The old compute chip manufacturing factory is quite versatile, capable of many types of programmable chips. It is highly automated, so overhead is a major cost component. They utilize Activity Based Costing for assigning overhead to its products. Here are some relevant facts:

Cost driver est number of drivers
Setup department 10,000,000 number of setups 800
Material handling 5,000,000 pallets of materials 5000
Manufacturing equipment 250,000,000 batches run 4000

One of their products has these volumes:
Chip D
Direct Materials 150000
Direct Labor 40,000
number of setups 50
pallets of materials 75
batches run 60
units produced 125,000

What is the cost per unit for the Chip D?

Answers

Answer 1

The cost per unit for Chip D is determined using Activity Based Costing, which considers cost drivers such as the number of setups, pallets of materials, and batches run.

To calculate the cost per unit for Chip D, we need to consider the overhead costs allocated to this product using Activity Based Costing. First, we determine the cost driver rates for each activity. The cost driver rates are calculated by dividing the estimated overhead cost for each activity by its respective number of drivers.

For the setup department, the cost driver rate is calculated as follows:

Cost driver rate for setups = Total setup department cost / Number of setups

Given that the number of setups is 800 and the total setup department cost is 10,000,000, the cost driver rate for setups is 10,000,000 / 800 = 12,500.

Similarly, for material handling, the cost driver rate is:

Cost driver rate for material handling = Total material handling cost / Number of pallets of materials

Given that the number of pallets of materials is 5,000 and the total material handling cost is 5,000,000, the cost driver rate for material handling is 5,000,000 / 5,000 = 1,000.

For manufacturing equipment, the cost driver rate is:

Cost driver rate for manufacturing equipment = Total manufacturing equipment cost / Number of batches run

Given that the number of batches run is 4,000 and the total manufacturing equipment cost is 250,000,000, the cost driver rate for manufacturing equipment is 250,000,000 / 4,000 = 62,500.

Now, we can calculate the overhead cost allocated to Chip D based on its usage of these cost drivers. For Chip D:

Setup department cost = Number of setups for Chip D * Cost driver rate for setups = 50 * 12,500 = 625,000

Material handling cost = Number of pallets of materials for Chip D * Cost driver rate for material handling = 75 * 1,000 = 75,000

Manufacturing equipment cost = Number of batches run for Chip D * Cost driver rate for manufacturing equipment = 60 * 62,500 = 3,750,000

The total overhead cost allocated to Chip D is the sum of these costs: 625,000 + 75,000 + 3,750,000 = 4,450,000.

Finally, we can calculate the cost per unit for Chip D by dividing the total overhead cost by the number of units produced:

Cost per unit for Chip D = Total overhead cost / Number of units produced = 4,450,000 / 125,000 = 35.60.

Therefore, the cost per unit for Chip D is $35.60.

Learn more about Chip here:

https://brainly.com/question/32128661

#SPPJ11


Related Questions


One easy way to tell if a cell contains a formula instead of data is to click on the cell and look at the formula bar to
see if it

A. contains a number.
B.contains any parentheses.
C.begins with an equal sign.
D.begins with an operator.

Answers

Answer:

C.. begins with an equal sign.

Explanation:

EDGE2021

You are writing a program that uses these modules. An error occurs when you
try to make the monkey sprite walk from one side of the screen to the other.
Which module needs to be edited?

Answers

Since the modules. Answer will be subjective. The module needs to be edited is the Object modules.

What is Object modules?

This is known as object file as it is the section of code that is said to be object-based programming.

Note that to make the monkey sprite walk , one has to change x by 10 block is that tends to really moves the sprite. One can make it move faster  or slower by the act of increasing or decreasing its value.

Learn more about modules from

https://brainly.com/question/13171394

#SPJ1

what is an example of an innovative solution to an engineering problem?

Answers

Answer:8 of the Greatest Challenges Facing Engineering

The climate crisis. ...

Making water clean and accessible. ...

Providing enough food. ...

Personalised and relevant education. ...

Improving health care. ...

The refugee crisis. ...

Cyber security. ...

Enlisting the youth.

Explanation:This may or may not help

Where is information stored in the computer?​

Answers

Answer:

files

Explanation:

data is stored in files

plz answer the following ​

plz answer the following

Answers

Answer:

it trojan

Explanation:

what is the question asking

Ethan is a member of the school choir. The group wants to serve the community this quarter. The choir director suggests a few ideas. Later, the choir decides to designate a group of five choir members to explore and discuss options and then bring three proposals before the whole choir at the next meeting.

What benefits might result from five people weighing the options rather than only the choir director sharing ideas? Check all that apply.

a quicker decision
a better variety of options
more carefully evaluated options
more donations from choir members
greater member involvement

Answers

Answer:

b,c,e is your answer mark me as brainliest

Explanation:

on edge2021

I know I am late but for the future people the answer is B,C, E! :)

- the person above me is correct

- Have a nice day

<3

free!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Answers

Answer:

thank you so much

Explanation:

foe the free really apreciatwd

differentiate between status bar and task bar​

Answers

Answer: The taskbar is for starting tasks, while the status bar shows information.

Explanation:

The taskbar is often at the bottom of the desktop, while the status bar may be at the bottom of a program's window.

The status bar displays information, but the taskbar is used to initiate tasks.

What is the status bar?

A graphics controller called a status bar displays an informational area there at bottom of windows. To organize the information, it might be split into sections. Since several status bars offer additional capabilities, their main duty is to provide knowledge about just the window's present state.

The status bar may appear at the bottom of a program's screen, although the taskbar is frequently at the bottom of the workspace.  They both have their own functions that help in running a system.

The status bar is presented at the bottom of internet browser displays or other software windows; a toolbar provides simpler access to operations generally carried inside the application.

Learn more about status bar, here:

https://brainly.com/question/3521461

#SPJ2

primary u.s. interstate highways are numbered 1-99. odd numbers (like the 5 or 95) go north/south, and evens (like the 10 or 90) go east/west. auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. thus, the 405 services the 5, and the 290 services the 90. write (define) a public static method named printhighwayinfo, that takes as its only argument a highway number (the arguments will be an int). when this method is called, it should print out a string indicating if the highway is a primary or auxiliary, and if the highway goes east/west or north/south (see examples below). this method should have a return void return type. examples: given a highway number, indicate whether it is a primary or auxiliary highway. if auxiliary, indicate what primary highway it serves. also indicate if the (primary) highway runs north/south or east/west. printhighwayinfo(90) will print the 90 is primary, going east/west. printhighwayinfo(290) will print the 290 is auxiliary, serving the 90, going east/west. printhighwayinfo(185) will print the 185 is auxiliary, serving the 85, going north/south. you may wish to write some additional code to test your method

Answers

The printhighwayinfo method is a public static method that takes an int argument representing a highway number. This method determines if the highway is a primary or auxiliary highway and if it goes east/west or north/south.

To determine if the highway is a primary or auxiliary highway, the method checks if the highway number is between 1 and 99 (primary) or between 100 and 999 (auxiliary). If the highway is auxiliary, the method extracts the rightmost two digits and determines which primary highway it serves based on the even/odd numbering system.Once the type of highway is determined, the method checks if the highway goes east/west or north/south based on the even/odd numbering system. If the highway is odd, it goes north/south, and if it is even, it goes east/west.For example, if the method is called with the argument 90, it will print "The 90 is primary, going east/west." If the method is called with the argument 290, it will print "The 290 is auxiliary, serving the 90, going east/west." And if the method is called with the argument 185, it will print "The 185 is auxiliary, serving the 85, going north/south."It is recommended to write additional code to test the printhighwayinfo method and ensure it is functioning correctly.

Learn more about highway here

https://brainly.com/question/1071443

#SPJ11

How far down the pyramid of decision-making do teachers usually go?

Answers

Decision-making is the process of selecting the best course of action among multiple alternatives based on available information, preferences, values, and goals. It involves identifying the problem or opportunity, gathering and analyzing relevant data, generating and evaluating potential solutions, and choosing the best option that maximizes the expected outcome or minimizes the risks or costs.

Teachers typically go down the lower levels of the pyramid of decision-making, which includes the operational and tactical levels. The operational level involves daily decisions that directly affect classroom instruction and student learning, such as lesson planning, classroom management, and assessment strategies. The tactical level involves decisions that impact the broader school community, such as curriculum development and implementation, student support services, and professional development opportunities. However, teachers may also participate in decision-making at the strategic level, which involves long-term planning and goal-setting for the school or district. This could include involvement in school improvement plans, budgeting decisions, and strategic planning committees. Ultimately, the extent to which teachers participate in decision-making at different levels of the pyramid depends on the school culture and leadership, as well as the individual teacher's level of experience and expertise.

To know more about Decision-making visit:

https://brainly.com/question/13244895

#SPJ11

For a direct-mapped cache design with a 32-bit address, the following bits of the address are used to access the cache: Tag Index Offset 31-10 4-0 9-5 a. What is the cache block size (in words)? b. How many entries does the cache have? C. What is the ratio between total bits required for such a cache implementation over the data storage bits? Starting from power on, the following byte-addressed cache references are recorded: 0,4, 16, 132, 232, 160, 1024, 30, 140, 3100, 180, 2180 d. How many blocks are replaced?

Answers

a. The cache block size (in words):The offset bits determine the size of the block that is accessed, since each block must be the same size as a memory word. In this case, there are 25 bits in the tag and 5 bits in the index field. That means that the offset field is made up of 5 bits, so the block size is 2^5=32 bits.b. Number of entries in the cache:There are 2^5 = 32 index values. As a result, there are 32 cache entries.

Each entry has a length of 32 bits, which includes 25 tag bits, 5 index bits, and 2 control bits, one of which is valid. As a result, the total number of bits required for cache entries is 32 x 32 = 1024 bits. c. Ratio between total bits required for such a cache implementation over the data storage bits:In total, the size of the memory is 2^32 bytes, or 2^30 words. If we divide the amount of memory by the size of the block, we get the number of blocks in memory:2^30 words / 2^5 words per block = 2^25 blocksThere are 32 cache entries in total.

As a result, the cache can only store 32 blocks at a time. As a result, the cache hit rate is expected to be low, resulting in a high miss rate. If a block is accessed that is not currently in the cache, it must be loaded from memory and saved in a cache entry. If a cache entry is already occupied by another block, the current block must be evicted. The cache replacement algorithm determines which block is evicted. The least recently used algorithm, which evicts the block that has not been used in the longest period of time, is the most common algorithm.

d. Number of blocks that are replaced:We'll have to look at each memory reference one at a time to figure out how many blocks are replaced. 0 is a reference to memory location 0. 0 maps to block 0 in the cache since the index field is 0. As a result, block 0 is loaded into the cache. 4 is a reference to memory location 4. 4 maps to block 0 in the cache since the index field is 0. As a result, block 0 is already in the cache. There is no replacement of blocks. 16 is a reference to memory location 16. 16 maps to block 0 in the cache since the index field is 0. As a result, block 0 is already in the cache. There is no replacement of blocks. 132 is a reference to memory location 132. 132 maps to block 26 in the cache because the index field is 26. As a result, block 26 is loaded into the cache. 232 is a reference to memory location 232. 232 maps to block 46 in the cache because the index field is 46. As a result, block 46 is loaded into the cache. 160 is a reference to memory location 160. 160 maps to block 32 in the cache because the index field is 32. As a result, block 32 is loaded into the cache.

To know more about memory visit:

https://brainly.com/question/28754403

#SPJ11

Create an algorithm to accept the height of a person. If the height entered is greater than 6 feet it should display the message, "You are tall" if the height is less than this it should display, "You are short".

Answers

1. Accept the height of a person as input.

2. If the height is greater than 6 feet, display "You are tall".

3. If the height is less than or equal to 6 feet, display "You are short".

The algorithm is a simple conditional statement that checks the height entered by a person and displays a corresponding message based on the condition.

1. The first step is to accept the height of a person as input. This can be done using an input function or by reading from a user interface.

2. Next, we check if the height is greater than 6 feet. If the condition is true, the algorithm proceeds to display the message "You are tall".

3. If the height is not greater than 6 feet, the algorithm moves to the next step, which is to display the message "You are short". This message indicates that the person's height is less than or equal to 6 feet.

The algorithm provides a straightforward way to determine whether a person is tall or short based on their entered height.

learn more about user interface here:

https://brainly.com/question/10604135

#SPJ11

n
How does an informal outline usually organize information?
A. With letters
B. With bullet points
C. With numbers
D. With Roman numerals

Answers

The answer is (B. With bullet points) have a good day :)

A threat actor programs an attack designed to invalidate memory locations to crash target systems. Which statement best describes the nature of this attack?
a. The attacker created a null pointer file to conduct a dereferencing attack.
b. The attacker programmed a dereferencing attack.
c. The attacker programmed a null pointer dereferencing exception.
d. The attacker created a race condition to perform a null pointer dereferencing attack.

Answers

The best answer that describes the nature of that attack is C. The attacker programmed a null pointer dereferencing exception.

A buffer overflow attack happened if an attacker exploits a known vulnerability in an application (for example, an error in an application that permitted that application to write to an area of memory (that is, a buffer) dedicated to a different application), which could cause another application to crash. There are three kinds of hackers in the world of information security: black hats, white hats and grey hats.

You can learn more about the nature of attack at https://brainly.com/question/28527128

#SPJ4

Which of the following is a key difference between a For loop and a Do....while loop?

A. A For loop functions at the beginning of the looping structure, while a Do...while loop evaluates the condition at the end.

B. The number of repetitions is known for a For loop but not for a Do... while loop.

C. The number of repetitions is known for a Do...while loop but not for a For loop.

D. A For loop functions as a posttest loop, while a Do....while loop is a pretest loop.

Answers

A While the number of repetitions in a For loop is known, the number of repetitions in a Do while loop is not. Therefore, Option B is the appropriate response.

What accomplishes the for loop?

A piece of code is continually performed by programmers using the for loop, a conditional iterative expression, to check for specified circumstances.

The for loop differs from other looping statements due to the explicit loop number or loop variable that allows the body of the loop to know the precise sequencing of each iteration.

The English term "for" is used to express an object's or action's purpose; in this example, the iteration's goal and specifics are being expressed. Numerous imperative programming languages, including C and C++, use the For loop.

To know more about programming languages, visit:

https://brainly.com/question/18763374

#SPJ1

Which actions are available in the Trust Center? Check all that apply.
Enable macros.
Set privacy options.
Create mail merges.
Set trusted documents.
Approve trusted publishers.
Block users from receiving emails.

Answers

Answer: 1,2,4,5

Explanation:

bc

During a vulnerability scan, you notice that the hostname www.diontraining.com is resolving to www.diontraining.com.akamized.net instead. Based on this information, which of the following do you suspect is true?
A.The server assumes you are conducting a DDoS
B. You are scanning a CDN-hosted copy of the site
C.Nothing can be determined about this site with the information provided
D.The scan will not produce any useful information

Answers

During a vulnerability scan, when the hostname www.diontraining.com resolves to www.diontraining.com.akamized.net, it is suspected that the site is scanned via:  B. You are scanning a CDN-hosted copy of the site.

A content delivery network (CDN) is a network of servers that are distributed across the globe. These servers serve web pages and other types of content to end-users based on their geographic location, origin of the webpage and the content delivery server. CDN helps to reduce the latency and improve the speed of page load. This also helps the company to serve their content across the globe with ease.Akamai is a well-known CDN service provider, and www.diontraining.com might be using Akamai's CDN services. When a vulnerability scan is done on the domain name, the scan may produce misleading information as the scan will be conducted on the CDN-hosted copy of the site.

Learn more about CDN:https://brainly.com/question/25899399

#SPJ11

Do you agree with mr. lee or do you disagree? use the sources linked above to formulate a response backed by evidence.
“ the constitution has very little democracy in it “ - Richard Lee

Answers

In the context of America's democracy,it is important to recognize that the Constitution serves as the cornerstone   of the nation's democratic system.

How is this so  ?

While the Constitution may have certain   provisions that limit direct democracy, such as the electoral college,it is designed to ensure a balance of power, protect individual rights, and promote democratic principles.

Also, the   Constitution has been amended over time to expand democratic participation, such as with the 15th, 19th,and 26th Amendments.

Therefore, while there may be   ongoing debates about the extent of democracy in the Constitution,it remains a vital framework for America's democratic governance.

Learn more about constitution at:

https://brainly.com/question/453546

#SPJ1

I will be thankful I’d you help

I will be thankful Id you help

Answers

The information used to explain the graph is known as chart title.  Hence option B is correct.

What are statistical graphs?

Statistical graphs are defined as a graphic representation of applied mathematical knowledge. To make it simpler to understand and interpret statistical data, a set of data is represented by statistical graphs.

A table chart is just another type of information presentation. In boxes or columns of the table, there are words, numbers, or a mix of the two. It depicts a group of facts and how they relate to one another.

Thus, the information used to explain the graph is known as statistical graphs.

To learn more about statistical graphs, refer to the link below:

https://brainly.com/question/28790913

#SPJ1

jannah is working on setting up one of the features on her digital camera because she wants to have a dated analog of the images she takes so that she can see exactly when shots were taken. what feature is jannah setting up?

Answers

The feature Jannah is setting up analog dates of the image is timestamp.

What is timestamp?A timestamp is a token or packet of information used to ensure timeliness; It includes timestamped data, such as a time, as well as a signature generated by a Trusted Timestamp Authority (TTA).Timestamps are used for a variety of synchronization purposes, such as identifying the exact date and time of an event. A timestamp that includes a date in the form of a calendar date and a time in the form of a time of day.The TIMESTAMP data type is used for values that include both a date and a time component. The range of TIMESTAMP is from '1970-01-01 00:00:01' UTC to '2038-01-19 03:14:07' UTC. A DATETIME or TIMESTAMP value can have a trailing fractional seconds part with a precision of up to microseconds (6 digits).

To learn more about timestamp refer to :

https://brainly.com/question/12950658

#SPJ4

a cloud service provider (csp) outsources the entire cyber security elements to a third party for the infrastructure in which an application resides due to lack of resources. the csp maintains responsibility of the environment and attributes. what is this an example of? answer resource pooling mssp pay as you go secaas

Answers

This is an example of an MSSP (Managed Security Service Provider). In this scenario, the CSP outsources cybersecurity elements to a third party due to resource constraints, while still maintaining responsibility for the environment and its attributes.

This scenario is an example of using a Managed Security Service Provider (MSSP) for Security-as-a-Service (SECaaS) as part of resource pooling. The CSP is outsourcing the cybersecurity elements to a third party due to lack of resources, which is a common practice in resource pooling where multiple customers share the same infrastructure. However, the CSP still maintains responsibility for the overall environment and attributes, while the MSSP is responsible for the security of the infrastructure in which the application resides. This type of arrangement is often structured on a pay-as-you-go basis, where the CSP pays for the services provided by the MSSP.

To know more about cybersecurity visit :-

https://brainly.com/question/31490837

#SPJ11

Jamal just finished taking a series of photographs that he loves, but he is
displeased with the lightness and darkness found in these images. What setting
does he need to adjust to fix this?

A. prime
B. tone
C. zoom
D. Opixels

Answers

Tone i’m not sure though

Answer:

Tone

Explanation:

This is the right answer for connexus

(Will give Brainliest.) Very important. Summarize the entire episode of "Escape from Cluster Prime" from the Nickelodeon TV show: "My Life as a Teenage Robot.". Must be at least 4 sentences or more.

Answers

A summary of the episode should explain that the queen of a certain robot community invited a robot named Jenny to her part of the world. While Jenny was happy to be there, this queen had an ulterior motive.

What is a summary of the episode?

The episode tells of a queen named Vexus who invited Jenny, a robot to her part of the world known as Cluster Prime. Jenny was very happy to be there but unknown to her, the wicked queen wanted to use her to strengthen a bad weapon.

When Jenny learned of this, she fought the Queen off and successfully retired to her homeland. So, Jenny won the battle against evil.

Learn more about robots here:

https://brainly.com/question/13515748

#SPJ1

Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of defense?.

Answers

Answer: DoD is prohibited from entering into a service contract to acquire a military flight simulator.

Explanation:

hope this helps

Yes, it is possible for a DoD activity to enter into a service contract for a military flight simulator without obtaining a waiver from the Secretary of Defense

What is  dod activity

The rules and needs for a military flight simulator contract for a DoD activity can change depending  on different factors like the type and size of the contract, where the money is coming from, and any laws or rules that apply.

Usually, a DoD activity can make a deal for a military flight simulator without needing permission from the Secretary of Defense. However, sometimes it may be necessary to get permission or approval if special circumstances apply.

Read more about  secretary of defense here:

https://brainly.com/question/1498711

#SPJ2

your sound card has 5 color coded output jacks. to which would you connect the microphone?

Answers

You would connect the microphone to the pink color-coded output jack on your sound card.

Which output jack on your sound card should you use to connect the microphone?

The microphone should be connected to the pink-colored output jack on your sound card. This jack is typically designated for microphones and is color-coded pink for easy identification. By connecting your microphone to this specific jack, you ensure that the sound card recognizes and processes the microphone input correctly.

Remember to check your sound card's documentation or consult the manufacturer's instructions for specific details on connecting devices. Learn more about audio connections and configurations to optimize your sound setup.

Learn more about Microphone

brainly.com/question/21291597

#SPJ11

What is the output of this program? age = 4 if age > 5: print("more") else: print("less") Output:

Answers

Answer:

less

Explanation:

The program is age = 4 if age > 5: print("more") else: print("less"). The age is less than 5, so the output will be less.

What is a program?

"The program can also be expressed as a binary code, but expressing it in a higher programming language makes it easier for people to grasp."

The only language that the computer understands is binary, which is just a version of 0 and 1, but the user cannot understand binary. It will translate into highly understandable language for the user.

Programming that is designed using an object-oriented approach does so in order to achieve the desired goal.

Data input is required for programs. The program uses (processes) this data, and as a result, data (or information) is output.

Therefore, the output will be less.

To learn more about the output of the program, refer to the below link:

https://brainly.com/question/18079696

#SPJ5

Below is a class hierarchy for card games. Assuming that these are the only classes and that the concrete classes are correctly completed, which of the following non-member functions are polymorphic?
class Hand {
std::vector cards;
public:
void add(const Card&);
Card get(size_t index) const;
virtual int score() const;
};
class PokerHand : public Hand { . . . };
class BlackjackHand : public Hand { . . . };
class GoFishHand : public Hand { . . . }; void draw(const PokerHand* h) { . . . }
None of these are polymorphic.
void draw(const Hand h) { . . . }
Correct Answer void draw(const Hand& h) { . . . }
void draw(const GoFishHand& h) { . . . }

Answers

Among the provided non-member functions, the only polymorphic function is void draw(const Hand& h) in the class hierarchy for card games.

Explanation:

Polymorphism refers to the ability of objects of different derived classes to be treated as objects of their common base class. In the given class hierarchy, the base class Hand has virtual function score(), making it polymorphic. Consequently, any derived classes that inherit from Hand will also exhibit polymorphic behavior.

Among the non-member functions, void draw(const Hand& h) is polymorphic because it accepts a reference to a Hand object, which can be an instance of the base class or any of its derived classes (PokerHand, BlackjackHand, or GoFishHand). This function allows for dynamic dispatch, meaning that the appropriate draw implementation will be called based on the actual type of the object passed at runtime.

The other non-member functions (void draw(const PokerHand* h) and void draw(const GoFishHand& h)) are not polymorphic since they accept specific derived class types as arguments, limiting their applicability only to those specific types.

Therefore, the correct answer is void draw(const Hand& h) as the only polymorphic function among the provided non-member functions in the given class hierarchy

Learn more about polymorphic function here:

https://brainly.com/question/29887426

#SPJ11

does some one have a presentation for pc viruses

Answers

Answer:

yes. don't get one. they huant ur pc and make ads pop up consistantly.

sensors that can monitor and report data about traffic and parking conditions are part of a network of physical objects known as the internet of technology.
a. true
b. false

Answers

The term “Internet of Things,” or “IoT,” refers to the entire network of interconnected objects as well as the technology that makes it possible for such devices to communicate both with one another and with the cloud.Thus, it is false.

What physical objects known as the internet of technology?

The internet of things, or IoT, is a network of interconnected computing devices, mechanical and digital machinery, items, animals, or people who can exchange data across a network while necessitating human-to-human or human-to-computer interaction.

Therefore, it is false that sensors that can monitor and report data about traffic and parking conditions are part of a network of physical objects known as the internet of technology.

Learn more about internet here:

https://brainly.com/question/29692740\

#SPJ1

What does the primary Help icon look like in Access?

a square with a star
a diamond with an asterisk
a circle with a question mark
a triangle with an exclamation point

Answers

a circle with a question mark

Answer:

c

Explanation:

Other Questions
8. A 5000 kg open railroad car coasts along with a constant speed of 7.0 m/s on a leveltrack. Snow begins to fall vertically and fills the car at a rate of 2.6 kg/min. Ignoringfriction with the tracks, what is the speed of the car after 100 min? Back to Assignment Attempts Keep the Highest/3 8. Collusive outcome versus Nash equilibrium Consider a remote town in which two restaurants, All-You-Can-Eat Caf and GoodGrub Diner, operate in a duopoly. Both restaurants disregard health and safety regulations, but they continue to have customers because they are the only restaurants within 80 miles of town. Both restaurants know that if they clean up, they will attract more customers, but this also means that they will have to pay workers to do the cleaning. If neither restaurant cleans, each will earn $12,000; alternatively, if they both hire workers to clean, each will earn only $9,000. However, if one cleans and the other doesn't, more customers will choose the cleaner restaurant; the cleaner restaurant will make $16,000, and the other restaurant will make only $4,000. Complete the following payoff matrix using the information just given. (Note: Al-You-Can-Eat Caf and GoodGrub Diner are both profit-maximizing firms.) GoodGrub Diner Clean Up Doesn't Clean Up 3 5 As You Can Cat Cafe Clean Up Doen Clean Up $ and AR-You-Can-Eat Can and GoodGrub Diner decide to collude, the outcome of this game is as follows: All-You-Can-Eat Caf GoodGut One If both restaurants decide to cheat and behave noncooperatively, the outcome reflecting the unique Nash equilibrium of this game is as follows: Ab Yi-Can-Eat Ca Y and GoodGni Der Grade It Now Save & Continue Continue without saving which of the following statements about government regulation of political advertisements is most accurate? The area of a rectangular garden is 224 square meters. The width is 6 meters longer than one-half of the length. Findthe length and the width of the garden. Use the formula, area = length width.Pls help What is the slope of this graph? Exercise 24-20A (Algo) IRR for investment using Excel LO P4 Optitux is considering investing in an automated manufacturing sytem. The system requires an initial investment of 56.0 millior, has a 20 -year life, and will have zero salvage value. If the system is implemented, the company will save $740,000 per year in direct labor costs. The company requlres a 10% return from its investments. Using Excel, compute the internal rate of return for the proposed investment. (Round your answer to 2 decimal places.) after reviewing the assigned materials, explore the various economic, social and psychological factors that contributed to the rise of conspicuous consumption in the 18th and 19th centuries.Please use proper consumer psychology terminology in your discussion postings. Cite your sources A rock with a mass of 70 grams is dropped into a graduated cylinder with 30 mL of water in it. The water level rose to 35 mL calculate the density of the rock in g/mL HEY CAN ANYONE PLS PLS HELP ME W MY ENGLISH WORK???? accounting primarily deals with a/ people b/ inveestors c/ statistics d/numbers what is happening to particles in a material when it stretches and breaks ? someone please help me Define a three-layer neural network to solve the Xor problem, using logistic function as an activation function. This design needs to be different from the example introduced in class. That is, at least some of the neurons in this network carry out an operation different from the ones shown in the example. You want to develop a three-sigma R-chart.You know the average range is 14 based on several samples of size6. Which of the following is the resulting LCL? Apply the modified Tukeys method to the data in Exercise 22 to identify significant differences among the i s.Reference exercise 22The following data refers to yield of tomatoes (kg/plot) for four different levels of salinity. Salinity level here refers to electrical conductivity (EC), where the chosen levels were EC = 1.6, 3.8, 6.0, and 10.2 nmhos/cm. Joe buys candy that costs $6 per pound. He will spend at most $72 on candy. What are the possible numbers of pounds he will buy? Use p for the number of pounds Joe will buy. Write your answer as an inequality solved for p. Please answer!! I will give brainliest to whoever can! new number in sequence 3, 5, 12, 55, 648, ? Explica los significados de estas expresiones un dinero feliz; un corazn limpio recubierto de una piel oscura Can someone pls help me TRUE or FALSE... Cardiovascular Endurance and Aerobic Capacity aresimilar to each other and can be used interchangeably. *