Ace - AI Tutor
Ask Our Educators
Textbooks
My Library
Flashcards
Scribe - AI Notes
Notes & Exams
Download App
rebekah douglas

rebekah d.

Divider

Questions asked

BEST MATCH

TB MC Qu. 10-101 (Static) The depreciation method that produces... The depreciation method that produces more depreciation expense during the early years of an asset's life and less expense in the later years is a(n): Multiple Choice Accelerated depreciation method. Book value depreciation method. Straight line depreciation method Depletion method Unrealized depreciation method

View Answer
divider
BEST MATCH

2. A particle P rests in equilibrium on a smooth horizontal plane. A system of three forces, F₁ N, F₂ N and F₃ N where $F_1 = (3ci + 4cj)$ $F_2 = (-14i + 7j)$ is applied to P. Given that P remains in equilibrium, (a) find F₃ in terms of c, i and j. The force F₃ is removed from the system. Given that c = 2 (b) find the size of the angle between the direction of i and the direction of the resultant force acting on P. The mass of P is m kg. Given that the magnitude of the acceleration of P is 8.5 m s⁻². (c) find the value of m.

View Answer
divider
BEST MATCH

1. Consider a monopolist firm that faces a market demand given by 9(P) = 2p-3/2, where q is the quantity sold and p is the price of the product. The firm has a marginal cost of 2 per unit and there are no fixed costs. What is the price of the product if the monopolist maximizes its profits? (a) p=4 (b) p= 6 (c) p= 8 (d) p= 10 (e) p= 12 2. Consider a monopoly market. The demand curve is given by 9(P) = Bp^a, where p is the price set by the monopolist, and the parameters a and B are such that a <-1 and B > 0. The cost curve is C(q) = f +cq, where f and c are positive parameters. The price that maximizes the monopolist's profits is: CB :+f CO (a) p= (b) p= 1+a (c) p= 1+a (d) P= 1+B (e) p= CB CA 1+8 + 1+a Info 3. Consider a monopolist facing a market demand given by p(q) = 9 – 3q. The monopolist's cost function is C(q) = 39. Compute the dead-weight loss (DWL) associated with the monopolistic equilibrium: (a) DWL = (b) DWL = } (C) DWL = 9 (d) DWL = 17 (e) DWL = 3

View Answer
divider
BEST MATCH

Determine the order of the differential equation: $y' + 3y = 3y^2$. order = 3

View Answer
divider
BEST MATCH

Consider a linear viscoelastic model that is consisted of a linear elastic element (Young’s modulus E1) in parallel with a Maxwell element (Young’s modulus E2, viscosity mu ), derive and plot (qualitatively) the stress relaxation and creep behavior described by this model.

View Answer
divider
BEST MATCH

Text: Matplotlib can create 2D images but not 3D images. True or false?

View Answer
divider
BEST MATCH

D-E Mix and WACC A public corporation in which you own common stock reported a WACC of 10.7% for the year in its annual report to stockholders. The common stock that you own has averaged a total return of 6% per year over the last 3 years. The annual report also mentions that projects within the corporation are 80% funded by its own capital. Estimate the company's cost of debt capital. Does this seem like a reasonable rate for borrowed funds?

View Answer
divider
BEST MATCH

Shaft ABC comprises a brass section AB and a steel section BC with different diameters shown in the diagram below. A lever is located at B with a force F applied at its end. What is the required diameter of the steel section in order to support 70% of the total applied torque to the shaft given the following parameters: db = 90mm, Gg = 75MPa, G = 40MPa? Give your answer in mm.

View Answer
divider
BEST MATCH

Discuss the benefits of having a formal ontology language when evaluating the quality of an ontology, especially with respect to the two activities above (5 marks)

View Answer
divider
BEST MATCH

A company is a victim of phishing and spear phishing campaign. Users are clicking on website links that look like common Bank sites and entering their credentials accidentally. A security engineer decides to use a layered defense to prevent the fishing or lessen its impact. Which of the following should the security engineer implement? Select 2 Spam filter host intrusion prevention client certificates content filter log monitoring data loss prevention

View Answer
divider