Edit Format View Help reate the FoodFactory and other required classes to demonstrate the serving process. The class should implement the following methods: FoodFactory getFactory() to return the instance of the FoodFactory class. void registercuisine(String cuisineKey, Cuisine cuisine) to register the cuisine so that the food factory would be able to serve it. lere Cuisine is the abstract class provided in the locked stub code. then the exception UnservableCuisineRequestException should be thrown with the message "Unservable cuisine \{cuisineKey\} for dish \{dish\}". The implementation of UnservableCuisineRequestException class is provided in the locked stub code. The locked stub code in the editor validates the correctness of the foodfactory class implementation by processing some cuisine requests. Constraints1≤totalNumberOfOrders ≤100 Input format for Custom Testing Input from stdin will be processed as follows and passed to the function. The first line contains the value of totalNumberofordens describing the total number of orders placed. The next totalNumberoforders lines contain the cuisine key and dish name separated by space for each order. Sample case 0 Sample Input for Custom Testing Italian Lasagne Japanese Kamameshi Polish Marioram Input Format For Custom Testing Input from stdin will be processed as follows and passed to the function. The first line contains the value of totalNumberofOrders describing the total number of orders placed. The next totalNumberoforders lines contain the cuisine key and dish name separated by space for each order. Sample Case θSample Input For Custom Testing 3 Italian Lasagne Japanese Kamameshì Polish Marjoram Sample Output Serving Lasagne(Italian) Serving Kamameshi(Japanese) Unservable cuisine Polish for dish Marjoram Explanation Consider the following cuisine orders: so the locked stub code prints "Unservable cuisine Polish for dish Marjonam" )

Answers

Answer 1

The FoodFactory class is responsible for managing the different cuisines and serving the requested dishes. It has a method getFactory() that returns the instance of the FoodFactory class, and a method registerCuisine() that registers the cuisine so that the food factory would be able to serve it.

The FoodFactory class also has a method serveDish() that serves the requested dish from the registered cuisine. If the requested cuisine or dish is not registered, then the method throws an UnservableCuisineRequestException with the message "Unservable cuisine {cuisineKey} for dish {dish}".

Here is the implementation of the FoodFactory class:

```
public class FoodFactory {
 private static FoodFactory instance;
 private Map cuisines;

 private FoodFactory() {
   cuisines = new HashMap<>();
 }

 public static FoodFactory getFactory() {
   if (instance == null) {
     instance = new FoodFactory();
   }
   return instance;
 }

 public void registerCuisine(String cuisineKey, Cuisine cuisine) {
   cuisines.put(cuisineKey, cuisine);
 }

 public void serveDish(String cuisineKey, String dish) throws UnservableCuisineRequestException {
   Cuisine cuisine = cuisines.get(cuisineKey);
   if (cuisine == null) {
     throw new UnservableCuisineRequestException("Unservable cuisine " + cuisineKey + " for dish " + dish);
   }
   cuisine.serveDish(dish);
 }
}
```

The Cuisine class is an abstract class that has a method serveDish() that serves the requested dish. Each cuisine class should extend the Cuisine class and implement the serveDish() method.

Here is the implementation of the ItalianCuisine class:

```
public class ItalianCuisine extends Cuisine {
 Override
 public void serveDish(String dish) {
   System.out.println("Serving " + dish + "(Italian)");
 }
}
```

The UnservableCuisineRequestException class is a custom exception class that is thrown when the requested cuisine or dish is not registered.

Here is the implementation of the UnservableCuisineRequestException class:

```
public class UnservableCuisineRequestException extends Exception {
 public UnservableCuisineRequestException(String message) {
   super(message);
 }
}
```

The locked stub code in the editor validates the correctness of the FoodFactory class implementation by processing some cuisine requests. The input format for custom testing is as follows:

- The first line contains the value of totalNumberOfOrders describing the total number of orders placed.
- The next totalNumberOfOrders lines contain the cuisine key and dish name separated by space for each order.

Here is the sample input for custom testing:

```
3
Italian Lasagne
Japanese Kamameshi
Polish Marjoram
```

And here is the sample output:

```
Serving Lasagne(Italian)
Serving Kamameshi(Japanese)
Unservable cuisine Polish for dish Marjoram
```

The first two orders are served successfully because the Italian and Japanese cuisines are registered and the requested dishes are available. However, the third order is not served because the Polish cuisine is not registered, so the UnservableCuisineRequestException is thrown with the message "Unservable cuisine Polish for dish Marjoram".

Learn more about programming:

https://brainly.com/question/26134656

#SPJ11


Related Questions

what command would you use in ubuntu linux to get permission to install software?

Answers

To get permission to install software on Ubuntu Linux, you would need to use the sudo command. Sudo stands for "superuser do" and allows you to execute commands as the superuser or administrator.

Here are the steps to use the sudo command:Open a terminal window by pressing Ctrl+Alt+T on your keyboard.Type in the command you want to run, for example, "sudo apt-get install [package name]".Press Enter on your keyboard.You will be prompted to enter your password. Type in your user password and press Enter.If the password is correct, the command will be executed with administrative privileges, allowing you to install the software.Note: Only use the sudo command for commands that require administrative privileges. Using the sudo command can be dangerous, so it's important to be careful and only use it when necessary.

To learn more about Linux click the link below:

brainly.com/question/13267082

#SPJ4

How is your approach to solving how to order your coins different from how a computer might have to approach it?

Answers

Answer: Computer solves the order of coins the way its programmed to while you solve the order of coins the way you want.

What is calculated first in this formula: =A5*(A7+A10)+A14​

Answers

Answer:

The equation in parenthisis , you always calculate first

HELPPPPP !!!!!!!!!!!

HELPPPPP !!!!!!!!!!!
HELPPPPP !!!!!!!!!!!

Answers

Answer:

Computers are developed along two separate engineering paths, producing two different types of computers.

An analog computer operates on continuosly varying data.

A digital computer operates on descrete data.

Data sorting refers to the arrangement of the data records in the ascending or descending order on the basis of numeric of alphabetic fields.

Answer:

hope this will help you friend.

HELPPPPP !!!!!!!!!!!

Secondary storage is also known as the ‘main memory’

Answers

Answer:

False

Explanation:

The main memory is called RAM (Random Access Memory). This is where all programs and variables in the computer live, and also it is the fastest storage.

Secondary storage would be your hard drive, USB, CD, floppy disk.

A popular design element is the inline-block, which consists of an enlarged initial letter in a body of text that drops down into the text body. True False

Answers

The statement is false as the term inline-block is not the correct term for the design element described. The correct term is drop cap.

The statement is partially correct. The design element you're referring to is called a drop cap, not an inline-block.

A drop cap consists of an enlarged initial letter in a body of text that drops down into the text body, creating a visually appealing effect.

Inline-block, on the other hand, is a CSS display property that allows elements to flow inline with text while still retaining block-level features.

To learn more about : design element

https://brainly.com/question/29946108

#SPJ11

Label the anatomy of the type below

Label the anatomy of the type below

Answers

Answer:

1. Gross anatomy is subdivided into surface anatomy (the external body), regional anatomy (specific regions of the body), and systemic anatomy (specific organ systems).

2. Microscopic anatomy is subdivided into cytology (the study of cells) and histology (the study of tissues).

Explanation:

None

Answer:

I do know 4 of the 7.

Explanation:

1) Cap height

2)Tail

5)Baseline

7)serif

I'm still trying to figure the other 3 out, ill add a comment if i do find out

Decrypt the message NXGQWFSLXG which was encrypted using the affine cipher: f(p)=(11p+5)mod26 Alphabet: A=0,B=1,…,Z=25 Message: You have attempted this problem 2 times. Your overall recorded score is 0%. You have unlimited attempts remaining.

Answers

One can  be able to decrypt the entire message "NXGQWFSLXG" as "XJTHDQVZJM".

What is the message about?

To decrypt the message "NXGQWFSLXG" that was encrypted using the affine cipher with the given encryption function f(p) = (11p + 5) mod 26, one need to know  the inverse function that undoes the encryption process.

Within the relative cipher, the encryption work is f(p) = (a * p + b) mod 26, where "a" and "b" are the key values. To decrypt the message, we got to discover the inverse function of this encryption work.

Learn more about Decryption from

https://brainly.com/question/31177004

#SPJ4

para saan po yung points dito?

Answers

Answer:

Hindi kudin Alam eh hahahha

Answer:

Hey, there this is the answer

Users need to use points to post a question. The more points they use, the more quickly their question will be answered. Users gain a basic number of points each time they log into the platform.

which xxx completes this method that adds a note to an oversized array of notes? public static void addnote(string[] allnotes, int numnotes, string newnote) { allnotes[numnotes]

Answers

The code fragment that adds a note to an oversized note matrix is

public static void addNote(String[] allNotes, int numNotes, String newNote) {

  allNotes[numNotes] = newNote;

}

The given method takes three arguments: an array of strings that can hold more elements than the current number of notes, an integer representing the current number of notes in the array, and a string representing the new note to be added.

The missing code snippet is the assignment statement that assigns the value of newNote to the next available position in allNotes. This can be achieved by indexing the array with numNotes, since the current number of notes is equal to the index of the next available position. Therefore, the completed method should look like the following:

public static void addNote(String[] allNotes, int numNotes, String newNote) {

  allNotes[numNotes] = newNote;

}

This will assign the value of newNote to the next available position in allNotes.

Learn more about programming:

https://brainly.com/question/26134656

#SPJ11

the physical parts of Computer are kwon as

Answers

Answer:

Computer hardware

Explanation:

Computer hardware includes the physical parts of a computer, such as the case,central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

which of the following components are the siem's way of letting the it team know that a pre-established parameter is not within the acceptable range?

Answers

Answer:Alerts

Explanation:

Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclusive, and sets its side length to a random decimal number greater than or equal to 5 and less than 12. Use Math.random() to generate random numbers.


This method must be called randomize() and it must take an RegularPolygon parameter.


Could someone help me out here thanks! C:

Answers

Answer:

public static void randomize(RegularPolygon r){

   int side = (int)((20-10) * Math.random()) + 10;

   int length = (int)((12-5)  * Math.random()) + 5;

   // assuming the regularpolygon class has setSide and setLength methods.

   r.set.Side(side);

   r.setLength(length);

}

Explanation:

The randomize method is used to access and change the state of the RegularPolygon class attributes sides and length. The method accepts the class as an argument and assigns a random number of sides and length to the polygon object.

If you are logged on to Windows Live Messenger, why would you be unable to engage

in an instant messaging session with your brother, who is logged on to his AOL

Instant Messenger account?

a. Because you use Windows and your brother uses Apple OS X

b. Because Windows Live Messenger has built-in security and AOL Instant

Messenger does not

c. Because AOL Instant Messenger and Windows Live Messenger use their own

proprietary protocols

d. Because AOL Instant Messenger encrypts

Answers

Answer:

C: Because AOL Instant Messenger and Windows Live Messenger use their own  proprietary protocols

Explanation:

Is a system software that manages the hardware resources and provides services 5o the application software

Answers

Answer:

"Operating system" is the right response.

Explanation:

The key program collection on something like a computer device that maintains it interacts mostly with underlying hardware of that system is considered as an Operating system.Even without the need for an OS, every consumer isn't able to access either equipment, monitor as well as portable phone or devices.

This is an analytical paper, so minimum theory.
1. Introduction – one paragraph – define and shortly describe the topic.
2. Provide analysis of whether a computer is innovation – apply criteria from the class materials or presentations.
3. Write a conclusion where provide your vision of the perspective for further development of computer technology.
Format:
1. One or two pages.
2. Font: 12 Times New Roman or similar.
3. Can be partly text and bullet points

Answers

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations. The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations.

The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

Computers and Technology:

"Sanjay sent 23 text messages on Monday, 25 on Tuesday and 40 on Wednesday."

"Develop an algorithm (pseudocode or flowchart) which accepts the number of text messages sent each day, and computes and outputs the average number of text messages sent daily. Remember that a fraction of a text message cannot be sent!
Also, show the answer in pascal code."

Please help me.

Answers

Answer:

The algorithm:

Input days

sum = 0

for i = 1 to \(days\)

   input text

   sum = sum + text

end for

average = sum/days

print average

The program in pascal:

var days, sum, text, i:integer;

var average : real;

Begin

    write ('Days: '); readln(days);

    sum:=0;

    for i := 1 to \(days\) do \(begin\)

         write ('Text: ');  readln(text);  

         sum:=sum+text;

    end;

    average := (sum/days);

    writeln ('The average text is' , average);

End.

Explanation:

This declares all variables

var days, sum, text, i:integer;

var average : real;

This begins the program

Begin

This gets the number of days from the user

    write ('Days: '); readln(days);

Initialize sum to 0

    sum:=0;

This iterates through the days

    for i := 1 to \(days\) do begin

This gets the text for each day

         write ('Text: ');   readln(text);  

This sums up the texts

         sum:=sum+text;

End loop

    end;

Calculate average

    average := (sum/days);

Print average

    writeln ('The average text is' , average);

End program

End.

A ________ is a name that represents a value that cannot be changed during the program's execution. sentinel literal keyword named constant

Answers

The correct one is "named constant". A named constant is a variable whose value is set at the beginning of a program and cannot be changed during the program's execution.

A named constant is a name that represents a value that cannot be changed during the program's execution. It is used to provide a meaningful label for a fixed value, making the code more readable and maintainable.

Named constants are often used in programming languages to define values that should remain constant throughout the execution of a program. These values can be represented by literals, but using named constants provides the advantage of making the code easier to understand and update. Keywords, on the other hand, are reserved words that have a specific meaning within the programming language, and sentinel values are special values that signal the end of a sequence or a specific condition.

To know more about program's execution visit:-

https://brainly.com/question/14547052

#SPJ11

c) what must an ethical hacker have before employing hacking tools and techniques on a company network?

Answers

They should be familiar with SQL, C#, C++, Javascript, and Java, as well as social engineering techniques for obtaining privileged or secret information and ethical hacking tools like Nmap, Netsparker, Burp Suite, and others.

What is ethical hacking?

An authorized attempt to gain unauthorized access to a computer system, application, or data constitutes ethical hacking. An ethical hack involves copying the tactics and behaviors of hostile attackers.

A database can be communicated with using SQL. It is the accepted language for relational database management systems, claims ANSI (American National Standards Institute). To update data on a database or to retrieve data from a database, SQL statements are used.

A contemporary, object-oriented, and type-safe programming language is C# (pronounced "See Sharp"). With C#, programmers may create a wide variety of. NET-compatible apps that are secure and reliable.

You can scan all of your company's web pages with Netsparker to get a better understanding of your applications and any potential security flaws. Any website or online application can be scanned. They may be built using any language, technology, or framework.

It supports the whole testing process, from initial mapping and analysis of an application's attack surface through detecting and exploiting security flaws. Burp Suite is an integrated platform and graphical tool for doing security testing of web applications.

Learn more about ethical hacking click here :

https://brainly.com/question/29038149

#SPJ1

You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to avoid having stale data. Because it is redundant. Because it should be defined in another class. In order to keep it current.

Answers

Answer:

The answer is "In order to avoid having stale data".

Explanation:

In this question, only the above-given choice is correct because follows the class-object concept, and the wrong choices can be defined as follows:

In this question, the second and third choices are wrong because its class field data value is not redundant, it should not define in another class.The third choice is also wrong because it can't define the class field to keep it current.  

Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birth. After additional inspection, she realized it was an extra report from one of their file systems that had been discarded. What should Denise do?

Answers

Answer:

All of the above

Explanation:

The report is a piece of critical information in the company's file system that should be saved and secure from adversaries. All the options should be implemented to prevent and manage data leakage.

how is the data you listed above being used? what features are enabled by the data? schoology data policy

Answers

The data I listed above is a Python code snippet that defines a class `Name` and a function `str_name`. This code is not directly related to the Schoology data policy, as it is a programming example unrelated to Schoology or any specific data policy.

The code snippet demonstrates how to define a class `Name` with two fields (`first` and `last`) and an initialization method `__init__`. It also provides a function `str_name` that takes a string input, parses it into a first name and last name, and returns a `Name` object.

Regarding the Schoology data policy, I don't have access to the specific content of the policy as my training only goes up until September 2021. To learn about the Schoology data policy and the features enabled by it, I recommend visiting the official Schoology website and reviewing their published data policy document.

The policy will outline how Schoology collects, uses, and protects user data, as well as the features and functionalities it provides.

Visit here to learn more about Python brainly.com/question/30391554

#SPJ11

__________________ is the best option for a 10 gigabyte core network which needs to use 10 meter (33 feet) fiber runs?

Answers

10GBase-SR is the best option for a 10 gigabyte core network which needs to use 10 meter (33 feet) fiber runs.

What is gigabyte core network?The novel, native-to-the-cloud function for processing control plane signals in Ericsson's dual-mode 5G Core solution is called the Ericsson Packet Core Controller. It offers the gateway control, mobility, access, session, and 5G use-case support functionalities. The new 5G service category known as mMTC (Massive Machine-Type Communications) may handle extraordinarily high online device connection densities. An internet service that delivers a maximum connection speed of 1 gigabit per second (Gbps), 1,000 megabits per second (Mbps), or 1 million kilobits per second is known as a gigabit broadband connection (Kbps). Video streaming is a snap to handle with the substantially quicker rates. playable media engaging media.

To learn more about gigabyte core network refer to:

https://brainly.com/question/5860806

#SPJ4

Use the ________ tag to configure a generic area on a web page that is embedded within a paragraph or other block display element.

Answers

Answer:

Use the HTML <p> tag to configure a generic area on a web page that is embedded within a paragraph or other block display element.

Explanation:

Example:

<p> This is some text in a paragraph. </p>

A major retailer wants to enhance their customer experience and reduce losses coming from their supply chain by eliminating ‘left-over’ and ‘out-of-stock' scenarios. Which type of Artificial Intelligence (AI) solution would be suitable for solving this problem?

Answers

Answer:

Predicting the demand by a certain product by analyzing existing data.

Explanation:

AI for retail can help optimize work schedules, delivery tracking, delivery planning, among other things

Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the audience attention?

1. Arrow
2. Ink Color
3. Eraser
4. Laser Pointer

Answers

A laser pointer provides the ability to convert the mouse icon when giving a presentation:)

data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cryptographic failure

Answers

The data that is transmitted in plain text is option D: cryptographic failure.

An established plain text only assault is what?

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

https://brainly.com/question/10564419
#SPJ1

Write a program to find the sum of first 10 even numbers in qbasic​

Answers

Answer:

CLS. FOR I = 1 TO 10. INPUT "ENTER THE NUMBERS"; N(I) IF N(I) MOD 2 = 0 THEN S = S + N(I) ...

Complete the program so that a sample run inputting 22 for the number of items bought and 1095 for the price of each item will produce the results below. Sample run of the program Please input the number of items bought 22 Please input the price of each iten 10.98 The total bill is $241.56 to Once you have the program working change the instruction precisio) ecsedechowpoint cout< in the header. Alter the program so that the program first asks for the name of the product which can be read into a string object) so that the following sample run of the program will appear Please input the name of the item MIK Please input the number of items bought 4 Please input the price of each item 1.97 The item that you bought is Milk The total bill is $7.88 Now alter the program, if you have not already done so, so that the name of an item could include a space within its string. Please input the name of the item Chocolate Ice Cream Please input the number of items bought 4 Please input the price of each item 1.97 The item that you bought is Chocolate Ice Cream The total bill is

Answers

The program calculates the total bill based on the number of items bought and the price of each item. It first asks for the number of items and the price per item

Here's an example implementation of the program in C++:

```cpp

#include <iostream>

#include <string>

#include <iomanip>

int main() {

   std::string itemName;

   int numItems;

   double pricePerItem;

 std::cout << "Please input the name of the item: ";

   std::getline(std::cin, itemName);

   std::cout << "Please input the number of items bought: ";

   std::cin >> numItems;

   std::cout << "Please input the price of each item: ";

   std::cin >> pricePerItem;

   double totalBill = numItems * pricePerItem;

   std::cout << "The item that you bought is " << itemName << std::endl;

   std::cout << "The total bill is $" << std::fixed << std::setprecision(2) << totalBill << std::endl;

   return 0;

}

```

In the modified program, the `std::getline()` function is used to read the input for the item name as a string, allowing for names with spaces. The `std::fixed` and `std::setprecision()` functions are used to format the total bill with two decimal places.

With the sample input of 4 items bought at a price of $1.97 each and the name "Chocolate Ice Cream," the program will output "The item that you bought is Chocolate Ice Cream" and "The total bill is $7.88".

The modifications enable the program to accurately handle item names with spaces and provide a more detailed output by including the name of the item along with the total bill.

Learn more about program here:

https://brainly.com/question/14588541

#SPJ11

Other Questions
Given that the point (-24, 7) is on the terminal side of an angle, theta , find the exact value of the following: sin()= cos()= tan()= csc()= sec()= cot()= Match six of the terms (a-j) with the following definitions presented below (1-6)a- Sales Journal. b- General ledger. c- Accounts receivable ledger.d- Sales invoice. e- Monthly statement. f- General Journal.8- Cash receipt journal. h- Purchase order. i- Accounts payable ledger.j- Service invoice.1- Record infrequent, no routine transactions; also record adjusting and closing entries.2- Maintain details about amounts due from customers.3- Maintain details about all major asset, liability, equity, revenue, and expense accounts4- Maintain details about amounts due to vendors.5- Inform customers of outstanding accounts balances.6- Record cash sales, payments from customers and other cash receipts, If an Oregon licensee commonly uses a name other than their legally given name, what mustthe licensee do to use this name in advertisements?The licensee must register the alternative name with the agency. Type the standard English translation to the phrase below in the space provided. I didn't meet him at no dance. This stage in the PI process cycle provides positive closure for the team members and is a time to celebrate successes and recognize team member contributions and accomplishments:adjourningcritical pathGantt Chart consider amanda and zelda. they both will save $6,000 per year until they retire at age 70. amanda and zelda, however, will start saving at different ages. amanda will start saving when she is 30 years old. zelda will start saving when she is 50 years old. assuming the interest rate each year is 8%, how much money will the first year of savings amount to when they retire? round your answers to two decimal places. Graph the curve whose parametric equations are given, and show its orientation. Find the rectangular equation of the curve. x=1+1, y=t-3; -00" Fiscal policy that involves changes in government spending affects which of the following components of aggregate demand?-Investment spending-Household consumption-Government spending-Total net exports Find the arc length. Leave your answer in terms of i. An arc with central angle 146 and radius 4 ft O A. 6.491 ft OB. 0.811 ft C. 0.02 ft OD. 3.2410 ft You are to present a proposed capital investment project to your board of directors. The project has a NPV of $12,000 and an IRR of 12%. The firm's required return is 10%. You are to communicate your proposal to the board in a single paragraph memo. Write this paragraph here. Remember, your job is to recommend to the board whether to accept or reject this project. For many years, humans have used a variety of techniques that have influenced the genetic makeupof organisms. These techniques have led to the production of new varieties of organisms that possesscharacteristics that are useful to humans. Identify one technique presently being used to alter thegenetic makeup of an organism, and explain how humans can benefit from this change. Your answermust include at least:the name of the technique used to alter the genetic makeup a brief description of what is involved in this techniqueone specific example of how this technique has been used a statement of how humans have benefited from the production of this new variety of organism. Write a question that a population ecologist might ask about the photo below. Then, write a question that an ecosystem ecologist might ask. How are the questions different A slingshot sends a stone vertically upward from a height of 20 feet above a pool ofwater. The starting speed of the stone is 90 feet per second. Its distance in feet, d.above the water is given by the equation:d-20+90t-16t^2, where t is the time in seconds after the launch.Drag statements to the table to show what each coordinate labeled on the graphrepresents in this problem situation.the height of the stone when it is launchedthe time when the stone hits the waterthe time when the stone is launched the maximum height of the stonethe time when the stone reaches its maximum heightCoordinateAthe height of the stone when it hits the waterWhat the Coordinate RepresentsDRAG AND DROPAN ITEM HEREDRAG AND DROPAN ITEM HEREDRAG AND DROPDRAG AND DROP Assume a company manufactures only two products14,000 units of Product C and 6,000 units of Product D. It is considering implementing an activity-based costing (ABC) system that allocates all of its manufacturing overhead to three cost pools. The following additional information is available for the company as a whole and for Products C and D:Activity Cost PoolActivity MeasureEstimated Overhead CostExpected ActivityMachiningMachine-hours$300,00015,000MHMachine setupsNumber of setups $150,000200SetupsProduct designNumber of products$78,0002ProductsActivity MeasureProduct CProduct DMachine-hours9,0006,000Number of setups50150Number of products11Using the ABC system, how much overhead cost would be assigned from the Machine Setups cost pool to Product D? Three ways citizens can play active role in democratic govrment which of the following is not one of the three steps in the process to help decide on a target market? ranking segments in order of attractiveness prioritizing segments based on potential return on marketing investment conducting a swot analysis for each of the segments excluding segments for ethical, moral, or competitive reason g A functionalist would likely ask which one of the following questions about socially assistive robots?a) Who benefits from socially assistive robots and at whose expense?b) What meanings do people assign to socially assistive robots?c) What are the intended and unintended consequences of socially assistive robots?d) How will socially assistive robots affect interaction? A project is expected to create operating cash flows of$42,000 per year for five years. The fixed assets required for theproject cost $98,000. It will cost an estimated $54,000 after taxto dispose Three of the papilla they tested were only able to detect one taste. Whats a reasonable hypothesis to explain why a papilla is only able to detect one taste? The papilla lacks taste buds. The papilla has only one taste bud with taste receptor cells that can interact with different chemicals. All the taste receptor cells within that papilla have the same type of taste receptor protein. Each taste receptor cell within that papilla has different types of receptor proteins that interact with different chemicals. What is the expected value of the probability distribution of the discrete random variable X?xP(X = x)1.233.095.057.019.3011.2113.11A. =11.09B. =7.26C. =9.23D. =71.08