Richard Palm is the accounting clerk of Olive Limited. He uses the source documents such as purchase orders, sales invoices and suppliers’ invoices to prepare journal vouchers for general ledger entries. Each day he posts the journal vouchers to the general ledger and the related subsidiary ledgers. At the end of each month, he reconciles the subsidiary accounts to their control accounts in the general ledger to ensure they balance.
Discuss the internal control weaknesses and risks associated with the above process. (maximum 300 words)

Answers

Answer 1

Answer:

Lack of segregation of duties

Explanation:

Internal Controls are set of rules and guidelines that are followed to ensure effectiveness of business operations. The main risk in the business is weak internal controls. There are some organizations with strong internal controls but implementation of such controls is a challenge for organizations. There are human errors, IT security risks, fraud and compliance risk.

The risks associated with Olive limited is that there is no segregation of duties, Richard Palm is preparing journal vouchers, posts the journal vouchers and reconciles the balance himself. If he makes an error in recording a transaction there is no one who reviews his work and can identify an error. Also if Richard is involved in a fraud and collaborates with purchase department or sales department staff, he can pass a transaction without any supervision.


Related Questions

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Answers

Answer: Provided in the explanation section

Explanation:

The question says :

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Solution:

Here, our fundamental aim is to look for the content which is having single space between different sentences. As it sentences finishing with . Going before with single and various spaces we have to channel and match just e the sentences which are finishing with ". "

For this we use order called "GREP" in Unix. "GREP " represents worldwide quest for standard articulation. This order is utilized inquiry and print the lines that are coordinating with determined string or an example. The example or indicated string that we have to look through we call it as customary articulation.

Syntax of GREP:

GREP [OPTIONS] PATTERN [FILE_NAME]

​​​​​​For our solution please follow the command

GREP "*\•\s$" userNotes.txt

Now it will display a all the lines having . Followed by single space.

a. Create a console-based application named Desks that computes the price of a desk and whose Main() method calls the following methods:
• A method to accept the number of drawers in the desk as input from the keyboard. This method returns the number of drawers to the Main() method.
• A method to accept as input and return the type of wood—‘m’ for mahogany, ‘o’ for oak, or ‘p’ for pine.
• A method that accepts the number of drawers and wood type, and calculates the cost of the desk based on the following:
• Pine desks are $100.
• Oak desks are $140.
• All other woods are $180.
• A $30 surcharge is added for each drawer.
• This method returns the cost to the Main() method.
• A method to display all the details and the final price.
b. Create a GUI application named DesksGUI that accepts desk order data from TextBox

Answers

Answer:

Explanation:

Code:-

using System;

using System.Linq;

using System.Collections;

using System.Collections.Generic;

public class Test{

public static int no_drawer(){

Console.WriteLine("Enter the number of drawers : ");

return Int32.Parse(Console.ReadLine());

}

public static char wood_type(){

Console.WriteLine("Enter the type of woods('m' for mahogany, 'o' for oak, or 'p' for pine) : ");

return Console.ReadLine()[0];

}

public static double final_cost(int d,char ch){

double cost = 0.0;

if (ch == 'p') cost += d*100;

else if (ch == 'o') cost += d*140;

else cost += d*180;

cost += d*30;

return cost;

}

public static void display(int d,char ch,double p){

Console.WriteLine("Number of drawers : "+d);

if (ch == 'p')

Console.WriteLine("Type of Wood Chosen : pine");

else if (ch == '0')

Console.WriteLine("Type of Wood Chosen : oak");

else if (ch == 'm')

Console.WriteLine("Type of Wood Chosen : mahogany");

else

Console.WriteLine("Type of Wood Chosen : other");

Console.WriteLine("Total Cost is : "+p);

}

public static void Main(){

int drawers = no_drawer();

char ch_wood = wood_type();

double res = final_cost(drawers,ch_wood);

display(drawers, ch_wood,res);

}

}

cheers i hope this helped !!!

Which of the following statements is true? The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. NetWitness Investigator is available at no charge while Wireshark is a commercial product.

Answers

Answer:

Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.

Explanation:

Wireshark is a computer software that was Initially released in the year 1998. The software was written in language (programming language) such as the C++ and the C programming language.

Originally, the main author of the Wireshark software is a man named Gerald Combs.

Wireshark is used in analyzing network protocols and software troubleshooting

Infomation such as antennae signal strengths can also be gotten by using Wireshark.

Hence, "Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues." Is the correct Option.

This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours

Answers

Answer: provided in the explanation section

Explanation:

Network Merging and Acquisitions

Environment:

· 400 Windows Servers

· 8000 Windows client devices (laptops running Windows os)

· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.

· Unix servers(Other environment to be merged)

· host resolution they use is BIND

A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.

Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.

Quick & Dirty IPSEC Tunnel

When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.  

Main problems with quick and dirty IPSEC tunnels are

Maintaining network lists manually.

manual maintenance of route injection into the IGP.

Probable single points of failure.

Using SD-WAN As Acquisition Network Glue:

Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers

1. Easily managed redundant plumbing :

SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.

2. IGP integration:

When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.

3. Segment isolation:

An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.

Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.

4. Service chaining:

Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.

Drawbacks Of The SD-WAN Approach

A few drawbacks in using SD-WAN as a network merger tool come to mind.

Cost:

The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.

Remote hands:

In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network

Perhaps not quick and dirty enough:

The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.

To Conclude:

Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.

If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.

SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.

Implement the method remove_all in the ArrayList class which takes the parameter x and removes all occurences of x from the list.

E.g., calling remove_all('a') on an ArrayList with contents ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a'] should result in the updated ArrayList ['b','r','c','d','b','r']

Answers

Answer:

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

Explanation:

The code is written in python

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

I declared a variable a and stored the list of value.

a = [x for x in a if x != 'a']

I used list comprehension to loop through the array and find any value that is not 'a' .

print(a)

I printed every value that is not 'a' in the array.

Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person’s BMI is calculated with the following formula:

BMI = weight x 703 / height2

where weight is measured in pounds and heightis measured in inches. The program should ask the user to enterhis/her weight and height. The program should display a message indicating whether the person has optimal weight, is underweight, or is overweight. A sedentary person’s weight is considered optimal if his or her BMI is between18.5 and 25. If the BMI is less than 18.5, the person is considered underweight. If the BMI valueis greater than 25, the person is considered overweight

Answers

Answer:

This program is written using C++

Comments are used to explain difficult lines

Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float BMI, Height,Weight;

// Prompt user for inputs

cout<<"Ener Height (in inches): ";

cin>>Height;

cout<<"Enter Weight (in pounds): ";

cin>>Weight;

//Calculate BMI

BMI = (Weight * 703)/(Height * Height);

cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;

//Test and print whether user is underweight, overweight or optimal

if(BMI>=18.5&&BMI<=25)

{

 cout<<"You have an optimal weight";

}

else if(BMI<18.5)

{

 cout<<"You are underweight";

}

else if(BMI>25)

{

 cout<<"You are overweight";

}  

return 0;

 

}

See attachment for .cpp source file

3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
pseudocode and explain your logic.​

Answers

Answer:

No, it can't be verified with a pseudocode.

Explanation:

We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.

Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.

In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).

// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary

start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop


Answers

Answer:

The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)

Comments are used to explain difficult lines

#Python Program starts here

#Prompt user for monthly pay

pay = float(input("Enter Monthly Pay: "))

#Prompt user for rent

rent = float(input("Enter Rent: "))

#Prompt user for utilities

utilities = float(input("Enter Utilities: "))

#Prompt user for groceries

groceries = float(input("Enter Groceries: "))

#Calculate discretionary

discretionary = pay - rent - utilities - groceries

#Print discretionary

print("Discretionary: ")

print(discretionary)

#Python Program ends here

//C++ Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float pay, rent, utilities, groceries, discretionary;

//Prompt user for input

cout<<"Enter Monthly Pay: ";

cin>>pay;

cout<<"Enter Rent: ";

cin>>rent;

cout<<"Enter Utilities: ";

cin>>utilities;

cout<<"Enter Groceries: ";

cin>>groceries;

//Calculate discretionary

discretionary = pay - rent - utilities - groceries;

//Print discretionary

cout<<"Discretionary: "<<discretionary;

return 0;

 

}

//C++ Program ends here

To improve visual effects and semantic context in your presentation, you can get and add a snapshot from a desktop running application or an internet resource in a slide using __________Immersive Reader
(1 Point)
(D) Screen Clipping
(B) Smart Art
(C) Online Pictures
(A) 3D Models

Answers

Answer:

D. Screen Clipping

Explanation:

Screen clipping is a feature or application integrated into operating systems to grab or capture a snapshot of the current open window on the desktop. It could be an inbuilt feature like "Snipping Tool" which is seen in the Windows operating system by default (from Windows 7 and upward); this feature is however not restricted to only Windows operating systems. It could also be a third party app to capture onscreen processes.

Smart Art is a visual representation of data and information which is made by choosing a layout that best suits the information you are projecting.

Online Pictures

are ready resources (photographs) which are already available online; they have to be downloaded to be used.  

3D Models is the process of creating and developing a mathematical representation of data and information in three dimensions using specialized software. This help bring the data and information to life  

All these options (A - D) are good ways of enhancing a presentation. However, to get a snapshot of an onscreen process from the desktop, Option D (Screen Clipping) is the correct answer

This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I will provide the instructions and the code that needs to be changed in order for the program to work. Any place that has a "// Student Code Here" or "// Test Your Methods Here" must be changed accordingly.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------INSTRUCTIONS:Step 1Fill in the doubleOrNothing method, which takes an int as a parameter. If the number is less than 100, return that number doubled. Otherwise, return zero.For example, passing 4 to this method would return 8, but passing 104 to this method would return 0.Step 2Fill in the formatPercentmethod, which takes a double as a parameter that represents a percent value between 0 and 1. This method returns a String that is the percentage between 0 and 100 percent, with one place following the decimal before a '%'.For example, passing the double '.85' would return the string "85.0%".Step 3Fill in the everyOtherChar method, which takes a String parameter called word*. This method returns an int which computes the sum of the ASCII values of *every other* character in the parameter word, starting with the first character.For example, passing the word "yam" into the method would tally the ASCII value of the characters 'y' and 'm', which have ASCII values of 121 and 109 respectively, so the method would return 230.Test Your MethodsTest your methods by calling them within main. You may run your program in Develop mode as many times as you would like, but you may only submit your program once.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------CODE:public class quiz1 { // Step 1 public static int doubleOrNothing(int num) {e // student code here } // Step 2 public static String formatPercent(double percent) { // student code here } // Step 3 public static int everyOtherChar(String word) { // student code here } public static void main(String [] args) { // test your methods here! }}

Answers

Answer:

The methods is completed as follows

See attachment for .java source file

Comments are used to explain difficult lines

Program starts here

import java.util.*;

public class quiz1

{

public static int doubleOrNothing(int num)

{

 if(num<100)

 {

  num*=2;

 }

 else{

  num = 0;

 }

 System.out.println(num);

 return num;

}

public static String formatPercent(double percent)

{

 percent*=100;

 System.out.println(percent+"%");

 return percent+"%";

}

 

public static int everyOtherChar(String word)

{

 char first = word.charAt(0);

 char last = word.charAt(word.length() - 1);

 int ascii = (int)first + (int)last;

 System.out.print(ascii);

 return ascii;

}

public static void main(String [] args)

{

 //Testing doubleOrNothing method

 int num;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter any integer number: ");

 num = input.nextInt();

 System.out.print("Result of doubleOrNothing method\n:");

 doubleOrNothing(num);

 

 //Testing formatPercent method

 double percent;

 System.out.print("Enter any number between 0 and 1: ");

 percent = input.nextDouble();

 System.out.print("Result of formatPercent method\n:");

 formatPercent(percent);

 

 //Testing everyOtherChar method

 String word;

 System.out.print("Enter any string: ");

 word = input.next();

 System.out.print("Result of everyOtherChar method\n:");

 everyOtherChar(word);

}

}

//See Attached file

The Sleeping-Barber Problem:

A barbershop consists of a waiting room with n > 0 chairs and the barber room containing the barber chair.

If there are no customers to be served, then the barber sleeps.

If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.

If the barber is busy but chairs are available, then the customer sits in one of the free chairs.

If the barber is asleep, then the customer wakes up the barber and the shaving process begins.

After they finish, the customer leaves and the barber start shaving another customer, if there are any in the waiting room. Otherwise he goes to sleep.

Answers

Answer:

Explanation:

Following are the Semaphores:

Customers: Counts waiting customers;

Barbers: Number of idle barbers (0 or 1)

mutex: Used for mutual exclusion.

Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves

Shared data variable:

count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.

// shared data

semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;

int count_cust= 0;

void barber() {

while(true) { //shop is always open

wait(customers); //sleep when there are no waiting customers

wait(mutex); //mutex for accessing customers1

count_cust= count_cust-1; //customer left

signal(barbers);

signal(mutex);

cut_hair();

}

}

void customer() {

wait(mutex); //mutex for accessing count_cust

if (count_cust< n) {

count_cust= count_cust+1; //new customer

signal(customers); signal(mutex);

wait(barbers); //wait for available barbers get_haircut();

}

else { //do nothing (leave) when all chairs are used. signal(mutex);

}

}

cut_hair(){ waiting(cutting);

}

get_haircut(){

get hair cut for some time; signal(cutting);

}

What is the name of the FOLDER in which the file named "script" is contained?

Answers

Answer:

The default location for local logon scripts is

the Systemroot\System32\Repl\Imports\Scripts folder

The ability to write functions is one of the more powerful capabilities in C++. Functions allow code to be reused, and provides a mechanism for introducing the concept of modularity to the programming process. In addition to the concept of functions, C++ allows complex programs to be organized using header files (.h files) that contain the prototypes of functions and implementation files that (.cpp files) that contain the implementation (definition) of the functions.
In this programming assignment you will be asked to implement a number of useful functions using a header file and an implementation file. You will place the prototypes for your function in a .h file, and implement these functions in a .cpp file. You will need to write a driver (a program designed to test programs) to test your functions before you upload them.
[edit]Deliverables:
main.cpp
myFunctions.cpp
myFunctions.h
[edit]Function:
[edit]max
Precondition
two integer values exist
Postcondition
The value of the largest integer is returned.
The original integers are unchanged
If the integers have the same value then the value of either integer is returned.
Return
integer
Description
Function returns the value of the larger of two integers.
Prototype:
int max ( int, int )
Sample Parameter Values
m n max(m,n)
5 10 10
-3 -6 -3

Answers

Answer:

The header file in C++ is as follows

myFunction.h

void max(int a, int b)

{

if(a>b)

{

 std::cout<<a;

}

else

{

 std::cout<<b;

}

}

The Driver Program is as follows:

#include<iostream>

#include<myFunction.h>

using namespace std;  

int main()

{

int m,n;

cin>>m;

cin>>n;

max(m,n);

}

Explanation:

It should be noted that, for this program to work without errors, the header file (myFunction.h) has to be saved in the include directory of the C++ IDE software you are using.

For instance; To answer this question I used DevC++

So, the first thing I did after coding myFunction.h is to save this file in the following directory  ..\Dev-Cpp\MinGW64\x86_64-w64-mingw32\include\

Back to the code

myFunction.h

void max(int a, int b)  {

-> This prototype is intialized with integer variables a and b

if(a>b)  -> If the value of a is greater than b;

{

 std::cout<<a;  -> then the value of variable a will be printed

}

else

-> if otherwise,

{

 std::cout<<b;

-> The value of b will be printed

}

}

Driver File (The .cpp file)

#include<iostream>

#include<myFunction.h>  -> This line includes the uesr defined header

using namespace std;  

int main()

{

int m,n;  -> Two integer variables are declared

      cin>>m;  -> This line accepts first integer input

      cin>>n;  -> This line accepts second integer input

max(m,n);

-> This line calls user defined function to return the largest of the two integer variables

}

difference between ram and rom​

Answers

Answer:

RAMIt stands for Random Access memory.It is used for both purpose( read and write).It is volatile memory.ROMIt stands for Read only memory.It can be used only to perform the read operation.It is non-volatile.

Hope this helps...

Good luck on your assignment...

Answer:

RAM is the memory available for the operating system, programs and processes to use when the computer is running. ... When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Explanation:

Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|

Answers

Answer:

...............................................

Explanation:

............................................................

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.

Answers

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.
Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!

Answers

Answer:

To answer this question, i prepared a pseudocode and a program written in python;

Pseudocode begins here:

1. Start

2. Input montlySales

3. If monthlySales < 100000

3.1. Display Nothing

4. Else

4.1 Display “You earned a $5000 bonus!”

4.2 If monthlySales > 1.25 * 90000

4.2.1 Display “All employees get one day off!”

5.     Stop

Python Program starts here (See attachment for proper view of the program):

#Prompt user for input

monthlySales = float(input("Monthly Sales: "))

#Check monthlySales

if monthlySales < 100000:

     print("")

else:

     print("You earned a $5,000 bonus")

     if monthlySales > 1.25 * 90000:

           print("All Employees get the day off")

Explanation:

To answer this question, a conditional if statement is needed.

The pseudocode (and the program) starts by prompting user for input;

Then, the user input is first compared with 100,000

If it's less than 100,000; then nothing is displayes

However, if it is at least 100,000

"You earned a $5,000 bonus" is displayed

It further checks if the user input is greater than 125% of 90,000

If yes, "All Employees get the day off" is displayed else, nothing is displayed.

The pseudocode (and the program) stops execution, afterwards

Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)

Answers

Answer:

Following are the statement in C++ Programming language

cout<<setw(4);// set the width

cout<<number; // print the number with the width of 4

Explanation:

The  setw() is setting  according to the width defined as the argument to the function .The setw()  is under the ios header library .It means its definition is under the ios header file .

Following are the syntax to defined the setw() function that are given below

 setw(int k)

For example

include <iomanip>   // header file

#include <ios>   // header file

#include <iostream>   // header file

using namespace std;   // namespace

int main()   // main function

{    

   int number = 60;// variable declaration  

   cout << "previous width:" << number; // print  

   cout << " After setting the width"<< setw(4);  

   cout << number;     // display number

   return 0;  

}

a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If signal has a power of 2 mW before passing near the generator and it becomes 1.4 mW after passing near the generator. How much is the attenuation?

Answers

Answer:

  1.55 dB

Explanation:

Attenuation to 1.4/2.0 = 0.7 of the previous power level is a gain of ...

  10·log(0.7) = -1.549 dB

The signal is attenuated by 1.55 dB.

Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter a 5 digit integer as input and does the following tasksThe program checks whether the input number is a palindrome or not and prints the result of this palindrome check. A number is a palindrome if it reads the same backward as forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611; whereas 12312, 55565, 45545 and 11621 are not a palindrome. Your program should print "The number is palindrome" or "The number is not palindrome" after checking the input number.The program checks whether the input number has 5 digits or not and prints the error message "Invalid number" if the input number is not a 5 digit one.I posted my code below, I think I have a good start with reversing the number but I'm not sure how to implement the portion of how to actually check if it is a palindrome.import java.util.Scanner;public class Problem2 {public static void main(String[] args){int number;
Scanner scanner = new Scanner(System.in);System.out.println("Enter a positive integer between 1 and 5 digits long that you would like to test for a palindrome: ");num = in.nextInt();for( ;num != 0; ){reversenum = reversenum * 10;reversenum = reversenum + num%10;num = num/10;

Answers

Answer:

import java.util.Scanner;

import java.util.regex.*;

public class Problem2 {

   public static void main(String[] args)

   {

       int number;

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter a positive integer with exactly 5 digits long that you would like to test for a palindrome: ");

       String str = scanner.nextLine();

       int len = str.length();

       

       if (!Pattern.matches("^[1-9]\\d{4}$", str)) {

           System.out.println("Invalid number");

       } else {

           boolean isPalindrome = true;

           for(int i=0; i<len/2; i++) {

               if (str.charAt(i) != str.charAt(len-i-1)) {

                   isPalindrome = false;

                   break;

               }

           }

           if (isPalindrome) {

              System.out.println("The number is palindrome");  

           } else {

              System.out.println("The number is not palindrome");  

           }

       }        

   }

}

Explanation:

Even though the problem talks about numbers, a palindrome check is more about strings, so that's how I'd handle it. I check the validity of the input using a regular expression (note how I don't allow the number to start with a zero, you can change that if you want), and then I check for palindrome to iterating to only halfway the string, and checking the i-th position ffrom the start against the i-th position from the end. If there is no match, the loop is aborted.

See that also for even-length palindromes this will work.

You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

is there reality in your point of view ? if your answer is yes, is there a couse effect relation ship between reality and apperance​

Answers

Answer: Yes but maybe yes

Explanation: reality does exist pinch yourself

Answer:

there should be

Explanation:

Contrary to Russell's suggestion, the distinction between appearance and reality is not simply the distinction "between what things seem to be and what they are," more precisely, the distinction between what things seem to be and what they are is not a simple distinction.

Appearance and Reality. Metaphysics is the science that seeks to define what is ultimately real as opposed to what is merely apparent. The contrast between appearance and reality, however, is by no means peculiar to metaphysics. ... Ultimate reality, whatever else it is, is genuine as opposed to sham.

Use the provided template, "Short-Term and Long-Term Goals" to develop short-term and long-term goals. You must develop these goals with your mentee. You can do this over the phone or in-person. It is important to identify areas that could use coaching or mentoring techniques in order to complete your implementation plan. Short-term goals must reflect the next 6 months and long-term goals must reflect 6 months to 2 years.

Answers

Answer:

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Explanation:

At a particular period of time we all need mentors and this mentorships are what that we build us. When we are already built, we also become mentors and in turn we mentor others so as to build them too.

For the question, we should have something like this from a mentee

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of the segment if all data is sent in only one segment?

Answers

Answer:

501.

Explanation:

In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.

The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.

In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).

However, assuming the same data was sent in five (5) segments. The sequence number would be;

First segment (1st) = 501.

Second segment (2nd) = 1501.

Third segment (3rd) = 2501.

Fourth segment (4th) = 3501.

Fifth segment (5th) = 4501.

Using the Biba Model with levels High, Medium, and Low, determine if the subject has read access, write access, both, or neither. Timecard process P is Medium and a database of entry/exit times D is High. Select one: a. Write b. Read c. Neither d. Read and Write

Answers

Answer:

Option(a) is the correct answer to the given question .

Explanation:

The Biba Model in the database management system ensure the data integrity and define the state transaction in the data security policy .Following are the Features of the Biba Model.

The quick Integrity quote ensures that perhaps the subject should not process the information i.e read at a relatively low level of integrity in the given level of integrity.The * (star) Integrity definition assumes that a subject should not submit data to a new level of integrity  i. e "write data" at a specified level of credibility.In this participant is write data so option(a) is the correct answer to the given question .All the other option are not correct for the Biba Model  that's why they are incorrect option .

Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();

Answers

Answer:

The csharp program to compute square roots of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeRoots()  

{  

StreamWriter writer1 = new StreamWriter("roots.txt");  

double root;  

for (int n=1; n<=max; n++)  

{  

root = Math.Sqrt(n);  

writer1.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeRoots();  

}  

}

The program to compute squares of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeSquares()  

{  

StreamWriter writer2 = new StreamWriter("squares.txt");  

long root;  

for (int n = 1; n <= max; n++)  

{  

root = n*n;  

writer2.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeSquares();  

}  

}  

Explanation:

1. An integer variable, max, is declared to hold the maximum value to compute square root and square.

2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer1 = new StreamWriter("roots.txt");

3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.

4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer2 = new StreamWriter("squares.txt");

5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.

6. Both the methods are declared static.

7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.

8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.

9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.

10. The csharp language is purely object-oriented language and hence all the code is written inside a class.

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:
A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.
A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.
A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.
A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.
A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.
A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.
A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.
Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.
The second class should be named Project1. It should consist of the following four class (static) methods.
The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.
A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.
A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.
A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.
Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.

Answers

Answer: Provided in the explanation section

Explanation:

CODE USED :

//weight class

public class Weight

{

  //defining private variables pound, ounces and number of ounces in pound which is 16

  private int pounds;

  private double ounces;

  private int numberOfOuncesInPound=16;

  //constructor which initializes the weight variable with the coming input

  public Weight(int p, double o)

  {

      this.pounds=p;

      this.ounces=o;

  }

  //checks if the incoming weight object is less than the current object weight

  public boolean lessThan(Weight w)

  {

      //first comparison between pounds of the objects, if current object is less, then return true

      if(this.pounds<w.pounds)

          return true;

      //else if it is less then return false

      else if(this.pounds>w.pounds)

          return false;

      //else if both are equal then we compare the ounces

      else

      {

          //if current object ounces is less than we return true else false

          if(this.ounces<w.ounces)

              return true;

          else

              return false;

      }

  }

  //adds incoming weight to the current weight object and then normalize it

  public void addTo(Weight w)

  {

      this.pounds+=w.pounds;

      this.ounces+=w.ounces;

      normalize();

  }

  //divide the current weight with factor x which is a parameter of the function

  public void divide(int x)

  {

      this.ounces=toOunces();

      this.ounces/=x;

      this.pounds=0;

      normalize();

  }

  //returns a string which contains the data in a Particular Format

  public String toString()

  {

      return this.pounds+" lbs "+this.ounces+" oz";

  }

  //returns weight converted into ounces

  private double toOunces()

  {

      return this.pounds*this.numberOfOuncesInPound+this.ounces;

  }

  //this function checks if number of ounces is greater than 16 then it normalizes it by converting into pounds

  private void normalize()

  {

      while(this.ounces>this.numberOfOuncesInPound)

      {

          this.ounces-=this.numberOfOuncesInPound;

          this.pounds++;

      }

  }

}

cheers i hope this helped !!

Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50

Answers

Answer:

You didn't specify the language so I did it in C#

Explanation:

Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two books. For example, if the first book's title is "The Adventures of Tom Sawyer" and the second book's title is "The Adventures of Huckleberry Finn", the concatenated title will be "The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn". Assume the book class is defined as: class Book { public Book(string title) { Title

Answers

next time m8 mmmmmdsaasd

Other Questions
Which of these relations on the set {0, 1, 2, 3} are equivalence relations? If not, please give reasons why. (In other words, if a relation is not an equivalence relation, please list each property that is missing and the reason why it is missing.) (1) {(0,0), (1,1), (2,2), (3,3)} (2) {(0,0), (0,2), (2,0), (2,2), (2,3), (3,2), (3,3)} (3) {(0,0), (1,1), (1,2), (2,1), (2,2), (3,3)} (4) {(0,0), (0,1), (0,2), (1,0), (1,1), (1,2), (2,0), (2,2), (3,3)} How did the issue of slavery divide the nation in the 1800s? Given: 22 and 24 are vertical anglesProve: Z2 Z4 Which of the following is a likely geographic barrier for speciation of finches? a open field of grass b mountain range or a canyon c islands surrounded by ocean water d forrest of trees What part of the circumstance is an arc whose measure is 30 What is the missing justification? The length of rod PR is adjusted to 16 feet. If width PQ remains the same, what is the approximate new height QR of the scaffold? Round your answer to the nearest hundredth. What is one way you can get involved in politics? read the news find a need in the community go to school talk to your parents Explain what it means to choose a position in an argument. How does an author's position affect the evidence she will include in her argument? Your answer should be at least 2 complete sentences. In RST, the measure of Que tienen en comun el chocolate, las papas fritas y la hamburguesa?Que tienen en comun los vegetales, el huevo y el pan? You found your dream vacation cottage in the mountains and your offer of $78,000 was accepted. You plan to put 20% down and will roll the closing costs of $3,500 into the mortgage. Congratulations, your 15 year mortgage has been approved at an interest rate of 4.125%. (You must use the attached Excel loan amortization schedule). How much are you financing For though the flame of liberty may sometimes cease to shine, the coal can never expire.Thomas PaineThe Crisis, No. 1Which type of figurative language is used in the passage? Rachelle purchased a warehouse 19 years ago in the month of September. The purchase price was $400,000. In May of the current year (year 20), Rachelle sold the warehouse. She will be able to deduct $ for depreciation on the warehouse in the year of sale. (Round your answer to the nearest whole dollar.) Let a and b be real numbers where a b 0. Which of the following functions could represent the graph below? ASAP! GIVING BRAINLIEST! Please read the question THEN answer CORRECTLY! NO guessing. I say no guessing because people usually guess on my questions. Question 2: How and why did changes in the environmental conditions affect carrying capacity in thisscenario? Recall the scenarios: 0-15 years, Harsh winter, 15-30 years, Harsh winter and Cold spring; 3045 years, Harsh winter, Cold spring, and Hot summer. Which of the following choices is a characteristic of the Baroque period?clear melodiessimplified orchestrationemotional meaninggrandeur At the beginning of the reaction the forward reaction rate is ____ the reverse reaction rate Tags are placed to the left leg and right leg of a bear in a forest. Let A1 be the event that the left leg tag is lost and the event that the A2 right leg tag is lost. Suppose these two events are independent and P(A1)=P(A2)=0.4. Find the probability that exactly one tag is lost, given that at least one tag is lost (write it up to second decimal place).