which is true? question 16 options: a) private members can be accessed by a class user b) a mutator is also known as a getter method c) a mutator may change class fields d) an accessor is also known as a setter method

Answers

Answer 1

Correct answer:-  (c)  a mutator may change class fields

What accomplish mutator methods?

Mutator methods in Java reset a private variable's value. Because of this, other classes can alter the value that variable holds without having access to the variable directly. The type of argument that is taken by mutator method ds must match the type of the variable they are altering.

Can a value be returned by a mutator?

The accessor method always returns a value, but mutator methods never do. While an accessor method is a get priority method, a mutation method sets priority (). In Java, the Thread class has this function in both the setter and the getter.

Do public mutator methods make sense?

A public method declaration must be made for the Mutator method. Although, there is no return type for Mutator methods. However, depending on the data type of the private variable, they may accept a parameter. It then uses the keyword this to access the private variable and sets its value to the parameter's value.

To know more about mutator visit:

https://brainly.com/question/13267124

#SPJ4


Related Questions

The brightness of a pixel depends on all of the following, except:

A. Bit depth

B. Pixel pitch

C. The exposure intensity

D. Brightness setting of the monitor

Answers

Brightness of a pixel does not depend on the brightness setting of the monitor. Option D is the correct answer.

Bit depth refers to the number of bits used to represent the color of a pixel, which affects the range of colors and shades that can be displayed. Pixel pitch refers to the distance between pixels on a display, influencing the sharpness and clarity of the image. The exposure intensity determines the amount of light that reaches the camera sensor or display, directly impacting the brightness.

The brightness setting of the monitor, on the other hand, is a user-controlled setting that adjusts the overall luminance of the display but does not directly affect the brightness of individual pixels.

Therefore, option D is the correct answer as the brightness setting of the monitor does not influence the brightness of a pixel.

You can learn more about PIixel depth at

https://brainly.com/question/29353349

#SPJ11

The correct answer is D, The brightness of a pixel depends on all of the following, except the brightness setting of the monitor. Pixels are the tiniest units of an image. The amount of light a pixel can create is determined by the amount of energy it receives from the image source.

The brightness of a pixel depends on all of the following, except the brightness setting of the monitor.Pixel pitch, exposure intensity, and bit depth all contribute to the brightness of a pixel. The pixel pitch determines the amount of light that a pixel can get. The exposure intensity determines the amount of light falling on the image source, and the bit depth determines the range of colors and tones that the pixel can reproduce.The brightness setting of the monitor does not affect the brightness of a pixel because it only affects the brightness of the entire image. Thus, the correct answer is D.

To know more about brightness of a pixel  visit:

https://brainly.com/question/32349835

#SPJ11

I need help!

A standard is a:

A. normal way of addressing business letters.
B. level of quality or performance that people accept as normal.
C. a document with specific rules and regulations.
D. set unit of measurement for a particular purpose.

Answers

Explanation:

The answer is B. level of quality or performance that people accept as normal

Answer:

A standard is a: level of quality or performance that people accept as normal.

Explanation:

Just did this and got it correct.

two lists showing the same data about the same person is an example of

Answers

When two or more lists display the same data about the same person, they are called duplicate data. Duplicate data is common in a variety of settings, including data management and personal finance software. Users may have entered the same data twice, resulting in two identical entries for the same person or item.

The presence of duplicates in a data set can make data analysis more difficult and result in inaccurate results. As a result, duplicate data detection and elimination are essential in ensuring data quality and accuracy.In the context of databases, a unique index is frequently used to guarantee that data is entered only once.

This unique index prohibits multiple entries of the same data for the same person. It also ensures that data is input in a consistent and accurate manner.

To know more about software visit:

https://brainly.com/question/32393976

#SPJ11

Write the pseudocode that could be used for a program that will test if a
number is odd or even and print the result.
esult.

Answers

Here's an example of pseudocode that could be used for a program that will test if a number is odd or even and print the result:

1. Ask the user for an integer input and store it in a variable called "number."
2. Check if the number is divisible by 2 using the modulo operator (%).
3. If the result of the modulo operator is 0, print "The number is even."
4. If the result of the modulo operator is 1, print "The number is odd."

Here's an implementation of the pseudocode using Python:

```
number = int(input("Enter an integer: "))

if number % 2 == 0:
print("The number is even.")
else:
print("The number is odd.")
```

This program will ask the user to enter an integer and then check if it is even or odd using the modulo operator. If the number is even, it will print "The number is even." If the number is odd, it will print "The number is odd."

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

ANY ADVICE?
i have to spend summer ( and the next 4 years) with a family who hates me. what should I do.

Answers

Answer:

Talk to a close friend or adult that you trust and have the power and explain to them why you don't want to go. Good luck.

Answer:

You should try talking to a person that could maybe help you or a family member that you trust who will let you stay with them for the summer and 4 years. If you don't have any one else I would try being nice, or just ignore them and live on with your life. I don't really know what else to say sense I don't know your life experience.

Explanation:

Sending a message to a reference variable before the corresponding object has been instantiated will cause what

Answers

Null Pointer
Source: Quizlet

Please write C language program which will use a data structure in order to enter the OCCUPATION, GENDER, AGE and SALARY of a number of people from the keyboard. Your program should define the NUMBER_OF_PEOPLE as a symbolic constant. Give data structure the name "people" and define a variable to store the data as person. Your program should then print on the screen the data about the people you entered from the keyboard in a formatted manner. Use the. (dot) notation not the -> (arrow) notation about the data structure definition and usage

Answers

In this code, we set up a person data structure utilizing the struct term. The group is comprised of four elements - occupation (an array of characters designed to hold the occupation), gender (an array of characters designed to hold the gender), age  and salary.

What is the C language program

In the code, The size of the people array, which holds data for multiple individuals, is determined using the symbolic constant known as NUMBER_OF_PEOPLE.

The program requests the user to specify the particulars for every individual, after which it generates a formatted output displaying the provided information.

Learn more about  C language program  from

https://brainly.com/question/26535599

#SPJ4

Please write C language program which will use a data structure in order to enter the OCCUPATION, GENDER,
Please write C language program which will use a data structure in order to enter the OCCUPATION, GENDER,

Modern School of higher education has around 2000 students and three departments. The students belong to various departments in the school. Every department has a Head of Department along with teachers. The head of department manages his departmental teachers and the students belonging to his department. The head of department also teaches the students. All the head of departments report to the Principal of the school. The Principal manages the departments and also teaches the students. Handling the administrative staff of the school is also the responsibility of the Principal. Every individual, except the students, are the employees of the school

Answers

This is a description of the organizational structure of the Modern School of higher education. The school has around 2000 students and three departments.

What is the education  about?

Each department is headed by a Head of Department (HOD), who manages the teachers and students belonging to his/her department. The HODs also teach the students. All the HODs report to the Principal of the school. The Principal manages the departments and teaches the students. The Principal is also responsible for handling the administrative staff of the school.

The structure ensures that there is a clear chain of command and responsibility in the school. The HODs are responsible for managing their departments and reporting to the Principal. The Principal, on the other hand, is responsible for managing the overall operations of the school, including the departments and administrative staff.

Therefore, this structure enables the school to function efficiently and effectively by ensuring that each department and individual has a clear understanding of their roles and responsibilities.

Read more about education  here:

https://brainly.com/question/919597

#SPJ1

How has the Internet changed the way people can be exploited?
Visit a government website and state the new data concerning prostitution or sex tourism. In an informative way. What must a new examiner be prepared to do once he or she has looked into the file system?
Explain why there may be a hash inconsistency during a mobile device examination.
What two logical file systems are available to the examiner on an unlocked Windows Phone 7?
What problems arise with the Date and Time within a feature phone, and what are those problems dependent on?

Answers

1. The Internet has changed the way people can be exploited by providing new avenues for online scams, identity theft, cyberbullying, and the distribution of illegal content.

People can be tricked into sharing personal information online, leading to financial or emotional exploitation. It has also facilitated the spread of fake news and misinformation, influencing public opinion.
2. To find new data concerning prostitution or sex tourism, a new examiner should visit a government website that provides statistical reports or studies on the subject. The examiner should look for the latest data, such as the number of reported cases, demographic information, geographic trends, and government efforts to combat such activities. It is important to approach the topic in an informative and objective manner, avoiding sensationalism or judgment.
3. Hash inconsistency can occur during a mobile device examination due to various reasons, such as software updates, user modifications, or malware infections. The examiner should be prepared to encounter different hash values when comparing files or system images. This can make it challenging to validate the integrity and authenticity of the examined data. To address this issue, the examiner should use multiple hashing algorithms and compare the results to identify any inconsistencies.

4. The two logical file systems available to an examiner on an unlocked Windows Phone 7 are FAT (File Allocation Table) and NTFS (New Technology File System). FAT is an older file system commonly used in portable devices, while NTFS is a more advanced file system with features like file permissions and journaling. The examiner should be familiar with both file systems to analyze and recover data from the device effectively.
5. Date and time problems within a feature phone can arise due to various factors, including incorrect settings, software bugs, or battery issues. These problems can affect the phone's functionality and may lead to inaccurate time stamps on calls, messages, or other events. The specific problems and their dependence vary depending on the phone model and software version. To troubleshoot these issues, the examiner should check the phone's settings, update the software if necessary, and ensure that the battery is functioning properly.
Please note that the above answers are general and may vary depending on the specific context or technology involved.

To know more about Internet refer to:

https://brainly.com/question/2780939

#SPJ11

Get-wmiobject : access is denied. (exception from hresult: 0x80070005 (e_accessdenied))

Answers

Get-WmiObject: Access is Denied error message usually appears when a user does not have permission to access the specific resource that is being targeted by the cmdlet.

The cause of this error can be a wrong syntax, incorrect access rights, or other PowerShell problems, but it is most commonly due to insufficient user rights.Get-WmiObject is a cmdlet that is used to retrieve information from Windows Management Instrumentation (WMI). WMI is a Microsoft management protocol that gives administrators access to various operating system components and configuration settings.

The Access Denied error is most commonly caused by the cmdlet being run by an account with insufficient permissions. This means that the account running the cmdlet does not have the appropriate security rights to access the target resource.

To resolve this issue, try the following steps:Run the cmdlet as an administrator account.Make sure the account you are using to run the cmdlet has the correct permissions to access the target resource.If the cmdlet is being run remotely, make sure that the remote computer is set up for remote management and has the necessary firewall rules in place.Check the WMI security settings on the target computer.

To know more about message visit:

https://brainly.com/question/28267760

#SPJ11

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.


5 2

5 3

8 2

8 3
plz help ill give brainliest

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the

Answers

Answer:

for numB in [5,8]:

     for numA in [2,3]:

            print(numB, numA)

Explanation:

Looking at the given output it can bee sent that the first numbers are repeated twice consecutively and the second numbers in a sequence.

This means that nested loops are used.

Assuming that the indentation will be correct in the program

The code in squence is:

for numB in [5,8]:

     for numA in [2,3]:

            print(numB, numA)

Answer:

Line 1: for numB in [5,8]

Line 3: print (numB, numA)

Line 2: for numA in [2,3]

Explanation:

Helpppppp What is telnet?
internet protocol that allows one to access newsgroups
internet protocol that is the foundation for online data communication
internet protocol that connects to a computer remotely
internet protocol that loads a local file from a network onto a computer

Answers

C. internet protocol that connects to a computer remotely

hich compatibility issues can be fixed for an app by using the capabilities included in windows 10? (choose all that ap

Answers

These compatibility issues can be fixed for an app by using the capabilities included in windows 10 are:

required to right-click and run as administratorodd colors issue, when the color depth is greater than 16 bits.When the screen resolution is 1920 X 1024, the display quality on full screen is poor.

What is compatibility issues in Windows 10?

Some functions' implementations may change as the Windows operating system evolves to support new technology and functionality. This might cause issues for some applications that rely on original-implementation. You can avoid compatibility issues by creating a specific application fix for a specific version of an application using the Microsoft Windows Application Compatibility (Compatibility Fix) infrastructure.

To learn more about Windows 10, visit: https://brainly.com/question/28847407?referrer=searchResults

#SPJ4

when did brainly open?

Answers

Answer:

September 2009, Kraków, Poland

Explanation:

serch it up

can i get brainliest

thank you and have a great dayyyyy:)

Can someone help with these true or false?

Can someone help with these true or false?

Answers

Full punctuation is used in the heading of an indented letter is False

13. There is no need to use punctuation when typing a letter in full blocked format is False.

14. The date should be typed between the sender's address and the recipient's address is False

What is the sentence about?

Three letter formats are: blocked, modified block, semi-block. Indented not commonly used. Indented letters align date and closing with center/left margin, without full punctuation in heading.

The heading typically contains the sender's name, address, and date, presented differently from the letter's body. Punctuation needed in full blocked letter format. Punctuation rules apply to all letter formats. Use punctuation correctly in salutations, body, and end of letters.

Learn more about sender's address from

https://brainly.com/question/1818234

#SPJ1

See text below

true or false  2. There are four main letters blocked, justified, semi blocked, indented Full punctuation is used in the heading of an indented letter?

13. There is no need to use punctuation When typing a letter in full blocked

format.

14. The date should be typed between the sender's address and the recipient's address.

larry wants to upgrade to windows 10. he will use his computer both at home and at work and will need to connect to his company's wi-fi peer-to-peer network to share files over the network. which version of windows 10 would you recommend to larry?

Answers

Recommended Windows 10 Pro, as this version of Windows 10 includes features such as Domain Join, Group Policy Management, and the ability to connect to a company's Wi-Fi peer-to-peer network for file sharing.

What is network ?

A group of computers exchanging resources that are available on or offered by network nodes is known as a computer network. Over digital links, the computers communicate with each other using standard communication protocols. These links are made up of telecommunication communication networks, which are based on physically wired, optic, and wireless transmission ways and may be set up in a number of different network topologies.

To know more about network
https://brainly.com/question/29350844
#SPJ1

According to Amdahl's Law, what is the speedup gain for an application that is 60% parallel and we run it on a machine with 4 processing cores?

Answers

With four processing cores, we get a speedup of 1.82 times.

What is Amdahl's Law?

Amdahl's law exists as a formula that provides the theoretical speedup in latency of the implementation of a task at a fixed workload that can be expected of a system whose resources exist improved.

Amdahl's law exists that, in a program with parallel processing, a relatively few instructions that hold to be completed in sequence will have a limiting factor on program speedup such that adding more processors may not complete the program run faster.

Amdahl's law stands also known as Amdahl's argument. It is utilized to find the maximum expected progress to an overall system when only part of the system exists improved. It is often utilized in parallel computing to indicate the theoretical maximum speed up utilizing multiple processors.

Hence,  With four processing cores, we get a speedup of 1.82 times.

To learn more about Amdahl's Law refer to:

https://brainly.com/question/16857455

#SPJ4

What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg

Answers

psd, others can’t save photoshop data, only the image as a whole

heya!!

-:QUESTION :-

DEFINE DATA SCIENCE?​

Answers

\( \large \underline{ \frak{ ~~~~~~~~~~~~~~~~~~~~\bigstar Solution~~~~~~~~~~~~~~~~~~~~}}\)

Data science helps to understand and analyse the actual scenario and help to take fruitful decisions. 

Data science is the inner core of ai

You do not use the Microsoft XPS Document Writer. Which option could you use to disable it?

a. Uninstall a program

b. Turn Windows features on or off

c. How to install a program

d. View installed udates

e. Turn Windows features on or off

Answers

The option you can use to disable the Microsoft XPS Document Writer is (b) Turn Windows features on or off.

The Microsoft XPS Document Writer is a feature in Windows that allows users to create XPS (XML Paper Specification) files from any application. If you want to disable this feature, you can access the "Turn Windows features on or off" settings in the Control Panel or the Settings app.

To disable the Microsoft XPS Document Writer using the "Turn Windows features on or off" option, follow these steps:

1. Open the Control Panel or go to the Windows Settings app.

2. Navigate to the "Programs" or "Apps" section.

3. Look for the "Turn Windows features on or off" link and click on it.

4. A dialog box titled "Windows Features" will appear.

5. Scroll down the list and locate the "XPS Services" or "XPS Viewer" option.

6. Uncheck the box next to the XPS Services or XPS Viewer option.

7. Click "OK" or "Apply" to save the changes.

8. Windows will apply the changes and disable the Microsoft XPS Document Writer feature.

To disable the Microsoft XPS Document Writer, you should use the option (b) "Turn Windows features on or off." This option allows you to manage and enable/disable various Windows features, including the XPS Services or XPS Viewer, which are related to the Microsoft XPS Document Writer functionality. By unchecking the appropriate box in the "Turn Windows features on or off" settings, you can disable the Microsoft XPS Document Writer feature on your Windows system.

To know more about Microsoft XPS Document Writer, visit

https://brainly.com/question/30750198

#SPJ11

Jonah needs to add a list of the websites he used to his report. He opens the "Websites" document and copies the information. He now needs to change his view to the "Renaissance" report to add the information before saving his report. What are the steps, in order, that Jonah needs to follow to view the "Renaissance" report?

Answers

Answer:

1.Go to the ribbon area

2.Click on the View tab.

3.Click on the Switch Windows tab.

4.Click on the "Renaissance" report

Explanation:

Answer:

1.Go to the ribbon area

2.Click on the View tab.

3.Click on the Switch Windows tab.

4.Click on the "Renaissance" report

Explanation:

just took it

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

codehs python 4.7.6 Powers of Two it says I'm wrong because I need
codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Answers

\(\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}\)

\(\huge\underline\mathtt\colorbox{cyan}{in attachment}\)

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

are responsible for overseeing the data and operation of databases.
are responsible for the installation and troubleshooting of compute
their associated equipment, such as printers, storage devices, and monitors.
are responsible for analyzing the IT needs of an organization and then
recommending systems to support those needs.

Answers

Database Administrator are responsible for overseeing the data and operation of databases.

Computer Technician are responsible for the installation and troubleshooting of computer and their associated equipment, such as printers, storage devices, and monitor.

System analyst are responsible for analyzing the IT needs of an organization and then recommending systems to support those needs.

Who Are responsible for working in the data and operation of databases?

A Database Administrator, or DBA, is known to be a person that is known to be  responsible for looking over the maintenance and security measures of any firm databases.

Hence, A Database Administrator are responsible for overseeing the data and operation of databases.

Learn more about A Database Administrator from

https://brainly.com/question/24223730

#SPJ1

Do the monthly payments fit in your budget? Could you save instead of borrow? Is it worth the added interest?

Answers

Because you wouldn't be able to pay off a new loan if you were paying, say, 90% of what you make each month toward your obligations, the aforementioned question is crucial.

Is saving money or borrowing money preferable?Start by asking yourself how quickly you need the item before determining whether to borrow it or save for it. Saving up is frequently the wisest course of action if it's not an emergency. If there is an emergency, look over your borrowing options and pick the cheapest one.It might be feasible to negotiate a lower price for a non-emergency big-ticket item by saving up and paying cash. A tried-and-true negotiating tactic with a lengthy history is "cash upfront." Although interest rates on savings accounts aren't very appealing right now, any interest is better than interest going out, so saving is at least somewhat superior than taking on debt.

To learn more about Saving money refer :

https://brainly.com/question/27254497

#SPJ1

When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС

Answers

Answer:

c,becauses she is helping

Explanation:

thank me later

Answer:

A

Explanation:

i got a 100

Explain the difference between file and folder (in your own words)

Answers

Answer:

the difference is one is online and one is not

Explanation:

A file is usually what you find online. And a folder is what you put papers into.

A computer program that converts assembly language to machine language is?
A. Compiler
B. Interpreter
C. Assembler
D. Comparator
E. None of the above

Answers

The computer programme Assembler transforms assembly language into machine language. Assembler: An assembler is a kind of computer programme that transforms software written in assembly language into machine language, code, and instructions that can be carried out by a computer.

What is Assembler?Assembly language is any low-level programming language in computer programming that has a very close resemblance to the machine code instructions of the architecture. It is also referred to simply as Assembly and is frequently shortened as ASM or asm. A piece of software called an assembler takes basic computer instructions and converts them into a pattern of bits that the computer's processor may use to perform its core functions.Depending on who you ask, you could hear the name "assembly language" or "assembler language" used to describe these directives.The process takes two passes for an assembler. It generates machine code that takes the form of mnemonics. Binary code made up of 0s and 1s is the result. Java, C, C++, and others are examples.

Therefore, the correct option is c) Assembler

To learn more about Assembler, refer to:

https://brainly.com/question/13171889

Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in the following skeletal program. Assume bigsub is at level 1. function bigsub() { var mysum; function a() { var x; function b (sum) { var y, Z; ... c(z); } // end of b b(x); } // end of a function c(plums) { ... <------ } // end of c var l; a(); } // end of bigsub

Answers

The stack configuration at position 1 includes activation record instances for functions c(plums), a(), b(sum), and bigsub(), with static and dynamic chains.

What does the stack look like at position 1 in the given program, including activation record instances and chains?

When execution reaches position 1 in the provided skeletal program, the stack contains several activation record instances, each representing a function call. At the top of the stack is the activation record for function c(plums), indicating that it is the currently executing function. Below it is the activation record for function a(), which called function b(sum). Further down is the activation record for function b(sum), and at the bottom of the stack is the activation record for function bigsub().

Each activation record stores relevant information for its respective function call. This includes parameters, local variables, and pointers to the static and dynamic chains. The static chain links each activation record to the activation record of its parent function, allowing access to variables in higher-level functions. The dynamic chain, on the other hand, connects each activation record to the activation record of the function that called it, enabling access to variables in the calling function.

By analyzing the stack configuration at position 1, we can trace the hierarchy of function calls and understand the relationships between the functions and their activation records.

Learn more about stack

brainly.com/question/32295222

#SPJ11

A trackerball is a pointing device

Answers

Answer:

nice

Explanation:

Other Questions
what is -0.8, 5/9, -3/4, -1.2, and -0.6 in order from least to greatest? Floridation of drinking water helped to reduce water-borne infections like cholera and typhoid in the United States. True False what is called, tendency of an organism to align its senses toward unexpected stimuli 2. How many moles are contained in 110 g of Magnesium chloride, MgCl2? What is Transcendentalism? Who were some of the more famous members of the Transcendental Club? 1. What role did "Manifest Destiny" play in getting people to move west? y= A(0.5)^t/(half-life) What is half-life PROBLEM 5-19A Break-Even Analysis; Pricing (LO5-I, LO5-4, LO5-5]Minden Company introduced a new product last year for which it is trying to land an opumal selling price. Marketins studies suggest that the company can increase sales by 5.000 units for each S2 reduction in the selling price. the companys present selling price as $70 per unit, and variable expenses are $40 per unit. Fixed expenses are 3340.000 per yeaf. The present annual sales volume (at the $70 selling price) is 15.000 units.Required:1. What is the present yearly net operating income or loss?2. What is the present break-even point in unit sales and in dollar sales? 3. Assuming that the markeung studies are correct. what is the maximum annual proft that the company can earn? At how many units and at what selling price per unit would the company gencrate this profit4. What would be the break -even point in unit sales and in dollar sales using the selling price you determined in (3) above (e.g.. the selling price at the level of maximum profits)? Why is this break-even point diflerent from the break-even point vou computed in (2) above? URGENT!Amanda walks 1.5 miles to school inthe morning. After school, she walks0.5 mile to the public library. After shehas chosen her books, she walks 2 mileshome. Sketch a graph to show thedistance Amanda traveled comparedto time. Use your graph to find thetotal distance traveled. Angle BAC measures 112. What is the measure of angle BDC? a. 28 b. 34 c.56 d. 112 Consider the relationship between a shipper and a lorry driver . hires to transport a load from London to Edinburgh. When lands in Edinburgh, will have another load ("back-haul") whose characteristics cannot be contracted in advance. The value of this load is . While driving from London to Edinburgh, can engage in two activities: she can search for an alternative back-haul and she can attend to her lorry. Alternative backhauls have value 2 with probability p and 1 with probability 1 p, where 2 > > 1. The probability p is a choice variable for the lorry driver, and the cost of effort p is p2 /2. The value of the lorry, , is also a choice variable for the driver, and the cost of is 2 /2. There is symmetric information throughout, but is not verifiable, and contracts on the back-haul cannot be written until the driver reaches Edinburgh. Both parties are risk neutral and there is no discounting. (i) Solve for the first-best levels of p and . (ii) Assume that the driver owns the lorry. Take this to mean that: (i) in the absence of renegotiation the lorry driver has the right to accept an alternative backhaul, in which case the shippers payoff is zero (since there are no other drivers to carry her load); (ii) the driver receives the full value of the lorry, (she is the residual claimant). Suppose, however, that renegotiation takes place if the alternative back-haul is inefficient and that this proceeds according to Nash bargaining with a 50-50 split. Solve for the second-best values of p and . (iii) Now assume the shipper owns the lorry. Take this to mean that: (i) in the absence of renegotiation the driver does not have the right to take alternative back-haul, and so receives zero, and the shipper also receives zero (since she needs the driver to carry her load); (ii) the shipper receives the full value (he is the residual claimant). Suppose again that renegotiation takes place as above. Solve for the second-best values of p and . (iv)Provide conditions under which the lorry is optimally owned by the driver and conditions under which it is optimally owned by the shopper. Discuss the trade-off between shipper and driver ownership. I don't even get what they are asking. For a plant having the transfer function G(s) 74109 it is proposed to use a controller in a unity feedback system and having the transfer function D(s) Solve for the parameters of this controller so that the closed loop will have the characteristic equation (s 6) (s + 3)(s2 + 3s + 9) = 0.1 s(s+di) { Answer: c2 = 18, ci = 54. co = 162, di = 9} Exercise. Show that if the reference input to the system of the above exercise is a step of amplitude A, the steady-state error will be zero. How much can you earn in 2021 and draw social security disability. what was the main defense for Bryant and Milam what protect the contents of the nucleus A firm considers buying a new machine whose expected lifetime is 6 years. The cost of the machine is $ 3 000 000 which is paid in 2020. The expected cash flows of this investment are as follows:2021: $ 700 0002022: $ 800 0002023: $ 1 200 0002024: $ 1 300 0002025: $ 900 0002026: $ 600 000a)Find the net present value of this investment using a discount rate of 18%b)Should the firm accept or reject this investment (write accept or reject as your answer)?c)What is the expected contribution of that investment to the value of the firm (give a numerical answer)? One of the strengths of the continental army was they got help from this country words the end of the war? 80% of the ammunition came from this country what country was it HELP PLEASE ASAP What is the product of any integer and -1? As part of his lease agreement with his landlord, Alex mows the grass around his apartment building each week in return for a small reduction in rent. What is this an example of