the keyword ""this"" in java refers to the child of the current parent object. the term ""this"" demonstrates a useful keyword in java. is the statement true or false?

Answers

Answer 1

True. In Java, the word "this" designates the current object and can be used to access methods and class members that are part of the same class. It can also be used to pass an object to a method as an argument.

The current object or instance within a class is referred to as "this" in Java. It is used to access class members from within another class, such as variables and methods. In order to access class members from within a function Object() { [native code] }, it is extremely helpful to be able to refer to methods and variables without using their full names. It may also be used to pass an object to a method as an argument. This is helpful when developing classes with several constructors that each expect a certain object to be supplied to them. When referencing an object that was generated inside of a method but needs to be referenced outside .

Learn more about java here:

brainly.com/question/28452505

#SPJ4


Related Questions

what internal controls does netflix have in place

Answers

The initial one happened in late 2001. Netflix had been expanding swiftly; we had a staff of around 120 people and were preparing for an IPO.

However, with the 9/11 attacks and the collapse of the dot-com boom, circumstances changed. It soon became apparent that we needed to cancel the IPO and let go of a third of our workforce. It was harsh. Then, quite unexpectedly, DVD players started to dominate the Christmas gift market. Our DVD-by-mail subscription business was exploding by the beginning of 2002. Suddenly, we had 30% fewer people and far more work to complete. A few months following our IPO in 2002, we had our second conversation. Our bookkeeper, Laura, was intelligent, diligent, and imaginative.

Learn more about subscription here-

https://brainly.com/question/14488456

#SPJ4

how to wtight a cover lette for an attachment

Answers

Fortunately, you may still create a strong cover letter for companies even if you lack experience. If you need an example letters or have questions on how to compose an attachment letter.

This manual is intended for you and will instruct you on how to draught your own.

Write with a formal tone

Create a distinctive cover letter.

emphasise your academic background

Describe your extracurricular activities.

Include your capabilities and talents

Revision and editing the letters

Are you currently filling out an internship application? Similar to when you apply for a job, you must provide a cover letter with your application. However, applying for internships is quite a bit different because there's a good possibility you don't have much experience and have only a few qualifications. Most applicants for internships struggle to respond to the topic of how to write an attachment letter without experience.

Learn more about Letters here:

https://brainly.com/question/1476323

#SPJ4

given a logical address 0x46a6 (in hexadecimal) with a page size of 256 bytes, what is the page number? a. 0x4a b. 0x4a6 c. 0x4646 d. 0x46 e. 0x004a f. your answer:

Answers

The page number will be D) 0x46 if you are given a logical address 0x46a6 (in hexadecimal) with a page size of 256 bytes.

To find the page number, we need to divide the logical address by the page size and take the floor of the result. In this case, the logical address 0x46A6 divided by the page size of 256 bytes (0x100 in hexadecimal) is 0x46A6 / 0x100 = 0x46 with a remainder of 0xA6. Therefore, the page number is 0x46.

This means that the memory access with logical address 0x46A6 belongs to the 46th page in the memory. The page number helps to determine the physical address of the data being accessed in the memory.

For more questions like Logical address click the link below:

https://brainly.com/question/27897332

#SPJ4

when designing an app that uses hardware sensors, what is it important to plan for if the device cannot provide a reading?

Answers

When designing an app that uses hardware sensors, it is important to plan for cases where the device cannot provide a reading (e.g. due to malfunction, low battery, etc.). To handle such cases, it is important to consider the following:

Error handling.Backup plan.User notification.Graceful degradation.Regular maintenance.

App should have proper error handling mechanism to handle such scenarios. Have an alternative solution in case the sensor is unavailable, e.g. using data from a previous session or using a default value. The app should inform the user if the sensor is unavailable or if there is an error in reading the data. The app should continue to function even if some data is missing or if the sensor is unavailable, in a way that does not impact the overall user experience. Regular maintenance and testing of the sensors to ensure that they are working correctly and to identify and fix any issues early.

Learn more about designing an app: https://brainly.com/question/28214415

#SPJ4

6. question 6 in r, what includes reusable functions and documentation about how to use the functions?

Answers

Packages in R come with reusable R functions as well as usage instructions. Some sets of data and tests for validating your code are also included.

Describe function.

A mathematical connection between two variables in which one depends on the other is known as a function. Either a formula, graph, or table can be used to represent this relationship. For each input, there is only a single output. This implies that the input to a function determines its output. We can make predictions and find solutions by using functions to model real-world phenomena.

When dealing with data in R, packages are an excellent method can save time and effort.

Working with R packages is a terrific approach and save time and effort.

When working with information in R, R packages are a terrific method to save effort and time. They offer an easy approach to have access to numerous data sets, functions, and documentation in one location. Many programs also include samples data and code samples to aid users in getting started with the data analysis right away.

To learn more about Functions refers to;

brainly.com/question/30096309

#SPJ4

1. explain how the computer fraud and abuse act and the electronic communications privacy act each specifically relate to the criminal activity described in the case study.

Answers

Anyone who gains unauthorised access to a computer or computer system utilised by a financial institution, a US government agency, or any other business or person engaged in international trade or.

communication is breaking the Computer Fraud and Abuse Act of 1986.The CFAA lists seven different types of illegal activity: stealing confidential information, compromising national security, accessing a government computer without permission, accessing a computer to commit fraud and steal money, damaging a computer or information, trading in passwords, and threatening to damage a computer. The following actions are prohibited by the Act: Unauthorized alteration of computer material. Unauthorized access to computer material. Unauthorized access to computer material with the purpose to commit or assist in the commission of a new offence.

To learn more about business click the link below:

brainly.com/question/15826604

#SPJ4

how to make a comic book in power point

Answers

Since PowerPoint is primarily used for presentations, it lacks the proper tools for producing books. Word is a writing tool, therefore it does have the necessary features, and Word will be used for everything that happens after writing.

By selecting Design > Designer on the ribbon, you may request design suggestions at any moment. PowerPoint provides slide design suggestions. In the Designer pane on the right side of the window, scroll through the suggestions. Click to choose the desired design, or click to close the window. You can create a comic even if you can't paint or draw. Some instructors believe the format is an effective approach to encourage kids to write creatively. You may create digital comics on a smartphone, tablet, computer, or even just a simple piece of paper with the help of a number of programmes.

To learn more about PowerPoint click the link below:

brainly.com/question/14498361

#SPJ4

given an ip address of 128.34.4.5, how do network packets know to find the location?

Answers

As you can see, the packet contains the sender's IP address. This also explains how Host2, the recipient in this case, is aware of the sender.

To answer your question, we must examine two potential outcomes. Both instances will be assumed to include two computers acting as legitimate hosts in a data transfer attempt. By doing so, the examples will remain clear and concise while yet including all necessary information. In the first example, we'll look at how two computers connected to the same workplace or network communicate with each other, while in the second situation, we'll look at two computers communicating with each other over the Internet.

First Case: Both hosts are connected to the same network.

Host1-----

{Switch}——

Host2

In this instance, data transmission from Host1 (IP address 192.168.0.10) to Host2 is required (IP 192.168.0.12).

Learn more about IP address here:

https://brainly.com/question/16011753

#SPJ4

which form of media typically has the lowest fps

Answers

Typically, the frame rate for conventional hand-drawn 2D animation is 12 frames per second (fps).

What is a suitable FPS rate?

The typical frame rate for movies and streaming media is 24 FPS. Standard frame rates for TV video are 25 FPS for the UK and Europe and 30 FPS for the US and other countries. For fast-moving footage, like sports coverage, the greater frame rate is beneficial.

Is 20 a reasonable frame rate?

20–30 FPS: On the edge. Depending on the game, some individuals may be content with 20–30 frames per second. A fast-paced game with little than 30 FPS may still feel undesirable to certain players. Playable at 30–45 FPS.

To know more about Fps visit:

https://brainly.com/question/13435515

#SPJ4

what other technical name or pdu can be used to represent the session presentation and application layer?

Answers

PDUs at the application layer are typically referred to as communications. A PDU is referred to as a packet, while SCTP packets are made up of an extra unit referred to as a chunk. Datagrams are another name for IP packets.

What is PDU name of application layer?

In the OSI layer of a network, the protocols data unit serves as the exemplary data unit. The OSI system's seven layers.

The protocol data units is represented in bits of data at the physical layer, which is the topmost layer of the system.

Keep in mind that on the network layer of the OSI network system, the term "packet" refers to the PDU for data.

The OSI layer of a network's protocol data unit serves as a representative data unit. The OSI system's seven layers.

The protocol data units is represented in bits of data at the physical layer, which is the topmost layer of the system.

Keep in mind that on the network layer of the OSI network system, the term "packet" refers to the PDU for data.

To learn more about PDU refers to;

brainly.com/question/20738575

#SPJ4

at the end of the sprint, frank - as the scrum master of a scrum team - is invited for the sprint review meeting. while presenting the user stories some unexpected error messages pop up and then the application crashes. what should frank do?

Answers

Frank, as the Scrum Master of the team, should work with the team to analyze the cause of the unexpected errors and crashes.

They should evaluate the user stories to identify any potential issues, and review the code for any bugs that could be causing the errors and crashes.

Additionally, they should look into any external dependencies that could be causing the issues and consider any changes that could be made to improve the quality of the user stories. Once they have identified and addressed the issue, they should re-test the user stories to ensure that the issue has been resolved.

Learn more about the Scrum Master:

https://brainly.com/question/4763588

#SPJ4

when 8 bits are grouped together as a unit, they form a(n)

Answers

According to the statement, a byte is created as 8 bits are combined into one chunk.

Comparing quantity and unit?

Quantity: A measurable quality, such as bulk, length, speed, volume, or pressure. A unit is a reference amount used to measure other quantities (for example, a gram, a second, a litre, or a pascal are equivalents of the above quantities).

Is a size a unit?

The area of either a unit as depicted on the subdivisions or transfer map that created the unit is referred to as its size. The lot, tract, or parcel length divided by the amount of units is the unit size for two-family and second homes on a single unit.

To know more about Bits visit:

https://brainly.com/question/8431891

#SPJ4

the ssid of wireless network would be best described in which manner?

Answers

SSID: Service set identifier is known as SSID. Case-sensitive letters, digits, and special characters like dashes, periods, and spaces can all be used to create this one-of-a-kind ID.

An SSID can have up to 32 characters in length in accordance with the 802.11 wireless local area networks (WLAN) specification.

How should an SSID be formatted?

Any alphanumeric, case-sensitive entry with 2 to 32 characters in length can serve as the SSID. The following six characters are prohibited:?, ", $, [,,], and +. Printing characters and the space (ASCII 0x20) are both permitted.

What kind of SSID is ideal?

There is a strong likelihood that there are several wireless networks nearby, thus the SSID needs to be distinctive. Separately configure the 2.4GHz and 5GHz Wi-Fi channels. This might be a distinctive name, then 2G or 5G, as appropriate. One SSID for both Wi-Fi bands is preferable if your router supports band steering.

To learn more about Case-sensitive letters here:

https://brainly.com/question/30037789

#SPJ4

events, cases and actions make up an interaction. what was the event used to set focus on textfield1 when the page loaded?

Answers

The event used to set focus on textfield1 when the page loaded would be an onload event.

Setting Focus on Textfield1 Using the Onload Event

The onload event is fired when the page has finished loading in the browser. It allows developers to specify a function or code to be executed after the page has been loaded. In this case, the onload event was used to set focus on textfield1 when the page loaded. This can be achieved by assigning a JavaScript function to the onload event, which contains a statement that sets the focus to the desired textfield. This way, the user can start typing in the textfield without having to manually set focus on it.

Learn more about programming: https://brainly.com/question/16397886

#SPJ4

(1 pt) your isp sent you the following information. default gateway 130.75.69.32/22 what is the proper subnet mask for this ip address (in dotted decimal format)?

Answers

The subnet mask for the IP address 130.75.69.32 with a default gateway of /22 is 255.255.252.0 in dotted decimal format. To calculate the subnet mask, we convert the number of network bits to binary and then convert the binary number to dotted decimal format.

A default gateway of /22 means that the first 22 bits of the IP address represent the network address, and the remaining bits represent the host address. In this case, the first 22 bits would be set to 1, and the remaining 10 bits would be set to 0. The binary representation of the subnet mask would be 11111111.11111111.11111100.00000000, which when converted to dotted decimal format is 255.255.252.0.

Learn more about ip address: https://brainly.com/question/16011753

#SPJ4

what do mockups allow designers to do?

Answers

Answer:

Mockups are a crucial part of the design thinking process because they answer important visual questions (like layout, color, and hierarchy) and allow designers to start high-fidelity prototyping. Mockups also provide engineers with a visual reference to start the development phase.

It is created to bring life to an idea or wireframe and allows a designer to test how various visual elements work together. Mockups gives stakeholders in the page the ability to see what that page will look like while making suggestions for changes in layout, color, images, styles, and more.

Explanation:

Before committing to their designs, designers can use mockups to experiment with layouts, colors, and typography computers as well as see how their work will look in advance.

Designers can easily test out various design aspects with mockups before committing to them. A mockup is a design prototype that can be used to show how the finished product will seem. Designers may easily and quickly test out various layouts, colors, fonts, photos, and other design elements to see how they will seem in the context of the finished product by producing a mockup. This enables designers to confirm that their ideas will be appealing and functional before committing to them. Before committing to their designs, designers can get feedback on them using mockups. Designers can gain a sense of how their ideas will be viewed by others by displaying their mockups to them and making adjustments accordingly.

Learn more about computers here:

brainly.com/question/30206316

#SPJ4

5. in the example of the y2k bug, do you think that the hypothetical programmer dave took the wrong approach in storing years as only two-digits. if your group has divided opinions, say so. (2)

Answers

No and yes. While some could connected that Dave made a mistake, others might concur that it was a workable option at the time. It depends on the individual's point of view.

The Y2K bug was a computer error brought on by the programming of two-digit years. When it was thought that computers wouldn't last more than a few decades, this was a widespread technique in the 1980s and 1990s. The issue was that when the year 2000 arrived, computers wouldn't be able to tell the difference between 1900 and 2000. There was a lot of panic and confusion as a result. Because it was a realistic option at the time, hypothetical coder Dave had the forethought to save years as two-digits. However, it is feasible to argue that Dave made the incorrect decision in the long run because two-digit years may cause issues in the future.

Learn more about connected here-

brainly.com/question/14327370

#SPJ4

When leakage current is detected by the probe in an IDCI- or ALCI- protected appliance, power is cut off to the appliance when the appliance switch is in the position.
Select one:
a. ON
b. OFF
c. either a or b

Answers

When leakage current is detected by the probe in an IDCI- or ALCI- protected appliance, power is cut off to the appliance when the appliance switch is in the position. It is on. The correct option is a.

What is leakage current fault?

When a fault between 4 and 6 milliamps is detected, the ALCI is intended to trip similarly to a GFCI. It is typically found as the sizable plug on a hand-held hair tool, like a hair dryer or curling iron.

Any value below 6 mA that can detect submersion of the connected device qualifies as the trip current. The existence of a grounded object is not necessary for an IDCI to operate.

Therefore, the correct option is a. ON.

To learn more about leakage current fault, refer to the link:

https://brainly.com/question/21864151

#SPJ1

which type of network architecture provides a way to isolate private internal networks from outside attacks? (5 points) dmz lan nat tun

Answers

DMZ networks are frequently used to: isolate and keep prospective target systems apart from internal networks; lessen and regulate external users' access to such systems;

Why are DMZ zones used in networks?

The goal of a DMZ to safeguard the hosts that are most susceptible to attacks, there is a DMZ network. These hosts typically host services that are accessible to users outside of the LAN, with email, web servers, and DNS servers serving as the most prevalent examples.

What are the techniques for isolating a network?

Techniques for network isolation prohibit network hosts from accessing system network resources that are not absolutely necessary. The number of computers that a host can connect with across their LAN is constrained by broadcast isolation. blocking the domain name value of the response from a reverse DNS search. preventing a reverse search based on IP address of the query.

To know more about DMZ visit:

https://brainly.com/question/27360592

#SPJ4

given the configuration of the join tool, how many output columns will be created?

Answers

Join tool possesses three. Only fields that match each other will be output in the J output based on configuration-selected fields.

Using a similarity between the two tables, the join tool joins two inputs. Similar to a SQL join, but with the ability to produce three outputs from the join. To combine two inputs based on shared fields across two tables, use join. Additionally, two data streams can be joined based on record position. Based on one or more shared fields between the two tables, the Join tool merges two inputs. Additionally, two data streams can be joined based on record position. The join produces the following three outputs: Records from the L input that did not join to records from the R input are included in the L output.

To learn more about Join tool click the link below:

brainly.com/question/29647093

#SPJ4

if data contains a one-dimensional array, which instruction using matplotlib.pylot (imported as pp) creates a plot of the array value versus array index?

Answers

If DATA contains a one-dimensional array, which instruction using matplotlib. Pylot (imported as pp ) creates a plot of the array value versus array index is pp. plot(DATA) .

Define one-dimensional array?A One-Dimensional Array is the most basic type of array, in which the elements are stored linearly and can be accessed individually by specifying the index value of each element in the array.A one-dimensional array in C is essentially a list.Each list element contains only one value, which can be an int, char, or float. Three values are typically required to declare an array: the data type, the array name, and the number of elements to be contained in the array.One-dimensional (1D) nanostructured materials, such as nanotubes, nanofibers, and nanowires, have piqued the interest of researchers due to their intriguing properties and broad range of potential applications.

To learn more about one-dimensional array refer to:

https://brainly.com/question/28505614

#SPJ4

What am I doing wrong please HELP

Answers

I think the problem here is that the statements in the body of the while loop are not indented. It works for me with the indentation, as shown in the screenshot attached.

true/false: a while loop is somewhat limited because the counter can only be incremented or decremented by one each time through the loop.

Answers

true a while loop is somewhat limited because the counter can only be incremented or decremented by one each time through the loop.

Does the fact that the counter can only be increased make a while loop somewhat constrained?

Because the counter can only be increased by one each time the loop is executed, a while loop has several limitations. If initialization is not necessary, the for loop may not include an initialization phrase. The break statement can be used to end a loop before all of its iterations have been completed.

What is the condition that a while loop checks for?

An action is repeated a certain number of times in this while loop. Before the loop begins, a counter variable is created and initialized with a value. Before starting each iteration of the loop, the following condition is tested.

To know more about while loop visit:-

https://brainly.com/question/12945887

#SPJ4

If I had a varchar400 column, but it has nothing but numbers in it, what function do I use to change it to int IS NUMERIC LTRIM . CAST AND CONVERT . IS NULL . SUBSTRING

Answers

The correct answer is CAST AND CONVERT. If I had a varchar400 column, but it has nothing but numbers in it, what function do I use to change.

1. In type casting, a programmer changes one data type into another by using the casting operator. While a compiler transforms a data type into another data type via type conversion. 2. The fundamental purpose of the SQL CAST function is to change the data type of an expression. This function returns an error if the SQL Server CAST function is unable to convert a declaration to the desired data type. We use the CAST function to convert numeric data into character or string data.

To learn more about CAST AND CONVERT click the link below:

brainly.com/question/15074782

#SPJ4

a programmer has a need to round many numeric values to the nearest integer. which of the following best explains the benefit of using a list as a data abstraction in this situation? responses keeping the numeric values in a list makes it easier to round a number to the nearest integer. keeping the numeric values in a list makes it easier to round a number to the nearest integer. keeping the numeric values in a list makes it easier to apply the same computation to every data element. keeping the numeric values in a list makes it easier to apply the same computation to every data element. keeping the numeric values in a list makes it easier to prevent a program from unintentionally changing the value of a variable. keeping the numeric values in a list makes it easier to prevent a program from unintentionally changing the value of a variable. keeping the numeric values in a list makes it easier to prevent a program from attempting to access an index beyond the length of the list.

Answers

Applying the same procedure to every data element is simplified by keeping the numerical values in a list. Many numerical numbers must be rounded by a coder to the nearest integer.

Which of the following traits characterizes well-named variables in computer programs?

Lists are collections of values that are populated within square brackets and separated by commas. They are changeable, making it simple to retrieve, add to, remove from, or replace values. As a result, using a list for data abstraction has the advantage that all of the list's values can simply be subjected to the round function.

Using a for loop, which iterates through each value in the list one at a time, it is simple to round the values in the list. They are added to another list after being rounded to the nearest integer.

To know more about numerical values visit:-

https://brainly.com/question/19663371

#SPJ4

Machine learning systems analyze patterns in data to improve their performance automatically.
True
False

Answers

Note It is TRUE to state that Machine learning systems analyze patterns in data to improve their performance automatically.

What is a Machine learning System?

Machine learning is a branch of artificial intelligence that is widely described as a machine's capacity to mimic intelligent human behavior. Artificial intelligence systems are used to do complicated tasks in a manner comparable to how people solve issues.

There are three forms of machine learning: supervised, unsupervised, and reinforcement learning.

Machine learning is used in search engines, email filters to filter out spam, websites to create personalized recommendations, banking software to detect anomalous transactions, and many apps on mobile phones, such as voice recognition.

Learn more about Machine Learning Systems:
https://brainly.com/question/28470561
#SPJ1

Comunidad Valenciana (2010). 2. Se tiene una dirección IP 172.17.111.0 mascara 255.255.254.0, ¿Cuántas subredes y cuantos hosts validos habrá por subred?
ACLARACIÓN: Parece que la solución de tribunal respetó la ‘subred cero’ y la ‘todo unos’.
answer choices
126 subnets with each 512 hosts.
128 subnets with each 510 hosts.
126 subnets with each 510 hosts.
126 subnets with each 1022 hosts.

Answers

126 subnets, each containing 510 hosts There is an IP address of 172.17.111.0 masking 255.255.254.0,

One network is divided into smaller networks by a technique called subnetting. Subnetworks (or subnets) are the collective term for the smaller networks, while a subnetwork is a single subdivision of a subnetwork (more commonly referred to as a subnet). A component of the IP address that is shared by every machine connected to a subnet is the same. In IPV4 (Internet Protocol Version 4), the term "routing prefix" (also known as "subnet mask") refers to this shared data. "Quad-dotted decimal representation" describes the subnet mask.

You may use this IPv4 Subnet Chart to find up how a network is divided into subnets.

Learn more about Subnets here:

https://brainly.com/question/15055849

#SPJ4

a 5 period moving average is used on a time series of 25 values. how many moving average values are available

Answers

There are 20 moving average values available, calculated by taking the average of the last 5 values for each of the 25 values in the time series.

A 5 period moving average is a type of technical analysis tool used to analyze the trend of a given time series. It is calculated by taking the average of the last 5 values in the time series. In this example, there are 25 values in the time series, so the moving average will be calculated for each of those values. This means that there will be 20 moving average values available, calculated by taking the average of the last 5 values for each of the 25 values in the time series. The moving average is used to smooth out short-term fluctuations and highlight longer-term trends or cycles. It can help to identify support and resistance levels, as well as provide an indication of momentum. It is also useful for identifying trend reversals, as prices tend to stay above or below the moving average.

Learn more about average here

https://brainly.com/question/24057012

#SPJ4

load the lahman library. filter the teams data frame to include years from 1961 to 2001. what is the correlation coefficient between number of runs per game and number of at bats per game?

Answers

Between 1961 and 2001, teams' handle average runs per game and at-bats per game correlated strongly positively, with a correlation coefficient of 0.861.

The strength of the linear link between two variables is gauged by the correlation coefficient. A perfect linear relationship is shown by a correlation coefficient of 1, whereas a teams' average runs per game and at-bats per game correlated strongly positively perfect inverse linear relationship is indicated by a correlation coefficient of -1. The correlation coefficient for runs per game and at bats per game for teams from 1961 to 2001 is 0.861, indicating a significant positive linear link. This indicates that as there are more at bats in a game, there are also more runs. Intuitively, this makes obvious because teams

Learn more about Handle here:

brainly.com/question/10601085

#SPJ4

luca's running a app campaign for news publisher world news online. why should luca care about the quality of world news online's listing on play? (choose two.)

Answers

Luca should care about the quality of World News Online's listing on Play because it will affect the visibility of their app and how users perceive it.

High quality listings will make the app stand out in the Play Store and will make it more likely for users to download and use it. Additionally, high quality listings make it easier for users to find the app and understand what it does, which will help with engagement and retention.

Additionally, a high quality listing will help to create a good impression and make users more likely to download and use the app. Finally, a good listing will help with engagement and retention, as users will be able to quickly find the app and understand what it does.

Learn more about quality of world:

https://brainly.com/question/28739333

#SPJ4

Other Questions
a railroad car of mass 2.00 x 10 4 kg moving at 3.00 m/s collides and couples with two coupled railroad cars, each of the same mass as the single car and moving in the same direction at 1.20 m/s. what is the speed of the three coupled cars after the collision? (1.8 m/s) If the long chord and tangent length of a circular curve of radius R are equal the angle of deflection, isa)300b)600c)900d)1200 If p is a nonconstant polynomial, a is a number and p(a) = 0, then..p(x) can be factored into (x-a)q(x), where is a polynomial of degree one less than the degree of p. p(x) must be equal to the zero polynomial, i.e. p(x) = 0. p(x) must be equal to (x-a).p(x) must be equal to (x-a)(x-b) where b is another number. Evaluate the function as indicated below. During the planning phase of the audit, you met with Pinnacles management team and performed other planning activities. You encounter the following situations that you believe may be relevant to the audit: 1. Your firm has an employee who reads and saves articles about issues that may affect key clients. You read an article in the file titled, "EPA Regulations Encouraging Solar-Powered Engines Postponed?" After reading the article, you realize that the regulations management is relying upon to increase sales of the Solar-Electro division might not go into effect for at least ten years. A second article is titled, "Stick to Diesel Pinnacle!" The article claims that although Pinnacle has proven itself within the diesel engine industry, they lack the knowledge and people necessary to perform well in the solar-powered engine industry. 2. You ask management for a tour of the Solar-Electro facilities. While touring the warehouse, you notice a section of solar-powered engines that do not look like the ones advertised on Pinnacles Web site. You ask the warehouse manager when those items were first manufactured. He responds by telling you, "Im not sure. Ive been here a year and they were here when I first arrived." 3. You also observe that new computerized manufacturing equipment has been installed at Solar-Electro. The machines have been stamped with the words, "Product of Welburn Manufacturing, Detroit, Michigan." 4. During discussions with the Pinnacle controller, you learn that Pinnacle employees did a significant amount of the construction work for a building addition because of employee idle time and to save costs. The controller stated that the work was carefully coordinated with the construction company responsible for the addition. 5. While reading the footnotes of the previous years financial statements, you note that one customer, Auto-Electro, accounts for nearly 15% of the companys accounts receivable balance. You investigate this receivable and learn the customer has not made any payments for several months. 6. During a meeting with the facilities director, you learn that the board of directors has decided to raise a significant amount of debt to finance the construction of a new manufacturing plant for the Solar-Electro division. The company also plans to make a considerable investment in modifications to the property on which the plant will be built. 7. While standing in line at a vending machine, you see a Pinnacle vice president wearing a golf shirt with the words "Todd-Machinery." You are familiar with the company and noticed some of its repairmen working in the plant earlier. You tell the man you like the shirt and he responds by saying, "Thank you. My wife and I own the company, but we hire people to manage it." 8. After inquiry of the internal audit team, you realize there is significant turnover in the internal audit department. You conclude the turnover is only present at the higher-level positions. 9. While reviewing Pinnacles long-term debt agreements, you identify several restrictive covenants. Two requirements are to keep the current ratio above 2.0 and debt-to-equity below 1.0 at all times. 10. The engagement partner from your CPA firm called today notifying you that Brian Sioux, an industry specialist and senior tax manager from the firms Ontario office, will be coming on-site to Pinnacles facilities to investigate an ongoing dispute between the Internal Revenue Service and Pinnacle. 11. A member of your CPA firm, who is currently on-site in Detroit at the Welburn division, calls you to see how everything is going while you are visiting Solar-Electro in Texas. During your conversation, he asks if you know anything about the recent intercompany loan from Welburn to Solar-Electro. Required a. Review Part I of the case and the situations in Part II and identify information that affects your assessment of acceptable audit risk. Note that only some of the situations in Part II will relate to acceptable audit risk. Classify the information based on the three factors that affect acceptable audit risk. External users reliance on financial statements Likelihood of financial difficulties Management integrity b. Assess acceptable audit risk as high, medium, or low considering the items you identified in requirement a. (A risky client will be assessed as a low acceptable audit risk.) Justify your response. c. Identify inherent risks for the audit of Pinnacle using the information from Parts I and II. For each inherent risk, identify the account or accounts that may be affected. Please answer a, b and c for 7, 8 & 9. how does gene flow affect genotype and phenotype of a population? when naming an ionic compound, the is always named first. to name the anion, the root of the nonmetal name is added to the suffix - . the anion o2 is therefore named . How do I solve for this arclength problem? I am gto an intigral of sqrt(1+cos2x) and when i solve for it it should be 1 but that wont work explain one historical situation in the period 1750-1900 other than the one illustrated in the passage in which the development of industrial capitalism affected economic or societal structures the republican party of texas and republican candidates have shifted the most on which political issue, even in light of the changing demographics of the state and the nation? punctuate these sentences: Henry reported I was supposed to do it a public health nurse is presenting an educational event to the local disaster response team on radiation injury. the nurse describes a client whose burns and trauma are evident. what type of radiation injury is this? Read the excerpt and answer the question."He has made her, if married, in the eye of the law, civilly dead."In this excerpt from Elizabeth Cady Stanton's Declaration of Sentiments, the phrase civilly dead is an example of which rhetorical device?a.) denotative languageb.) technical languagec.) connotative languaged.) figurative language A cyclist took 180 min to cover a 38-km course. For the first 29 km, he cycled at a speed of 15 kph. Find his speed for the remaining 26 km of the course. ( show solution please ) how does alex's comparison of day and night in part 1, chapter 4 help you understand how night and darkness function symbolically in the novel? how useful is power in analyzing the foreign policies of third world states. In the story, Jake says it's 6:45 pm but Summer says it's 6:30 pm. Who is right and how do we know? ** answers for the whole test are in the comments** I got a 100 a chef Cuts 3/4 lb of cheese. he put aside 1/8 of the cheese to top his lasagna. how much cheese will he put on top Political parties in Texas are currently more influential in some parts of the state than in others. Match the party on the left with the area on the right in which it tends to dominate. Which are true of algorithms (in the strict sense of the term)?a. There must be at least one input b. There must be at least one output . The algorithm should halt after a finite number of steps d. Each step should be clear and unambiguous e. The result should be correct in all cases