Write in Java please
Description
There is a cricket that lives by our timeshare in Myrtle Beach, South Carolina. Most every night I hear it patiently chirping away. Some nights it chirps faster than others, and it seems like the warmer it is, the faster it chirps. There are many crickets, and each of them seems to behave the same. On several different nights, armed with a stopwatch and a thermometer, I recorded the frequency of the chirps and compared it to that night's air temperature.
Experimental Results
The chirping follows a simple linear formula: take the number of chirps, add 40 and divide that sum by four to get the temperature in degrees Fahrenheit.
Assignment
Create a simulation to model the crickets chirping at various randomly generated frequencies, create an Environmentclass that knows and can return the current temperature. Create a Cricket class that chirps, or for simplicity, returns how many chirps per minute the cricket would make at that temperature. Repeat the simulation for at least three trials.
Extension: There is a cricket variety in some parts of South Carolina that is a little slower than most normal Carolina crickets. Add a ClemsonCricket class that extends Cricket but chirps slower by 20%.
Bonus: Implement polymorphism in the driver class.
Rubrics
Cricket class should include the following items:
A variable that stores the frequency of chirps.
A default constructor that initializes the frequency to a random value
An overloaded constructor that initializes the frequency to a value of your choice that gets passed on as a parameter.
A method for changing the frequency to a random value.
A getter method that returns the frequency.
clemsonCricket class should include the following items:
A default constructor that initializes the frequency to a random value that is 20% lower than what the parent class constructor would initialize it to.
A overloaded constructor that calls to the parent constructor.
A polymorphic method that changes the frequency value to a value that is 20% lower than what the parent method would change it to.
Environment class should include the following items:
A variable that stores the temperature.
A default constructor that initializes the temperature to a value of your choosing.
An overloaded constructor that initializes the temperature based on the formula in the assignment.
A method that takes in a frequency as a parameter and calculates the temperature based on the formula in the assignment.
testCrickets program should do the following items:
Creates an Environment object in the test program or in the Cricket or clemsonCricket classes and displays temperature Creates a cricket object and displays temperature before and after changing frequency
Creates a Clemson cricket object and displays temperature before and after changing frequency
Creates a polymorphic Clemson cricket object and displays temperature before and after changing frequency.

Answers

Answer 1

Answer: Provided in the section below

Explanation:

Using C# Code:

using System;

class Environment{

//temperature

private double temp;

//sets initial value of temp to 100 Fahrenheits

public Environment(){

temp=100;

}

//sets initial value to given temp

public Environment(double t) {

this.temp = t;

}

//returns temp

public double getTemp(){

return temp;

}

//calculates temp at given frequency

public void calcTemperature(double frequency){

temp=(frequency+40)/4.0;

}

}

class Cricket{

private Random r=new Random();

//frequency of birds

protected double frequency;

//sets frequency to a random value between 0-100

public Cricket(){

 

frequency=r.NextDouble()*100;

}

//sets frequency to a given frequency

public Cricket(double f) {

frequency = f;

}

//returns the frequency

public double getFrequency() {

return frequency;

}

//randomize the frequency

public virtual void randomFrequency() {

frequency = r.NextDouble()*100;

}

}

class ClemsonCricket: Cricket{

//sets the frequency to 80% of the parent's

public ClemsonCricket(): base(){

frequency=frequency*0.8;

}

//sets frequency to a given frequency

public ClemsonCricket(double f): base(f){}

//randomize frequency and sets it to 80% of the parent's

public override void randomFrequency(){

base.randomFrequency();

frequency=frequency*0.8;

}

}

public class testCrickets {

static void Main(){

Environment env=new Environment();

Console.WriteLine("Initial Temp: "+env.getTemp());

Cricket cricket=new Cricket();

env.calcTemperature(cricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

cricket.randomFrequency();

env.calcTemperature(cricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}",env.getTemp()));

Console.WriteLine("\nClemson Cricket: ");

ClemsonCricket clemsonCricket=new ClemsonCricket();

env.calcTemperature(clemsonCricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

clemsonCricket.randomFrequency();

env.calcTemperature(clemsonCricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}" ,env.getTemp()));

Console.WriteLine("\nPolymorphism Clemson Cricket: ");

Cricket Ccricket=new ClemsonCricket();

env.calcTemperature(Ccricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

Ccricket.randomFrequency();

env.calcTemperature(Ccricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}",env.getTemp()));

}

}

cheers i hope this helped !!

Write In Java PleaseDescriptionThere Is A Cricket That Lives By Our Timeshare In Myrtle Beach, South

Related Questions

difference between ram and rom​

Answers

Answer:

RAMIt stands for Random Access memory.It is used for both purpose( read and write).It is volatile memory.ROMIt stands for Read only memory.It can be used only to perform the read operation.It is non-volatile.

Hope this helps...

Good luck on your assignment...

Answer:

RAM is the memory available for the operating system, programs and processes to use when the computer is running. ... When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Explanation:

This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I will provide the instructions and the code that needs to be changed in order for the program to work. Any place that has a "// Student Code Here" or "// Test Your Methods Here" must be changed accordingly.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------INSTRUCTIONS:Step 1Fill in the doubleOrNothing method, which takes an int as a parameter. If the number is less than 100, return that number doubled. Otherwise, return zero.For example, passing 4 to this method would return 8, but passing 104 to this method would return 0.Step 2Fill in the formatPercentmethod, which takes a double as a parameter that represents a percent value between 0 and 1. This method returns a String that is the percentage between 0 and 100 percent, with one place following the decimal before a '%'.For example, passing the double '.85' would return the string "85.0%".Step 3Fill in the everyOtherChar method, which takes a String parameter called word*. This method returns an int which computes the sum of the ASCII values of *every other* character in the parameter word, starting with the first character.For example, passing the word "yam" into the method would tally the ASCII value of the characters 'y' and 'm', which have ASCII values of 121 and 109 respectively, so the method would return 230.Test Your MethodsTest your methods by calling them within main. You may run your program in Develop mode as many times as you would like, but you may only submit your program once.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------CODE:public class quiz1 { // Step 1 public static int doubleOrNothing(int num) {e // student code here } // Step 2 public static String formatPercent(double percent) { // student code here } // Step 3 public static int everyOtherChar(String word) { // student code here } public static void main(String [] args) { // test your methods here! }}

Answers

Answer:

The methods is completed as follows

See attachment for .java source file

Comments are used to explain difficult lines

Program starts here

import java.util.*;

public class quiz1

{

public static int doubleOrNothing(int num)

{

 if(num<100)

 {

  num*=2;

 }

 else{

  num = 0;

 }

 System.out.println(num);

 return num;

}

public static String formatPercent(double percent)

{

 percent*=100;

 System.out.println(percent+"%");

 return percent+"%";

}

 

public static int everyOtherChar(String word)

{

 char first = word.charAt(0);

 char last = word.charAt(word.length() - 1);

 int ascii = (int)first + (int)last;

 System.out.print(ascii);

 return ascii;

}

public static void main(String [] args)

{

 //Testing doubleOrNothing method

 int num;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter any integer number: ");

 num = input.nextInt();

 System.out.print("Result of doubleOrNothing method\n:");

 doubleOrNothing(num);

 

 //Testing formatPercent method

 double percent;

 System.out.print("Enter any number between 0 and 1: ");

 percent = input.nextDouble();

 System.out.print("Result of formatPercent method\n:");

 formatPercent(percent);

 

 //Testing everyOtherChar method

 String word;

 System.out.print("Enter any string: ");

 word = input.next();

 System.out.print("Result of everyOtherChar method\n:");

 everyOtherChar(word);

}

}

//See Attached file

a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

Implement the method remove_all in the ArrayList class which takes the parameter x and removes all occurences of x from the list.

E.g., calling remove_all('a') on an ArrayList with contents ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a'] should result in the updated ArrayList ['b','r','c','d','b','r']

Answers

Answer:

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

Explanation:

The code is written in python

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

a = [x for x in a if x != 'a']

print(a)

a = ['a', 'b', 'r', 'a', 'c', 'a', 'd', 'a', 'b', 'r', 'a']  

I declared a variable a and stored the list of value.

a = [x for x in a if x != 'a']

I used list comprehension to loop through the array and find any value that is not 'a' .

print(a)

I printed every value that is not 'a' in the array.

Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|

Answers

Answer:

...............................................

Explanation:

............................................................

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.

Answers

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

Use the provided template, "Short-Term and Long-Term Goals" to develop short-term and long-term goals. You must develop these goals with your mentee. You can do this over the phone or in-person. It is important to identify areas that could use coaching or mentoring techniques in order to complete your implementation plan. Short-term goals must reflect the next 6 months and long-term goals must reflect 6 months to 2 years.

Answers

Answer:

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Explanation:

At a particular period of time we all need mentors and this mentorships are what that we build us. When we are already built, we also become mentors and in turn we mentor others so as to build them too.

For the question, we should have something like this from a mentee

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours

Answers

Answer: provided in the explanation section

Explanation:

Network Merging and Acquisitions

Environment:

· 400 Windows Servers

· 8000 Windows client devices (laptops running Windows os)

· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.

· Unix servers(Other environment to be merged)

· host resolution they use is BIND

A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.

Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.

Quick & Dirty IPSEC Tunnel

When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.  

Main problems with quick and dirty IPSEC tunnels are

Maintaining network lists manually.

manual maintenance of route injection into the IGP.

Probable single points of failure.

Using SD-WAN As Acquisition Network Glue:

Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers

1. Easily managed redundant plumbing :

SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.

2. IGP integration:

When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.

3. Segment isolation:

An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.

Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.

4. Service chaining:

Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.

Drawbacks Of The SD-WAN Approach

A few drawbacks in using SD-WAN as a network merger tool come to mind.

Cost:

The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.

Remote hands:

In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network

Perhaps not quick and dirty enough:

The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.

To Conclude:

Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.

If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.

SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.

Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();

Answers

Answer:

The csharp program to compute square roots of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeRoots()  

{  

StreamWriter writer1 = new StreamWriter("roots.txt");  

double root;  

for (int n=1; n<=max; n++)  

{  

root = Math.Sqrt(n);  

writer1.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeRoots();  

}  

}

The program to compute squares of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeSquares()  

{  

StreamWriter writer2 = new StreamWriter("squares.txt");  

long root;  

for (int n = 1; n <= max; n++)  

{  

root = n*n;  

writer2.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeSquares();  

}  

}  

Explanation:

1. An integer variable, max, is declared to hold the maximum value to compute square root and square.

2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer1 = new StreamWriter("roots.txt");

3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.

4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer2 = new StreamWriter("squares.txt");

5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.

6. Both the methods are declared static.

7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.

8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.

9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.

10. The csharp language is purely object-oriented language and hence all the code is written inside a class.

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:
A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.
A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.
A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.
A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.
A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.
A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.
A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.
Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.
The second class should be named Project1. It should consist of the following four class (static) methods.
The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.
A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.
A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.
A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.
Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.

Answers

Answer: Provided in the explanation section

Explanation:

CODE USED :

//weight class

public class Weight

{

  //defining private variables pound, ounces and number of ounces in pound which is 16

  private int pounds;

  private double ounces;

  private int numberOfOuncesInPound=16;

  //constructor which initializes the weight variable with the coming input

  public Weight(int p, double o)

  {

      this.pounds=p;

      this.ounces=o;

  }

  //checks if the incoming weight object is less than the current object weight

  public boolean lessThan(Weight w)

  {

      //first comparison between pounds of the objects, if current object is less, then return true

      if(this.pounds<w.pounds)

          return true;

      //else if it is less then return false

      else if(this.pounds>w.pounds)

          return false;

      //else if both are equal then we compare the ounces

      else

      {

          //if current object ounces is less than we return true else false

          if(this.ounces<w.ounces)

              return true;

          else

              return false;

      }

  }

  //adds incoming weight to the current weight object and then normalize it

  public void addTo(Weight w)

  {

      this.pounds+=w.pounds;

      this.ounces+=w.ounces;

      normalize();

  }

  //divide the current weight with factor x which is a parameter of the function

  public void divide(int x)

  {

      this.ounces=toOunces();

      this.ounces/=x;

      this.pounds=0;

      normalize();

  }

  //returns a string which contains the data in a Particular Format

  public String toString()

  {

      return this.pounds+" lbs "+this.ounces+" oz";

  }

  //returns weight converted into ounces

  private double toOunces()

  {

      return this.pounds*this.numberOfOuncesInPound+this.ounces;

  }

  //this function checks if number of ounces is greater than 16 then it normalizes it by converting into pounds

  private void normalize()

  {

      while(this.ounces>this.numberOfOuncesInPound)

      {

          this.ounces-=this.numberOfOuncesInPound;

          this.pounds++;

      }

  }

}

cheers i hope this helped !!

Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a person with a sedentary lifestyle is overweight or underweight for his or her height. A person’s BMI is calculated with the following formula:

BMI = weight x 703 / height2

where weight is measured in pounds and heightis measured in inches. The program should ask the user to enterhis/her weight and height. The program should display a message indicating whether the person has optimal weight, is underweight, or is overweight. A sedentary person’s weight is considered optimal if his or her BMI is between18.5 and 25. If the BMI is less than 18.5, the person is considered underweight. If the BMI valueis greater than 25, the person is considered overweight

Answers

Answer:

This program is written using C++

Comments are used to explain difficult lines

Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float BMI, Height,Weight;

// Prompt user for inputs

cout<<"Ener Height (in inches): ";

cin>>Height;

cout<<"Enter Weight (in pounds): ";

cin>>Weight;

//Calculate BMI

BMI = (Weight * 703)/(Height * Height);

cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;

//Test and print whether user is underweight, overweight or optimal

if(BMI>=18.5&&BMI<=25)

{

 cout<<"You have an optimal weight";

}

else if(BMI<18.5)

{

 cout<<"You are underweight";

}

else if(BMI>25)

{

 cout<<"You are overweight";

}  

return 0;

 

}

See attachment for .cpp source file

// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary

start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop


Answers

Answer:

The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)

Comments are used to explain difficult lines

#Python Program starts here

#Prompt user for monthly pay

pay = float(input("Enter Monthly Pay: "))

#Prompt user for rent

rent = float(input("Enter Rent: "))

#Prompt user for utilities

utilities = float(input("Enter Utilities: "))

#Prompt user for groceries

groceries = float(input("Enter Groceries: "))

#Calculate discretionary

discretionary = pay - rent - utilities - groceries

#Print discretionary

print("Discretionary: ")

print(discretionary)

#Python Program ends here

//C++ Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float pay, rent, utilities, groceries, discretionary;

//Prompt user for input

cout<<"Enter Monthly Pay: ";

cin>>pay;

cout<<"Enter Rent: ";

cin>>rent;

cout<<"Enter Utilities: ";

cin>>utilities;

cout<<"Enter Groceries: ";

cin>>groceries;

//Calculate discretionary

discretionary = pay - rent - utilities - groceries;

//Print discretionary

cout<<"Discretionary: "<<discretionary;

return 0;

 

}

//C++ Program ends here

Using the Biba Model with levels High, Medium, and Low, determine if the subject has read access, write access, both, or neither. Timecard process P is Medium and a database of entry/exit times D is High. Select one: a. Write b. Read c. Neither d. Read and Write

Answers

Answer:

Option(a) is the correct answer to the given question .

Explanation:

The Biba Model in the database management system ensure the data integrity and define the state transaction in the data security policy .Following are the Features of the Biba Model.

The quick Integrity quote ensures that perhaps the subject should not process the information i.e read at a relatively low level of integrity in the given level of integrity.The * (star) Integrity definition assumes that a subject should not submit data to a new level of integrity  i. e "write data" at a specified level of credibility.In this participant is write data so option(a) is the correct answer to the given question .All the other option are not correct for the Biba Model  that's why they are incorrect option .

To improve visual effects and semantic context in your presentation, you can get and add a snapshot from a desktop running application or an internet resource in a slide using __________Immersive Reader
(1 Point)
(D) Screen Clipping
(B) Smart Art
(C) Online Pictures
(A) 3D Models

Answers

Answer:

D. Screen Clipping

Explanation:

Screen clipping is a feature or application integrated into operating systems to grab or capture a snapshot of the current open window on the desktop. It could be an inbuilt feature like "Snipping Tool" which is seen in the Windows operating system by default (from Windows 7 and upward); this feature is however not restricted to only Windows operating systems. It could also be a third party app to capture onscreen processes.

Smart Art is a visual representation of data and information which is made by choosing a layout that best suits the information you are projecting.

Online Pictures

are ready resources (photographs) which are already available online; they have to be downloaded to be used.  

3D Models is the process of creating and developing a mathematical representation of data and information in three dimensions using specialized software. This help bring the data and information to life  

All these options (A - D) are good ways of enhancing a presentation. However, to get a snapshot of an onscreen process from the desktop, Option D (Screen Clipping) is the correct answer

a. Create a console-based application named Desks that computes the price of a desk and whose Main() method calls the following methods:
• A method to accept the number of drawers in the desk as input from the keyboard. This method returns the number of drawers to the Main() method.
• A method to accept as input and return the type of wood—‘m’ for mahogany, ‘o’ for oak, or ‘p’ for pine.
• A method that accepts the number of drawers and wood type, and calculates the cost of the desk based on the following:
• Pine desks are $100.
• Oak desks are $140.
• All other woods are $180.
• A $30 surcharge is added for each drawer.
• This method returns the cost to the Main() method.
• A method to display all the details and the final price.
b. Create a GUI application named DesksGUI that accepts desk order data from TextBox

Answers

Answer:

Explanation:

Code:-

using System;

using System.Linq;

using System.Collections;

using System.Collections.Generic;

public class Test{

public static int no_drawer(){

Console.WriteLine("Enter the number of drawers : ");

return Int32.Parse(Console.ReadLine());

}

public static char wood_type(){

Console.WriteLine("Enter the type of woods('m' for mahogany, 'o' for oak, or 'p' for pine) : ");

return Console.ReadLine()[0];

}

public static double final_cost(int d,char ch){

double cost = 0.0;

if (ch == 'p') cost += d*100;

else if (ch == 'o') cost += d*140;

else cost += d*180;

cost += d*30;

return cost;

}

public static void display(int d,char ch,double p){

Console.WriteLine("Number of drawers : "+d);

if (ch == 'p')

Console.WriteLine("Type of Wood Chosen : pine");

else if (ch == '0')

Console.WriteLine("Type of Wood Chosen : oak");

else if (ch == 'm')

Console.WriteLine("Type of Wood Chosen : mahogany");

else

Console.WriteLine("Type of Wood Chosen : other");

Console.WriteLine("Total Cost is : "+p);

}

public static void Main(){

int drawers = no_drawer();

char ch_wood = wood_type();

double res = final_cost(drawers,ch_wood);

display(drawers, ch_wood,res);

}

}

cheers i hope this helped !!!

Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)

Answers

Answer:

Following are the statement in C++ Programming language

cout<<setw(4);// set the width

cout<<number; // print the number with the width of 4

Explanation:

The  setw() is setting  according to the width defined as the argument to the function .The setw()  is under the ios header library .It means its definition is under the ios header file .

Following are the syntax to defined the setw() function that are given below

 setw(int k)

For example

include <iomanip>   // header file

#include <ios>   // header file

#include <iostream>   // header file

using namespace std;   // namespace

int main()   // main function

{    

   int number = 60;// variable declaration  

   cout << "previous width:" << number; // print  

   cout << " After setting the width"<< setw(4);  

   cout << number;     // display number

   return 0;  

}

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Answers

Answer: Provided in the explanation section

Explanation:

The question says :

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Solution:

Here, our fundamental aim is to look for the content which is having single space between different sentences. As it sentences finishing with . Going before with single and various spaces we have to channel and match just e the sentences which are finishing with ". "

For this we use order called "GREP" in Unix. "GREP " represents worldwide quest for standard articulation. This order is utilized inquiry and print the lines that are coordinating with determined string or an example. The example or indicated string that we have to look through we call it as customary articulation.

Syntax of GREP:

GREP [OPTIONS] PATTERN [FILE_NAME]

​​​​​​For our solution please follow the command

GREP "*\•\s$" userNotes.txt

Now it will display a all the lines having . Followed by single space.

Which of the following statements is true? The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. NetWitness Investigator is available at no charge while Wireshark is a commercial product.

Answers

Answer:

Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.

Explanation:

Wireshark is a computer software that was Initially released in the year 1998. The software was written in language (programming language) such as the C++ and the C programming language.

Originally, the main author of the Wireshark software is a man named Gerald Combs.

Wireshark is used in analyzing network protocols and software troubleshooting

Infomation such as antennae signal strengths can also be gotten by using Wireshark.

Hence, "Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues." Is the correct Option.

What is the name of the FOLDER in which the file named "script" is contained?

Answers

Answer:

The default location for local logon scripts is

the Systemroot\System32\Repl\Imports\Scripts folder

You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two books. For example, if the first book's title is "The Adventures of Tom Sawyer" and the second book's title is "The Adventures of Huckleberry Finn", the concatenated title will be "The Adventures of Tom Sawyer and The Adventures of Huckleberry Finn". Assume the book class is defined as: class Book { public Book(string title) { Title

Answers

next time m8 mmmmmdsaasd

3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
pseudocode and explain your logic.​

Answers

Answer:

No, it can't be verified with a pseudocode.

Explanation:

We can not verify this with a pseudocode because the largest integer that we can store in 32-bit integer goes by the formula 2^32 - 1 = 4, 294, 967,295 and this means that it has 32 ones. Or it may be 2^31 - 1 = 2, 147, 483,647 which is a two complement signed integer.

Despite the fact that it can not be verified by using pseudocode, we can do the Verification by writting programs Through some programming language or in plain English code.

In a 32-bit CPU, the largest integer that we can store is 2147483647 because we can store integer as 2^31 and - (2^31 + 1).

The Sleeping-Barber Problem:

A barbershop consists of a waiting room with n > 0 chairs and the barber room containing the barber chair.

If there are no customers to be served, then the barber sleeps.

If a customer enters the barbershop and all chairs are occupied, then the customer leaves the shop.

If the barber is busy but chairs are available, then the customer sits in one of the free chairs.

If the barber is asleep, then the customer wakes up the barber and the shaving process begins.

After they finish, the customer leaves and the barber start shaving another customer, if there are any in the waiting room. Otherwise he goes to sleep.

Answers

Answer:

Explanation:

Following are the Semaphores:

Customers: Counts waiting customers;

Barbers: Number of idle barbers (0 or 1)

mutex: Used for mutual exclusion.

Cutting: Ensures that the barber won’t cut another customer’s hair before the previous customer leaves

Shared data variable:

count_cust: Counts waiting customers. ------------copy of customers. As value of semaphores can’t access directly.

// shared data

semaphore customers = 0; semaphore barbers = 0; semaphore cutting = 0; semaphore mutex = 1;

int count_cust= 0;

void barber() {

while(true) { //shop is always open

wait(customers); //sleep when there are no waiting customers

wait(mutex); //mutex for accessing customers1

count_cust= count_cust-1; //customer left

signal(barbers);

signal(mutex);

cut_hair();

}

}

void customer() {

wait(mutex); //mutex for accessing count_cust

if (count_cust< n) {

count_cust= count_cust+1; //new customer

signal(customers); signal(mutex);

wait(barbers); //wait for available barbers get_haircut();

}

else { //do nothing (leave) when all chairs are used. signal(mutex);

}

}

cut_hair(){ waiting(cutting);

}

get_haircut(){

get hair cut for some time; signal(cutting);

}

Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of the segment if all data is sent in only one segment?

Answers

Answer:

501.

Explanation:

In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.

The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.

In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).

However, assuming the same data was sent in five (5) segments. The sequence number would be;

First segment (1st) = 501.

Second segment (2nd) = 1501.

Third segment (3rd) = 2501.

Fourth segment (4th) = 3501.

Fifth segment (5th) = 4501.

A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.
Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!

Answers

Answer:

To answer this question, i prepared a pseudocode and a program written in python;

Pseudocode begins here:

1. Start

2. Input montlySales

3. If monthlySales < 100000

3.1. Display Nothing

4. Else

4.1 Display “You earned a $5000 bonus!”

4.2 If monthlySales > 1.25 * 90000

4.2.1 Display “All employees get one day off!”

5.     Stop

Python Program starts here (See attachment for proper view of the program):

#Prompt user for input

monthlySales = float(input("Monthly Sales: "))

#Check monthlySales

if monthlySales < 100000:

     print("")

else:

     print("You earned a $5,000 bonus")

     if monthlySales > 1.25 * 90000:

           print("All Employees get the day off")

Explanation:

To answer this question, a conditional if statement is needed.

The pseudocode (and the program) starts by prompting user for input;

Then, the user input is first compared with 100,000

If it's less than 100,000; then nothing is displayes

However, if it is at least 100,000

"You earned a $5,000 bonus" is displayed

It further checks if the user input is greater than 125% of 90,000

If yes, "All Employees get the day off" is displayed else, nothing is displayed.

The pseudocode (and the program) stops execution, afterwards

Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50

Answers

Answer:

You didn't specify the language so I did it in C#

Explanation:

is there reality in your point of view ? if your answer is yes, is there a couse effect relation ship between reality and apperance​

Answers

Answer: Yes but maybe yes

Explanation: reality does exist pinch yourself

Answer:

there should be

Explanation:

Contrary to Russell's suggestion, the distinction between appearance and reality is not simply the distinction "between what things seem to be and what they are," more precisely, the distinction between what things seem to be and what they are is not a simple distinction.

Appearance and Reality. Metaphysics is the science that seeks to define what is ultimately real as opposed to what is merely apparent. The contrast between appearance and reality, however, is by no means peculiar to metaphysics. ... Ultimate reality, whatever else it is, is genuine as opposed to sham.

You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If signal has a power of 2 mW before passing near the generator and it becomes 1.4 mW after passing near the generator. How much is the attenuation?

Answers

Answer:

  1.55 dB

Explanation:

Attenuation to 1.4/2.0 = 0.7 of the previous power level is a gain of ...

  10·log(0.7) = -1.549 dB

The signal is attenuated by 1.55 dB.

Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter a 5 digit integer as input and does the following tasksThe program checks whether the input number is a palindrome or not and prints the result of this palindrome check. A number is a palindrome if it reads the same backward as forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611; whereas 12312, 55565, 45545 and 11621 are not a palindrome. Your program should print "The number is palindrome" or "The number is not palindrome" after checking the input number.The program checks whether the input number has 5 digits or not and prints the error message "Invalid number" if the input number is not a 5 digit one.I posted my code below, I think I have a good start with reversing the number but I'm not sure how to implement the portion of how to actually check if it is a palindrome.import java.util.Scanner;public class Problem2 {public static void main(String[] args){int number;
Scanner scanner = new Scanner(System.in);System.out.println("Enter a positive integer between 1 and 5 digits long that you would like to test for a palindrome: ");num = in.nextInt();for( ;num != 0; ){reversenum = reversenum * 10;reversenum = reversenum + num%10;num = num/10;

Answers

Answer:

import java.util.Scanner;

import java.util.regex.*;

public class Problem2 {

   public static void main(String[] args)

   {

       int number;

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter a positive integer with exactly 5 digits long that you would like to test for a palindrome: ");

       String str = scanner.nextLine();

       int len = str.length();

       

       if (!Pattern.matches("^[1-9]\\d{4}$", str)) {

           System.out.println("Invalid number");

       } else {

           boolean isPalindrome = true;

           for(int i=0; i<len/2; i++) {

               if (str.charAt(i) != str.charAt(len-i-1)) {

                   isPalindrome = false;

                   break;

               }

           }

           if (isPalindrome) {

              System.out.println("The number is palindrome");  

           } else {

              System.out.println("The number is not palindrome");  

           }

       }        

   }

}

Explanation:

Even though the problem talks about numbers, a palindrome check is more about strings, so that's how I'd handle it. I check the validity of the input using a regular expression (note how I don't allow the number to start with a zero, you can change that if you want), and then I check for palindrome to iterating to only halfway the string, and checking the i-th position ffrom the start against the i-th position from the end. If there is no match, the loop is aborted.

See that also for even-length palindromes this will work.

The ability to write functions is one of the more powerful capabilities in C++. Functions allow code to be reused, and provides a mechanism for introducing the concept of modularity to the programming process. In addition to the concept of functions, C++ allows complex programs to be organized using header files (.h files) that contain the prototypes of functions and implementation files that (.cpp files) that contain the implementation (definition) of the functions.
In this programming assignment you will be asked to implement a number of useful functions using a header file and an implementation file. You will place the prototypes for your function in a .h file, and implement these functions in a .cpp file. You will need to write a driver (a program designed to test programs) to test your functions before you upload them.
[edit]Deliverables:
main.cpp
myFunctions.cpp
myFunctions.h
[edit]Function:
[edit]max
Precondition
two integer values exist
Postcondition
The value of the largest integer is returned.
The original integers are unchanged
If the integers have the same value then the value of either integer is returned.
Return
integer
Description
Function returns the value of the larger of two integers.
Prototype:
int max ( int, int )
Sample Parameter Values
m n max(m,n)
5 10 10
-3 -6 -3

Answers

Answer:

The header file in C++ is as follows

myFunction.h

void max(int a, int b)

{

if(a>b)

{

 std::cout<<a;

}

else

{

 std::cout<<b;

}

}

The Driver Program is as follows:

#include<iostream>

#include<myFunction.h>

using namespace std;  

int main()

{

int m,n;

cin>>m;

cin>>n;

max(m,n);

}

Explanation:

It should be noted that, for this program to work without errors, the header file (myFunction.h) has to be saved in the include directory of the C++ IDE software you are using.

For instance; To answer this question I used DevC++

So, the first thing I did after coding myFunction.h is to save this file in the following directory  ..\Dev-Cpp\MinGW64\x86_64-w64-mingw32\include\

Back to the code

myFunction.h

void max(int a, int b)  {

-> This prototype is intialized with integer variables a and b

if(a>b)  -> If the value of a is greater than b;

{

 std::cout<<a;  -> then the value of variable a will be printed

}

else

-> if otherwise,

{

 std::cout<<b;

-> The value of b will be printed

}

}

Driver File (The .cpp file)

#include<iostream>

#include<myFunction.h>  -> This line includes the uesr defined header

using namespace std;  

int main()

{

int m,n;  -> Two integer variables are declared

      cin>>m;  -> This line accepts first integer input

      cin>>n;  -> This line accepts second integer input

max(m,n);

-> This line calls user defined function to return the largest of the two integer variables

}

Other Questions
if Y is directly proportional to x and y = 10 when x = 2, find I) an equation connecting x and y ii) the value of y when x = 10III) the value of x when y = 60 p.s please give me a answer quickly Line A's equation is y = 6x - 5. Line B is parallel to Line A and and goes through thepoint (3, 10). Write the equation for Line B in slope-intercept form. There are no advantages for completing the Additional General Education Courses for any of the Limited Entry Health Sciences ProgramsTrueFalse Fill in the blanks for these highlighted questions.Will give the brainliest. leutian Company uses the multiple production department factory overhead rate method. The Fabrication Department uses machine hours as an allocation base, and the Assembly Department uses direct labor hours. The Assembly Department's factory overhead rate is Simplify (x+3)^2 - 6x 94 cities were surveyed to determine sports teams. 26 had baseball, 23 had football, 22 had basketball, 12 baseball and football, 13 had baseball and basketball, 14 had football and basketball, and 7 had all three.A) How many had only a basketball team?B) How many had baseball or football?C) How may had baseball or football, but not basketball? What does Newtons first law describeA. The relationship between force, mass and accelerationB. Action-reaction pairs C. How friction and the normal force are related D. How inertia affects the motion of an object what is the three main uses of crude oil in the world today I will give you 10B points plus mark someone again for the Brainliest if you get this right. a:15 b:7 c:4 The altitude to the hypotenuse of a right triangle is the geometric mean between the segments on the hypotenuse.alwayssometimesnever Consider the information and reading selections you have read about cultural diversity and socioeconomic differences. Write a one-page essay or a 16-line poem describing what constitutes your American identity. How do culture, religion, socioeconomic status, family, and background make you who you are? How do these factors make you unique? Make sure to include an introduction, a body, and a conclusion to your essay. If you choose to write a poem, try including figurative language or poetic techniques such as a rhyme scheme. To improve your essay or poem, try brainstorming, outlining, and revising drafts to your work. Find the HCF of 64 and 80. What types of punctuation can be used to set off nonrestrictive elements in a sentence? Check all that apply. Cawley Company makes three models of tasers. Information on the three products is given below. Sales Variable expenses Contribution margin Fixed expenses Net income Tingler Shocker Stunner $304,000 $496,000 $200,000 149,800 193,300 139.400 154,200 302,700 60,600 119.984 226,816 93,200 $34.216 $75,884 $(32,600) Fixed expenses consist of $296,000 of common costs allocated to the three products based on relative sales, as well as direct fixed expenses unique to each model of $30,000 (Tingler), $80,000 (Shocker), and $34.000 (Stunner). The common costs will be incurred regardless of how many models are produced. The direct fixed expenses would be eliminated if that model is phased out. James Watt, an executive with the company, feels the Stunner line should be discontinued to increase the company's net income. (a) Compute current net income for Cawley Company. Net income $ 77500 (b) Compute net income by product line and in total for Cawley Company if the company discontinues the Stunner product line. (Hint: Allocate the $296,000 common costs to the two remaining product lines based on their relative sales.) Can someone help me answer these please What is the midpoint of Line segment A B ?point Fpoint Gpoint Hpoint I abecedario manera y material para producir escultura y otra obra de arte su obra se realiza con Lienzo tinta madera y varios otros materiales la cultura refleja problemas sociales y polticos en el mundoQu pensamos del tiempo?Nosotros dudamos que ________. llover llueva llueve llover An icicle is in the shape of an inverted cone with a diameter of 9 mm and a height of 120 mm. The icicle drips at a rate of 75 mmper minute. How long will it take the icicle to completely melt? Use 3.14 for 7. Round the answer to the nearest tenth.0 5.1 minutes7.5 minutes15.1 minutes033.9 minutes What must be a factor of the polynomial function fx) graphed on the coordinate plane below?