.Name two loaders used in Linux?

Answers

Answer 1

Answer:

LOADLIN(Load linux)    LILO(Linux Loader).

Explanation:

Loader is a computer program that is used in linux to load linux in the memory.In linux we have to install a special loader while in other operating system we do not need to  install the loader it comes in them by default.

The two most common loader in linux are as following:-

LOADLIN(Load Linux).LILO(Linux Loader).

Related Questions

Write an application that calculates and displays the weekly salary for an employee. The main() method prompts the user for an hourly pay rate, regular hours, and overtime hours. Create a separate method to calculate overtime pay, which is regular hours times the pay rate plus overtime hours times 1.5 times the pay rate; return the result to the main() method to be displayed. Save the program as Salary.java.

Answers

Answer:

// import package

import java.util.*;

// class definition

class Salary

{

   // method to calculate weekly salary

   public static double fun(int p_rate,int r_hour,int o_hour)

   {

       // calculate weekly salary

       double w_salary=(p_rate*r_hour)+(o_hour*p_rate*1.5);

       // return salary

       return w_salary;

   }

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // object to read value from user

    Scanner scr=new Scanner(System.in);

   

       System.out.print("enter hourly pay rate: ");

       // read hourly pay rate

       int p_rate=scr.nextInt();

     

       System.out.print("enter regular hours: ");

       //read regular hours

       int r_hour=scr.nextInt();

       

       System.out.print("enter overtime hours : ");

       // read overtime hours

       int o_hour=scr.nextInt();

       // call the method

       System.out.println("weekly salary of an employee :"+fun(p_rate,r_hour,o_hour));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read hourly pay rate, regular hours and overtime hours from user.Call the method sal() with these parameters.There weekly salary is calculated by multiply regular hours with p_rate and overtime hours with 1.5 time of p_rate.Sum both of them, this will be the weekly salary.return this to main method and print it.

Output:

enter hourly pay rate: 50                                                                                                  

enter regular hours: 35                                                                                                    

enter overtime hours : 15                                                                                                  

weekly salary of an employee :2875.0

The `Salary` application prompts the user for hourly pay rate, regular hours, and overtime hours, then calculates and displays the weekly salary using a separate method to calculate overtime pay.

Here's the Java program `Salary.java` that calculates and displays the weekly salary for an employee:

import java.util.Scanner;

public class Salary {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       // Prompt the user for input

       System.out.print("Enter hourly pay rate: ");

       double hourlyPayRate = scanner.nextDouble();

       System.out.print("Enter regular hours: ");

       double regularHours = scanner.nextDouble();

       System.out.print("Enter overtime hours: ");

       double overtimeHours = scanner.nextDouble();

       // Calculate and display the weekly salary

       double weeklySalary = calculateWeeklySalary(hourlyPayRate, regularHours, overtimeHours);

       System.out.println("Weekly salary: $" + weeklySalary);

       scanner.close();

   }

   // Method to calculate overtime pay

   public static double calculateWeeklySalary(double hourlyPayRate, double regularHours, double overtimeHours) {

       double regularPay = regularHours * hourlyPayRate;

       double overtimePay = overtimeHours * hourlyPayRate * 1.5;

       return regularPay + overtimePay;

   }

}

Explanation:

The `main` method prompts the user for input: hourly pay rate, regular hours, and overtime hours.It then calls the `calculateWeeklySalary` method to calculate the weekly salary based on the provided inputs.The `calculateWeeklySalary` method calculates the regular pay and overtime pay separately, then returns the total weekly salary.Finally, the main method displays the calculated weekly salary.

You can compile and run this program to calculate and display the weekly salary for an employee based on the provided hourly pay rate, regular hours, and overtime hours.

The World Wide Web (not the Internet) went live in this decade:

Select one:

a. 1960s

b. 1970s

c. 1980s

d. 1990s

Answers

Answer:

d. 1990s

Explanation:

The World Wide Web is a kind of friendly information system that uses hypertext, and since its creation has made Internet available for most people.

The Internet already existed quite before the World Wide Web: the first computer network was ARPANET (created in 1969), a project of the Advanced Research Projects Agency of the United States Department of Defense.

Further developments in computers' protocols (ways in which computers communicate with each other) resulted in a network of networks, or the Internet, in 1983.

Although the World Wide Web was a proposal first published on March 12, 1989, by Tim Berners-Lee of the European Nuclear Research Center (CERN) --this is why it is considered that the World Wide Web was created in 1989-- the idea came into life at the end of the year 1990, for the following reasons:

After that proposal of 1989, Berners-Lee wrote another on May 1990, and in September 1990 he received support to develop those ideas.Some of the essential technologies needed to create the World Wide Web were already available by October 1990, that is, the HTTP (Hypertext Transfer Protocol), the HTML (Hypertext Markup Language) and the URI (Universal Resource Identifier), all considered been developed by Berners-Lee.On November 12, 1990, with the Belgian engineer Robert Cailliau, who was working in similar ideas, wrote a more formal proposal of such a system to share information across the CERN where they mentioned: "build a Hypertext project called WorldWideWeb" [Wikipedia, 2019].

Well, by the end of December 1990, in a NeXT computer, and after the creation of the first web server and the first web page browser, the first web site, running at CERN, appeared on December 20, 1990.

This idea was rapidly adopted outside the CERN in 1991 and, by the end of the 1990s, more than 130 million people could access the Internet using the World Wide Web technology.

In conclusion, the World Wide Web went live in the decade of 1990s: was a project, a proposal by the end of 1989 and started to work as a fast-adopted technology at the beginning, and throughout, the 1990s.

Answer:

b

Explanation:

Some companies, especially consulting firms, require their employees to create ____ about sessions with clients.
timesheets
reports
logs
stories

Answers

Answer: Reports

Explanation:

 Some companies always ask to the employees to create the particular report for the session with their clients.

As, the report is the main communication channel between the company employees and clients where all the information are complied together and focus for transmitting the data clearly.

Efficient reports are basically help in the decision making and problem with sufficient knowledge.  

On the other hand, all the other options are not needed for session with the clients in the organization. Therefore, report is the correct option.

 

what would you consider the most effective perimeter and network defense methods available to safeguard network assets?

Answers

Answer: There are several methods that are used for maintenance of safety and defensing the network against any type of hacking or attacking.Some of the methods are mentioned as follows:-

Denial of service attack(Dos)-it is the type of service that does not let the unauthorized sources and users to use the resources of the service.Intrusion detection system(IDS)-it is the system that is used for the detection of any unauthorized access happening in the system.It detects the accessing on the basis of host and networkFirewall-is the system for the security of network for controlling the  traffic that enters and exits a networks and maintains barriers by blocking untrusted traffic.

Name the contributions of Steve Jobs and Bill Gates, with respect to technology.

Answers

Answer: Steve Jobs made several contributions towards technology by introducing the range of Apple devices and technologies .he started the Apple Incorporation.The technologies introduced by his company are as follows:-

iPodiPhoneApple LisaiMaciPad etc.

 Bill Gates is the founder of Microsoft incorporation and made a lot of development in that field to create various software for the operating system.the creation of "Microsoft Window" was started by him and some other contributions are as follows:

Windows 7Windows 8VistaXPwindows 95 etc.

Answer:

Steve jobs also made the Macintosh

Explanation:

how can i take out a random (double) number in between 5.0 to 15.0 in c++?

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   srand(time(0));

   for(int i=0;i<5;i++)

   {

      double f = (double)rand() / RAND_MAX;//generating random numbers.

       double a= 5.0 + f * (15.0 - 5.0);//random numbers in range provided.

       cout<<a<<" ";

   }

return 0;

}

Explanation:

The above program generate five random numbers in the range 5.0 to 15.0.The function rand() is used to generate random numbers.First we have to call srand(time(0)) otherwise the rand() function will generate same random numbers over and over every time.

For a class Foo, one difference between a variable declared Foo * and a variable declared Foo & is that only the variable declared Foo & can potentially have the value NULL.

Select one:

a. FALSE

b. TRUE

Answers

Answer:

False.

Explanation:

When we declare a variable as reference type we have to initialize that variable otherwise the compiler will give error that the reference variable is not initialized.You also cannot initialize the variable Foo& with NULL value because it is a reference variable and we have to initialize it.

On the other there is no need to initialize the variable Foo * since it is a pointer it can also store NULL value.

So the answer is only Foo* can store NULL value not Foo &.

Flash memory is:

a) a semiconductor

b) a type of ROM

c) non-volatile

d) all of the above

e) none of the above

Answers

Answer:

d) all of the above.

Explanation:

Flash Memory is a memory storage that is non volatile.It can be erased electrically and reprogrammed since it is a type of ROM(Read Only Memory).It is the least expensive form of semiconductor memory.It offers lower power consumption and can be erased in large blocks.

Hence the answer to this question is option d.

. Write an if/else statement that assign "Excellent" to variable comments (a string data type) when score is 90 or higher, "Good" when score is between 80 and 89, and "Try Harder" when score is less than 80.

Answers

Answer:

Following are the program in c++

if(score>= 90)

 // check if score 90 or higher

{

comments = "Excellent"; // initialize comments to excellent

}

else if(score<90 && score >= 80)

// check if  when score is between 80 and 89

{

comments = "Good";   //initialize comments to good

}

else

//when score is less than 80.

{

comments = "Try Harder"; //initialize comments to try harder

}

Explanation:

Following are the program in c++ language

#include<iostream> // header file

using namespace std;  // namespace

int main() // main function

{

string comments; // variable

int score;  // variable declaration

cout<<" enter score ";

cin>>score;

if(score>= 90)

{

comments = "Excellent"; // initialize comments to execellent

}

else if(score<90 && score >= 80)

{

comments = "Good";   //initialize comments to good

}

else

{

comments = "Try Harder"; //initialize comments to try harder

}

cout<<comments;

return(0);

}

Output:

enter score

45

Try Harder

In this we check the condition  

if score>= 90 then it store the Excellent in variable  comments of type string

if(score<90 && score >= 80)

it store the Good in variable comments of type string.

otherwise it store harder in variable comments of type string.

Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash, and the year. End with newline. The program will be tested with inputs 1 2000, and then with inputs 5 1950. Ex: If the input is 1 2000, the output is: 1-2000 Note: The input values come from user input, so be sure to use cin statements, as in cin >> birthMonth, to get those input values (and don't assign values directly as in birthMonth

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

// variables to read birth month and year

int birthMonth,birthYear;

cout<<"Enter the birth month:";

// read the birth month

cin>>birthMonth;

cout<<"Enter the birth Year:";

// read the birth year

cin>>birthYear;

// print the output

cout<<birthMonth<<"-"<<birthYear<<endl;

return 0;

}

Explanation:

Declare two variables "birthMonth" and "birthYear". Read the value of birthMonth and birthYear from user. Then print the birth month and birth year and a dash(-) in between them.

Output:

Enter the birth month:1                                                                                                                                      

Enter the birth Year:2000                                                                                                                                    

1-2000  

Enter the birth month:5                                                                                                                                      

Enter the birth Year:1950                                                                                                                                    

5-1950

The program is an illustration of a sequential program, and it does not require loops, iterations or conditions.

The programming statements in C++, where comments are used to explain each line is as follows:

//This gets input for birthMonth

cin>>birthMonth;

//This gets input for birthYear

   cin>>birthYear;

// This prints the month, a dash, and the year

   cout<<birthMonth<<"-"<<birthYear;

Read more about similar programs at:

https://brainly.com/question/15187402

. Why is it insufficient to develop a long-term IT strategy and not reexamine the strategy on a regular basis?
a. Systems need to be maintained
b. To keep the CIO part of the executive team
c. Organizational goals change over time
d. To automate business processes

Answers

Answer:

The correct answer is c. Organizational goals change over time.

Explanation:

Develop a long-term IT strategy is an important goal to provide planning and solutions to an organization but it is important to reexamine the IT strategy on a regular basis to do corrections on this strategy because organizational goals change over time.

Defining a(n) ______________ of an object is called instantiation.

(Points : 2) object
link
instance
prototype

Answers

Answer: Instance

Explanation: Instantiation is the creation of the instance for any particular object in the field of object-oriented programming concept. The previously defined objects are realized in a program.This object that gets created in the class is provided with the name and placed in the memory.

They have their certain methods, process and properties on which they access.Other options are incorrect because instantiate object does not gets created from the link, object or prototype.Thus, the correct option is instance.

What are three key characteristics of an OS process?

Answers

Answer:

 The three key charactertics of the operating system process is that:

The process of the operating system is the instance of the program that can be executed and run.The operating system process is represented by the code and program. It is also indicated by the parameters that it is also allow in the situation if any interruption occur. In the case of the Linux operating system the process is also used to indicate as task in the system.  

. Convert your age into binary and then to hexadecimal. Show your work.

Answers

Explanation:

Age = 23.

To convert a base 10 number to hexadecimal number we have to repeatedly divide the decimal number by 16 until  it becomes zero and store the remainder in the reverse direction of obtaining them.

23/16=1 remainder = 5

1/16=0 remainder = 1

Now writing the remainders in reverse direction that is 15.

My age in hexadecimal number is (15)₁₆.

What is a URI (include example)

Answers

Answer:

 URI is the uniform resource identifier and it is basically a sequence of the character which identify the physical and logical resources. The uniform resource identifier basically contain the predefined set of rules and syntax and also maintain the extensibility hierarchical schema.

There are basically two types of URI that are:

  1)  Uniform Resource Name (URN)

  2) Uniform Resource Locator (URL)

For example: HTTP protocol , file transfer protocol (FTP).

 

Left uncaught, a thrown exception will cause your program to terminate.

Select one:

a. FALSE

b. TRUE

Answers

Answer: True

Explanation:

  Yes, the given statement is true that the left uncaught, the throwing exceptions caused stop execution or terminate the program. The uncaught exception is basically refers that the compiler control the termination function in the program.  

Left Uncaught exception basically cause termination of the program and also implement the interface in the uncaught exception handler in the particular java thread.

__________________ are evaluations of a network

Answers

Answer:

 The evaluation of the network is basically depend upon the various factors such as the stage, type and size of the network development. The main purpose for the evaluation of the network is that the system works with high efficiency without any interruption in the network.

According to the size and the type of the network we can easily evaluate the particular network in the system and then we can easily work on the network infrastructure to make the network more efficient.

_______For the C programming language, files containing the code you write are named with a file extension of .g. (T/F)

Answers

Answer:

False.

Explanation:

In C programming language the file which containing the code that we are writing the code is have the file extension .c and for c++ it is .cpp.  C programming language is a general purpose procedural computer programming language.

.g file extension is for data chart file format used by APPLAUSE database development software.

Hence the answer to this question is false.

Enumerations can contain ___________ values.

a.only unique

b.an indefinite number of

c.up to 10

d.up to 100

Answers

Answer: (A) Only unique

Explanation:

 Enumeration basically contain only unique value as enumeration is define as the set of the numeric values that is finite and it is represent specifically by the identifiers which is known as the enumeration constant.  

It only work with the finite values and also hide all the un-relevant and unnecessary information from the programmers. Enumeration is the type of the data type variable which contain only previous declared values.  

Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and Recovery configuration settings in the Control Panel System applet (System -> Advanced system settings -> Advanced -> Startup and Recovery -> Settings... -> System failure).

(A) True
(B) False

Answers

Answer:

True.

Explanation:

Sometimes there comes a problem in computer systems of continuous reboots of a windows this could due to following reasons such as software issues,bad power supply,bad hard drive,hardware issues.

If the issue is from startup and recovery configuration or software you can see it by going in the Control Panel System applet given in the question.

The value of the mathematical constant e can be expressed as an infinite series: e=1+1/1!+1/2!+1/3!+... Write a program that approximates e by computing the value of 1+1/1!+1/2!+1/3!+...+1/n! where n is an integer entered by the user.

Answers

Answer:

// here is code in c++ to find the approx value of "e".

#include <bits/stdc++.h>

using namespace std;

// function to find factorial of a number

double fact(int n){

double f =1.0;

// if n=0 then return 1

if(n==0)

return 1;

for(int a=1;a<=n;++a)

       f = f *a;

// return the factorial of number

return f;

}

// driver function

int main()

{

// variable

int n;

double sum=0;

cout<<"enter n:";

// read the value of n

cin>>n;

// Calculate the sum of the series

  for (int x = 0; x <= n; x++)

  {

     sum += 1.0/fact(x);

  }

  // print the approx value of "e"

    cout<<"Approx Value of e is: "<<sum<<endl;

return 0;

}

Explanation:

Read the value of "n" from user. Declare and initialize variable "sum" to store the sum of series.Create a function to Calculate the factorial of a given number. Calculate the sum of all the term of the series 1+1/1!+1/2!.....+1/n!.This will be the approx value of "e".

Output:

enter n:12

Approx Value of e is: 2.71828

Euler's number, e, can be approximated using a series expansion. The provided C program calculates e by summing the series up to 1/n! where n is entered by the user.

Euler's number, e, is a mathematical constant approximately equal to 2.71828. It can be computed using the series expansion:

e = 1 + 1/1! + 1/2! + 1/3! + ... + 1/n!

Below is a C program that approximates e by computing the sum up to 1/n! where n is an integer entered by the user.

#include <stdio.h>
// Function to calculate factorial of a number
double factorial(int n) {
   double fact = 1;
   for (int i = 1; i <= n; i++) {
       fact *= i;
   }
   return fact;
}
int main() {
   int n;
   double e = 1.0; // Starting with 1 as per the series definition
   
   // User input
   printf("Enter an integer n: ");
   scanf("%d", &n);
   
   // Calculate value of e
   for (int i = 1; i <= n; i++) {
       e += 1.0 / factorial(i);
   }
   
   // Display result
   printf("Approximation of e using %d terms: %lf\n", n, e);
   return 0;
}

What is the efficiency (Big O Notation) of quicksort algorithm?

Answers

Answer:

O(NlogN)

Explanation:

The time complexity of quick sort in worst case is O(N²) but the average case time complexity of quick sort is O(NLogN).The efficiency of quick sort totally depends upon the pivot.If the pivot is the smallest or the largest element in the array every time then the time complexity of quick sort algorithm will come out to be O(N²).

If (41)r = (21)10, determine the value of the radix r.

Answers

Answer:

r=5.

Explanation:

Since we know we can convert a a number with any base to base ten(10) by multiplying the corresponding powers of the base.Stating form the LSB(Least Significant Bit) and with the power 0 and the power will increase by 1 as we move to MSB(Most Significant Bit).

[tex]4*r^1+1*r^0 = 21[/tex]

[tex]4r = 21 -1[/tex]

[tex]4r=20[/tex]

[tex]r=5[/tex]

In what respects does a UML state diagram differ from a state transition diagram?

Answers

Answer: The difference between the UML state diagram and state transition diagram are as follow:-

State-transition diagrams display the states of the object where the change takes place whereas the UML(Unified modeling language) state diagrams are representation of parts of system at certain time instance. State-transition diagram requires the condition to be accomplished before the transition happens whereas the dynamic behavior of the states are expressed by transitions in UML state diagrams.

Standards are used when an organization has selected a solution to fulfill a policy goal.

True

False

Answers

Answer: True

Explanation:

 Yes, the given statement is true that the standard are basically used when the organization are selected for the solution to fulfilling the particular policy goals. In the organization are standard are basically require for the software and hardware solutions to control the security risk.

Adopting standard in the organization it provide many advantages like it helps to save money and productivity of the organization or company.

Standard are basically establish a common throughput in the organization which provide all the department in the organization on the same level.

Wi-Fi is all around us. Is there any downside to its pervasiveness?

Answers

Answer:

  Wi-Fi(Wireless fidelity) is the networking technology that helps in providing the internet connectivity to the users. The Wi-Fi is all around the surrounding due to several Wi-Fi connections the users demand and use. It creates the networking environment where internet access becomes easy.

There are drawback to Wi-Fi service range that covers a large area is the high number of users.The addition of many users slow down the data rate and accessing .The radiation from this service is also a negative side of the Wi-Fi pervasiveness.

Final answer:

The downsides to the pervasiveness of Wi-Fi include the digital divide, security risks, and the psychological impact of being constantly connected. To mitigate these issues, digital literacy, cybersecurity, and healthy digital habits are crucial.

Explanation:

Wi-Fi's pervasiveness indeed comes with downsides alongside the immense benefits it provides in terms of connectivity and access to information. One major concern is the digital divide, a gap that is widening between those who have access to technology and those who do not, both locally and globally. This phenomenon can lead to disparities in access to information and inequalities in educational and economic opportunities.

Another significant concern is security risks. With Wi-Fi networks, there is the potential for eavesdropping and unauthorized access to communications, raising issues of privacy and data protection. As we further integrate Wi-Fi and other wireless technologies into critical infrastructure and personal devices, the risk for systemic failures and technological vulnerabilities increases, which could have severe consequences in the event of natural disasters or targeted attacks.

Broadly speaking, how is testing in an object-oriented approach different to testing in traditional software development?

Answers

Answer:

In object oriented programming methodology, the attention is that capture the main structure and conduct of data frameworks into little modules that joins the two information and procedure.

The main principle of Object Oriented Design (OOD) is that it helps in improve the quality and efficiency of framework analysis and configuration by make the system more progressively usable.

The software Programming testing is a significant period of the product advancement cycle of the life. Testing is the way toward executing the main structure of the program with the help of main objective and also discovering mistakes.

In today world the situation of the object oriented ideas are utilized all through programming designing. Testing of item arranged programming is unique in relation to testing with the traditional programming.

What is a relational database management system and how does it relate to a database administrator?

Answers

Answer: A database management system tends to support administration, development, and use of the platforms. A Relation Database Management System (RDBMS) is referred to as a type of Database Management System (DBMS) that consists of a structure(row-based table) that tends to connect data elements and also involve functions that are supposed to maintain accuracy, security, consistency and integrity of the data.

Social engineering is deceiving or using people to get around security controls.

True

False

Answers

Answer: True

Explanation:

Social engineering, in regards to information security, it is referred to as the cognitive manipulation of an individual into divulging confidential data and information. This also tends to differs from social engineering within discipline and domain of social sciences, which usually does not concern with the divulging of confidential data and information.

Answer: FALSE

Explanation:

Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
public: void print() {}
public: virtual void print() {}
public: virtual void print()=0;

Answers

Answer:

public: virtual void print()=0;

Explanation:

An abstract class contains a pure virtual function. Pure virtual class cannot be instantiated but it can be subclassed and the subclass can provide an implementation of the function.

A virtual function declaration in the class is preceded by the virtual keyword. For example, virtual void print();

A pure virtual function declaration is followed by '=0;'

public: virtual void print()=0;

Other Questions
The electric field surrounding two point charges: a) is the vector sum of the electric field that would be caused by each charge separately.b) zero at all points along the line connecting the two charges.c) cannot be determined.d) cannot be zero anywhere.e) None of the above. What times what equals -18 the word means anything that happens to or is done by a character in astory O20Q000Many immigrants to the United States in the late twentieth century came fromEurope and Latin America.O Europe and Africa,O Africa and Asia.O Asia and Latin America. A prescription medication requires 5.98 mg per kg of body weight.A)Convert this quantity to the number of grams required per pound of body weight.B)Determine the correct dose (in g) for a 191-lb patient. Express your answer with the appropriate units. What is 4527 written in scientific notation?OA) 4.527O B) 4.527 x 102OC) 4.527 x 103OD) 4.527 x 104 The___ of people includes its customs, beliefs, and ways of making a living OKAY, LOOK... JUST CLICK ON THIS and tell me if this is too much text. Simple, EASY points. It's effortless!! You just have to tell me "yes" or "no", based on your opinion. This is a single slide from my presentation about Wattpad for my English class, and we're presenting it in front of the whole class on Wednesday (aaaaH), and nobody wants to listen to me say a TON of words. That'd be so boring.**I'll give you brainliest if you tell me what to improve on, like making it 3 bullet points or something, or maybe adding icons or pictures for da pe-pow who like visuals.** an average person has 6x10 2power times as many red blood cells as white blood cells. A small sample of blood has 7x10 3power white blood cells. about how many red blood cells are in the sample The following information pertains to the August manufacturing activities of Griss Co.: Beginning work-in-progress (BWIP): $12,000 Ending work-in-progress (EWIP): $10,000 Cost of goods manufactured (COGM): $97,000 Direct materials issued to production: $20,000 Factory overhead is assigned at 150% of direct labor. What was the August direct labor? Round the following number to the indicated place. 66.1086 to hundredths A student who works at a record store and plays in a rock band thinks for a minute about his own music-purchasing habits, and then makes a quick guess about the number of other students who buy more than 30 CDs a year. He grossly overestimates. He has probably applied the A company issues $25300000, 7.8%, 20-year bonds to yield 8.0% on January 1, Year 17. Interest is paid on June 30 and December 31. The proceeds from the bonds are $24799240. Using effective-interest amortization, what will the carrying value of the bonds be on the December 31, Year 17 balance sheet? Consider a fair coin which when tossed results in either heads (H) or tails (T). If the coin is tossed TWO times 1. List all possible outcomes. (Order matters here. So, HT and TH are not the same outcome.) 2. Write the sample space. 3. List ALL possible events and compute the probability of each event, assuming that the probability of each possible outcome from part (a) is equal. (Keep in mind that there should be many more events than outcomes and not all events will have the same probability.) Given the chemical formula, how is this substance MOST LIKELY classified? A)atom B)compound C)both atom and compound D)neither atom nor compound Immunological memory is only observed in Helper T cells. a. True b. False At the farmer's market, a bag of apples and 3 cartons of strawberries cost $18 total. If a bag of apples costs 50% more than a carton of strawberries, how much does a bag of apples cost? The three major network category are_____,_____ and_____ Which of the following would be included in the United States GNP but not GDP? An American named Elizabeth provides financial services in Kansas City, Missouri An American named Amy provides accounting services in Beijing A Colombian citizen provides legal services in Miami A French citizen provides medical services in Quebec City, Canada None of the above The U.S. financial system is composed of (1) policy makers, (2) a monetary system, (3) financial institutions, and (4) financial markets. Which of the following components is associated with the role of the financial markets? a) Accumulate and lend/invest savings b) Create and transfer money c) Pass laws and set fiscal and monetary policies d) Market and facilitate transfer of financial assets