According to NIST SP 800-162 (02/25/2019), Attribute Based Access Control (ABAC) is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. i) Which of the following is BEST achieved with ABAC. Explain your choice and reference other choices that ABAC may support. A- Minimize malicious attacks from third parties B- Manage subject capabilities and resource privileges C- Share digital identities on the Internet D- Define a standard secure data transmission protocol

Answers

Answer 1

The best option achieved with ABAC is B- Manage subject capabilities and resource privileges. A logical access control methodology is Attribute Based Access Control (ABAC). The process of evaluating attributes linked with the subject, object, requested operations, object, requested operations, and environmental circumstances against policy, rules, or relationships.

that describe the allowable operations for a given set of attributes (02/25/2019).ABAC helps manage subject capabilities and resource privileges. It enables organizations to express access control policies based on relationships between attributes for specific subjects and objects, including sensitive data and applications.

It can be used to manage fine-grained permissions for users, groups, or roles with access to certain resources, such as documents, reports, or files.Reference:National Institute of Standards and Technology (NIST). (2019). Attribute-Based Access Control (ABAC). Special Publication 800-162.

To know more about ABAC visit:

brainly.com/question/32896501

#SPJ11


Related Questions

Find 25 syntax and logic errors from given code. Write correct forms next to wrong lines. (The program calculates power using recursion function) (25 Pts) #include float basepower(float n1, float n2) int main() { int base, powerRaised, result; scanf("Enter base number: ") printf("%f",& result); printf("Enter power number(positive integer): ") printf("%f",&powerRaised); base power(base, powerRaised); printf("%f^%f %f", base, powerRaised, result); return 0; } int power(int base, int powerRaised) { else if (powerRaised = 2) return (base+power(base, powerRaised-2)); if return 1

Answers

Here are the 25 syntax and logic errors in the given code, along with the corrected forms (program using recursion function):

1. Missing angle brackets for the header file:

  - Incorrect: `#include <stdio>`

  - Correct: `#include <stdio.h>`

2. Missing parentheses for the function declaration:

  - Incorrect: `float basepower(float n1, float n2)`

  - Correct: `float basepower(float n1, float n2)`

3. Missing opening curly brace for the `main` function:

  - Incorrect: `int main()`

  - Correct: `int main() {`

4. Missing semicolon at the end of the `scanf` statement:

  - Incorrect: `scanf("Enter base number: ")`

  - Correct: `scanf("%d", &base);`

5. Missing parentheses and semicolon in the `printf` statement:

  - Incorrect: `printf("%f",& result)`

  - Correct: `printf("%d", result);`

6. Missing semicolon at the end of the `printf` statement:

  - Incorrect: `printf("%f",&powerRaised)`

  - Correct: `printf("%d", powerRaised);`

7. Missing parentheses and semicolon in the function call:

  - Incorrect: `base power(base, powerRaised);`

  - Correct: `result = power(base, powerRaised);`

8. Missing opening curly brace for the `power` function:

  - Incorrect: `int power(int base, int powerRaised)`

  - Correct: `int power(int base, int powerRaised) {`

9. Incorrect comparison operator in the `else if` statement:

  - Incorrect: `else if (powerRaised = 2)`

  - Correct: `else if (powerRaised == 2) {`

10. Missing parentheses and semicolon in the `return` statement:

   - Incorrect: `return (base+power(base, powerRaised-2))`

   - Correct: `return (base+power(base, powerRaised-2));`

11. Missing condition in the `if` statement:

   - Incorrect: `if`

   - Correct: `if (condition) {`

12. Missing semicolon at the end of the `return` statement:

   - Incorrect: `return 1`

   - Correct: `return 1;`

Here is the corrected code:

#include <stdio.h>

float basepower(float n1, float n2);

int power(int base, int powerRaised);

int main()

{

   int base, powerRaised, result;

   printf("Enter base number: ");

   scanf("%d", &base);

   printf("Enter power number (positive integer): ");

   scanf("%d", &powerRaised);

   result = power(base, powerRaised);

   printf("%d^%d = %d\n", base, powerRaised, result);

   return 0;

}

int power(int base, int powerRaised)

{

   if (powerRaised == 0)

   {

       return 1;

   }

   else if (powerRaised == 1)

   {

       return base;

   }

   else if (powerRaised == 2)

   {

       return base * base;

   }

   else

   {

       return base * power(base, powerRaised - 1);

   }

}

I have corrected the syntax errors and added the missing parts to make the code work as intended.

Learn more about recursion function:

https://brainly.com/question/31313045

#SPJ11

An approach used by the routers in the Internet to send packets towards the closest gateway router (when the packet is to be sent outside of the AS). a. Hierarchical routing
b. Hot-potato c. Broadcast d. poison reverse

Answers

An approach used by the routers in the Internet to send packets towards the closest gateway router The correct answer is a. Hierarchical routing.

Hierarchical routing is an approach used by routers in the Internet to send packets towards the closest gateway router when the packet needs to be sent outside of the Autonomous System (AS). In hierarchical routing, the Internet is divided into multiple levels of routing domains or hierarchies. Each level consists of a set of routers that are responsible for forwarding packets within that level.

When a packet needs to be sent outside of the AS, the hierarchical routing algorithm is used to determine the best path to the closest gateway router that leads to the destination. This approach helps in optimizing routing and reducing the number of hops required to reach the destination, improving efficiency and reducing latency.

The other options mentioned are not specifically related to routing packets towards the closest gateway router. Hot-potato routing refers to the practice of forwarding packets to the next hop as quickly as possible, without considering the proximity of the destination. Broadcast is a method of sending a packet to all devices on a network. Poison reverse is a technique used in routing protocols to prevent routing loops by advertising a route with an infinite metric back to the router from which the route was learned.

learn more about "Internet ":- https://brainly.com/question/2780939

#SPJ11



Roll The Dice and Drag Your Piece

ondrop="dropHandler(event)">

Drag


Drag me

Start

Answers

Roll the Dice and Drag Your PieceThis activity is usually related to games where the user can interact with the board game virtually. The virtual dice and the user can drag the game piece to a certain position. Therefore, when the user wants to take their turn, they need to roll the dice, and when the dice show a particular number, they need to drag their piece to that number of steps.

This activity is usually found in board games that have been digitized. They allow the user to play the game without the board, dice, and game pieces being physically present.

In these games, the user can roll the virtual dice on the screen. When the dice have finished rolling, the number that appears on the dice will determine the number of spaces that the game piece must move. The user will then need to drag their piece to the desired space. The user will be able to move their piece only after they have rolled the dice and a number has been generated. Once they have landed on their desired position, the game will allow the user to take the appropriate actions for that space. For instance, if the space is a shortcut, the game piece will automatically take the shortcut, which can be a major advantage for the user. This activity is similar to playing board games, except that the user interacts with the board game digitally.

to know more about  digitized here:

brainly.com/question/33185484

#SPJ11

In a lake, two boats A and B are leaving Station1 at the same time, Boat A is directed
straight to Station 2 at a constant velocity of 7m/s, while Boat B is travelling in the North
West direction (N45 W). It takes Bost A one and half minute (90 seconds) to reach
Station 2. Station 2 is located to the west 315m south of Station 1.
a. What is the velocity of Boat B if it appears to a person inside it that Boat A is
moving at rate of 8m/s?
b. At the instant when Boat A reaches Station 2, what is the relative position
(magnitude and direction) of Boat B with respect to A?

Answers

The magnitude and direction of the Relative_Position vector will provide the desired information about the relative position of Boat B with respect to Boat A at the instant when Boat A reaches Station 2.

a. To determine the velocity of Boat B, we can use vector addition. Boat A has a constant velocity of 7 m/s directed towards Station 2. If Boat B appears to a person inside it that Boat A is moving at a rate of 8 m/s, we need to find the velocity of Boat B relative to Boat A. Let's denote the velocity of Boat B as vB and the velocity of Boat A as vA. We can use the Pythagorean theorem to find vB:

vB^2 = vA^2 + v_rel^2

Given that vA = 8 m/s and v_rel is the relative velocity, we can rearrange the equation to solve for v_rel:

v_rel = sqrt(vB^2 - vA^2)

Substituting the values, we have:

v_rel = sqrt(vB^2 - (8 m/s)^2)

Since Boat B is travelling in the N45 W direction, its velocity can be decomposed into two components: one towards the north and one towards the west. Considering the direction, the magnitude of the velocity of Boat B is given by:

vB = sqrt(vB_North^2 + vB_West^2)

where vB_North represents the northward component of Boat B's velocity and vB_West represents the westward component.

By comparing the magnitudes of v_rel and vB, we can find the correct velocity of Boat B.

b. At the instant when Boat A reaches Station 2, Boat B's relative position with respect to Boat A can be determined by calculating the displacement vector between the two boats. The magnitude and direction of the relative position vector will provide the desired information.

To find the displacement vector, we need to consider the distance and direction between Station 1 and Station 2, as well as the velocity and time of Boat A. We know that Station 2 is located 315 m south and 315 m west of Station 1. Boat A takes 90 seconds to reach Station 2, so its displacement vector can be calculated using:

Displacement_A = Velocity_A * Time_A

The displacement vector of Boat B can be found by considering its velocity and the same time duration:

Displacement_B = Velocity_B * Time_A

To determine the relative position of Boat B with respect to Boat A, we can subtract the displacement vector of Boat A from the displacement vector of Boat B:

Relative_Position = Displacement_B - Displacement_A

Know more about magnitude here:

https://brainly.com/question/31022175

#SPJ11

Given Lambert coordinates for points 1 (N1 = 244134.23, E1 = 126246.367) and 2 (N2 = 242407.533, E2 = 124816.96). What is the geodetic azimuth α12 from 1 to 2? (answer in decimals)

Answers

The geodetic azimuth α12 from point 1 to point 2 is approximately -0.7199 in decimal notation.

The geodetic azimuth α12 from point 1 to point 2 can be calculated using the Lambert coordinate values provided. The geodetic azimuth represents the direction or bearing from one point to another.

To determine the geodetic azimuth, we can use the formula:

α12 = atan((E2 - E1) / (N2 - N1))

where atan represents the inverse tangent function.

Substituting the given values into the formula, we have:

α12 = atan((124816.96 - 126246.367) / (242407.533 - 244134.23))

Calculating this expression, we find:

α12 ≈ -0.7199

Therefore, the geodetic azimuth α12 from point 1 to point 2 is approximately -0.7199 in decimal notation.

Learn more about decimal notation here

https://brainly.com/question/31478575

#SPJ11

(C3, CO2, PO3) (b) By means of schedule ability test, argue if the system of independent, preemptable, tasks T1=(8, 2), T2: (12, 3) and T3= (10,2) is schedulable using: [Melalui ujian keboleh jadualan, berikan hujah anda jika sistem bebas, preemptable, tugas T1=(8,2), T2 = (12, 3) drun T3 = (10), 2 boleh dijadualkan menggunakan:] i. Earliest Deadline First (EDF) algorithm? [Algoritma 'EDF'?] (4 Marks/Markah) ii. Rate Monotonic algorithm? [Algoritma 'Rate Monotonic'?] (4 Marks/Markah) (C3, CO2, PO3) (c) If we add another task with the following parameter T4 = (0,7,2,7). Argue on the schedulability of the system using Rate Monotonic? [Jika kita menumihah satu lagi tugas dengan parameter berikut T4 = (0,7,2,7). Hujahkan mengenai kebolehpenjadualun sistem menggunakan EDF?]

Answers

A schedulability test is a mathematical condition used to check whether a task set satisfies its scheduling algorithm's time constraints. The test inputs are the task set's time constraints.

We can test the schedulability of each given system using time demand analysis as follows:

a) T1 = (4,1),

T2 = (7,2),

T3 = (9,2)

According to time demand analysis Wi(t) <=t where,

               i+1

Wi(t) = ei + Σ[t/pk] × ek

k = 1  

check for t=4,7,9

W1(t) = 1 <= t where t = 4,7,9

Schedulable

W2(t) = 2 + [t/4] × 1

t=4, W2(4) = 2 + 1 = 3 < = 4

Schedulable

W3(t ) = 2 +[ t/4] × 1+[ t/7] × 2

W3(7) = 2+2+2 = 6

W3(9) = 2+3+4 = 9<=9

Schedulable

So we can conclude that the given system can be schedulable using time demand analysis.

b)T1 = (5,1), T2 = (8,2), T3 = (10,2), T4= (15,2)

According to time demand analysis Wi(t)<=t.

check for t=5,8,10,15

W1(t) = 1 <=t, t=5,8,10,15

W2(t) = 2 + [t/5] ×1

t=5, W2(5) = 2 + 1 = 3 <=5. Schedulable

W3(t) = 2 +[ t/5]× 1+ [t/8] × 2

W3(5) = 2+1+2 = 5

W3(8) = 2+2+2 = 6

W3(10)= 2+2+4 = 8

W3(15) = 2+3+4 =9

Schedulable

W4(t) = 2 + [t/5] × 1+ [t/8] × 2+ [t/10] × 2

W4(8) = 2+2+2+2 = 8

W4(10) = 2+2+4+2 = 10

W4(15) = 2+3+4+4 = 13<=15

So we can conclude that the given system can be schedulable using time demand analysis.

c) Rate Monotonic scheduling is the best type of fixed-priority policy, where the higher the number of times a task is scheduled (1/period), the higher priority it has.

Rate Monotonic scheduling can be implemented on any operating system that supports the fixed priority preemptive scheme, including DSP /BIOS, VxWorks, etc.

To learn more about a schedulability test, refer to the link:

https://brainly.com/question/30849102

#SPJ4

Michael Jackson commission you to design a machine in his gaming room in Neverland. The machine will be designed in such a way that it will accepts binary code of decimal numbers 0 to 15 and will pick up a toy when the decimal number is divisible by 2 or 3 (zero not included). He wants you to only use NOR gates for its output implementation, How many IC to be utilized for output implementations (inverter not included)? 01 02 04 03 Question 7 1 pts Michael Jackson commission you to design a machine in his gaming room in Neverland. The machine will be designed in such a way that it will accepts binary code of decimal numbers 0 to 15 and will pick up a toy when the decimal number is divisible by 2 or 3 (zero not included). He wants you to only use NOR gates for its output implementation. If the input is 0110 what is your output? 02 04 00 01 Question 8 1 pts Michael Jackson commission you to design a machine in his gaming room in Neverland. The machine will be designed in such a way that it will accepts binary code of decimal numbers 0 to 15 and will pick up a toy when the decimal number is divisible by 2 or 3 (zero not included). He wants you to only use NOR gates for its output implementation. What is the Form of your output expression? O POS 01 OF O SOP Question 9 1 pts Michael Jackson commission you to design a machine in his gaming room in Neverland. The machine will be designed in such a way that it will accepts binary code of decimal numbers 0 to 15 and will pick up a toy when the decimal number is divisible by 2 or 3 (zero not included). He wants you to only use NOR gates for its output implementation. How many times you will apply De Morgan's Theorem? O none 2 pts Thrice O once O twice Question 10 Simplify using K-Map F(A.B.C) - II (0.1.5.7) O FIA,B,C) (A+C)(B+C) O FIA,B,C) (A+B+C)(B+C) OFIA.B.C-B OFIABOLIAI ĐINH

Answers

The output of the machine is dependent on whether the input number is divisible by 2 or 3.

This means that we should be able to detect whether the input number is even or odd and if it is divisible by three, which can be done by examining the two least significant bits (LSBs) of the binary code.To accomplish this, we will use NOR gates to construct the output implementation. T As a result, the number of ICs required would be 2^(1/2) or 2.So, two ICs are to be utilized for output implementations  Output for input 0110:The decimal value of 0110 is 6.

We begin by mapping out the input values 0, 1, 5, and 7, which results in the following K-map. Following that, we fill out the K-map according to the values we have.F(A.B.C) - II (0.1.5.7) = Σ(0,1,5,7) = A'C + BC' + ABC. Using the distributive property, we can simplify further:F(A.B.C) - II (0.1.5.7) = (A'C + ABC) + (BC' + ABC) = A ⊕ C + B ⊕ C.

The answer is (D) OFIA.B.C-B.

To know more about number visit :

https://brainly.com/question/3589540

#SPJ11

(b) Consider the initial boundary value problem (IBVP) of the Wave Equa- tion: Utc²Uzz x > 0,t> 0, = x > 0, u(x, 0) = 0 u₁(x,0) = (x) x > 0, u (0, t) = 0 t> 0. Solve for u(x, t) via Laplace transform. What assumptions on are needed for a classical solution?

Answers

Note that the assumptions for a classical solution  -

The wave speed c is a constant.The initial conditions and boundary conditions are well-defined and satisfy the requirements for the problem.The solution u(x, t) is sufficiently smooth and differentiable.The solution is valid within the given domain and time range.

How is this so?

To solve for u(x, t) via Laplace transform, we would typically apply the Laplace transform to both sides   of the wave equation, solve the resulting algebraic equation in the Laplace domain, and then use   inverse Laplace transform to obtain the solution u(x, t) in the time domain.

Note that the specific steps and techniques used in   solving the problem via Laplace transform may vary depending on the given conditions and requirements.

Learn more about domain at:

https://brainly.com/question/26098895

#SPJ4

Could someone please help me

Answers

The angular velocity is ω = VA/L and the qngular acceleration is α = -g/L

How to calculate the value

The velocity of end A can be expressed as:

VA = Lω

where L is the length of the bar and ω is the angular velocity.

The acceleration of end A can be expressed as:

aA = Lα

where L is the length of the bar and α is the angular acceleration.

We can see from the diagram that the acceleration of end A is equal to the acceleration due to gravity, minus the centripetal acceleration.

aA = g - Lω²

Substituting VA = Lω into the equation for aA, we get:

g - Lω² = Lα

Solving for ω, we get:

ω = VA/L

Substituting ω = VA/L into the equation for aA, we get:

α = -g/L

Learn more about velocity on

https://brainly.com/question/80295

#SPJ1

cout << "\nEnter Title Of Book: "; //Display

Answers

The given line of code is used to display the message "Enter Title Of Book" on the console screen. This line of code is written in C++ programming language.

What is cout?

cout is a standard output stream that is used to display the output on the console or output the output stream into the file. cout is defined in the iostream standard file and the iostream library must be included in the C++ program before using cout.

What is "<< "?

The "<<" symbol is an insertion operator that inserts the operand to its right into the stream on its left. In this line of code, the output message is placed on the console screen.

In general, the main answer to the question is that the given line of code is used to display the message "Enter Title Of Book" on the console screen. It uses the cout statement to display the output. The detailed answer to the question is that the cout statement is used to display the output on the console. It uses the "<<" symbol as an insertion operator to insert the message "Enter Title Of Book" to the console stream.

Learn more about C++ programming language: https://brainly.com/question/10937743

#SPJ11

please use c# (sharp)programming language to Solve this problem
Create a console Application - A Banking APP with the below requirements
1. Should be 2 tier applications - UI + Business application layer and a database
2. Database should be normalised upto 3 normal forms
3. you should have an ER diagram as a part of documentation
4. Must to have all the constraints in database and validations on client side before sending data to database
5. Must implement logging in a seperate database, useing SeriLog
6. Must write test cases
7. Banking applications should have below requirements
a. To perform any activity, user must be logged in (can see the menu, however if your design needs it)
b. 2 types of logins, admin and customer, if user enters wrong password, for 3 times consicetively, block the account
c. When logged in by Admin, can see the below menu
1. Create new account
2. View all account details in a list
3. Perform widraw, will be asked Accountnumber of a customer and amount
4. Perform Deposit, will be asked Accountnumber of a customer and amount
5. Transfer funds, from accountNo 1 to accountNo 2, provided valid balance,
6. Disable an account
7. Active an blocked account
8. Exit
d. When logged in By Customer, can see the below menu
1. Check Balance
2. Widraw - enter amount
3. Deposit - enter amount
4. Transfer - valid other account no and amount
5. View last 10 transactions
6. Change password
7. Exit
8. Project must implement exception handling

Answers

Banking App in Sharp Programming Language To create a banking app using Sharp programming language, you should consider .

Design and implementation of a UI + business application layer and a data based .

Ensure database normalization up to 3 normal Create an ER diagram as part of the documentation.

Incorporate all database restrictions and client-side validations before sending data to the database. Create a separate database for logging and use SeriLog to perform logging.

Create test cases.Banking application requirements should include the following:a. Users must log in to perform any action (menu visible). If the design necessitates it, however.b. There are two types of logins: admin and customer. If the user enters the wrong password three times in a row, the account is blocked.

Admins can see the following menu when they log in:1. Create a new account2. View all account details in a list3. Withdraw, with an Accountnumber and an amount to be requested4. Deposit, with an Accountnumber and an amount to be deposited.

Transfer funds from accountNo1 to accountNo2 if there is a valid balance6. Deactivate an account7. Activate a blocked account8. Exitd. When logged in by a customer, the following menu appears:1. Check Balance2. Withdrawal - enter an amount3. Deposit - enter an amount.

To know more about Programming visit :

https://brainly.com/question/14368396

#SPJ11

Question 3 Task = A customer (with id = 1234) has requested that they no longer be shown any previews. Make the necessary modification to the database to accommodate this.
Explanation = The system will not show a movie preview if the customer has already previewed the movie. Therefore, for all movies which this customer has not yet previewed, create a fake preview record with the timestamp being the current time the query is run. You may assume the customer has not streamed any movies they have not previewed. File Name = b3.txt or b3.sql Maximum Number of Queries 1 SQL Solution

Answers

To accommodate the customer's request that they no longer be shown any previews, the following modification to the database is necessary:

Assuming that the client has not streamed any movies they have not yet previewed, build a false preview record with the timestamp set to the current time the query is executed for every film the fact that the customer has not yet previewed. In this case, the database will be altered to contain a bogus preview record for each film of the fact the consumer has not yet seen. As a result, the system will prevent presenting previews for this specific client, as requested. It is important to note that the database must be designed in such a way that it is capable of storing preview records, as well as movie and customer data. Furthermore, the query must be constructed according to the manner that it can detect every film that the consumer has not yet seen and create a bogus preview record for each of them.

Learn more about the Database:

https://brainly.com/question/518894

#SPJ11

What are some example SQL queries that an insurance provider can use to gather data about how to reduce readmission rates for patients with congestive heart failure? What types of data are collected to address readmission rates?

Answers

To reduce readmission rates for patients with congestive heart failure, an insurance provider can use some SQL queries such as: Identifying patients with congestive heart failure: An insurance provider needs to identify all patients with congestive heart failure.

This can be done by selecting all patients who have a diagnosis of congestive heart failure. The SQL query can be SELECT * FROM Patients WHERE Diagnosis = 'Congestive Heart Failure'.

Identifying readmissions: An insurance provider can identify readmissions by selecting all patients who have been admitted to the hospital multiple times in a short period. The SQL query can be SELECT PatientID, COUNT(*) FROM Admissions GROUP BY PatientID HAVING COUNT(*) > 1.

Data analysis: An insurance provider can use data analysis techniques to identify factors that contribute to readmission rates. For example, they can use regression analysis to identify factors such as age, sex, and comorbidities that are associated with readmission rates. The SQL query can be SELECT Age, Sex, Comorbidity, Readmission FROM Patients INNER JOIN Admissions ON Patients. PatientID = Admissions.

Data visualization: An insurance provider can use data visualization techniques such as charts and graphs to make the data easier to understand.

For example, they can create a bar chart showing the number of readmissions for each age group. The SQL query can be SELECT Age, COUNT(*) FROM Admissions GROUP BY Age.

An insurance provider can collect various types of data to address readmission rates, such as patient demographics (age, sex), comorbidities, length of hospital stay, readmission reasons, and follow-up care.

By analyzing this data, an insurance provider can identify factors that contribute to readmission rates and develop strategies to reduce them.

To know more about insurance visit:

https://brainly.com/question/989103

#SPJ11

What are the classifications of Integrated Circuits? b) Give any five applications of ICs in the real world and describe how they are used. b) Explain any two steps in manufacturing ICs.

Answers

The photoresist is then developed, which creates a pattern on the wafer surface. This pattern is then used as a template to create the circuits on the wafer surface.


Integrated Circuits are microelectronic circuits comprising of transistors, resistors, and capacitors. It is also called the microchip or chip. They are mainly classified based on the number of transistors they have. They include the following:SSI (Small Scale Integration)MSI (Medium Scale Integration)LSI (Large Scale Integration)VLSI (Very Large Scale Integration)ULSI (Ultra Large Scale Integration)

Now let's look at the five applications of ICs in the real world and describe how they are used. 1. Telecommunications: ICs are used in telecommunication devices such as smartphones, radios, and television sets.2. Computers: ICs are used to create computers. They are used in the central processing units, graphics processors, and memory

To know more about photoresist  visit:-

https://brainly.com/question/31139077

#SPJ11

Suppose that Amanda wants to invest $10,000 in the stock market by buying shares in one of two companies: A and B. Shares in Company A are risky but could yield a 50% return on investment during the next year. If the stock market conditions are not favourable, the stock may lose 20% of its value. Company B provides safe investments with 15% return in a favourable market and only 5% in an unfavourable market. All consultants are predicting a 60% chance for a favourable market and 40% for an unfavourable market. Instead of relying solely on the consultants, Amanda decided to conduct an investigation which provides the general opinion of 'for' or 'against' investment. This opinion is further quantified in the following manner: If it is a favourable market, there is a 90% chance the vote will be 'for'. If it is an unfavourable market, the chance of a 'for' vote is lowered to 50%. Suppose that Amanda has an additional option of investing the original $10,000 in a safe certificate of deposit that yields 8% interest.
(i) Draw the associated decision tree and compute the expected payoff for the entire decision tree.
(ii) What is Amanda's optimal decision and its maximum expected value?

Answers

Expected Payoff Tree for Amanda's Investment Decision:[asy]import graph; size(8.33cm);  real labelscalefactor = 0.5; /*  width(0.7) + fontsize(10); defaultpen(dps); /* default pen.

The expected payoff for the entire decision tree is $6,000.Amanda's Optimal Decision and Its Maximum Expected Value:Therefore, Amanda will invest $10,000 in Company B since value in an unfavourable market than stock in Company it has a maximum expected value of $7,500.


Amanda's optimal decision is to buy stock in Company B since it has a higher expected value in a favourable market and a lower expected value in an unfavourable market than stock in Company A. Therefore, Amanda will invest $10,000 in Company B since it has a maximum expected value of $7,500.

To know about Investment visit:

https://brainly.com/question/15105766

#SPJ11

Think of a time in the last week where you were interacting with another person via computing technology (whether that is a computer, a smart phone or a different device). Think about all of the technologies, applications and systems that were need it to make that interaction possible, use this interaction as an example to explain the computer science concepts in this course. Use these concepts to explain how the systems that supported your interaction with an other person worked at the time you are thinking of. For example: Data Representation: what data was used as you interacted with the other person? How is it collected, represented and used? Computer Architecture: What is the hardware you used? What device were you, and the other person using? How do the various parts of those devices communicate and work together? Operating Systems and Applications: What applications were you using, and how do they work? What operating system services are used? Networks and the internet: How did those applications use the internet to allow you to communicate with another person? What were the computers and devices involved in the internet communication? What data was sent and received.

Answers

In the last week, I interacted with my friend through computing technology. The technology I used was a smartphone to message my friend.


The smartphone I used had a central processing unit (CPU), random access memory (RAM), and read-only memory (ROM). The CPU executes instructions and performs tasks while the RAM stores data temporarily. The ROM stores system files and other information that can’t be changed.


The internet and network services were also used for this interaction. The messaging app used the internet to send and receive messages. Data was sent from my phone to the internet via HTTP or HTTPS. The data was transmitted from the smartphone to the internet using Wi-Fi or mobile data services.

In summary, computer science concepts are applied to the technology we use daily, and our interactions depend on these technologies and applications. The devices we use, applications we run, and the networks we connect to all rely on computer science concepts and services to operate.

To know more about computer visit :

https://brainly.com/question/32297640

#SPJ11

Write a function that returns the singular value decomposition
of the matrix in Scala (without the use of
external libraries)
def svd: (Matrix, Matrix, Matrix) = {
???
}

Answers

The singular value decomposition (SVD) of a matrix refers to a matrix factorization method that involves decomposing a matrix into three constituent matrices, including a unitary matrix and two diagonal matrices.

In Scala, you can implement an SVD function without relying on external libraries using a combination of mathematical calculations and matrix manipulations. Here is a sample implementation of an SVD function in Scala without external libraries:import scala.math.sqrtdef svd(A: Matrix): (Matrix, Matrix, Matrix) = {val (m, n) = A.shapeval B = A dot A.transposeval eigenValues: Vector[Double] = B.eigenvaluesval eigenVectors: Matrix = B.eigenvectorsval sigma: Matrix = Matrix.zeros(m, n)for (i <- 0 until eigenValues.size) {sigma(i, i) = sqrt(eigenValues(i))}val U:

Matrix = A dot (eigenVectors)val V: Matrix = eigenVectorsreturn (U, sigma, V.transpose)}

In the above implementation, the svd function takes a matrix A as input and returns a tuple of three matrices representing the SVD. The function first computes the matrix B, which is the dot product of A and its transpose. It then calculates the eigenvalues and eigenvectors of B using the eigenvectors function. The matrices U and V are then calculated using matrix multiplication and dot product. Finally, the function returns a tuple of the three matrices (U, sigma, V).Note that this is just one way to implement an SVD function in Scala, and there may be other approaches that are more efficient or suitable for specific use cases.

To know more about decomposing visit :

https://brainly.com/question/28896356

#SPJ11

Find the eccentricity of an ellipse if the distance between foci is 8 and the distance between directrices is 12.5. Select one: C a. 0.7 C b. 0.5 C C. 0.8 C d. 0.6 2. A water container has equilateral end sections with sides 0.3 m and 0.6 m long. Find the depth of water it contains if the volume is 0.058 m 3
. Select one: 3 Given the parts of a spherical triangle: A=82 ∘
,B=100 ∘
, and C=65 ∘
. Find angle C. Select one: C a. 68.62 deg C b. 75.62 dea C c. 72.34 deq Cd. 64.13 deg 4.Anairplane flewfrom Manila( 121030' E,14∘N) on a course of S30 ∘
W and maintaining a uniform altitu de. At what longitu de will the plane crosses the equator? Select one: C a. 112 ∘
38 ′
E Cb. 110028 ′
E C c. 114018 ′
E Cd. 113 ∘
33 ′
E 5. A right spherical triangle has the following parts: c=80deg,a=62deg,C=90 deg. Find the measure of side b. Select one: C a. 65.32 deg Cb. 78.45 deg C c. 68.3deg Cd. 73.24deg

Answers

The eccentricity of the ellipse is approximately 1.28. **(eccentricity, ellipse). the depth of water in the container is approximately 0.771 m. **(depth, water container). The plane will cross the equator at approximately 271°30' E longitude. **(longitude, equator crossing)**

1. To find the eccentricity of an ellipse, we can use the formula e = c/a, where c is the distance between the foci and a is half the distance between the major and minor axes. In this case, the distance between the foci is given as 8, and we need to find a.

Since the distance between the directrices is given as 12.5, we know that a + a' = 12.5, where a' is the distance from the center of the ellipse to one of the directrices. Since the directrices are equidistant from the center, we have a' = 12.5/2 = 6.25.

Now, we can use the relationship between a, c, and e: a = c/e. Substituting the values, we have 6.25 = 8/e, which gives e = 8/6.25 = 1.28.

Therefore, the eccentricity of the ellipse is approximately 1.28. **(eccentricity, ellipse)**

2. The volume of the water container can be calculated using the formula V = (1/4) * sqrt(3) * a^2 * h, where a is the side length of the equilateral end sections and h is the depth of water. We are given that V = 0.058 m^3 and a = 0.3 m.

Plugging in the values, we have 0.058 = (1/4) * sqrt(3) * (0.3)^2 * h. Solving for h, we get h = 0.058 / [(1/4) * sqrt(3) * (0.3)^2] = 0.771 m.

Therefore, the depth of water in the container is approximately 0.771 m. **(depth, water container)**

3. In a spherical triangle, the sum of the angles is greater than 180 degrees. Given A = 82°, B = 100°, and C = 65°, we can find angle C using the formula:

C = 180 - A - B = 180 - 82 - 100 = -2°.

Since the sum of the angles of a spherical triangle is always 180 degrees, we need to adjust angle C to be positive by adding 360 degrees. Therefore, angle C = -2° + 360° = 358°.

Thus, the measure of angle C in the spherical triangle is approximately 358°. **(angle, spherical triangle)**

4. To determine the longitude at which the plane crosses the equator, we need to find the difference in longitude between Manila (121°30' E) and the destination point where the course changes.

Since the plane flies on a course of S30°W, it means the bearing from Manila is 210° (180° + 30°). We need to subtract this bearing from the longitude of Manila:

121°30' E - 210° = -88°30'.

Since the resulting longitude is negative, we can convert it to positive by adding 360°:

-88°30' + 360° = 271°30'.

Therefore, the plane will cross the equator at approximately 271°30' E longitude. **(longitude, equator crossing)**

5. In a right spherical triangle, the sides are measured in degrees, and the angles are measured in radians. We need to convert the given angle values to radians to use them in calculations.

Given c = 80°, a = 62°, and C = 90°, we have to find side b. Using the Law of Sines

Learn more about ellipse here

https://brainly.com/question/32080758

#SPJ11

When the MSB of the 2's compliment number is a 1, the number is: A) Greater than one B) Invalid C) Positive D) Negative The sum of the binary numbers 1111 and 0011 is: A) 111111 B) 10010 C) 10011 D) 1122 The difference between the binary numbers 10101 and 110 is: A) 10011 B) 1001 C) 1011 D) 1111 The number of different states a counter must go through to complete its counting 3 A) Modulus B) Differential C) Count D) Cycle amount Which of the following flip-flops are generally used in counters? A) J-K B) Delay C) R-S D) D

Answers

1) Negative number

2) 10010

3) 1111

4) Modulus

5) J K flip flop .

Given,

When the MSB of the 2's compliment number is a 1

1)

Negative number

2)

Sum of binary numbers:

1111 + 0011

= 10010

Thus option B is correct .

3)

The difference of 10101 and 110:

10101 - 110

= 01111

Thus option D is correct .

4)

The number of different states a counter must go through to complete its counting Modulus.

5)

All flip flops are used for counter but more frequently we use JK flip flop

Thus option A is correct .

Know more about flip flops,

https://brainly.com/question/31676510

#SPJ4

design a mod-68 counter using d flip flops only. (with logic gates)
(tip: consider connecting two systems, one mod-7 ripple
counter and one 4-bit ripple counter)

Answers

A counter is an electronic circuit that records the number of times a particular event or process occurs. The binary counter is a type of counter that uses a sequence of flip-flops or other digital logic gates to count from zero to some maximum value.

A mod-68 counter using d flip-flops can be designed by connecting two systems, one mod-7 ripple counter and one 4-bit ripple counter.The mod-7 ripple counter is a counter circuit that counts from zero to seven. It uses three D flip-flops to achieve this count. The output of the first flip-flop is connected to the input of the second flip-flop. The output of the second flip-flop is connected to the input of the third flip-flop. The output of the third flip-flop is connected to the input of the first flip-flop. The input of the first flip-flop is connected to a clock signal.

The 4-bit ripple counter is a counter circuit that counts from zero to fifteen. It uses four D flip-flops to achieve this count. .To create a mod-68 counter using d flip-flops only, we can connect the mod-7 ripple counter to the 4-bit ripple counter. The output of the mod-7 ripple counter can be connected to the input of the 4-bit ripple counter. This will allow the 4-bit ripple counter to count up to 68 (1000100 in binary) before resetting to zero. The circuit can be implemented using logic gates to connect the flip-flops and generate the clock signals. The complete circuit diagram is given below.

To know more about electronic circuit visit :

https://brainly.com/question/14625729

#SPJ11

Which of the following is a collection of protocols that provides security at the ISO reference model network layer level ? a) SecProto b) IPSec c) ISO Application layer file transfer programs d) Presentation Abstract Syntax Notation 1 (ASN.1)

Answers

IPSec is a collection of protocols that provides security at the ISO reference model network layer level.

So, the correct answer is B

IPsec stands for Internet Protocol Security, which is a suite of protocols that ensures the security of communication over an IP network.

This suite of protocols is designed to provide security at the network layer (Layer 3) of the OSI model and is implemented to encrypt data, verify its integrity, and provide authentication services, among other things. In a nutshell, IPSec is a collection of protocols that ensures that communication over an IP network is secure and confidential.

Therefore, the correct option is (b) IPSec.

Learn more about internet protocol at

https://brainly.com/question/32085275

#SPJ11

The java.util.Date class is introduced in this section. Analyze the following code and choose the best answer: Which of the following codes, A, B, or both, creates an object of the Date class? A: public class Test { public Test() { new java.util.Date(); } } B: public class Test { public Test() { java.util.Date date= new java.util.Date(); } } B Neither

Answers

The code that creates an object of the Date class is B which is as follows:public class Test {public Test() {java.util.Date date = new java.util.Date();}}

Explanation: In code A, we have new java.util.Date(), which creates a new object of the class java.util.Date, but the object is not assigned to any variable, so it will be lost immediately, and no code will use it. The constructor is invoked, but the object it creates is not kept. So, code A is not useful.

In code B, we have java.util.Date date = new java.util.Date(); which creates a new object of the class java.util.Date and stores it in the variable date, so the object is not lost. The constructor is invoked, and the object it creates is assigned to the variable date, so we can use it later in the code.The output of this code is not very useful, but the object is created, and that is what was asked in the question, so the answer is B.

To know more about constructor visit:

https://brainly.com/question/13097549

#SPJ11

Velocity domain in a flow is gişiven by V
= V
( S
)=(3x+2y) 
+(2z+3x 2
) 

+(2t−3z) k
a) How many dimensions does the flow have got? b) Write the velocity components. c) Is the flow steady-state? d) Which kinematic analysis method should be used? Why? e) Determine resultant velocity at point A(1,1,1). f) Calculate resultant velocity at point M(0,0,2) for time t=2 s.

Answers

No, the flow is not steady-state because the velocity components are functions of time (t). Tthe resultant velocity at point M for time t = 2 s is V = 0i + 4j - 2k.

a) The flow has four dimensions: x, y, z, and t.

b) The velocity components are:

Vx = 3x + 2y

Vy = 3x^2 + 2z

Vz = 2t - 3z

c) No, the flow is not steady-state because the velocity components are functions of time (t).

d) The kinematic analysis method that should be used is Eulerian analysis. Eulerian analysis focuses on observing and analyzing the flow properties at fixed points in space, regardless of time. It is suitable for flows where the velocity components are given as functions of position and time.

e) To determine the resultant velocity at point A(1, 1, 1), we substitute the coordinates into the velocity components:

Vx = 3(1) + 2(1) = 5

Vy = 3(1)^2 + 2(1) = 5

Vz = 2t - 3(1) = 2t - 3

Therefore, the resultant velocity at point A is V = 5i + 5j + (2t - 3)k.

f) To calculate the resultant velocity at point M(0, 0, 2) for time t = 2 s, we substitute the coordinates and time into the velocity components:

Vx = 3(0) + 2(0) = 0

Vy = 3(0)^2 + 2(2) = 4

Vz = 2(2) - 3(2) = -2

Therefore, the resultant velocity at point M for time t = 2 s is V = 0i + 4j - 2k.

Learn more about velocity here

https://brainly.com/question/30505958

#SPJ11

The timer OFF-delay instruction is a retentive timer instruction 11. Internal bit C5:0/CU is on when the input to the count up instruction C5:0 is open ID: E 12. There are two types of PLC counter instructions. 13. The content of an accumulated register in the countdown instruction decrements whenever there is a low-to-high counter input switch transition 14. The accumulated register for counter instruction C5:0 is addressed as C5:0.ACC. 15. The counter done it for the counter instruction C5:1 is addressed as C5:1/DN. 16. The count up instruction C5:0 in a fixed SLC 500 PLC uses two sixteen bit registers. 17. The content of an accumulated register in the count up instruction increments whenever there is a low to high counter input switch transition 18. Internal bit CS:0 CD is on when the input to the count up instruction C5:0 is closed. 19. In a subtract instruction, sources A and B can be the content of integer registers N7:0 and 7:1. respectively 20. In a multiply instruction, the result carnot be placed in the integer register N7:2 21. The destination in the add instruction must nor be a register 22. There are several advanced math instructions that are available in the Allen-Bradley SLC 503, 5LC 5704 and SEC 5/05 processors 23. Forced conditions must be used with extreme caution, 24. Occupational Safety and Health Agency (OSHA) regulations require that technicians must not use forced conditions when the plant is in normal operation, 25. The Allen-Bradley fixed SLC 500 PLC has ten inputs. 26. SLC 500 PLCs have five indicator lights: Power, PLC run, CPU fault, forced 1/0 and battery low 27. Rockwell RSLogix 500 software can be used for troubleshooting to find PLC falts and take corrective actions to solve problems 28. The PLC run light indicates when power has been applied to the PLC and the processor is energie 29. In addition to checking the indicator lights, technicians must also maintain a clean environment around the PLC cabinets.

Answers

The timer OFF-delay instruction is a retentive timer instruction.

Internal bit C5:0/CU is on when the count up instruction input is open.

There are two types of PLC counter instructions.

What is the accumulated register?

The accumulated register in the countdown instruction decrements on a low-to-high counter input switch transition.

The accumulated register for counter C5:0 is addressed as C5:0.ACC.

The counter done bit for counter C5:1 is addressed as C5:1/DN.

The count up instruction C5:0 in a fixed SLC 500 PLC uses two sixteen-bit registers.

The accumulated register in the count up instruction increments on a low-to-high counter input switch transition.

Internal bit CS:0 CD is on when the count up instruction input is closed.

Sources A and B in a subtract instruction can be integer registers N7:0 and 7:1, respectively.

The result in a multiply instruction cannot be placed in integer register N7:2.

The destination in an add instruction cannot be a register.

The Allen-Bradley SLC 503, 5LC 5704, and SEC 5/05 processors have advanced math instructions.

Forced conditions must be used with caution.

OSHA regulations prohibit using forced conditions during normal plant operation.

The Allen-Bradley fixed SLC 500 PLC has ten inputs.

SLC 500 PLCs have five indicator lights: Power, PLC run, CPU fault, forced 1/0, and battery low.

Rockwell RSLogix 500 software is used for troubleshooting and problem-solving in PLC systems.

The PLC run light indicates power and processor operation.

Technicians should maintain a clean environment around PLC cabinets.

Read more about accumulated register here:

https://brainly.com/question/14522160

#SPJ4

Pick any three supply chain network types and provide an example
of an organization which uses the type of network to deliver the
products/services to the customers.

Answers

The supply chain network refers to the different organizations, people, resources, activities, and technologies involved in creating and delivering a product or service to the customers. There are various supply chain network types that organizations use to optimize their operations and meet the needs of their customers. Here are three types of supply chain networks and examples of organizations that use them:

1. Direct supply chain network: In a direct supply chain network, a manufacturer or producer directly sells the product or service to the customers. An example of an organization that uses a direct supply chain network is Dell, a computer manufacturer, which sells its products directly to customers through its website.

2. Retailer-based supply chain network: In a retailer-based supply chain network, a retailer purchases the product from the manufacturer and sells it to the customers. An example of an organization that uses a retailer-based supply chain network is Walmart, which purchases products from various manufacturers and sells them to its customers.

3. Distributor-based supply chain network: In a distributor-based supply chain network, a distributor purchases products from the manufacturer and sells them to the retailers or customers.

An example of an organization that uses a distributor-based supply chain network is Coca-Cola, which has distributors who purchase its products and distribute them to retailers and customers. These are three supply chain network types and examples of organizations that use them.

let's learn more about organizations:

https://brainly.com/question/19334871

#SPJ11

Implement F(A, B,C,D) = m (0,1,2,3,6,7,8,9,11,12,13,14,15) using (Show All your Work) (30 points) a. A4X 1 MUX and any logic gates you may need. (The number of gates should be minimized for an efficient design). b. A 2X 1 MUX and any logic gates you may need. (The number of gates should be minimized for an efficient design).

Answers

The given Boolean function is F(A, B, C, D) = m(0, 1, 2, 3, 6, 7, 8, 9, 11, 12, 13, 14, 15). We need to implement this Boolean function using the following:a. A 4x1 MUX and any logic gates you may need.b. A 2x1 MUX and any logic gates you may need.The implementation of F(A, B, C, D) = m(0, 1, 2, 3, 6, 7, 8, 9, 11, 12, 13, 14, 15) using a 4x1 MUX and any logic gates is given below:For a 4-variable function, we need two 2x1 MUXes and four logic gates to implement the function using a 4x1 MUX.

Here, we have to implement the function using the least possible number of gates and 4x1 MUX. Let’s take a look at how we can do this.The simplified Boolean expression for F(A, B, C, D) is as follows:F(A, B, C, D) = A'B'D + A'C'D' + AB'C' + ABC + A'BC'D' + AB'C'D' + ABC'D'MUX implementation of the Boolean function:The 4x1 MUX has four inputs A, B, C, and D, and one output Y. The MUX is designed such that the selector lines A, B are assigned with two input variables each. For each of the two selectors, the combination of input variables and their negations are provided as inputs to the MUX.

The output Y from the MUX corresponds to the Boolean function's value for the particular combination of the selector inputs.The truth table of 4x1 MUX is shown below: :To minimize the number of gates required for implementing the Boolean function using a 4x1 MUX, we will use an XOR gate and two 2-input AND gates. The XOR gate and AND gates are used to generate the required select lines A, B for the MUX.The XOR gate is used to generate the complement of the input variable A. The XOR gate takes A as one input and a high-level input as the other input.The two AND gates are used to generate the select lines for the MUX. The first AND gate generates the A'BC select line, and the second AND gate generates the AB'C select line.  

To know more about boolean fuction visit:

brainly.com/question/33183382

#SPJ11

A list of 30 exam scores is: 31, 70, 92, 5, 47, 88, 81, 73, 51, 76, 80, 90, 55, 23, 43,98,36,87,22,61, 19,69,26,82,89,99, 71,59,49,64 Write a computer program that determines how many grades are between 0 and 19, between 20 and 39, between 40 and 59, between 60 and 79, and between 80 and 100. The results are displayed in the following form: Grades between 0 and 19: 2 students Grades between 20 and 39: 4 students Grades between 40 and 59: 6 students and so on. (Hint: use the command fprintf to display the results.)

Answers

To write a computer program that determines how many grades are between 0 and 19, between 20 and 39, between 40 and 59, between 60 and 79, and between 80 and 100 and display the results using the command fprintf we will follow the steps given below:

Step 1: Create a list of exam scores.

Step 2: Initialize 5 variables to 0 for each grade range

Step 3: Create a for loop that will iterate through each score in the list.

Step 4: For each score, use conditional statements to check which grade range it falls into and increment the corresponding variable for that range by 1.

Step 5: Use the command fprintf to display the results in the required format. Below is the program that will implement the above steps:```
scores = [31, 70, 92, 5, 47, 88, 81, 73, 51, 76, 80, 90, 55, 23, 43,98,36,87,22,61, 19,69,26,82,89,99, 71,59,49,64]
range1 = 0
range2 = 0
range3 = 0
range4 = 0
range5 = 0
for score in scores:
   if score >= 0 and score <= 19:
       range1 += 1
   elif score >= 20 and score <= 39:
       range2 += 1
   elif score >= 40 and score <= 59:
       range3 += 1
   elif score >= 60 and score <= 79:
       range4 += 1
   elif score >= 80 and score <= 100:
       range5 += 1
fprintf('Grades between 0 and 19: %d students\n', range1)
fprintf('Grades between 20 and 39: %d students\n', range2)
fprintf('Grades between 40 and 59: %d students\n', range3)
fprintf('Grades between 60 and 79: %d students\n', range4)
fprintf('Grades between 80 and 100: %d students\n', range5)

```The above program will print the number of students in each grade range in the required format.

To know more about grades visit:

https://brainly.com/question/29618342

#SPJ11

Consider the following declaration for a Class A. Class A ( private int x, y; public A (int x, int y) ( this.x = x; this.y -y; Class B is a subclass of A. Which of the following can be constructors in B? Choose TWO answers. Opublic B (int x, int y) { super (x,y); } □public B () {} Opublic B () { super(0, 0); } Opublic B (int x, int y) { this.x = x; this.y = y; }

Answers

The constructors that can be used in Class B are:public B (int x, int y) { super (x,y); }public B () { super(0, 0); }Explanation:In the given code snippet,

Class A has a private integer x and y with a constructor. Class B is a subclass of A.To create constructors in class B, we need to use super keyword that refers to the immediate superclass of a class, i.e, class A. It is used to invoke immediate superclass constructor.

Let's analyze the given constructors of class B one by one.public B (int x, int y) { super (x,y); }In this constructor, the arguments x and y are passed as parameters to invoke the constructor of class A using super keyword. Hence, it is valid.public B () { super(0, 0); }In this constructor, the constructor of class A is invoked with two arguments as 0 and 0. Hence, it is valid.public B (int x, int y) { this.x = x; this.y = y; }This constructor doesn't invoke the constructor of class A using super keyword. Instead, it directly assigns the values of x and y to the instance variables of class B. Hence, it is invalid. Therefore, the two valid constructors that can be used in class B are:public B (int x, int y) { super (x,y); }public B () { super(0, 0)

TO know more about that constructors visit:

https://brainly.com/question/13267120

#SPJ11

Two straights AB having gradient Falling 1.25% to the right, and BC having gradient Falling 1.4% to the right, are to be connected by a parabolic curve. The point A is the start point of the curve with elevation is 512.55 m, located on AB at station 18+33.35 m, and C is the end point of the curve with reduced level 510.95m, located on BC. Calculate the required elements to set out the (30 marks) vertical curve and points on curve at 20m interval.

Answers

The required elements for setting out the vertical curve and the elevations at 20m intervals along the curve.

To calculate the required elements for setting out the vertical curve and points on the curve at 20m intervals, we can use the principles of vertical curve design. Let's calculate the necessary elements step by step:

1. Determine the length of the vertical curve (L):

  L = (station of C) - (station of A)

  L = (18+33.35 m) - (0 m)  [assuming A is the start point of the curve]

  L = 18+33.35 m

2. Calculate the difference in elevation (ΔE) between points A and C:

  ΔE = (elevation of C) - (elevation of A)

  ΔE = 510.95 m - 512.55 m

  ΔE = -1.6 m

3. Determine the algebraic difference in gradient (∆G) between the two straights:

  ∆G = (gradient of BC) - (gradient of AB)

  ∆G = -1.4% - (-1.25%)

  ∆G = -0.15%

4. Calculate the elevation of the point of vertical intersection (PVI):

  PVI elevation = (elevation of A) + (ΔE/2)

  PVI elevation = 512.55 m + (-1.6 m/2)

  PVI elevation = 511.75 m

5. Determine the length of the vertical curve segment (LV):

  LV = L/2

  LV = (18+33.35 m)/2

  LV = 9+16.675 m

6. Calculate the elevation at each 20m interval using the parabolic formula:

  Elevation at any point (d) = PVI elevation + (d/LV)^2 * ΔE

  Let's calculate the elevations at each 20m interval from A to C:

  - At A (d = 0 m): Elevation = 512.55 m

  - At 20m from A (d = 20 m): Elevation = 511.973 m

  - At 40m from A (d = 40 m): Elevation = 511.2 m

  - At 60m from A (d = 60 m): Elevation = 510.231 m

  - At 80m from A (d = 80 m): Elevation = 509.065 m

  - At 100m from A (d = 100 m): Elevation = 507.7 m

  - At C (d = L): Elevation = 510.95 m

These calculations provide the required elements for setting out the vertical curve and the elevations at 20m intervals along the curve.

Learn more about curve here

https://brainly.com/question/13445467

#SPJ11

Assume you are leading a group for designing a Celsius to Fahrenheit converter. Demonstrate your leadership qualities on assigning the tasks to your team members. Further, develop the program to convert Celsius to Fahrenheit in Code Sys Simulation Software tool and determine the value of the number stored in each of the following words for a thumbwheel setting of 035: a. l: 012 b. N7:0 c. N7:1 d. O: 013

Answers

According to the given statement when we write a program the program output will be the temperature in Celsius is 40 degrees.

A code is a predetermined set of sequential activities that a computer is programmed to carry out. The programs in the modern pc what John von Neumann described in 1945 contains a series of instruction that the machine executes one at a time.

Briefing:

input = temp Enter the desired temperature conversion here.(e.g., 45F, 102C etc.) : ")

degree = int(temp[:-1])

i_convention = temp[-1]

if i_convention.upper() == "C":

results are equal to int(round((9 * degree) / 5 + 32))

o_convention = "Fahrenheit"

elif i_convention.upper() == "F":

result is equal to int(round((degree - 32)* 5/9)).

o_convention = "Celsius"

else:

print("Input proper convention.")

quit()

print("The temperature in", o_convention, "is", result, "degrees.")

To know more about Program visit:

brainly.com/question/23275071

#SPJ4

Other Questions
What is Half Life? The ratio of the amount of parent to daughter isotopes The amount of isotopes (in millions) that decay over a given amount of time.. The amount of time it takes for half of the parent isotopes to decay into daughters. The amount of time it takes for the number of parent isotopes to double in number. Question 4 5 pts Which is NOT true about isotopes? They can decay radioactively They have the same number of neutrons than protons They begin is parent isotopes, then decay into daughter isotopes They can be unstable 11. Two particles with masses m, and m, and charges q and 2q travel with the same velocity v& and enter a magnetic field B(?) at the same point a) In the magnetic field, these two particles move in semi circles with radii Rand 2R, What is the ratio of their masses? b) In the magnetic field, these two particles move in a straight line by applying an electric field. What would be the magnitude and the direction of electric field? Which of the following is NOT an assumption (condition) for sample data being good enough to estimate the population percentage (proportion) with a confidence interval? Sample data should be either normal or have a sample size of at least 30. O At least ten successes and at least ten failures. Random sample. O Individuals in sample should be independent create normal distribution plot with mean 5 and sd=1.02 The world and manufacturing corporation has office support salaries of $4000, factory supplies of $1000, indirect labor of $6000, direct materials of $16,000, advertising expensive $2500, office expenses $14,000, and direct labor of $20,000. What is the total. Cost? A $1,000 par value, 10-year bond, with a 10% annual coupon and a yield to maturity of 7% has a duration of 7.068 years. If rates are expected to increase by 50 basis points (+0.50\%) to 7.5%, the predicted $ change in the bond's price is actual change in the bond's peice if rates increase to 7.5% is [Hint: firts Eompute the new price of the bond using a 7,5% yield] ? Muliple Choice $3999,53999 539.99; 53911 5100;599 53911,33939 Based on the Treasury security spot rates below, what is the implied five-year forward rate in five years (i.e what is the expected spot rate on a five-year Treasury bill that you plan to purchase five years from now?) MaturityYleid () T-year: 0.152% 2-year 0.137% 3-year 0.149\% 5year: 025296 10 -year: 0.693% Multiple Cnoice 0.1524 0.2524 0693% 1136% What are the limitations of Demand Forecasting?give me the aswer in seven to eight setances. Choose a country to profile and prepare a brief research paper that highlights the potential opportunities, risks and challenges of doing business there. Issues to consider and/or include: A. Brief overview of the country and demographics B. The political and legal environment. political stability? Legal issues? C. The economic environment. Stability? Growing economy? Hard hit by this recession? D. Cultural issues. E. Any other important issues. Cite your sources.Your sources will include at least one academic journal, two quality Web sources and two other popular business sources (Forbes, Fortune, Wall Street Journal, Financial Times, Harvard Business Review). All written work must be completed using proper APA format. For the question below, consider the following class definition:public class ClassA{protected int a;protected int b;public ClassA(int a, int b){this.a = a;this.b = b;}public int sum( ){return a + b;}public String toString( ){return a + " " + b;}}public class ClassB exends ClassA{private int c;private int d;}, which of the following choice works best as an overwritten of the sum methodforClassB? Consider a firm that just paid a dividend of $2.60. They plan to increase dividends by 5% in year one, 10% in year two, 20% in year three, 20% in year four, and then 3% per year thereafter. You feel that a 16% required return is appropriate. What is this stock worth to you? When we develop a precess to promote employees, which of the questions should we NOT ask? Swide the frecena be a formal of irtermal tire? Many employers today sponsor retirement plans where employees contribute, and the employer may match a portion of the employee centribution. This plan is known as a Hexible Spendra Account Heittrisainas Account 529 S Minispian 4016) Tom has worked full-time for a large ausoenotive supplier for over 6 years. Tom and his wife have recenthy adopted a baby, and Tom wants to toke time off frem work to care for the child. Which of the following lwws most likely applies to Tom's situation? Question 13 jill works as a cashier at a grocery store. She earns $12.50 an hour (or $500 for 40 -hour week). Last week, she worked 46 hours. What is the minimum amoint that Jal earned last weck? \$ 70 5575. 5600 561250 Question 14 0/1 pts Direct parvments part of an employee's compensation include all EXCEPT: uav. titere off vay commintions Employees LuxCorp are able to spend their benefits allowances as they desire and to opt out of certain benefits, sixch as disability and unemployment insurarce. MKM International is seeking to purchase a new CNC machine in order to reduce costs. Two alternative machines are in consideration. Machine 1 costs $450,000, but yields a 15 percent savings over the current machine used. Machine 2 costs $1,100,000, but yields a 25 percent savings over the current machine used. In order to meet demand, the following forecasted cost information for the current machine is also provided. a. Based on the NPV of the cash flows for these 5 years, which machine should MKM International purchase? Assume a discount rate 11 percent. Assuming a discount rate of 11 percent, MKM International should purchase because the NPV of machine 1 is $ and the NPV of machine 2 is $ (Enter your responses rounded to the nearest whole number.) b. If MKM International lowered its required discount rate to 9 percent, what machine would it purchase? Assuming a discount rate of 9 percent, MKM International should purchase because the NPV of machine 1 is $ and the NPV of machine 2 is $ (Enter your responses rounded to the nearest whole number.) If B = -2 - 6+ 2k and C = -2 - 2- 3k, find the magnitude of C x B. A. 25.5 B. 21.1 C. 17.6 D. 13.9 E. 9.37 Choose the correct answer:a*b*a* = (aba)*Group of answer choices- True- False Compute the Euclidean distance between the sets of points below. a. (3,5) and (8,4) b. (11,3,33) and (17,13,52) Derek will deposit $8,461.00 per year for 14.00 years into an account that earns 11.00%, The first deposit is made next year. How much will be in the account 40.00 years from today? Submit Answer format: Currency: Round to: 2 decimal places. Derek will deposit $1,424.00 per year for 29.00 years into an account that earns 6.00%, The first deposit is made next year. He has $17,098.00 in his account today. How much will be in the account 34.00 years from today? Submit Answer format: Currency: Round to: 2 decimal places. Derek will deposit $5,240.00 per year for 9.00 years into an account that earns 12.00%. Assuming the first deposit is made 7.00 years from today, how much will be in the account 38.00 years from today? Submit Answer format: Currency: Round to: 2 decimal places. The point (4,6) lies on the terminal arm of an angle in standard position. The measure of , correct to the nearest degree, is List and briefly describe the six levels of abstraction. Where do malware authors spend most of their time compared to malware analysts? Program Description: Single-Digit Calculator: Write a program that would accept 2 single- digit numbers num1 and num2 (0-9) and an arithmetic operator (+,-, * and /). Perform arithmetic operations entered with num1 and num2. If the operator is invalid, display "Operation Error". Note: Assume no invalid output. This means test cases to check the program will only have inputs for a single-digit output. Upload .asm file-use any proper filename Add a comment in the assembly file for codes not included in our module. Explain structure and functionality. Assuming the transmission in a half-duplex mode, compute the signal rate for the below signals: (i) a binary PSK transmitting at 2000 bps. [2 marks] (ii) a 64-QAM transmitting at 72,000 bps.