Use the laws of propositional logic to prove the following:

(a) ¬p → ¬q ≡ q → p

(b) p ∧ (¬p → q) ≡ p

(c) (p → q) ∧ (p → r) ≡ p → (q ∧ r)

Answers

Answer 1

Final answer:

The logical equivalences ¬p → ¬q ≡ q → p, p ∧ (¬p → q) ≡ p, and (p → q) ∧ (p → r) ≡ p → (q ∧ r) are proven using the laws of propositional logic including contraposition, noncontradiction, and distribution.

Explanation:

Proof of Logical Equivalences

Using the laws of propositional logic, we can prove the following equivalences:

¬p → ¬q ≡ q → p can be proven by considering the truth tables for each side of the equivalence or using the contraposition law which states that the implication ¬p → ¬q is equivalent to q → p.

p ∧ (¬p → q) ≡ p can be proven by realizing that according to the law of noncontradiction, p and ¬p cannot both be true. If p is true, the implication ¬p → q is always true, thus the conjunction simplifies to just p.

(p → q) ∧ (p → r) ≡ p → (q ∧ r) uses the distribution of the implication over conjunction, which tells us that if p implies both q and r separately, then p must imply their conjunction q ∧ r.

Each of these logical equivalences utilizes fundamental logical laws such as the law of contraposition, noncontradiction, and distribution, to establish the equivalences. Understanding these laws helps in proving logical equivalences and understanding the structure of logical arguments.


Related Questions

Which of the following are not valid assignment statements? A) total = 9;
B) 72 = amount;
C) yourAge = myAge;

Answers

Final answer:

Option B (72 = amount;) is not a valid assignment statement because a constant value cannot be assigned to another value, whereas valid statements involve assigning values to variables.

Explanation:

The question is asking which of the given assignment statements in the context of a programming language is not valid. An assignment statement typically involves assigning a value to a variable.

The correct answer among the options provided is:

B) 72 = amount; This is not a valid assignment statement because in most programming languages, the value or expression on the right is assigned to the variable on the left. Since '72' is a constant value and not a variable, it cannot be assigned a value.

On the other hand, options A and C are valid assignment statements:

A) total = 9; - This is valid because 'total' is a variable that can be assigned the value of '9'.C) yourAge = myAge; - This is also valid as one variable, 'yourAge', is being assigned the value of another variable, 'myAge'.

Create a program in java that calculates area and perimeter of a square - use a class and test program to calculate the area and perimeter; assume length of square is 7 ft.

Answers

Answer:

Following are the program in Java

class abc // class abc

{

   

   public void area(int s) // function area

   {

       s=s*s;// calculate area

       System.out.println(" The area is:" +s + " ft"); // display the area

   }

    public void perimeter(int s) //function perimeter

    {

        s=4*s;//calculate perimeter.

       System.out.println(" The perimeter is:" +s + " ft"); //display the perimeter

    }

}

public class Main //class main

{

public static void main(String[] args) // main function

{

abc ob=new abc(); // creating instance of class abc

ob.area(7); // calling function area

ob.perimeter(7); // calling function perimeter

}

}

Output:

The area is: 49 ft

The perimeter is:28 ft

Explanation:

In  this program we create the class "abc" .We declared two function in the class "abc" i.e "area" and "perimeter" which is calculating the area and perimeter of a square and print them , from the main function we create a object of class "abc" i.e "ob" which called the function area and perimeter .

Which of the following is a/are question(s) that you should ask before you create an Access report?

What is the purpose of the report?
Who will use the report?
How will the report be distributed?
All the above questions should be asked

Answers

Answer: All the above questions should be asked

Explanation:  Access report are the reports in access which provides the summarized and formatted information display in database. The information in the database is extracted from tables.The access report requires purpose of the report before preparation and the accessing users information to be known .

It is asked to make sure about that no unauthorized access of the report can take place. Distribution of the report among the other user or client is also a major question to be asked as to keep the record of the accessing of access report..Thus, all the question mentioned in the options are correct.

What is meant by ""responsive design""?

Answers

Answer:

Supported by all devices,screen sizes and orientation.

Explanation:

Responsive design mostly used in Web designs.It is the approach in which the design of the web app must respond to behavior of user and the environment also based on the platform,screen size and orientation.

This should be done by using flexible grids,layouts and some smart use of CSS .

You can also use Bootstrap for responsive designs.

If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign letter w to the variable?
A) letter = w;
B) letter = 'w';

C) letter = "w";

Answers

Answer:

The correct answer for the given question is option(A) and option(C) .

Explanation:

To declared any variable of character we using following syntax

char variable=' value';

char  letter='w';

In option(A)  their is no single quotes between character w .So this is not a valid assignment.

In option(C) their is double quotes between character w,no single quotes  between character w .So this is not a valid assignment.

In option(B) their is single quotes between character w .So this is a valid assignment.

So option(A) and option(C) are are not valid assignment statement.

A) Valid if `w` is a `char` variable.

B) Valid (`'w'` is a `char` literal).

C) Invalid (`"w"` is a `String`, not a `char` literal).

In Java, a `char` variable can only be assigned a single character enclosed in single quotes (e.g., `'a'`, `'b'`, `'w'`). Therefore, valid assignment statements must adhere to this rule.

Let's analyze each option:

A) `letter = w;`

- This statement assumes `w` is a variable holding a `char` value. If `w` is not declared as a `char` and does not represent a valid character literal, this assignment will cause a compilation error.

B) `letter = 'w';`

- This is a valid assignment statement. `'w'` is a character literal representing the character 'w'. It matches the type `char`.

C) `letter = "w";`

- This statement uses double quotes, which in Java denote a `String` literal, not a `char` literal. Therefore, this assignment will cause a compilation error because you cannot directly assign a `String` to a `char` variable.

Conclusion:

The assignment statement that is not valid to assign the letter 'w' to a `char` variable in Java is **C) `letter = "w";`**.

Write c++ function that receives input a person’s first name and surname, and then just displays the initials. For example: John Peter Joe, the initials JPJ must be displayed

Answers

Answer:

void Initials(string firstName,string lastName)

{

   cout<<firstName[0];

   for(int i=1;i<firstName.length();i++)

   {

       if(firstName[i-1]==' ')

       {

           cout<<firstName[i];

       }

   }

   cout<<lastName[0];

    for(int i=1;i<lastName.length();i++)

   {

       if(lastName[i-1]==' ')

       {

           cout<<lastName[i];

       }

   }

   cout<<endl;

}

Explanation:

The above written code is the function Initials which prints the full name.Parameters provided in the function are firstname and lastname in the format of string.You should include string header file for this code to run.

What are the two possible stereotypes allowed for package: (Points : 6) framework and private
modelLibrary and protected
framework and modelLibrary
framework and protected

Answers

Answer: framework and modelLibrary

Explanation: Stereotypes helps in the providing the control action to the class that is providing support to the other class in the  UML(Unified modeling language) model. For the package as the model element the stereotypes allowed are framework and modelLibrary.

framework stereotype applied on the package for providing due to  reusable components it persist. modelLibrary is the stereotype for the package that has reusable model elements.

Other options are incorrect because "private" and "protected" are not the stereotypes for the model element package.Thus the correct option is framework and modelLibrary.

."How is social media influencing web applications and development?"

Answers

Answer:

Social media plays a vital role in today's era, it tends to influence the web applications and their development in several ways possible, such as:

Most of the business organizations tend to have a presence on a social media platform and that is considered to be a great way of letting individuals know about your commodities, since most of the people have access to internet.  This is considered one of the reasons that most of the websites created have icons of  different social media platforms that the organization has presence on. The tendency to use icons in order to project which social platform an organization is on is turning out to be more vital for many websites today.

Final answer:

Social media platforms like are reshaping web development, with a strong influence on the dissemination of information, including political discourse.

Explanation:

Social media is significantly influencing web applications and development, reshaping how they interact with users and how content is delivered. Platforms like Face-book and Twi-tter have become central to disseminating information, including political discourse, news, and general public communication. The extensive reach of these platforms raises critical questions about their influence on political information, elections, and public policy.

Social media's impact on web development is evident in the proliferation of features that promote social sharing and connectivity. Features such as liking, sharing, and comments sections are now standard on various web applications, driven by the desire to increase user engagement and time spent on sites. Beyond these features, the backbone technologies of the internet, like Cloud Computing, are being harnessed to support the massive amounts of data generated and shared via social media.

Write a small program basic c++, that defines a negative integer (between ‐1 and ‐255), converts it to a positive value and then displays it on the console window.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

int a=-156;//negative integer between -1 and -255.

a*=-1;//multiplying a to -1 so that it can become positive.

cout<<a;//printing a.

return 0;

}

Explanation:

The above written program is in C++ and in the program an integer a is defined with a negative value in the program it is -156.Then to convert it to positive integer we have to multiply a to -1 after that printing the value of a on the screen.

Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.

scripts
applets
file indexes
security holes

Answers

Answer: Security holes

Explanation: Security holes are the patches in the form of vulnerabilities that occur in the antivirus software and other such software that can lead to the hacking or attacking of the system. Security holes are filled in with update as quick repair solution. During this repairing, worms as a malicious  element attacks the system.

Other options are incorrect because scripts is type of language ,applets are small applications and the files index is the index holding the data of files.Thus the correct option is security holes.

An extract report lists ____________.

(Points : 2) records that satisfy selection criteria
summary information only
every record read and processed
only records that are sorted

Answers

Answer: Summary information only

Explanation:

The extract report is basically design to create the various output files and contain only summary information. In the extract report we can listed and modify the data sets according top the specific requirements.

The extract report is basically used to describe the summary and specif pattern of the information or data.

The extract report is basically generated when the overall extract job is executed and submitted.  

Index addressing is for traversing arrays.

True

False

Answers

Answer:

False.

Explanation:

Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.

for example:-

We have an array a of size 10.So to access the element at position 6.We have to write.

a[5];

Manipulating it

a[5]=6;

Program 1: I’m buyin’ a Ferrari! If you’ve ever travelled to another country, you know that working with different currencies takes a while to get used to. As of the date of making this assignment, there are 9,240.00 Guinean Francs to $1 USD. For this program, design (pseudocode) and implement (source code) a program that prompts the user for the amount of U.S. currency they have, and converts it into Ginean Francs.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

// initialize one Guinean_Francs

   double Guinean_Francs=9240.00;

   int u_s_d;

   double tot_Guinean_Francs;

   cout<<"enter the amount in U.S dollar:";

   // read the dollar

   cin>>u_s_d;

   // conver it into Guinean_Francs

   tot_Guinean_Francs=u_s_d*Guinean_Francs;

   print the output

   cout<<"total Guinean Francs is :"<<tot_Guinean_Francs<<endl;

return 0;

}

Explanation:

Declare and initialize a variable "Guinean_Francs" with 9240.00.Then read the  U S dollar from user and assign it to variable "u_s_d".Then multiply u_s_d  with Guinean_Francs and assign it to tot_Guinean_Francs. This will be the  total Guinean Francs.

Output:

enter the amount in U.S dollar:25                                                                                                                            

total Guinean Francs is :231000  

Subtract the following the Hex numbers:

67h

2Ah

Result is =

Answers

Answer:

3D ( in hexadecimal )

Explanation:

Converting the given hexadecimal numbers to decimal:

 67 (HEX) = 16*6 + 7 = 103 (Decimal)

 2A (HEX) = 2*16 + 10 = 42 (Decimal)

Subtracting the two numbers: 103 - 42 = 61 (Decimal)

Converting the result to Hexadecimal format:

61 = 16* 3 + 13

13 corresponds to D in hexadecimal.

So result in hex is 3D.

To summarize, the subtraction result for the two given hexadecimal numbers is 61 in decimal format or 3D in hexadecimal.

.What are signals, how can they be used?

Answers

Answer:

 The signal is the function which that carry information about the particular phenomenon in the signal processing. A signal is also define as the change in the quantity which is observable.

In terms of telecommunication, a signal is the varying current, voltage and the electromagnetic wave which basically carries data or information. Signal can be in the form of audio, image and radar related.

A signal can be used be various signal processing system and telecommunication fr the transmission of information from one device to another device.    

To copy a list you can use this. list2 = list1[ : ]

True or False

Answers

Answer:

True.

Explanation:

The colon in square brackets is used to subsetting the list.

for example list1=[1,2,4,6,2,5]

print(list1[3:5])

This will print 6 ,2

Because it means the list from index 3 to 4 the last value is not inclusive.So if you write [:] it means the whole list and in the question we are assigning it to list2.So all the values from list1 will be copied to list2.

Write a program that prints to the screen all the ASCII characters from 33 to 126. 33! 34''

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   for(int i=33;i<=126;i++)//Using loop to print ASCII characters.

   {

         cout<<i<<char(i<<" ";//statement to print integer and it's ASCII characters with values.

   }

return 0;

}

Explanation:

Put a closing parenthesis i char(i after doing that code will run .Since the answer was not getting posted hence i have to come to this resort.

I have used for loop for values 33 to 126 and for printing the ascii characters I have used typecasting converting the integer to corresponding char forcefully.

. Dеclarе a onе-dimеnsional array of 30 doublеs (on thе stack) namеd rainfall

Answers

Answer:

double rainfall[30];

Explanation:

Here we are declared an onе dimеnsional array named " rainfall "  of size 30  and type double.To declared a onе dimеnsional array we can use the following syntax.

datatype array-name[size];

So double rainfall[30];

Following are the program in c++

#include<iostream> // header file

using namespace std; // namespace

int main() // main method

{

 double rainfall[30]={45.5,78.9,67.78}; // array declaration and storing values

for(int i=0;i<3;++i) // iterating loop

{

    cout<<rainfall[i]<<endl; // printing the array elements

}

   return 0;

}

Output:

45.5

78.9

67.78

Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detected should print a separate statement followed by a newline. Ex: If passCode is "9a", output is: Alphabetic at 1 Hint: Use two if statements to check each of the two characters in the string, using Character.isLetter().

Answers

Final answer:

To find the location of any alphabetic character in a 2-character string, use two if statements to check both characters with Character.isLetter(), consider 0-based indexing while displaying a 1-based output.

Explanation:

The student is asked to write Java code that prints the location of any alphabetic character in a 2-character string called passCode. In Java, the method Character.isLetter() can be used to determine if a given character is a letter. To accomplish this task, two if statements can be used, one for each character in the string, and the indexes are 0-based. If an alphabetic character is found, the program outputs the location of the character using a 0-based index, but since users usually expect a 1-based index, we'll add one to the index before printing. Here is an example of how to write the code:

public class Main {
  public static void main(String[] args) {
      String passCode = "9a";
      if (Character.isLetter(passCode.charAt(0))) {
          System.out.println("Alphabetic at " + (0 + 1));
      }
      if (Character.isLetter(passCode.charAt(1))) {
          System.out.println("Alphabetic at " + (1 + 1));
      }
  }
}
For the string "9a", the output of this code would be "Alphabetic at 2" because 'a' is an alphabetic character at the second position (index 1).

Write a Scheme function called "sum" which takes an input function func and a nonnegative number n and outputs the value

func(1) + func(2) + .. + func(n)

Answers

Answer:

function sum(number) {

      if (number == 1) {

             return 1;

      }

      return number + sum(number -1);

}

Explanation:

This is a recursive function, it means that is a function that calls itself for example: if you call the function with sum(5) the process is :

sum(5)

   |______ 5 + sum(4)

                           |_______ 4 + sum(3)

                                                       |______ 3 + sum(2)

                                                                                   |_____2 + sum(1)

                                                                                                        |_____ 1

                                                                                                 

the result is 1+2+3+4+5 = 15

Write a procedural programming loop.. Your loop should start variable n with a value of 10 and count down to zero. The loop should terminate when n reaches the value of zero.

Answers

Answer:

//Here is the for loop in C.

for(n=10;n>0;n--)

{

   printf("count =%d \n",n);

}

Explanation:

Since C is a procedural programming language.Here if a loop that starts with n=10; It will run till n becomes 0. When n reaches to 0 then loop terminates otherwise it  print the count of n.

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{  // variables

int n;

// for loop that runs 10 times

// when n==0 then loop terminates

for(n=10;n>0;n--)

{

   cout<<"count ="<<n<<endl;

}

return 0;

}

Output:

count =10

count =9

count =8

count =7

count =6

count =5

count =4

count =3

count =2

count =1

What are some steps in object-oriented design process? Explain with examples.

Answers

Answer:

The following are some steps for the object oriented designing process that are:

First, define the proper modes and the context use in the system. Then, design the process of the object oriented system architecture and define its main feature by using the architecture.Identify the given object from the object oriented system for construction of the model of the system.Then, finally specify the object interface in the system.

For example:

For implementing the flow of pipe, Firstly break the transformation into the different level of stages and then define the output and input properly between the pair of the stages. Then, differentiate the operation of each stage of the updates pipeline.

Which of the following is true of two-factor authentication?

A. It uses the RSA public-key signature based on integers with large prime factors.

B. It requires two measurements of hand geometry.

C. It does not use single sign-on technology.

D. It relies on two independent proofs of identity.

Answers

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

A ____ is any manipulation of data, usually with the goal of producing information.

decision

process

problem

system

Answers

Answer: Process

Explanation: Processing data in the computing field is referred as the manipulation and transformation of data into useful output. The raw data is transformed machine language data.The processing also consist of the operations performed on data.

Other options are incorrect because decision is the final judgement made regarding computing,problem is issue in system and system is the complete unit in which processing takes place.Thus, the correct option is process.

______The statement #include < math.h > defines the name of the current program you are writing as "math". (T/F)

Answers

Answer:

False.

Explanation:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Answer:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Explanation:

there is the link https://study.com/academy/lesson/variability-in-statistics-definition-measures-quiz.html

A common measure of transmission for digital data is the number of bits transmitted per second. Generally, transmission is accomplished in packets consisting of a start bit, a byte (8 bits) of information, and a stop bit. Using these facts, answer the following:

a. Compute the time required to transmit an image of 1200x800 pixels with 8 bits for gray of each pixel using a 50 M bits/sec. modem?

b.What would the time be at 3 M bits/sec, a representative of download speed of a DSL connection?

(c) Repeat a and b when the image is RGB colored with 8 bits for each primary color. f 20 colored frames per second

Answers

Answer:  a) 0,19 seg. b) 3,2 seg. c) 11,5 seg.  d) 192 seg.

Explanation:

a)  For each pixel in the image, we use 8 bits + 1 start bit + 1 stop bit= 10 bits.

Number of Pixels: 800*1200= 960,000.Bits transmitted: 960,000 x 10 = 9.6 * 10⁶ bits = 9.6 Mbitsif  the modem is able to transmit up to 50 Mbits in a second, we can calculate how much time it will be needed to transmit 9.6 Mbits, using this equality:

50 Mbit = 1 sec9.6 Mbit = x  ⇒  t= 9.6 / 50 = 0.19 sec

b)  If the modem speed changes to 3 Mb/s, all we need to do is just use the same equality, as follows:

3 Mbit = 1 sec9.6 Mbit = x  ⇒  t= 9.6 / 3 = 3.2 sec

c) Now, if we need to transmit a colored image , at a rate of 20 f/sec, we need to calculate first how many bits we need to transmit, as follows:

1 Frame= 800*1200* (24 bits + 3 start bits + 3 stop bits)=  28.8  Mbits1 Second= 20 frames/ sec = 28.8 Mbits *20 = 576 Mbits.If the modem speed is 50 Mb/s, we can use the same formula that we used for a) and b), as follows: 50 Mbit = 1 sec576 Mbits = x  ⇒  t= 576 / 50 = 11.5 sec

d) Same as c) replacing 50 Mb/s by 3 Mb/s, as follows:

3 Mbit = 1 sec576 Mbits = x  ⇒  t= 576 / 3 = 192 sec

The time that's required to transmit an image of 1200x800 pixels with 8 bits for gray is 151.6 million seconds.

How to calculate the time taken?

The time required to transmit an image of 1200x800 pixels with 8 bits for gray will be:

= (1200 × 800 × 8) / 50

= 151.6 million seconds.

The time needed to be at 3 M bits/sec, a representative of download speed of a DSL connection will be:

= 7.68/3

= 2.56 seconds.

Learn more about time on:

https://brainly.com/question/4931057

How is a microkernel architecture different from a monolithic architecture?

Answers

Answer:

The monolithic kernel is a bigger process that run in a unique memory address. All the kernel services run over the kernel space.

In micro kernel it get split in services in different memory spaces. Each one run in it own space.

Explanation:

Advantages:

    1. Monolithic:

Faster processing

    2. Micro:

crash proof

Summarize who you believe cyber criminals are, and why?

Answers

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

Internet stalkersCyber terrorist Identity thieves

Add a script element into your HTML page that prints ‘hello’ to the browser’s JavaScript developer console.

Answers

Answer:

<!DOCTYPE html>

<html>

<body>

<h2>My Webpage</h2>

<script>

console.log("hello");

</script>

</body>

</html>  

Explanation:

The above written is the HTML code which contains a script tag in which javascript code is written to print hello on the javascript developer console.The script element contains the statement console.log("hello"); which is used to print the argument provided in the console.log on the console of the  javascript.

To see hello on the console you have open javascript console in the browser.Otherwise it will not be visible to you.

Create a single line comment that says ""Print results to screen""

Answers

Answer:

//""Print results to screen""

Explanation:

In c,c++,java,javascript // is used for the single line comment.

syntax:- // comment.

Whatever text that is followed after // is commented means this line will not get executed by the compiler.

Comments are used to explain the code to other person who is working on the code or trying to understand that code.

Other Questions
to make a cup of potato soup A liquid mixture of density 0.85 g/mL flowing at a rate of 700 lbm/h is formed from mixing a stream of benzene S = 0.879 and another of n-hexane S = 0.659. Determine the volumetric flow rates of all three streams as well as the mass flow rate of benzene and n-hexane. Which statement concerning polygenic traits is not true? a. The most frequently discussed are skin, hair, and eye color. b. Their expression is often influenced by genetic/environmental interactions. c. The alleles have an additive effect on the phenotype, intensifying the genes. d. They are continuous traits. e. They are governed by more than one genetic locus. You extract DNA from some of your cells and cut out the complete human growth hormone gene directly from this DNA. You put this gene into a plasmid and transform E.coli with the plasmid. To your dismay, you find that E. coli does not make any human growth hormone. What is the most likely explanation for the failure of this experiment?A) Bacteria cannot carry out RNA splicing to remove introns and so produced a much larger protein.B) Bacteria lack a nucleus for proper transcription of eukaryotic genes.C) Human DNA cannot be cloned in a bacterium.D) Human DNA can be maintained in cloned form only for brief periods in bacteria. A= 4a-9b Solve for a The index of refraction of a thin lens is 1.5. Its one surface is convex (radius of curvature 20 cm) and the other planar. Calculate the focal length of the lens. What kind of an image does it form when the object is real and at 40 cm before the lens? What is the focal length if the lens is turned around? How does this influence image formation? In a normal costing system, the cost of a job includes A. actual direct materials, actual direct labor, and estimated (applied) overhead. B. estimated direct materials, estimated direct labor, and estimated overhead. C. actual direct materials, actual direct labor, actual overhead, and actual selling cost. D. actual direct materials, actual direct labor, and actual overhead. E. None of these. Job-order costing requires the use of actual, not normal, costing. Solve the following equation.LaTeX: \left|\frac{x}{7}\right|=1| x 7 | = 1Group of answer choicesLaTeX: x=7 x = 7LaTeX: x=-4,\:x=-16 x = 4 , x = 16LaTeX: x=7,\:x=-7 x = 7 , x = 7LaTeX: x=-5,\:x=-13 (1) Depreciation for the current year includes equipment $2,700(2) The beginning balance of Office Supplies was $ 2,100. During the year, Bookfield purchased office supplies for $ 3,400, and at December 31 the office supplies on hand totaled $ 1,100. (Assume that Bookfield debits an asset account when supplies are purchased.)(3) The company had earned $3,400 of unearned revenueJurnalize the adjusting entry needed on December 31 for each situation. 7 1/2 of what number is 12 Define the term bigamy There is 6/8 of a cake leftover after a birthday party how many 1/4 pieces can be made from the leftover cake Need help ASAP! I will give Brainliest! Explain how the Reformation led to political conflict and warfare during the 1500s In most one-year-olds, a. language comprehension typically precedes language production. b. language production typically precedes language comprehension. c. language comprehension and language production occur simultaneously. d. neither language comprehension nor language production is readily apparent. Select all statements that are true for density curves.The curve is on or above the horizontal axis.The total area under the curve is 1The curve is symmetric and single peakedThe proportion of data values between two numbers and is the area under the curve between a and b.The curve satisfies the 68.95.99.7% rule. A concert loudspeaker suspended high off the ground emits 32.0 W of sound power. A small microphone with a 1.00 cm^2 area is 52.0 m from the speaker. Part complete What is the sound intensity at the position of the microphone?How much sound energy impinges on the microphone each second? Knowing what you need to accomplish _____, and how you intend to do it, gives you an edge over someone who merely reacts to monetary events as they unfold. Consider the gas reaction: H2 (g)2(g) 2HI (g) The equilibrium constant at 731 K is 50.3. Equal amounts of all three gases (0.100 M) are introduced in a container, calculate the concentration of each gas after the system reaches equilibrium. Express your results with the right number of significant figures. In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?a. protocol b. data link c. transport d. network Suppose that Jane borrows $8400 from a bank on April 9 at an annual rate of 9.2% simple interest. How much does she owe on August 20 of the same year?