The column is constructed from high-strength concrete and eight A992 steel reinforcing rods. The column is subjected to an axial force of P=230 kip. Each rod has a diameter of 1 in.For A992 steel, Est=29.0(103)ksi, and for high-strength concrete, Ec=4.20(103)ksi.



Part A

Determine the average normal stress in the concrete and in each rod.

Express your answer to three significant figures and include appropriate units.

σcon=

Part B

Determine the average normal stress in the concrete and in each rod.

Express your answer to three significant figures and include appropriate units.

Answers

Answer 1

Part A The cross-sectional area of one steel reinforcing rod is given by the formula below:A = πd2/4where π = 3.14 and d = diameter of steel reinforcing rod.

The cross-sectional area of the concrete is given by the formula:Aconcrete = A − Asteel

where A = cross-sectional area of the column. Substituting the given values A = 78.54 in2 and Asteel = 6.28 in2 into the formula above yields:

Aconcrete = 78.54 in2 − 6.28 in2 = 72.26 in2The force in each steel reinforcing rod is given by the formula:

Frod = P/nwhere n = number of steel reinforcing rods.

Determine the average normal stress in the concrete and in each rod.The average normal stress in each rod is equal to the stress in the rod, which was found to be 36.61 ksi.The average normal stress in the concrete is also equal to the stress in the concrete, which was found to be 3.18 ksi.

To know about Aconcrete visit:

https://brainly.com/question/23306388

#SPJ11


Related Questions

Amorphous thermoplastics are formed above their Softening points. O Glass transition temperatures. Melting temperatures.

Answers

Amorphous thermoplastics become soft and pliable above their softening points, undergo a transition from a glassy to a rubbery state at their glass transition temperatures, and do not have a distinct melting temperature like crystalline thermoplastics.

What are the thermal behaviors of amorphous thermoplastics in relation to their softening points, glass transition temperatures, and melting temperatures?

Amorphous thermoplastics are a type of polymer material that lacks a distinct crystalline structure. These materials exhibit different thermal behaviors compared to crystalline thermoplastics.

The statement mentions that amorphous thermoplastics are formed above their softening points, glass transition temperatures, and melting temperatures.

The softening point of a thermoplastic refers to the temperature at which the material becomes soft and pliable, losing its structural integrity. Above this temperature, the amorphous thermoplastic starts to deform and flow easily.

The glass transition temperature (Tg) is the temperature at which the amorphous thermoplastic transitions from a glassy, rigid state to a rubbery, flexible state.

It represents the temperature range where the polymer undergoes a transition from a glass-like solid to a more viscous and less rigid state. Above the glass transition temperature, the material becomes softer and more susceptible to deformation.

Unlike crystalline thermoplastics that have distinct melting points, amorphous thermoplastics do not have a well-defined melting temperature. Instead, they exhibit a gradual softening and flow as the temperature increases. This behavior is due to the absence of an ordered crystal lattice structure.

In summary, amorphous thermoplastics undergo softening above their softening points, transition from a glassy to a rubbery state at their glass transition temperatures, and do not have a specific melting temperature like crystalline thermoplastics.

Learn more about Amorphous thermoplastics

brainly.com/question/29602025

#SPJ11

plot the lattice parameter and the instantaneous thermal expansion coefficient as a function of temperature over this range. plot the lattice parameter and the instantaneous thermal expansion coefficient as a function of temperature over this range.

Answers

The lattice parameter and the instantaneous thermal expansion coefficient both vary with temperature over the given range.

The lattice parameter is a measure of the spacing between atoms or ions in a crystal lattice. As the temperature increases, the lattice parameter generally increases due to the expansion of the crystal lattice. This is because the atoms or ions in the lattice vibrate more vigorously at higher temperatures, leading to increased distances between them.

The instantaneous thermal expansion coefficient, on the other hand, quantifies the rate at which the lattice parameter changes with temperature. It is a measure of how much the lattice parameter expands or contracts for a given change in temperature. The thermal expansion coefficient is typically positive, indicating that the lattice parameter increases with temperature.

Plotting the lattice parameter and the instantaneous thermal expansion coefficient as functions of temperature over the given range would provide a visual representation of their relationship. The plots would show how the lattice parameter and the thermal expansion coefficient change with increasing or decreasing temperature, providing valuable insights into the behavior of the material.

Learn more about  lattice parameter

brainly.com/question/14618066

#SPJ11

1-Which of the approaches is used to determine the password of a system account or a user account? (Choose two.) A) Through the use of Trojan horse B) Through the use of keylogger C) Through the use of encryption mechanism D) Through the use of compression mechanism E) Through the use of file shares 2- What are the three types of malicious traffic detection methods? A) Signature, policy, and anomaly based B) IDS, IPS, and IRS based C) NIDS, HIPS, and NIPS based D) Symmetric, asymmetric, and transparent based

Answers

1- The approaches used to determine the password of a system account or a user account are A) Through the use of a Trojan horse and B) Through the use of a keylogger. 2- The three types of malicious traffic detection methods are Signature, policy, and anomaly-based.

1) Through the use of the Trojan horse and Through the use of a keylogger are the two approaches used to determine the password of a system account or a user account. A Trojan horse is a type of malware that is disguised as legitimate software. When a user downloads and installs the malware, it can be used to gain access to their system and capture their passwords or other sensitive information.

A keylogger is a type of software or hardware device that records every keystroke made by a user on a computer or mobile device. This can include passwords, usernames, credit card numbers, and other sensitive information.

2) The three types of malicious traffic detection methods are: Signature-based detection is a commonly used approach that compares network traffic to a database of known attack signatures. Policy-based detection is a technique that detects anomalies based on predetermined rules and policies. Anomaly-based detection is a technique that identifies anomalies and malicious traffic by analyzing network traffic patterns that deviate from normal traffic patterns.

You can learn more about keyloggers at: brainly.com/question/32221991

#SPJ11

The two approaches used to determine the password of a system account or a user account are:A) Through the use of Trojan horseB) Through the use of keyloggerTrojan horseTrojan horse is a form of malware that allows cybercriminals to spy on computer users, steal data, and gain unauthorized access to systems.

In the case of password theft, attackers might use Trojan horses to inject malicious code into a victim's computer, which would then track the user's keystrokes as they entered their login credentials.KeyloggerA keylogger is a type of malware that records every keystroke made on an infected device. Keyloggers might be used by cybercriminals to steal passwords, credit card numbers, and other sensitive information entered by computer users.2. The three types of malicious traffic detection methods are:A) Signature, policy, and anomaly basedSignature-Based DetectionSignature-based detection works by comparing traffic to a pre-defined list of known malicious signatures, such as virus definitions. If the traffic matches one of the known signatures, it is flagged as malicious.Policy-Based DetectionPolicy-based detection uses a set of predefined rules to identify traffic that does not comply with an organization's security policy. For example, if a policy prohibits users from downloading certain types of files, policy-based detection would flag any traffic containing those files as malicious.Anomaly-Based DetectionAnomaly-based detection compares network traffic to a baseline of expected behavior. If the traffic deviates significantly from the baseline, it is flagged as malicious.

To know more about malware visit:

https://brainly.com/question/30586462

#SPJ11

when planning a night cross-country flight, a pilot should check for

Answers

Answer: the availability and status of lighting systems at the destination airport

Explanation: It is recommended that prior to a night flight, and particularly a cross-country night flight, a check of the availability and status of lighting systems at the destination airport is made. This information can be found on aeronautical charts and in the Chart Supplements.

It is necessary for a pilot to ensure that the flight is planned thoroughly, particularly for a night cross-country flight. Before commencing the journey, several checks and balances must be put in place to ensure the security and safety of both the pilot and the passengers.

Current weather patterns and forecasts: The pilot should assess the current weather patterns and weather forecasts to determine whether it will be safe to fly. Poor visibility, turbulence, thunderstorms, and strong winds are only a few examples of challenging weather conditions that a pilot should be aware of.Fuel: It is necessary to verify the quantity of fuel required for the journey. The pilot should ensure that there is enough fuel in the airplane, taking into account the distance and duration of the journey.Communication: A pilot should also ensure that they can communicate with the ground or the airport staff and air traffic control while in flight.Emergency plan: The pilot must have a contingency plan in place if something goes wrong during the flight.Navigation: The pilot should have a detailed map of the route to be followed. They should ensure that they have the necessary information on all the checkpoints and runways, as well as the altitude they will be flying at.Flight instruments: Finally, a pilot should make sure that all flight instruments are in good working condition. The altitude indicator, heading indicator, airspeed indicator, and other vital instruments should be double-checked to ensure that they are in good working order.

In conclusion, a pilot must examine all of these elements while planning a night cross-country flight. With proper planning, the journey will be safe, secure, and enjoyable.

To learn more about cross-country flight, visit:

https://brainly.com/question/28238808

#SPJ11

design an embedded query for the healthcare database to give the total number of patients treated by each healthcare provider, sorted in the alphabetical order of provider name.

Answers

To design an embedded query for the healthcare database to give the total number of patients treated by each healthcare provider, sorted in the alphabetical order of provider name, the following SQL query can be used:```SELECT provider_name, COUNT(patient_id) AS total_patients_treatedFROM healthcare_databaseGROUP BY provider_nameORDER BY provider_name ASC```

This SQL query uses the `COUNT()` function to count the number of patients treated by each healthcare provider. It also uses the `GROUP BY` clause to group the result by provider name and the `ORDER BY` clause to sort the result in alphabetical order by provider name. The result will include two columns: the provider name and the total number of patients treated by that provider.

You can learn more about SQL query at: brainly.com/question/31663284

#SPJ11

An embedded query, also known as a subquery, is a query within another query that is used to provide a more targeted response to a particular condition.

In this case, we want to design an embedded query that will provide us with the total number of patients treated by each healthcare provider in alphabetical order of their name from the healthcare database. Here's how to do it:SELECT Provider_Name, COUNT(*) AS Total_Patients_TreatedFROM Patient_InfoWHERE Provider_Name IN (SELECT DISTINCT Provider_NameFROM Patient_Info)GROUP BY Provider_NameORDER BY Provider_Name ASC;Explanation: The embedded query used here is a subquery that returns a distinct list of healthcare providers. The main query counts the total number of patients treated by each provider name from the Patient_Info table.

To know more about  healthcare visit:

https://brainly.com/question/16846279

#SPJ11

To avoid the problem of interference in a pair of spur gears using a 20 ∘
pressure angle, specify the minimum number of teeth allowed on the pinion for each of the following gear ratios. (a) 2 to 1 (b) 3 to 1 (c) 4 to I (d) 5 to 1

Answers

The minimum number of teeth allowed on the pinion for each gear ratio to avoid interference in a pair of spur gears with a 20° pressure angle are: (a) 40 teeth (b) 60 teeth (c) 80 teeth (d) 100 teeth.

What is the minimum number of teeth required on the pinion to prevent interference in a pair of spur gears with a 20° pressure angle and the following gear ratios?

To avoid interference in a pair of spur gears using a 20° pressure angle, the minimum number of teeth allowed on the pinion depends on the gear ratio. The pressure angle refers to the angle between the line of action and a line perpendicular to the gear teeth. When the pressure angle is 20°, it is necessary to ensure that there is sufficient clearance between the teeth to avoid interference.

For a gear ratio of 2 to 1, the pinion should have a minimum of 40 teeth. This means that the larger gear, known as the gear wheel, should have at least twice the number of teeth, in this case, 80 teeth.

For a gear ratio of 3 to 1, the pinion should have a minimum of 60 teeth, and the gear wheel should have 180 teeth.

For a gear ratio of 4 to 1, the pinion should have a minimum of 80 teeth, and the gear wheel should have 320 teeth.

For a gear ratio of 5 to 1, the pinion should have a minimum of 100 teeth, and the gear wheel should have 500 teeth.

Learn more about spur gears

brainly.com/question/31031498

#SPJ11

Translate the following Lisp functions to ML. Note that f is a function. Can the code be alternatively implemented using a loop in a straightforward fashion? If yes, give the loop implementation as well. A) (define count (lambda (f x) (cond ((cons? x) (if (f(car x)) (+1 (count f (cdr x))) (count f(cdr x)))) (else 0)))) (define count (lambda (fx) (cond ((fx) 1) ((cons? x) (if (null? (cdr x)) (count f(car x)) (+ (count f(car x)) (count f (cdr x))))) (else 0)))).

Answers

The translated ML function count takes two arguments, f (a function) and x (a list). It uses pattern matching to handle two cases. If x is an empty list ([]), it returns 0.

The loop implementation uses a recursive function called loop to iterate through the list x. The function loop takes two arguments: acc (the accumulator to keep track of the count) and the list itself. If the list is empty, it returns the accumulated count (acc). Otherwise, it checks if f hd evaluates to true, updating the accumulator accordingly. Then, it recursively calls loop with the updated accumulator and the remaining elements in the list. Finally, the loop is initiated by calling loop with an initial accumulator value of 0 and the input list x.

To know more about function click the link below:

brainly.com/question/26810169

#SPJ11

People tend to resist biometrics as a method of identification because of their concerns that their pri- vacy will be invaded or belief that the technology is too intrusive in their personal lives. 1. Research the Internet to determine some privacy problems related to biometrics. 2. Consider some mechanisms that could mitigate these problems and concerns. 3. Which method(s) of biometrics that would not meet with undue resistance from potential users would you recommend to a manager to replace password-based access controls?

Answers

Implementing behavioral biometrics can help mitigate privacy concerns and resistance from potential users while replacing password-based access controls.

Biometrics, such as fingerprint or facial recognition, have raised concerns regarding privacy invasion and intrusiveness in personal lives. People worry that their biometric data could be misused or accessed without their consent, leading to potential privacy breaches. Additionally, there are concerns about the security of storing biometric information, as it could be vulnerable to hacking or unauthorized access.

To mitigate these problems and alleviate user concerns, implementing behavioral biometrics can be a viable solution. Behavioral biometrics analyze unique patterns and characteristics of an individual's behavior, such as typing rhythm, mouse movement, or voice modulation. Unlike physical biometrics, behavioral biometrics do not rely on capturing or storing sensitive personal data like fingerprints or facial features. Instead, they focus on the patterns of how users interact with devices or systems.

By adopting behavioral biometrics, individuals' privacy can be better protected. The data collected is less intrusive and less susceptible to misuse since it does not involve personal physical traits. Users can feel more confident that their privacy is preserved while still benefiting from the convenience and security offered by biometric authentication.

Learn more about privacy:

brainly.com/question/1145825

#SPJ11

An empty hash table hashTable has 20 buckets and a hash function of key % 20.
The following operations are performed in order.
Select which operations cause a collision.
HashInsert(hashtable, 15) __
HashInsert(hashtable, 55) __
HashInsert(hashtable, 35) __
HashInsert(hashtable, 40) __
HashInsert(hashtable, 0) __

Answers

An empty hash table hashTable has 20 buckets and a hash function of key % 20. The following operations are performed in order:HashInsert(hashtable, 15)HashInsert(hashtable, 55)HashInsert(hashtable, 35)HashInsert(hashtable, 40)HashInsert(hashtable, 0)In the above hash table, we have to insert five elements (15, 55, 35, 40, 0).

The hash function is key%20, which means the hash table has 20 buckets, and each element's hash value is determined by the hash function by taking the element and dividing it by 20 with the remainder. The position in the hash table is the index of the resulting hash value. When two elements have the same hash value and are inserted into the same bucket in the hash table, a collision occurs.HashInsert(hashtable, 15)Hash table values after operation: [0,NULL,35,40,55]From the above values, we can see that a collision occurs while inserting 35 because the hash value of 35 is the same as that of 15, which is already present in the hash table. Hence, the operation HashInsert(hashtable, 35) causes a collision.

To know more about empty visit:

https://brainly.com/question/29201431

#SPJ11

find the producers' surplus if the supply function for pork bellies is given by the following. s(q)=q5/2 3q3/2 54 assume supply and demand are in equilibrium at q=16.

Answers

The producer's surplus in this scenario is 1728 after calculation given by the scenario.

What is the total benefit to producer's surplus?

In the given scenario, the supply function for pork bellies is represented by the equation s(q) = q^(5/2) * 3q^(3/2) * 54. We are told that supply and demand are in equilibrium at q = 16. To calculate the producer's surplus, we need to determine the area above the supply curve and below the equilibrium price (represented by the demand curve) up to the quantity supplied.

To find the producer's surplus, we can start by calculating the equilibrium price. At q = 16, we substitute this value into the supply function:

s(16) = 16^(5/2) * 3(16)^(3/2) * 54 = 16⁵ * 3 * 16³ * 54 = 24 * 2¹⁵ * 3 * 2²⁴ * 54 = 2³⁹ * 3²* 5² * 7.

Now, we can calculate the area between the supply curve and the equilibrium price. Since the supply function is represented by an equation, we integrate it with respect to q from 0 to 16:

∫[0 to 16] (q^(5/2) * 3q^(3/2) * 54) dq = 54 * ∫[0 to 16] (q⁵ * 3q³)^(1/2) dq.

Integrating this expression gives us:

54 * (2/7) * [(q^7/2) * (3/2)]|[0 to 16] = (216/7) * [16^7/2 - 0] = (216/7) * (2⁷ * 3 * 5² * 7 - 0) = (216/7) * 2⁷ * 3 * 5² * 7.

Finally, we subtract the equilibrium price from the calculated area to find the producer's surplus:

(216/7) * 2⁷ * 3 * 5² * 7 - 2³⁹ * 3² * 5² * 7 = 1728.

Therefore, the producer's surplus in this scenario is 1728.

Learn more about producer's surplus

brainly.com/question/32106601

#SPJ11

he jump-to-subroutine instruction can save a great 9. deal of duplicate programming in cases: a) that require the programming of several timers. b) that require the programming of several counters. c) where a machine has a portion of its cycle that must be repeated severaltimes during one machine cycle. d) all of these

Answers

The jump-to-subroutine instruction can save a great deal of duplicate programming in cases d) all of these.

What is the jump-to-subroutine instruction ?

The jump-to-subroutine instruction, commonly known as a subroutine or subprogram, is a programming construct that allows a portion of code to be written once and then called or executed multiple times from different parts of a program. This helps to eliminate duplicate programming and improves code organization and maintainability.

In situations where a machine has a portion of its cycle that needs to be repeated several times within one machine cycle, a subroutine can be used to encapsulate the repeated code.

Find out more on subroutine instructions at https://brainly.com/question/29854384

#SPJ1

In the condenser of a power plant, energy is discharged by heat transfer at a rate of 1200 MW to cooling water that exits the condenser at 45°C into a cooling tower. Cooled water at 20°C is returned to the condenser. Atmospheric air enters the tower at 20°C, 1 atm, 50% relative humidity. Moist air exits at 40°C, 1 atm, 90% relative humidity. Makeup water is supplied at 15°C. Ignore kinetic and potential energy effects. For operation at steady state, determine: (a) the volumetric flow rate of atmospheric air entering, in m3/sec. (b) the mass flow rate of makeup water, in kg/sec. (c) the dew point of air exiting the cooling tower.

Answers

a) the volumetric flow rate of atmospheric air entering the cooling tower is 63.29 m³/sec.

b) the mass flow rate of makeup water is 47937.5 kg/sec.

c) the dew point of air exiting the cooling tower is 25.9°C.

(a) The volumetric flow rate of atmospheric air entering, V1 = ?

Density of atmospheric air at the entering condition, ρ3 = 1.184 kg/m³

The volumetric flow rate of atmospheric air entering the cooling tower can be determined using the formula:

V₁ = Q / (ρ₃ × Cp × (t₄ - t₃))

Where, Cp is the specific heat of air at constant pressure = 1005 J/kg K

Substituting the values in the above equation:

V₁ = 1200 × 10^6 / (1.184 × 1005 × (40 - 20)) = 63.29 m³/sec

Thus, the volumetric flow rate of atmospheric air entering the cooling tower is 63.29 m³/sec.

(b) The mass flow rate of makeup water, m5 = ?The cooling water returning to the condenser is at a temperature of 20°C.

Assuming no heat losses, the energy transferred from the condenser to the cooling water is equal to the energy taken up by the air-water mixture entering the tower.

Therefore, the energy balance equation becomes:

Q = mₐ × Cpₐ × (t₄ - t₃) + mₕ × Cpₕ × (t₅ - t₄)

Where, mₐ is the mass flow rate of atmospheric air, mₕ is the mass flow rate of water, and Cpₐ and Cpₕ are the specific heats of air and water, respectively.

Rearranging the equation we get,

mₕ = (Q - mₐ × Cpₐ × (t₄ - t₃)) / (Cpₕ × (t₅ - t₄))

Substituting the values in the above equation:

mₕ = (1200 × 10^6 - 63.29 × 1.184 × 1005 × (40 - 20)) / (4.18 × (20 - 15)) = 47937.5 kg/sec

Thus, the mass flow rate of makeup water is 47937.5 kg/sec.

(c) The dew point of air exiting the cooling tower, tdp = ?

To calculate the dew point temperature, we need to calculate the partial pressure of water vapor in the air mixture at the exit condition.

Using the formula for the saturation pressure of water vapor:

pₛ = exp(77.3450 + 0.0057T - 7235 / T)

where T is the temperature in K (Kelvin)

At the inlet condition:

ps3 = exp(77.3450 + 0.0057(20 + 273) - 7235 / (20 + 273))= 2.339 kPa

At the exit condition:

ps4 = φ4 × ps4 = 0.9 × 5.85 = 5.265 kPa

Therefore, the partial pressure of water vapor in the air-water mixture is 5.265 kPa.

At the dew point condition:

p = ps4 = 5.265 kPa

Using the steam tables, at a pressure of 5.265 kPa, the dew point temperature is 25.9°C

Therefore, the dew point of air exiting the cooling tower is 25.9°C.

Learn more about humidity at:

https://brainly.com/question/16015629

#SPJ11

(a)The volumetric flow rate of atmospheric air entering the cooling tower in m3/sec is 5.197 m3/sec

(b)The mass flow rate of makeup water supplied in kg/sec is 78.89 kg/sec

(c)The dew point of air exiting the cooling tower is 35.23°C.

A condenser is a machine that converts a gaseous substance to a liquid one. In a power plant, the condenser is used to transform steam from the turbine into water so that it may be used again. The steam produced from the power generation process is first driven through a turbine. When it exits the turbine, the steam is led to a condenser where it is cooled by water. The volumetric flow rate is the measure of how much space is occupied by a fluid or gas that passes through a given area. It is calculated by dividing the mass flow rate by the density of the fluid or gas.

Here, the volumetric flow rate of atmospheric air entering the cooling tower can be determined using the formula below;{eq}\text{Volumetric flow rate, Q} = \frac{\text{Mass flow rate}}{\text{Density}} {/eq}Density of atmospheric air at 20°C, 1 atm, and 50% relative humidity can be found using steam tables. For these conditions, the density of air is 1.1769 kg/m3.

The rate at which makeup water is supplied is equal to the rate at which cooling water leaves the tower. This is because the mass of water leaving is equal to the mass of makeup water supplied. Thus, the mass flow rate of makeup water supplied is 7.198 × 106 kg/sec.(c)To determine the dew point temperature of the moist air, we need to use a psychrometric chart.

First, we need to determine the humidity ratio of the atmospheric air. The chart shows that the relative humidity is 50% and the temperature is 20°C. At these conditions, the humidity ratio is 0.00845 kg H2O/kg dry air. Now, the humid air exits at 40°C and 90% relative humidity. On the chart, we go to 40°C and follow the 90% relative humidity line to the left until it intersects the line of 0.00845 kg H2O/kg dry air. We then read the corresponding dew point temperature from the chart, which is found to be 35.23°C.

To know about condenser visit:

https://brainly.com/question/956180

#SPJ11

Other Questions
The probability that Pete will catch fish on a particular day when he goes fishing is .8. Peter is going fishing 3 days. The variance of the number of days Pete will catch fish isa. 48b. 8c. 2.4d. 16 A number of employees have complained that they dont understand the performance review process and how they can improve their chances to advance in the Company. What is the issue? How would you handle it? In 2020, XYZ Auto Insurance ran a marketing campaign to boost its customer pool from 100,000 to105,000 customers, using a series of commercials on local TV networks and mailing to its prospective100,000 customers. The company allocated $1,000,000 as the campaigns budget but ended upspending $1,200,000 in 2020. However, the company was only able to gain 3,000 new customers. Onthe other hand, the company lost 250 customers every month during the same period. At the sametime, XYZ increased its annual customer maintenance budget by $1,000,000 to $5,000,000 to improvecustomer care for its existing customers. A newly acquired customers average annual insurancepremium is roughly $350 per year, and the average interest rate that XYZ pays to its primary bank,Delta, is 5%.A.) What is the CLV of an average customer acquired in 2020 for the next 5 years?B.) For XYZ to make a profit, at least how long must a customer be kept?PLEASE SHOW ALL WORK, USUALLY EXCEL IS USED how do you distinguish between epithelial cells and connective tissue An issue of preferred stock is paying an annual dividend of $5. The growth rate for the firm's common stock is 14%. What is the preferred stock price if the required rate of return is 11%? A. $45.45 B. $41.67 C. $35.71 D. $31.45 Compare the novel Little Women by Louisa May Alcott and the filmThe Littlest Rebel starring Shirley Temple. How do these twointertwine or influence each other? Which combination of units is equivalent to that used for force? Okg-m/s/s O kgm-s kg/(m/s) O kg/m/s Silver Pty Ltd (Silver) has three directors, Tim, Raj and Valerie. Silvers shareholders are Tim, Raj, Valerie and Li. Each shareholder owns 25 per cent of the companys shares. The three directors of Silver recently diverted business away from the company to Coffers & Co, a partnership in which they are partners. Li found out about this and confronted the directors. The directors then called a members meeting where they voted in favour of inserting a clause into Silvers constitution to allow past and future diversions to Coffers & Co, and for the directors to retain the profits received from that diversion of business. Li feels that the company has suffered a wrong and wishes to seek a remedy on behalf of the company for the wrong it has suffered. With reference to the above set of facts, and using the four-steps process, discuss the (ONE) key remedy Li could seek on behalf of the company. The combination of processes which result in the process of mountain building is called _______________ (deformation/isostatsy/orogeny).2. ____________ (Underthrusting/isostacy/erosion) refers to a state of gravitational equilibrium between the lithosphere and asthenosphere. Based on a sample of 25 people, the sample mean GPA was 2.46 with a standard deviation of 0.03The test statistic is: (to 2 decimals)The critical value is: (to 2 decimals)Based on this we: Reject the null hypothesis Fail to reject the null hypothesis globalization has made cyberterrorism a new way to attack western ideology. T/F What three services does cert provide? (choose three. ) Consider a two-firm model with a negative production externality. Let xi denote firm i s output, with i = 1, 2 . Suppose that two firms operate in two different competitive markets and each firm sells its product in its respective competitive market, at the prices p1 = 100 and p2 = 150 , respectively, and that they face the same direct production cost cixi=xi22 . Let ex1,x2=x1x2 be the external cost on firm 2s activity generated by the production of firm 1.Find each firms best response function to the output set by the other firm and compute the Nash equilibrium assuming that firms choose their output non-cooperatively and independently. Illustrate the equilibrium in an appropriate graph. [10 marks]Calculate each firms equilibrium profits and the total external cost imposed on firm 2. [5 marks]Consider a two-firm model with a negative production externality. Let xi denote firm i s output, with i = 1, 2 . Suppose that two firms operate in two different competitive markets and each firm sells its product in its respective competitive market, at the prices p1 = 100 and p2 = 150 , respectively, and that they face the same direct production cost cixi=xi22 . Let ex1,x2=x1x2 be the external cost on firm 2s activity generated by the production of firm 1.Find each firms best response function to the output set by the other firm and compute the Nash equilibrium assuming that firms choose their output non-cooperatively and independently. Illustrate the equilibrium in an appropriate graph. [10 marks] nareh began the year with a tax basis of $20,000 in her partnership interest. her share of partnership liabilities consists of $10,000 of recourse liabilities and $13,000 of nonrecourse liabilities at the beginning of the year and $10,000 of recourse liabilities and $15,000 of nonrecourse liabilities at the end of the year. during the year, she was allocated $37,000 of partnership ordinary business loss. nareh does not materially participate in this partnership, and she has $2,000 of passive income from other sources. a. How much of Jenna's loss is limited by her tax basis? Loss limited by her tax basis b. How much of Jenna's loss is limited by her at-risk amount? Loss limited by her at-risk amount C. How much of Jenna's loss is limited by the passive activity loss rules? Loss limited by the passive activity loss rules 2. A small open economy is described by the following equations: C = 50+0.75 (Y-T) I= 200-20r NX = 200-50 M/P= Y-40r G= 200 T= 200 M= 3,000 P=3 r* = 5 Use the equilibrium exchange rate, income, and net exports you calculated in problem set 4. Assume a fixed exchange rate. Calculate what happens to the exchange rate, income, net exports, and the money supply if the government increases its spending by 50. Use a graph to explain what you find. 4. The Mundell-Fleming model takes the world interest rate r* as an exogenous variable. Let's consider what happens when this variable changes. a. If the economy has a fixed exchange rate, what happens to aggregate income, the exchange rate, and the trade balance when the world interest rate rises? the volume of a cylindrical tin can with a top and a bottom is to be 16pi cubic inches b. What is the yield to maturity on a simple loan for $3 million that requires a repayment of $5 million in five years' time? 4) [20 points] Consider a survival game in which members of a large population of animals meet in pairs and either fight over or share a food source. There are two phenotypes in the population: One always fights, and the other always shares. For the purpose of this question, assume that no other mutant types can arise in the population. Suppose that the value of the food source is 200 calories, and that caloric intake determines each player's fitness. If two sharing types meet one another, they each get half the food, but if a sharer meets a fighter, the sharer concedes immediately, and the fighter gets all the food. a) [10 points) Suppose that the cost of a fight is 50 calories (for each fighter) and that when two fighters meet, each is equally likely to win the fight and get the food or to lose and get no food. i. Draw the payoff table for the game played between two random players from this population. ii. Find all the evolutionarily stable strategies in the population. Check for pure strategies as well as mixed strategies. iii. What type of game is being played in this case? b) [10 points] Now suppose that the cost of a fight is 150 calories for each fighter. As before, assume that when two fighters meet, each is equally likely to win the fight and get the food or to lose and get no food. i. Draw the payoff table for the game played between two random players from this population. ii. Find all the evolutionarily stable strategies in the population. Check for pure strategies as well as mixed strategies. iii. What type of game is being played in this case? QUIZ! 100 POINTS AND BRAINLIEST! (DONT remove this brainly)Which country has the longest coastline in the world?What is the capital of Malta?Which country is the newest in the world to be recognised by the UN?In which UK city would you find the river Clyde?What is the oldest recorded town in the UK?If you travelled to the city of Volgograd, which country would be in?What is the name of the largest river to flow through Paris?What did Ceylon change its name to in 1972?What is the most populous city in the US state of Illinois?What is the highest mountain in Britain? Beleaguered State Bank (BSB) holds $400 million in deposits and maintains a reserve ratio of 10 percent.Complete the following T-account for BSB.Beleaguered State BankAssetsLiabilitiesReserves___________ millionDeposits___________ millionLoans___________millionNow suppose that BSB's largest depositor withdraws $20 million in cash from her account. BSB decides to restore its reserve ratio by reducing the amount of loans outstanding.Complete BSB's new T-account after it has taken this action.Beleaguered State BankAssetsLiabilitiesReserves___________millionDeposits_____________millionLoans_____________ millionBecause BSB is cutting back on its loans, other banks will find they have excess or insufficient? reserves, causing them to Increase or Decrease ? their loans.BSB may find it difficult to cut back on its loans immediately because it cannot force people to pay off loans.Which of the following ways represent an alternative for BSB to return to its original reserve ratio? Check all that apply.Attract additional depositsBorrow money from another bankLend moneyBorrow money from the Fed