You need to provide the data for the 4 other meas.pdfanandshingavi23
You need to provide the data for the 4 other measurements. Without it I don\'t think
the answer can be figured out!
Solution
You need to provide the data for the 4 other measurements. Without it I don\'t think
the answer can be figured out!.
When an acid reacts with a base produces a salt &.pdfanandshingavi23
When an acid reacts with a base produces a salt & water H2SO4 + NaOH -->
Na2SO4 + H2O Thats why water is on the right side
Solution
When an acid reacts with a base produces a salt & water H2SO4 + NaOH -->
Na2SO4 + H2O Thats why water is on the right side.
The one with the lowest Ksp will precipitate firs.pdfanandshingavi23
The one with the lowest Ksp will precipitate first and hence AuCl will precipitate.
Solution
The one with the lowest Ksp will precipitate first and hence AuCl will precipitate..
Riboflavin (Vitamin B2) consists of the sugar alc.pdfanandshingavi23
Riboflavin (Vitamin B2) consists of the sugar alcohol D-ribitol attached to 7,8 -
dimethyl isoalloxazine. The coenzymes are flavin mononucleotide (FMN) and flavin adenine
dinucleotide (FAD). Good luck!
Solution
Riboflavin (Vitamin B2) consists of the sugar alcohol D-ribitol attached to 7,8 -
dimethyl isoalloxazine. The coenzymes are flavin mononucleotide (FMN) and flavin adenine
dinucleotide (FAD). Good luck!.
molar mass, or atomic weight, its true False. .pdfanandshingavi23
molar mass, or atomic weight, its true False. The atomic mass unit is defined as
1/12 the mass of a C-12 atom, this is slightly different than the mass of H-1
Solution
molar mass, or atomic weight, its true False. The atomic mass unit is defined as
1/12 the mass of a C-12 atom, this is slightly different than the mass of H-1.
just multiply 806 by the molar mass of water and .pdfanandshingavi23
just multiply 806 by the molar mass of water and divide that by the latent heat of
fusion.
Solution
just multiply 806 by the molar mass of water and divide that by the latent heat of
fusion..
This document could not be summarized as the image is not visible and no text content was provided. To generate an accurate summary, more context about the document is needed such as visible images or readable text.
When it comes categorizing hazardous waste, the EPA has broken it do.pdfanandshingavi23
When it comes categorizing hazardous waste, the EPA has broken it down by four
characteristics:
These high level categories each have their own characteristics that further help you as a
generator define with what your are dealing.
Ignitability
There are three types of ignitable forms:
Corrosivity
Corrosive substances, such as hydrochloric acid, nitric acid, and sulfuric acid, have the ability
eat through containers, causing the leakage of harmful materials. A corrosive is anything liquid
with a pH of less than or equal to 2 or greater than or equal to 12.5, or has the ability to corrode
steel. Everyday example of corrosives include battery acid and rust removers.
Reactivity
Given their instability, reactive wastes can be very dangerous. The EPA recognizes that there
are too many conditions and situations to identify all types of reactive materials. However, they
use the following as guidelines to assist generators:
Toxicity
Poisonous materials pose a threat to our groundwater, which can have long term effects to
human health and the environment. This is different from the first three characteristic groups,
which the EPA views as containing immediate and firsthand dangers. There are 60 contaminants
on the toxicity characteristics list. These contaminants are identified solely through a test method
called Toxicity Characteristic Leaching Procedure or TCLP
Solution
When it comes categorizing hazardous waste, the EPA has broken it down by four
characteristics:
These high level categories each have their own characteristics that further help you as a
generator define with what your are dealing.
Ignitability
There are three types of ignitable forms:
Corrosivity
Corrosive substances, such as hydrochloric acid, nitric acid, and sulfuric acid, have the ability
eat through containers, causing the leakage of harmful materials. A corrosive is anything liquid
with a pH of less than or equal to 2 or greater than or equal to 12.5, or has the ability to corrode
steel. Everyday example of corrosives include battery acid and rust removers.
Reactivity
Given their instability, reactive wastes can be very dangerous. The EPA recognizes that there
are too many conditions and situations to identify all types of reactive materials. However, they
use the following as guidelines to assist generators:
Toxicity
Poisonous materials pose a threat to our groundwater, which can have long term effects to
human health and the environment. This is different from the first three characteristic groups,
which the EPA views as containing immediate and firsthand dangers. There are 60 contaminants
on the toxicity characteristics list. These contaminants are identified solely through a test method
called Toxicity Characteristic Leaching Procedure or TCLP.
You need to provide the data for the 4 other meas.pdfanandshingavi23
You need to provide the data for the 4 other measurements. Without it I don\'t think
the answer can be figured out!
Solution
You need to provide the data for the 4 other measurements. Without it I don\'t think
the answer can be figured out!.
When an acid reacts with a base produces a salt &.pdfanandshingavi23
When an acid reacts with a base produces a salt & water H2SO4 + NaOH -->
Na2SO4 + H2O Thats why water is on the right side
Solution
When an acid reacts with a base produces a salt & water H2SO4 + NaOH -->
Na2SO4 + H2O Thats why water is on the right side.
The one with the lowest Ksp will precipitate firs.pdfanandshingavi23
The one with the lowest Ksp will precipitate first and hence AuCl will precipitate.
Solution
The one with the lowest Ksp will precipitate first and hence AuCl will precipitate..
Riboflavin (Vitamin B2) consists of the sugar alc.pdfanandshingavi23
Riboflavin (Vitamin B2) consists of the sugar alcohol D-ribitol attached to 7,8 -
dimethyl isoalloxazine. The coenzymes are flavin mononucleotide (FMN) and flavin adenine
dinucleotide (FAD). Good luck!
Solution
Riboflavin (Vitamin B2) consists of the sugar alcohol D-ribitol attached to 7,8 -
dimethyl isoalloxazine. The coenzymes are flavin mononucleotide (FMN) and flavin adenine
dinucleotide (FAD). Good luck!.
molar mass, or atomic weight, its true False. .pdfanandshingavi23
molar mass, or atomic weight, its true False. The atomic mass unit is defined as
1/12 the mass of a C-12 atom, this is slightly different than the mass of H-1
Solution
molar mass, or atomic weight, its true False. The atomic mass unit is defined as
1/12 the mass of a C-12 atom, this is slightly different than the mass of H-1.
just multiply 806 by the molar mass of water and .pdfanandshingavi23
just multiply 806 by the molar mass of water and divide that by the latent heat of
fusion.
Solution
just multiply 806 by the molar mass of water and divide that by the latent heat of
fusion..
This document could not be summarized as the image is not visible and no text content was provided. To generate an accurate summary, more context about the document is needed such as visible images or readable text.
When it comes categorizing hazardous waste, the EPA has broken it do.pdfanandshingavi23
When it comes categorizing hazardous waste, the EPA has broken it down by four
characteristics:
These high level categories each have their own characteristics that further help you as a
generator define with what your are dealing.
Ignitability
There are three types of ignitable forms:
Corrosivity
Corrosive substances, such as hydrochloric acid, nitric acid, and sulfuric acid, have the ability
eat through containers, causing the leakage of harmful materials. A corrosive is anything liquid
with a pH of less than or equal to 2 or greater than or equal to 12.5, or has the ability to corrode
steel. Everyday example of corrosives include battery acid and rust removers.
Reactivity
Given their instability, reactive wastes can be very dangerous. The EPA recognizes that there
are too many conditions and situations to identify all types of reactive materials. However, they
use the following as guidelines to assist generators:
Toxicity
Poisonous materials pose a threat to our groundwater, which can have long term effects to
human health and the environment. This is different from the first three characteristic groups,
which the EPA views as containing immediate and firsthand dangers. There are 60 contaminants
on the toxicity characteristics list. These contaminants are identified solely through a test method
called Toxicity Characteristic Leaching Procedure or TCLP
Solution
When it comes categorizing hazardous waste, the EPA has broken it down by four
characteristics:
These high level categories each have their own characteristics that further help you as a
generator define with what your are dealing.
Ignitability
There are three types of ignitable forms:
Corrosivity
Corrosive substances, such as hydrochloric acid, nitric acid, and sulfuric acid, have the ability
eat through containers, causing the leakage of harmful materials. A corrosive is anything liquid
with a pH of less than or equal to 2 or greater than or equal to 12.5, or has the ability to corrode
steel. Everyday example of corrosives include battery acid and rust removers.
Reactivity
Given their instability, reactive wastes can be very dangerous. The EPA recognizes that there
are too many conditions and situations to identify all types of reactive materials. However, they
use the following as guidelines to assist generators:
Toxicity
Poisonous materials pose a threat to our groundwater, which can have long term effects to
human health and the environment. This is different from the first three characteristic groups,
which the EPA views as containing immediate and firsthand dangers. There are 60 contaminants
on the toxicity characteristics list. These contaminants are identified solely through a test method
called Toxicity Characteristic Leaching Procedure or TCLP.
Visual hacking is used to visually capture private,sensitive informa.pdfanandshingavi23
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial gain
social engineering happens when malicious employee try to gain access by asking passwords to
resolve issues.spear pishing is another technique they will sent an email as a friend and ask to
clik below link.
viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they
can break into systems and plant viruses.
worms. These are programs that run independently and travel from computer to computer across
network connections. Worms may have portions of themselves running on many different
computers. Worms do not change other programs, although they may carry other code that does.
password cracking. This is a technique attackers use to surreptitiously gain system access
through another user\'s account. This is possible because users often select weak passwords. The
two major problems with passwords is when they are easy to guess based on knowledge of the
user.
E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access
to Internet e-mail, someone can potentially correspond with any one of millions of people
worldwide.
Denial-of-service attacks. They will create the need to have a service available. It is a growing
trend on the Internet because Web sites in general are open doors ready for abuse. People can
easily flood the Web server with communication in order to keep it busy. Therefore, companies
connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and
allow other types of attacks to be subdued.
Trojan horses. These are malicious programs or software code hidden inside what looks like a
normal program. When a user runs the normal program, the hidden code runs as well. It can then
start deleting files and causing other damage to the computer. Trojan horses are normally spread
by e-mail attachments.
Network spoofing. In network spoofing, a system presents itself to the network as though it were
a different system
intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems.
These can range from password-cracking tools to protocol hacking and manipulation tools.
Solution
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial g.
The standards used for the various layers in an Ethernet-based netwo.pdfanandshingavi23
The standards used for the various layers in an Ethernet-based network that is man-aged by the
Internet management protocol is IEEE 802.3 CSMA/CD. Ethernet works at layer 2 of OSI
model(7 layers).
The commonly used protocol for management of network devices is known as Simple Network
Management Protocol, i.e. SNMP
Solution
The standards used for the various layers in an Ethernet-based network that is man-aged by the
Internet management protocol is IEEE 802.3 CSMA/CD. Ethernet works at layer 2 of OSI
model(7 layers).
The commonly used protocol for management of network devices is known as Simple Network
Management Protocol, i.e. SNMP.
The end result of double fertilization is zygote and edosperm. In th.pdfanandshingavi23
The end result of double fertilization is zygote and edosperm. In this process, out of two sperm
cells, one sperm feritilizes egg cell which forms diploid zygote, while other sperm fuses with two
polar nuclei forming endosperm.
Solution
The end result of double fertilization is zygote and edosperm. In this process, out of two sperm
cells, one sperm feritilizes egg cell which forms diploid zygote, while other sperm fuses with two
polar nuclei forming endosperm..
The conus medullaris (Latin for medullary cone) is the tapered, .pdfanandshingavi23
The conus medullaris (Latin for \"medullary cone\") is the tapered, lower end of the spinal cord.
It occurs near lumbar vertebral levels 1 (L1) and 2 (L2), occasionally lower. The upper end of
the conus medullaris is usually not well defined.
2. C 1 through T 1 and L 1 through S4
3. Motor
4.Extension of the knee
Solution
The conus medullaris (Latin for \"medullary cone\") is the tapered, lower end of the spinal cord.
It occurs near lumbar vertebral levels 1 (L1) and 2 (L2), occasionally lower. The upper end of
the conus medullaris is usually not well defined.
2. C 1 through T 1 and L 1 through S4
3. Motor
4.Extension of the knee.
The document states that D is the answer and to take care in a concise manner. It provides a single statement indicating that D is the solution followed by a brief reminder to be careful. In just a few words, the key information conveyed is that D is the answer and caution is advised.
Endothermic or exothermic reaction nature .pdfanandshingavi23
The document discusses whether a chemical reaction is endothermic or exothermic. An endothermic reaction absorbs heat from the surroundings, while an exothermic reaction releases heat to the surroundings. Determining whether a reaction is endothermic or exothermic can provide insight into the reaction's energy changes and heat transfer properties.
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdfanandshingavi23
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g
Step2 mass of iodine = 60x10^-9 x 1025 g
Step3 Atomic mass of iodine =126.90447
Step4 Molarity of I- ion = (60x10^-9 x1025)/126.90447 = 4.846x10^-7= 4.8x10^-7 M
Step5 Option B is correct
Solution
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g
Step2 mass of iodine = 60x10^-9 x 1025 g
Step3 Atomic mass of iodine =126.90447
Step4 Molarity of I- ion = (60x10^-9 x1025)/126.90447 = 4.846x10^-7= 4.8x10^-7 M
Step5 Option B is correct.
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdfanandshingavi23
Solution
:
66. Candida albicans is vaginal Yeast infection or “Thrush”.
67. Aflatoxin is a fungal toxin that can affect peanut Butter. It is a potent human carcinogen.
68. Trypanosoma Tsetse fly transmitted disease causes insomnia and can affect the nervous
system
69. Babesiosis infections parasite carried by ticks.
70. Tinea versicolor is the fungal infection that affects the skin of young people.
71. Giardiasis peanut parisite found in fecal matter and can be contracted through oral contact
with feces
72. Trichophyton grows on skin, hair; can get from towels, comb, hat; ringworm or athletes foot
73. Ambiasis cysts develop in colon or rectum; bloody stool, high fever
74. Cryptococcus neoformans found in soil and can effect the respiratory tract and cause mild
pneumonia
75. Azoles is most commonly used to treat fungal infections..
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdfanandshingavi23
Rate of formation of P2O5=rate of reaction
Rate of formation =2.9*10-3/10
Rate of formation =2.9*10-4M/s
Solution
Rate of formation of P2O5=rate of reaction
Rate of formation =2.9*10-3/10
Rate of formation =2.9*10-4M/s.
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdfanandshingavi23
Solution
:
Lymphoid stem cell is a type of blood stem cells.These stem cells develops into a white blood
cell.Mainly it develops lymphocytes.White blood cells destroy infectious bacteria after
identifying them.It play different role in providing immunity to our body from
virus,bacteria,fungi etc..
copper sulphate when added to 5 moles of water ge.pdfanandshingavi23
copper sulphate when added to 5 moles of water gets hydrated and forms CuSO4
which is of blue colour
Solution
copper sulphate when added to 5 moles of water gets hydrated and forms CuSO4
which is of blue colour.
public class Point { Insert your name here private dou.pdfanandshingavi23
The document defines a Point class with methods to initialize points, get x and y coordinates, calculate distance between points, and check for equality. It also defines a Cloud class to represent a collection of points with methods to add/remove points, get size and extremes, and calculate the center point and minimum distance between points in the cloud. Both classes are tested with example points in a main method.
Program.cs class Program { static void Main(string[] args).pdfanandshingavi23
Program.cs:
class Program
{
static void Main(string[] args)
{
Console.WriteLine(\"Welcome the Employee Hierarchy Program\");
Console.WriteLine(\"CIS247, Week 5 Lab\");
Console.WriteLine(\"Name:
Solution
\");
Console.WriteLine(\" This program tests an Employee inheritance hierarchy \");
//Array to hold Employee type objects
Employee[] emp = new Employee[3];
//Initializing 3 values of array with 3 three types of classes
//Employee class object
emp[0] = new Employee(\"Joe\", \"Doe\", \'M\', 1, 10000.0, new Benefit(\"Partial\", 1000, 2));
//Salaried Employee
emp[1] = new Salaried(\"Zoe\", \"Likoudis\", \'F\', 3, 20000.0, new Benefit(\"Full\", 2000, 4), 1);
//Hourly Employee
emp[2] = new Hourly(\"Kate\", \"Perry\", \'F\', 0, 75, 25, new Benefit(\"Partial\", 3000, 8), \"part
time\");
//Displaying their data to the console
for (int i = 0; i < emp.Length; i++)
{
Console.WriteLine(\" ***************** Display Employee\'s Data ***************** \");
Console.WriteLine(emp[i].ToString());
}
//Displaying number of emps
Console.WriteLine(\" Total number of employees in Database: {0} \",
Employee.GetNumberOfEmployees());
} //End of Main method
} //End of Program class
}//End of namespace
Employee.cs:
class Employee
{
//Private data members
protected string firstName;
protected string lastName;
protected char gender;
protected int dependents;
protected double annualSalary;
//Number of employees
private static int numEmployees = 0;
//Benefit object
protected Benefit benefit;
//Default Constructor
public Employee()
{
firstName = \"not given\";
lastName = \"not given\";
gender = \'U\';
dependents = 0;
annualSalary = 20000;
//updates number of employees
numEmployees++;
benefit = new Benefit(\"not given\", 0, 0);
}//End of Default Constructor
//Argumented Constructor
public Employee(string first, string last, char gen, int dep, double salary, Benefit benefit)
{
firstName = first;
lastName = last;
gender = gen;
dependents = dep;
annualSalary = salary;
//Updates number of employees
numEmployees++;
this.benefit = new Benefit(benefit.GetHealthInsurance(), benefit.GetLifeInsurance(),
benefit.GetVacation());
}//End of Argumented Constructor
//Calculates weekly pay
public virtual double CalculatePay()
{
return annualSalary / 52;
}//End of CalculatePay method
//Displays all the data of the employee
public override string ToString()
{
return string.Format(\"Employee Type : {0} First Name : {1} Last Name : {2} Gender : {3}
Dependents : {4} Annual Salary : {5:c} Weekly Pay : {6:c} {7}\",
\"GENERIC\", FirstName, LastName, (Gender == \'M\') ? \"Male\" : \"Female\", Dependents,
AnnualSalary, CalculatePay(), benefit.ToString());
}//End of DisplayEmployee method
//Public properties
//Property for first name of the employee
public string FirstName
{
set
{
firstName = value;
}
get
{
return firstName;
}
}//End of FirstName method
//Property for last name of the employee
public string LastName
{
set
{
lastName = value;
}
get
{
return lastName;
}
}//End of LastName method
//Gender of.
PART IIncome StatementFor the year ended December 31, 2009Part.pdfanandshingavi23
PART I
Income Statement
For the year ended December 31, 2009
Particulars
Amount $
Sales Revenue
54000
Less: Purchases of merchandise
(27000)
Add: Opening Stock
15000
Less: Closing Stock
(10250)
Gross Profit
31750
Less:Operating Expenses
(Other Indirect cost, Expenses and losses)
Rent for shop
4000
Sales Commission
2300
Utilities for shop
2450
Net Profit
23000
Part 2
For the year ended December 31, 2010
Particulars
Amount
Amount
Opening Stock of Raw Material
Add: Purchase of Raw materials
Add: Purchase Expenses
Less: Closing stock of Raw Materials
Raw Materials Consumed
Direct Wages (Labour)
Direct Charges
13500
31000
0
9275
35,225
18300
0
Prime cost (1)
53,525
Add :- Factory Over Heads:
Rent on Manufacturing Plant
Plant Janitorial Service
Utilities of plant
9000
1250
4600
Works cost Incurred
14850
Add: Opening Stock of WIP
Less: Closing Stock of WIP
0
720
Works cost (2)
67655
Add:- Administration Over Heads:-
0
Cost of Production (3)
67655
Add: Opening stock of Finished Goods
Less: Closing stock of Finished Goods
0
5700
Cost of Goods Sold
61955
PART 2 (b) Income Statement
For the year ended December 31, 2010
Particulars
Amount
Amount
105000
Less: Cost of Goods Sold As per Above
(61955)
Gross profit
43045
Less : Selling and Distribution OH
Customer service hotline Exp
1000
Delivery Exp
1500
Sales Salaries
5000
7500
Net Profit
35545
PART 2 (c)
The Major differencein income statement of Best friends Manufacturing and hannah\'s pets is in
Calculation of cost of goods sold
Cost of goods sold of Best friends Manufacturing includes
(i) Manufacturing cost
(ii) administration expenses and
(iii) Opening and Closing Stock of Raw material,WIP and FG
BUT
Cost of goods sold of hannah\'s pets includes only administration expenses and Finished goods
Stock
The method for reporting earnings is the same for merchandisers and manufacturers. Each type
of company has sales and the total of these sales is the earnings figure. This figure does not
reflect cost-of-goods expenses.
Cost of Goods for Merchandisers
Merchandisers buy goods and resell them. The cost of those goods must be subtracted from the
earnings figure. The method for calculating this figure is to add inventory on hand at the
beginning of the accounting period to inventory purchased during the accounting period.
Subtract the inventory on hand at the end of the period, and subtract any freight charges. This is
the cost-of-goods figure for a merchandiser. The merchandiser\'s income statement will show
gross revenues minus this cost-of-goods number.
Cost of Goods for Manufacturers
Manufacturers break the cost of goods into categories. Raw materials expenses make up the first
category of manufacturing expenses. This cost covers any components, parts or materials
required to make the company’s product. The manufacturer must also inventory goods-in-
progress. These are partially manufactured products that could not be finished before the end of
the accounting period. In addition, manufacturers must count fi.
Because acidity of compound depends on conjugate .pdfanandshingavi23
Because acidity of compound depends on conjugate base stability . So conjugate
base of triphenyl methane is more stable because negative charge is in resonance with phenyl
ring and more resonance structure compare to other compound .
Solution
Because acidity of compound depends on conjugate base stability . So conjugate
base of triphenyl methane is more stable because negative charge is in resonance with phenyl
ring and more resonance structure compare to other compound ..
It is very important for organizations to adapt and learn.The only.pdfanandshingavi23
It is very important for organizations to adapt and learn.
The only constant in life is change. These changes present an opportunity as well as an initial
problems for company. Companies should not resist change. They should be flexible and
respond to the change and adapt it. Otherwise, their survival will be at danger. For example, with
the increasing use of digital platform, many people in the developed countries have started
reading newspapers and magazines in the digital platform and have stopped subscribing the hard
copies of newspapaer and magazines altogether.
Many companies have adapted this change and learned the use of digital platform for rolling out
their newspapers and magazines in an e-format. Some companies, who resisted the change and
did not roll out their e-versions of newspaper and magazines, have already closed down or are on
the verge of closure, due to declining subscribership of their hard copies of newspaper and
magazines.
Thus, it is very important for all newspaper and magazine to adapt and learn. Its very important
for survival.
Bureaucracy is an administrative policy making group. It is a group of large number of people
who are involved in running a government but are not elected.
Bureaucracy, involves, more often than not, use of age old methods and practices to function.
The system is rigid and not open to change. This discourages new thinking or fresh thinking or
even thinking out of the box.
Bureaucracy promotes employees on the basis of seniority rather than merit (again, more often
than not). This causes wrong allocation of power.
The government, is like a corporation. Just as organizations have failed by not adapting and
learning, government too can fail. Government is elected for a fixed term. A government has to
change its policies and governing practices with changing times. Government failing to do this,
will be blamed for poor decision making and policy formulations. This government will not be
re-elected, once its term expires and fresh elections are held.
Solution
It is very important for organizations to adapt and learn.
The only constant in life is change. These changes present an opportunity as well as an initial
problems for company. Companies should not resist change. They should be flexible and
respond to the change and adapt it. Otherwise, their survival will be at danger. For example, with
the increasing use of digital platform, many people in the developed countries have started
reading newspapers and magazines in the digital platform and have stopped subscribing the hard
copies of newspapaer and magazines altogether.
Many companies have adapted this change and learned the use of digital platform for rolling out
their newspapers and magazines in an e-format. Some companies, who resisted the change and
did not roll out their e-versions of newspaper and magazines, have already closed down or are on
the verge of closure, due to declining subscribership of their hard copies of newspaper and
magaz.
Visual hacking is used to visually capture private,sensitive informa.pdfanandshingavi23
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial gain
social engineering happens when malicious employee try to gain access by asking passwords to
resolve issues.spear pishing is another technique they will sent an email as a friend and ask to
clik below link.
viruses-Attackers can develop harmful code known as viruses. Using hacking techniques, they
can break into systems and plant viruses.
worms. These are programs that run independently and travel from computer to computer across
network connections. Worms may have portions of themselves running on many different
computers. Worms do not change other programs, although they may carry other code that does.
password cracking. This is a technique attackers use to surreptitiously gain system access
through another user\'s account. This is possible because users often select weak passwords. The
two major problems with passwords is when they are easy to guess based on knowledge of the
user.
E-mail hacking. Electronic mail is one of the most popular features of the Internet. With access
to Internet e-mail, someone can potentially correspond with any one of millions of people
worldwide.
Denial-of-service attacks. They will create the need to have a service available. It is a growing
trend on the Internet because Web sites in general are open doors ready for abuse. People can
easily flood the Web server with communication in order to keep it busy. Therefore, companies
connected to the Internet should prepare for (DoS) attacks. They also are difficult to trace and
allow other types of attacks to be subdued.
Trojan horses. These are malicious programs or software code hidden inside what looks like a
normal program. When a user runs the normal program, the hidden code runs as well. It can then
start deleting files and causing other damage to the computer. Trojan horses are normally spread
by e-mail attachments.
Network spoofing. In network spoofing, a system presents itself to the network as though it were
a different system
intrusion attacks. In these attacks, a hacker uses various hacking tools to gain access to systems.
These can range from password-cracking tools to protocol hacking and manipulation tools.
Solution
Visual hacking is used to visually capture private,sensitive information for unauthorized
access.for example we give a visiting pass to a person he can roam anywhere in the offie.person
can snap photo of employee device screen.by this information he can hack the company
databases.
Employees who have access to company databases may either leak the essential data with out
knowing it or employees can be lured by financial g.
The standards used for the various layers in an Ethernet-based netwo.pdfanandshingavi23
The standards used for the various layers in an Ethernet-based network that is man-aged by the
Internet management protocol is IEEE 802.3 CSMA/CD. Ethernet works at layer 2 of OSI
model(7 layers).
The commonly used protocol for management of network devices is known as Simple Network
Management Protocol, i.e. SNMP
Solution
The standards used for the various layers in an Ethernet-based network that is man-aged by the
Internet management protocol is IEEE 802.3 CSMA/CD. Ethernet works at layer 2 of OSI
model(7 layers).
The commonly used protocol for management of network devices is known as Simple Network
Management Protocol, i.e. SNMP.
The end result of double fertilization is zygote and edosperm. In th.pdfanandshingavi23
The end result of double fertilization is zygote and edosperm. In this process, out of two sperm
cells, one sperm feritilizes egg cell which forms diploid zygote, while other sperm fuses with two
polar nuclei forming endosperm.
Solution
The end result of double fertilization is zygote and edosperm. In this process, out of two sperm
cells, one sperm feritilizes egg cell which forms diploid zygote, while other sperm fuses with two
polar nuclei forming endosperm..
The conus medullaris (Latin for medullary cone) is the tapered, .pdfanandshingavi23
The conus medullaris (Latin for \"medullary cone\") is the tapered, lower end of the spinal cord.
It occurs near lumbar vertebral levels 1 (L1) and 2 (L2), occasionally lower. The upper end of
the conus medullaris is usually not well defined.
2. C 1 through T 1 and L 1 through S4
3. Motor
4.Extension of the knee
Solution
The conus medullaris (Latin for \"medullary cone\") is the tapered, lower end of the spinal cord.
It occurs near lumbar vertebral levels 1 (L1) and 2 (L2), occasionally lower. The upper end of
the conus medullaris is usually not well defined.
2. C 1 through T 1 and L 1 through S4
3. Motor
4.Extension of the knee.
The document states that D is the answer and to take care in a concise manner. It provides a single statement indicating that D is the solution followed by a brief reminder to be careful. In just a few words, the key information conveyed is that D is the answer and caution is advised.
Endothermic or exothermic reaction nature .pdfanandshingavi23
The document discusses whether a chemical reaction is endothermic or exothermic. An endothermic reaction absorbs heat from the surroundings, while an exothermic reaction releases heat to the surroundings. Determining whether a reaction is endothermic or exothermic can provide insight into the reaction's energy changes and heat transfer properties.
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g Step2 ma.pdfanandshingavi23
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g
Step2 mass of iodine = 60x10^-9 x 1025 g
Step3 Atomic mass of iodine =126.90447
Step4 Molarity of I- ion = (60x10^-9 x1025)/126.90447 = 4.846x10^-7= 4.8x10^-7 M
Step5 Option B is correct
Solution
Step1 mass of 1 litre of sea water = 1.025x1000 =1025 g
Step2 mass of iodine = 60x10^-9 x 1025 g
Step3 Atomic mass of iodine =126.90447
Step4 Molarity of I- ion = (60x10^-9 x1025)/126.90447 = 4.846x10^-7= 4.8x10^-7 M
Step5 Option B is correct.
Solution66. Candida albicans is vaginal Yeast infection or “Thrus.pdfanandshingavi23
Solution
:
66. Candida albicans is vaginal Yeast infection or “Thrush”.
67. Aflatoxin is a fungal toxin that can affect peanut Butter. It is a potent human carcinogen.
68. Trypanosoma Tsetse fly transmitted disease causes insomnia and can affect the nervous
system
69. Babesiosis infections parasite carried by ticks.
70. Tinea versicolor is the fungal infection that affects the skin of young people.
71. Giardiasis peanut parisite found in fecal matter and can be contracted through oral contact
with feces
72. Trichophyton grows on skin, hair; can get from towels, comb, hat; ringworm or athletes foot
73. Ambiasis cysts develop in colon or rectum; bloody stool, high fever
74. Cryptococcus neoformans found in soil and can effect the respiratory tract and cause mild
pneumonia
75. Azoles is most commonly used to treat fungal infections..
Rate of formation of P2O5=rate of reaction Rate of formation =2.9.pdfanandshingavi23
Rate of formation of P2O5=rate of reaction
Rate of formation =2.9*10-3/10
Rate of formation =2.9*10-4M/s
Solution
Rate of formation of P2O5=rate of reaction
Rate of formation =2.9*10-3/10
Rate of formation =2.9*10-4M/s.
Solution Lymphoid stem cell is a type of blood stem cells.These s.pdfanandshingavi23
Solution
:
Lymphoid stem cell is a type of blood stem cells.These stem cells develops into a white blood
cell.Mainly it develops lymphocytes.White blood cells destroy infectious bacteria after
identifying them.It play different role in providing immunity to our body from
virus,bacteria,fungi etc..
copper sulphate when added to 5 moles of water ge.pdfanandshingavi23
copper sulphate when added to 5 moles of water gets hydrated and forms CuSO4
which is of blue colour
Solution
copper sulphate when added to 5 moles of water gets hydrated and forms CuSO4
which is of blue colour.
public class Point { Insert your name here private dou.pdfanandshingavi23
The document defines a Point class with methods to initialize points, get x and y coordinates, calculate distance between points, and check for equality. It also defines a Cloud class to represent a collection of points with methods to add/remove points, get size and extremes, and calculate the center point and minimum distance between points in the cloud. Both classes are tested with example points in a main method.
Program.cs class Program { static void Main(string[] args).pdfanandshingavi23
Program.cs:
class Program
{
static void Main(string[] args)
{
Console.WriteLine(\"Welcome the Employee Hierarchy Program\");
Console.WriteLine(\"CIS247, Week 5 Lab\");
Console.WriteLine(\"Name:
Solution
\");
Console.WriteLine(\" This program tests an Employee inheritance hierarchy \");
//Array to hold Employee type objects
Employee[] emp = new Employee[3];
//Initializing 3 values of array with 3 three types of classes
//Employee class object
emp[0] = new Employee(\"Joe\", \"Doe\", \'M\', 1, 10000.0, new Benefit(\"Partial\", 1000, 2));
//Salaried Employee
emp[1] = new Salaried(\"Zoe\", \"Likoudis\", \'F\', 3, 20000.0, new Benefit(\"Full\", 2000, 4), 1);
//Hourly Employee
emp[2] = new Hourly(\"Kate\", \"Perry\", \'F\', 0, 75, 25, new Benefit(\"Partial\", 3000, 8), \"part
time\");
//Displaying their data to the console
for (int i = 0; i < emp.Length; i++)
{
Console.WriteLine(\" ***************** Display Employee\'s Data ***************** \");
Console.WriteLine(emp[i].ToString());
}
//Displaying number of emps
Console.WriteLine(\" Total number of employees in Database: {0} \",
Employee.GetNumberOfEmployees());
} //End of Main method
} //End of Program class
}//End of namespace
Employee.cs:
class Employee
{
//Private data members
protected string firstName;
protected string lastName;
protected char gender;
protected int dependents;
protected double annualSalary;
//Number of employees
private static int numEmployees = 0;
//Benefit object
protected Benefit benefit;
//Default Constructor
public Employee()
{
firstName = \"not given\";
lastName = \"not given\";
gender = \'U\';
dependents = 0;
annualSalary = 20000;
//updates number of employees
numEmployees++;
benefit = new Benefit(\"not given\", 0, 0);
}//End of Default Constructor
//Argumented Constructor
public Employee(string first, string last, char gen, int dep, double salary, Benefit benefit)
{
firstName = first;
lastName = last;
gender = gen;
dependents = dep;
annualSalary = salary;
//Updates number of employees
numEmployees++;
this.benefit = new Benefit(benefit.GetHealthInsurance(), benefit.GetLifeInsurance(),
benefit.GetVacation());
}//End of Argumented Constructor
//Calculates weekly pay
public virtual double CalculatePay()
{
return annualSalary / 52;
}//End of CalculatePay method
//Displays all the data of the employee
public override string ToString()
{
return string.Format(\"Employee Type : {0} First Name : {1} Last Name : {2} Gender : {3}
Dependents : {4} Annual Salary : {5:c} Weekly Pay : {6:c} {7}\",
\"GENERIC\", FirstName, LastName, (Gender == \'M\') ? \"Male\" : \"Female\", Dependents,
AnnualSalary, CalculatePay(), benefit.ToString());
}//End of DisplayEmployee method
//Public properties
//Property for first name of the employee
public string FirstName
{
set
{
firstName = value;
}
get
{
return firstName;
}
}//End of FirstName method
//Property for last name of the employee
public string LastName
{
set
{
lastName = value;
}
get
{
return lastName;
}
}//End of LastName method
//Gender of.
PART IIncome StatementFor the year ended December 31, 2009Part.pdfanandshingavi23
PART I
Income Statement
For the year ended December 31, 2009
Particulars
Amount $
Sales Revenue
54000
Less: Purchases of merchandise
(27000)
Add: Opening Stock
15000
Less: Closing Stock
(10250)
Gross Profit
31750
Less:Operating Expenses
(Other Indirect cost, Expenses and losses)
Rent for shop
4000
Sales Commission
2300
Utilities for shop
2450
Net Profit
23000
Part 2
For the year ended December 31, 2010
Particulars
Amount
Amount
Opening Stock of Raw Material
Add: Purchase of Raw materials
Add: Purchase Expenses
Less: Closing stock of Raw Materials
Raw Materials Consumed
Direct Wages (Labour)
Direct Charges
13500
31000
0
9275
35,225
18300
0
Prime cost (1)
53,525
Add :- Factory Over Heads:
Rent on Manufacturing Plant
Plant Janitorial Service
Utilities of plant
9000
1250
4600
Works cost Incurred
14850
Add: Opening Stock of WIP
Less: Closing Stock of WIP
0
720
Works cost (2)
67655
Add:- Administration Over Heads:-
0
Cost of Production (3)
67655
Add: Opening stock of Finished Goods
Less: Closing stock of Finished Goods
0
5700
Cost of Goods Sold
61955
PART 2 (b) Income Statement
For the year ended December 31, 2010
Particulars
Amount
Amount
105000
Less: Cost of Goods Sold As per Above
(61955)
Gross profit
43045
Less : Selling and Distribution OH
Customer service hotline Exp
1000
Delivery Exp
1500
Sales Salaries
5000
7500
Net Profit
35545
PART 2 (c)
The Major differencein income statement of Best friends Manufacturing and hannah\'s pets is in
Calculation of cost of goods sold
Cost of goods sold of Best friends Manufacturing includes
(i) Manufacturing cost
(ii) administration expenses and
(iii) Opening and Closing Stock of Raw material,WIP and FG
BUT
Cost of goods sold of hannah\'s pets includes only administration expenses and Finished goods
Stock
The method for reporting earnings is the same for merchandisers and manufacturers. Each type
of company has sales and the total of these sales is the earnings figure. This figure does not
reflect cost-of-goods expenses.
Cost of Goods for Merchandisers
Merchandisers buy goods and resell them. The cost of those goods must be subtracted from the
earnings figure. The method for calculating this figure is to add inventory on hand at the
beginning of the accounting period to inventory purchased during the accounting period.
Subtract the inventory on hand at the end of the period, and subtract any freight charges. This is
the cost-of-goods figure for a merchandiser. The merchandiser\'s income statement will show
gross revenues minus this cost-of-goods number.
Cost of Goods for Manufacturers
Manufacturers break the cost of goods into categories. Raw materials expenses make up the first
category of manufacturing expenses. This cost covers any components, parts or materials
required to make the company’s product. The manufacturer must also inventory goods-in-
progress. These are partially manufactured products that could not be finished before the end of
the accounting period. In addition, manufacturers must count fi.
Because acidity of compound depends on conjugate .pdfanandshingavi23
Because acidity of compound depends on conjugate base stability . So conjugate
base of triphenyl methane is more stable because negative charge is in resonance with phenyl
ring and more resonance structure compare to other compound .
Solution
Because acidity of compound depends on conjugate base stability . So conjugate
base of triphenyl methane is more stable because negative charge is in resonance with phenyl
ring and more resonance structure compare to other compound ..
It is very important for organizations to adapt and learn.The only.pdfanandshingavi23
It is very important for organizations to adapt and learn.
The only constant in life is change. These changes present an opportunity as well as an initial
problems for company. Companies should not resist change. They should be flexible and
respond to the change and adapt it. Otherwise, their survival will be at danger. For example, with
the increasing use of digital platform, many people in the developed countries have started
reading newspapers and magazines in the digital platform and have stopped subscribing the hard
copies of newspapaer and magazines altogether.
Many companies have adapted this change and learned the use of digital platform for rolling out
their newspapers and magazines in an e-format. Some companies, who resisted the change and
did not roll out their e-versions of newspaper and magazines, have already closed down or are on
the verge of closure, due to declining subscribership of their hard copies of newspaper and
magazines.
Thus, it is very important for all newspaper and magazine to adapt and learn. Its very important
for survival.
Bureaucracy is an administrative policy making group. It is a group of large number of people
who are involved in running a government but are not elected.
Bureaucracy, involves, more often than not, use of age old methods and practices to function.
The system is rigid and not open to change. This discourages new thinking or fresh thinking or
even thinking out of the box.
Bureaucracy promotes employees on the basis of seniority rather than merit (again, more often
than not). This causes wrong allocation of power.
The government, is like a corporation. Just as organizations have failed by not adapting and
learning, government too can fail. Government is elected for a fixed term. A government has to
change its policies and governing practices with changing times. Government failing to do this,
will be blamed for poor decision making and policy formulations. This government will not be
re-elected, once its term expires and fresh elections are held.
Solution
It is very important for organizations to adapt and learn.
The only constant in life is change. These changes present an opportunity as well as an initial
problems for company. Companies should not resist change. They should be flexible and
respond to the change and adapt it. Otherwise, their survival will be at danger. For example, with
the increasing use of digital platform, many people in the developed countries have started
reading newspapers and magazines in the digital platform and have stopped subscribing the hard
copies of newspapaer and magazines altogether.
Many companies have adapted this change and learned the use of digital platform for rolling out
their newspapers and magazines in an e-format. Some companies, who resisted the change and
did not roll out their e-versions of newspaper and magazines, have already closed down or are on
the verge of closure, due to declining subscribership of their hard copies of newspaper and
magaz.