Expert Answers

(Solved): need it as soon as possible Use the shooting method to sol...

Use the shooting method to solve the boundary-value problem
2
y = y - xy + 2x + y(1) = 0, y(2) = 4 In 2.
.
Compare with the

need it as soon as possible

Use the shooting method to solve the boundary-value problem 2 y" = y - xy + 2x + y(1) = 0, y(2) = 4 In 2. . Compare with the exact solution y = 2.c Inz.

(Solved): 6. Three different distributions There are 559 full-service ...

6. Three different distributions

There are 559 full-service restaurants in Delaware. The mean number of seats per restaurant is 99.2. [Source: Data based on the 2002 Economic Census from the US Census Bureau.]

Suppose that the true population mean µ = 99.2 and standard deviation ? = 20.8 are unknown to the Delaware tourism board. They select a simple random sample of 50 full-service restaurants located within the state to estimate µ. The mean number of seats per restaurant in the sample is M = 103.4, with a sample standard deviation of s = 18.2.

The standard deviation of the distribution of sample means (that is, the standard error, ?MM) is    . (Note: Although µ and ? are unknown to the Delaware tourism board, they are known to you for the purposes of calculating these answers.)

The standard or typical average difference between the mean number of seats in the 559 full-service restaurants in Delaware (µ = 99.2) and one randomly selected full-service restaurant in Delaware is    .

The standard or typical average difference between the mean number of seats in the sample of 50 restaurants (M = 103.4) and one randomly selected restaurant in that sample is    .

The standard or typical average difference between the mean number of seats in the 559 full-service restaurants in Delaware (µ = 99.2) and the sample mean of any sample of size 50 is    .

The z-score that locates the mean number of seats in the Delaware tourism board’s sample (M = 103.4) in the distribution of sample means is    .

Use the unit normal tables and accompanying figures to answer the question that follows. To use the tables, select the desired range of z-score values. A table of the proportions of the normal distribution corresponding to that range of z-scores will appear.

Suggestion: Make a sketch of the area under the normal distribution you are seeking. This sketch will help you determine which column(s) of the normal table to use in determining the appropriate probability.

(Solved): c) A low-carbon steel with 200 mm wide fed through rolling...

c) A low-carbon steel with 200 mm wide fed through rolling operations is to be used to
reduce the thickness from 50 mm to 15

c) A low-carbon steel with 200 mm wide fed through rolling operations is to be used to reduce the thickness from 50 mm to 15 mm in a reversing two-high mill. The entrance speed of the plate = 30 m/min. Roll diameter = 300 mm, and coefficient of friction between rolls and work = 0.18. The specification is that the draft is to be equal on each pass. Strength coefficient = 600 MPa, and strain hardening exponent=0.25. Determine: i. maximum draft for this operation (2 marks) ii. minimum number of passes required (2 marks) iii. Draft per passes and draw the rolling design system based on the calculation (3 marks)

(Solved):   1. Design and analyses a microcontroller instructi...

1. Design and analyses a microcontroller instruction
cycle pipeline to execute an embedded program
which has 100 instructions

 

1. Design and analyses a microcontroller instruction cycle pipeline to execute an embedded program which has 100 instructions. Each instruction has a uniform period and has 5 pipeline stages in the following order Instruction Fetch (IF), Instruction Decode (ID), Execute (Ex), Memory Access (MEM) and Register Write Back (WB). The fetch operation takes 3 clock cycles, decode operation takes 2 clock cycles, execution operation takes 4 cycles, memory access takes 3 cycles and register write back takes 2 cycles. a) With necessary diagrams, calculate the total number of clock cycles that will take to execute the program. b) If the microcontroller is given a clock with input clock frequency 2 GHz, what is the maximum clock frequency with which the microcontroller can operate? c) If the instruction pipeline is flushed after every 40 instructions, calculate the total number of clock cycles taken. d) In order to increase the microcontroller operating frequency, a register is placed in between the pipeline. Where it should be placed, and after placing, what is the new maximum operating frequency, and total number of clocks cycles the program will take without pipeline flushing?

(Solved): The theme of this activity is to learn the use of complex...

The theme of this activity is to learn the use of complex combinations of Loops, Dictionaries
and Functions in Python. The goStep 3-b: Now, add the encrypted symbol for the vowel in the dictionary created in step 2.
(Think of using appropriate key-va

The encrypted text is: h2114 w4rld
Part 3: Deciphering the encrypted text
Step 9: Start a loop for all variables in the dicti

The theme of this activity is to learn the use of complex combinations of Loops, Dictionaries and Functions in Python. The goal of this activity is to create a code that can decipher an encrypted text, given the encrypted text and a codebook with alternate symbols for characters (vowels). Point to note, all the inputs and outputs are case-sensitive. Be sure to create a header comment with the title of this program, your name, the current date, and a short summary about the purpose of the program (in your own words). Your program should be made of this following steps: Part 1: Entering and storing the encryption symbols Step 1: Create a variable replace_list, with a list of 5 vowels as characters, all lowercase. Step 2: Initialize an empty dictionary to hold the encrypted symbols. Step 3: Start a loop for all the values in replace_list. Step 3-a: Ask user for input, to use as an encrypted symbol for the current vowel in replace_list. It should look like: Encrypted symbol for a is: I We will use a simple case of encryption here. For example, the encryption could be: a ? 1, b?2, C3, 04, e ? 5. Step 3-b: Now, add the encrypted symbol for the vowel in the dictionary created in step 2. (Think of using appropriate key-value pairs!) Step 4: Print the whole dictionary here, to see the complete encryption symbols. This is your dictionary: {'a': '1', 'e': '2', 'i': '3', 'o': '4', 'u': '5'} Part 2: Reading the encrypted text Step 5: You should create a text file in the same location as your code, titled “examplefile.txt”. This file contains one line of encrypted text. For this example, we will use “h2|14 w4rld” (which is basically an encoded version of “hello world” using the code symbols decided in step 3-a). Step 6: Write a code snippet that opens the text file, reads the lines from there and stores them in a list. (It is a two-line code, standard for Python file-reading operations). Step 7: From the lines read, store only the first value as an input string in a new variable. (Using only the first value, since we have only one line in examplefile.txt. We do not need additional lines for this code.) Step 8: Print the encrypted text to show successful reading from the text file. The encrypted text is: h2114 w4rld Part 3: Deciphering the encrypted text Step 9: Start a loop for all variables in the dictionary. Step 9-a: Check if the corresponding value (character) from the dictionary is already present in the encrypted text (read in step 7). If it is, replace the encrypted character in the encrypted text with the original symbol (aka, replace “1” with "a"). This step should technically change all the encryption, as it is running in a loop for all variables in the dictionary. Step 10: Print the deciphered text. The resulting string is: hello world Overall note: This input process is case-sensitive, meaning, it does differentiate between lowercase letters, uppercase letters, and symbols. When prompted for an encrypted symbol, assume the user only enters one character. Example Test Case: Encrypted symbol for a is: 1 Encrypted symbol for e is: 2 Encrypted symbol for i is: 3 Encrypted symbol for o is: 4 Encrypted symbol for u is: 5 This is your dictionary: {'a': '1', 'e': '2', 'i': '3', 'o' '4', 'u': '5'}

(Solved): QUESTION 19 Insurance hypothesis tells us that: O a investo...


QUESTION 19
Insurance hypothesis tells us that:
O a investors will demand that financial reports be audited as a way of insur
QUESTION 19 Insurance hypothesis tells us that: O a investors will demand that financial reports be audited as a way of insuring against some of their loss should their investment fall. Ob the entity can take out insurance to protect itself from such risks as employee or management fraud which can lead to material misstatements in the financial statements. O investors cannot insure themselves against loss when investing in an entity. Od investors can insure themselves against loss by investing in a diverse investment portfolio should an individual investment fail

(Solved): 200 mm 20mm 20mm 210mm 20mm 110mm Figure 2 Determine the ma...


200 mm
20mm
20mm
210mm
20mm
110mm
Figure 2
Determine the maximum shear force (V) the cross section shown in Figure 2 can carr
200 mm 20mm 20mm 210mm 20mm 110mm Figure 2 Determine the maximum shear force (V) the cross section shown in Figure 2 can carry if the maximum shear stress is not to exceed 100MPa. 15 Using the calculated V, determine the force carried by the web 6 [21]

(Solved): Create an excel formula in column B, "Reviewer Assig...

Create an excel formula in column B, "Reviewer Assigned", so that the following is true                
- If the call took place on 09/23 or 09/24, then the cell should populate with CSS              
- Otherwise, the cell should populate with CSR               
- Apply this to all cells in column B for the data set              

(Solved):   please help, thank you very much:) Multiple choice...

Multiple choice: (Just write the letter (A/B/C/D/E) for the correct answer next to
the question number)
14.3) A gas sample wi

 

please help, thank you very much:)

Multiple choice: (Just write the letter (A/B/C/D/E) for the correct answer next to the question number) 14.3) A gas sample with a mass of 128 mg occupies 50.0 mL at 750 Torr and 27°C. The gas is: A. CO B. CO2 C. SO2 D. SF E. CHA 14.4) The reaction: XY2(g) ? X(g) + Yz(9) takes place isothermally in a sealed container with a fixed volume. Which one of the following statements is CORRECT when comparing the conditions before and after the reaction occurs? A. The number of mole of gas in the flask remains the same. B. The kinetic energy of the gas particles increase. c. The average speed of the gas particles is constant. D. The pressure in the flask remains constant. E. The pressure in the flask doubles. 14.5) If a system undergoes a series of processes and then returns to its initial state, then: A. no work will be done by the system. B. the sum of work and heat transfer for the entire process will be zero. C. AH for the entire process will be zero only if the system is kept at constant pressure. D. AS for the entire process will positive due to the changes that the system undergoes. E. AT for the entire process will only be zero if the process occurs isothermally. (2)

(Solved): Answer fast please  Problem 1. (2 points) A financial a...

Answer fast please 

Problem 1. (2 points) A financial analyst claims that, out of 5 specific stocks, it is possible to
predict, in the correct or
Problem 1. (2 points) A financial analyst claims that, out of 5 specific stocks, it is possible to predict, in the correct order, the three that will perform best during the coming year. What is the probability of making the correct selection by chance? Show your work.