database was set up so that a 5 was coded as "Very Unsatisfied". What type of error has occurred? interviewer error frame error processing error selection error

Answers

The error that occurred in the database is a processing error. In this case, the survey indicated that a rating of 5 meant "Very Satisfied," but the database was set up to code a rating of 5 as "Very Unsatisfied." This discrepancy between the survey instructions and the coding in the database caused the processing error.

To elaborate, a processing error refers to a mistake or inconsistency that occurs during the data processing stage. In this scenario, the error was introduced when inputting the survey data into the database. The mistake was in the coding, where a rating of 5 was erroneously labeled as "Very Unsatisfied" instead of "Very Satisfied".

As a result, the data collected from parents may provide misleading information, as the interpretation of the ratings would be reversed. For example, a parent who rated their satisfaction level as 5, thinking it meant "Very Satisfied," would have their response coded as "Very Unsatisfied" in the database.
To know more about inconsistency visit:

https://brainly.com/question/11117561

#SPJ11

How can I search all columns of a table in SQL Server?

Answers

To search all columns of a table in SQL Server, you can use the LIKE keyword along with the wildcard character %. Here's the syntax:

sql

Copy code

SELECT *

FROM your_table

WHERE column1 LIKE '%search_value%'

  OR column2 LIKE '%search_value%'

  OR column3 LIKE '%search_value%'

  -- add more columns as needed

Replace your_table with the actual name of your table.

Replace column1, column2, column3, etc., with the names of the columns you want to search in.

Replace search_value with the value you want to search for.

The % wildcard character is used to represent any sequence of characters. Placing % before and after the search value ensures that it can match any part of the column value.

The LIKE keyword is used for pattern matching, allowing you to search for values that partially match the specified pattern.

By using the LIKE keyword with wildcard characters %, you can search all columns of a table in SQL Server for a specific value or pattern. This method allows you to perform a broad search across multiple columns, looking for matches in any part of the column values.

To know more about SQL visit

https://brainly.com/question/23475248

#SPJ11

Begin your research by brainstorming a list of skills,
interests, and demands.

Answers

Answer:

Teamwork.

Communication.

Flexibility.

Patience.

Time management.

Motivation.

Problem Solving.

Active Listening.

Explanation:

Why is the lack of a sense of humor a serious limitation for AI?

Answers

Answer:

they arent made to Express emotion? can you be a little more specific with the question?

If a network security professional wants to connect some computers in the same building without using a router, what
type of network is being used?
star topology
WAN
LAN
peer-to-peer

Answers

Answer:

Peer to peer

Explanation:

Answer:

peer-to-peer

Explanation:

2020 edge unit test

whay is typography ​

Answers

technique of arranging type to make make written language legible

Answer:

The style and appearance of printed matter. (source: Google)

Explanation:

It's an art form.

How does one select an entrepreneurial activity?

Answers

Entrepreneurial activities are those activities, the tasks and or functions of an entrepreneur. ... The second part can be answered by looking at the options of entrepreneurial activities, for instance is it marketing, selling the brand name, coming up with funds, etc.

Which of these signifies an ethical issue?
A.
An employee using workplace resources for personal work.
B.
A business restricting access to sensitive data.
C.
A company monitoring employees for the use of workplace resources.
D.
A manager allowing only some employees access to a restricted resource.

Answers

The statement which signifies an ethical issue is: A.  An employee using workplace resources for personal work.

What is an ethic?

An ethic can be defined as a set of both written and unwritten values, principles, or rules of moral conduct that guides human behaviors, especially based on what is:

Good or bad.Right or wrong.Just or unjust.Fair or unfair.

What is an ethical issue?

An ethical issue is most likely to occur when a given situation, activity or behavior creates a conflict with morally acceptable standards and principles within an organization or society.

In this scenario, an employee that use workplace resources for his or her personal work signifies an ethical issue because it contradicts the morally acceptable standards and principles of any business organization.

Read more on ethics here: https://brainly.com/question/502735

What kind of careers do you know about that are technology related?
son

Answers

Engineering ::::)))))
Software developer.
IT manager.
Web developer.
Database administrator.
Information security analyst.
Computer systems analyst.
Computer network architect.
Computer systems administrator.
Other Questions
need help 1-5 test please quick What are the barriers for older people and healthcareproviders to adapt to using telemonitoring model? When a system analyst is questioning everything. We callthat:attention to detailsimpertinenceimpartialityrelax constraints How to Have Your Cake & Negotiate Too1. Why don't the same negotiation tactics work for everyone?2. What are three actionable strategies that will empower you to lay the foundation for successful negotiations?3. How do corporate culture and the inner workings of an organization play into each employee's self-worth?4. What can companies do to help make their employees feel valued and rewarded for their work? Kroger's orders Louisiana Specialty Foods famous meat pies at a rate of 350 cases a month. The order cost, which includes transportation is $37.50. Annual holding costs ate $5.75 per case. The internal expense peripie is $2.59. Assume 250 days per year. Lead time is 3 days. a. Determine the EOQ b. What is the average inventory? c. Determine the number of orders per yeat d. Determine total inventory-related costs per year e. What is the total cost, including the cost of the ples? f. What if Kroger's decided to reduce the ordering of the ples to 190 cases very time they placed an order, what impact would if have on ordering costs? A block of concrete has a density of 9 kg/m^3 and a volume of 210 000 cm^3 What is its mass A family of two adults and three children went to a water park. Admission to the water park costs $18 per person. Nora used the expression 2 (18) + 3 (18) to model the total cost for the family, and Alex used the expression 5 (18). Which property of operations makes both of their expressions correct? Calculate the solubility of mg(oh)2 in 0. 50m nh4cl Materials issued for the current month are as follows:Requisition No. Material Job No. AmountAluminum 201 500 $88,700Plastic 202 503 27,600Rubber 203 504 3,650Glue 204 Indirect 2,250Steel 205 510 38,750Journalize the entry on Dec. 31 to record the issuance of materials.Work-in-Process:When materials are used on a given job they are transferred to the work-in-process account of that job number. This represents costs that have been incurred for jobs that have not been yet completed by the company. Question 1Order the following steps of the Strategic Risk AssessmentProcess1. Implement the enterprise risk management action plans2. Communicate the strategic risk profile and action plans3. Dev Toy wil receve $8678 at the end of Year 2 . At the end of the following two years, he will receive $8260 and $2665, reipectively. What is the futiare value of these canh flows at the end of Year 6 if the miterest rate is 4 percent? iDo not round intermediate calculations and round your answer to 2 decinal places, e.f.. 32.15.) 65333445+76567*656667+9998088-98765666*765-876533=answer asap plz giving brainliest which of the following is true of a cave automatic virtual environment (cave)?a. it is environmentally friendly and produces green energy systems.b. it consists of a cube-shaped room in which the walls are rear-projection screens.c. it is developed to make computers faster and smaller, with more memory.d. it consists of white modules arranged in a grid on a black background. all of the following are ways the body can regulate fluid balance, except which one? group of answer choices by pumping sodium out of cells and potassium into cells by decreasing urine output from the kidneys by signaling the thirst mechanism by moving water in and out of cells Knowing how to classify accounts is a key piece of accounting knowledge. Reading a financial statement in today's business world is not limited to accounting personnel. Anyone involved with making business decisions must have a firm grasp of the parts of financial statements. Use the Internet to find the published financial statements for a company that you enjoy doing business with. What are its current assets? Current liabilities? What information is listed for its property, plant, and equipment? What are some other interesting facts and figures in its financial statements? Write one well-written paragraph PVC is a banned material on an LBC building project. Group ofanswer choices True False B. Write 'T' for true and 'F' for false.1. Deforestation leads to desertification.2. Cutting of trees does not affect the soil layer.3. Endemic species can be found anywhere in the world.4. The red data book contains list of endangered species.5. Extinct species are those which do not exist on Earth anymore. molality of 0.465 mol/kg. when the temperature of this solution is 100oc, what is its vapor pressure? Kinga Doll Company manufactures eight versions of its popular girl doll, Shari. The company operates on a 40 -hour workweek. The eight versions differ in doll skin, hair, and eye color, enabling most children to have a doll with a similar appearance to them. It currently sells an average of 4,000 dolls (spread equally among its eight versions) per week to boutique toy retailers. In simplified terms, doll making at Kinga involves three basic operations: molding the body and hair, painting the face, and dressing the doll. Changing over between versions requires setup time at the molding and painting stations due to the different colors of plastic pellets, hair, and eye color paint required. Table 7.5 lists the setup times for a batch and the activity times for each unit at each step. Process Step Molding Painting DressingSetup time(min) 15.00 30.00 No setupProcessing time(min) 0.25 0.15 0.30a. What is the process capacity in dolls per hour with a batch size of 500 dolls? dolls per hour (Round your answer to 2 decimal places.) b. What is the utilization of molding in dolls per hour with a batch size of 800 dolls? _______% c. Which batch size would minimize inventory without decreasing the process capacity? _____ dolls per batch (Round your final answer to nearest whole number.) d. Which batch size would minimize inventory without decreasing the current flow rate? _______dolls per batch Andretti Company has a single product called a Dak. The company normally produces and sells 84.000 Daks each year a price of $58 per unit. The company's unit costs at this level of activity are given below Direct materials $8.50 Direes labor 10.00 2.30 Variable manufacturing overhead Fland manufacturing overhead Variable selling expenses Find selling expenses 7.00 15500,000 2.70 3.90 (5253,000 total) Tutal cost per unit A number of questions relating to the production and sale of Daks follow. Each question is independent Required: 1-a. Assume that Andretti Company has sufficient capacity to produce 105.000 Daks each year without any increase in fixed manufacturing overhead costs. The company could increase its unit sales by 25% above the present 84.000 units each year if it were willing to increase the fixed selling expenses by $140,000. What is the financial advantage (disadvantage) of investing an additional $140,000 in fixed selling expenses? 1-b. Would the additional investment be justified? 2. Assume again that Andretti Company has sufficient capacity to produce 105.000 Daks each year. A customer in a foreign market wants to purchase 21,000 Daks. If Andretti accepts this order it would have to pay import duties on the Daks of $4.70 per unit and an additional $10.500 for permits and licenses. The only selling costs that would be associated with the order would be $2.30 per unit shipping cost. What is the break-even price per unit on this order? 3. The company has 500 Daks on hand that have some irregularities and are therefore considered to be seconds. Due to the irregularities, it will be impossible to sell these units at the normal price through regular distribution channels. What is the unit cost figure that is relevant for setting a minimum selling price? 4. Due to a strike in its supplier's plant, Andretti Company is unable to purchase more material for the production of Daks. The strike is expected to last for two months. Andretti Company has enough material on hand to operate at 25% of normal levels for the two-month period. As an alternative, Andretti could close its plant down entirely for the two months If the plant were closed, fixed manufacturing overhead costs would continue at 30% of their normal level during the to-month period and the fixed selling expenses would be reduced by 20% during the two-month period. a How much total contribution margin will Andretti forgo if it closes the plant for two months? b. How much total feed cost will the company avoid if it closes the plant for two months? c. What is the financial advantage (disadvantage) of closing the plant for the two-month period? d. Should Andretti close the plant for two months? Check my work period. AS overhead costs would continue at 30% of reduced by 20% during the two-month period. a. How much total contribution margin will Andretti forgo if it closes the plant for two months? b. How much total fixed cost will the company avoid if it closes the plant for two months? c. What is the financial advantage (disadvantage) of closing the plant for the two-month period? d. Should Andretti close the plant for two months? 5. An outside manufacturer has offered to produce 84,000 Daks and ship them directly to Andretti's customers. If Andretti Company accepts this offer, the facilities that it uses to produce Daks would be idle, however, fixed manufacturing overhead costs would be reduced by 30%. Because the outside manufacturer would pay for all shipping costs, the variable selling expenses would be only two- thirds of their present amount. What is Andretti's avoidable cost per unit that it should compare to the price quoted by the outside manufacturer? Complete this question by entering your answers in the tabs below. Reg 1A Reg 18 Reg 2 Req 3 Reg 44 to 40 Req 40 Req S Assume that Andretti Company has sufficient capacity to produce 105,000 Daks each year without any increase in fixed manufacturing overhead costs. The company could increase its unit sales by 25% above the present 84,000 units each year if it were willing to increase the fixed selling expenses by $140,000. What is the financial advantage (disadvantage) of investing an additional $140,000 in fixed selling expenses? Show less A advantage Req 18 >