Research an IoT device on the internet and share the research with your classmates. I suggest searching by industry such as Health, Manufacturing, Construction, etc. Here are the rules: Do NOT research Fitbit! In your initial post, answer the following questions: How will 5G transform developments in the IoT? What are two potential issues associated with the expansion of the IoT? Your Initial post should be two full paragraphs in length. The rest of the normal forum rules apply.

Answers

Answer 1

The advent of 5G technology is expected to significantly transform developments in the Internet of Things (IoT), enabling faster and more reliable connectivity, lower latency, and support for a greater number of connected devices.

However, this expansion of the IoT also presents potential issues related to security and privacy vulnerabilities, as well as the need for robust infrastructure and standards.

The deployment of 5G networks is poised to revolutionize the IoT landscape by addressing some of the limitations of existing connectivity options. With its ultra-fast speeds, low latency, and high capacity, 5G technology will enable more efficient and seamless communication between IoT devices. This will facilitate real-time data transmission, enhance the responsiveness of IoT applications, and unlock new possibilities in various industries such as healthcare, manufacturing, and smart cities.

However, the expansion of the IoT also brings forth certain challenges. One major concern is the security and privacy of IoT devices and the data they generate. With an increasing number of connected devices, the attack surface expands, making it more difficult to ensure robust security measures across the entire ecosystem. Additionally, privacy concerns arise due to the massive amounts of data collected by IoT devices, requiring careful management and protection of personal information.

Another issue associated with the IoT's expansion is the need for infrastructure development and standardized protocols. 5G networks require the dense deployment of small cells and robust network infrastructure to support the vast number of connected devices. Additionally, standardized protocols and frameworks are necessary to ensure interoperability and seamless integration of diverse IoT devices and systems.

In conclusion, 5G technology is set to transform developments in the IoT by enabling faster, more reliable connectivity and supporting a larger number of connected devices. However, this expansion also poses challenges in terms of security, privacy, and the need for infrastructure development and standardization. Addressing these issues will be crucial for the successful and widespread adoption of IoT technologies across various industries.

Learn more about Internet of Things  here:

https://brainly.com/question/29767247

#SPJ11


Related Questions

Imagine you are a project manager for a software company. Your team plans todevelop a new learning management system (LMS) for a local school district bythe end of the quarter. Which of the following factors can potentially push backyour release plan date? Select all that apply.A member of your development team leaves to take a new job.The Product Owner expands the project to include two additionalschool districts.

Answers

As the project manager for a software company, you plan to develop a new learning management system (LMS) for a local school district by the end of the quarter. The release plan date for the new LMS is at risk if certain factors intervene. The factors that can potentially push back your release plan date include:

A member of your development team leaves to take a new job: If one of your team members who is an essential part of the project leaves the project, it can lead to delays in the project completion. The impact of such a scenario will be that your team will be short of staff, which means you will have to find a replacement, which can be a time-consuming process. Moreover, the new member of the team will take time to familiarize themselves with the project.

The product owner expands the project to include two additional school districts: This is another factor that can potentially push back the release plan date for the new LMS. If the Product Owner expands the project, it will require additional resources, time, and effort to complete the new scope of work. Thus, it is essential to discuss the feasibility of including these additional school districts and the impact on the existing release plan date.

Other factors that can potentially push back your release plan date are - inadequate budget allocation, changes in requirements, scope creep, inadequate resources, lack of stakeholder alignment, and unanticipated issues with the technology.

As a project manager, it is crucial to manage project risks and uncertainties and monitor the progress of the project regularly. By doing so, you can prevent potential delays and ensure timely delivery of the project.

To know more about learning management system  visit:

https://brainly.com/question/30641101

#SPJ11

Ch8: Apply Yourself Quiz
Answer the following questions after watching the video
"Selecting a Master Patient Index."

Answers

Master Patient Index (MPI) is a database of patient identification data and refers to the software used to maintain the MPI.

The selection of a Master Patient Index is a critical decision for healthcare organizations. A Master Patient Index is designed to ensure the accuracy of patient records, and the selection of an MPI that is secure, easy to use, and efficient is essential to its success. This is why healthcare organizations need to be careful when selecting a Master Patient Index.There are several factors that healthcare organizations should consider when selecting a Master Patient Index, including the size of the organization, the complexity of the environment, and the type of data being managed. Healthcare organizations must also consider the needs of their clinicians and staff when selecting an MPI.

The software should be easy to use and not add additional workload or create undue burden on clinicians and staff. Moreover, it should be flexible enough to accommodate new workflows as they arise.To ensure that the MPI meets the organization's needs, it is important to involve the end-users in the selection process. End-users can provide valuable insights into what features and capabilities they need from the software. This approach also helps build support for the MPI among end-users as they have a voice in the selection process.Finally, it is essential that healthcare organizations select an MPI that is secure. The MPI should have the necessary security features and meet industry standards for protecting patient data. This ensures that the organization is compliant with regulations and reduces the risk of data breaches.

Learn more about software :

https://brainly.com/question/1022352

#SPJ11

Why doesn’t the system drive (c:) appear on the select where you want to save your backup page?

Answers

There can be a few reasons why the system drive (C:) may not appear as an option to select for saving a backup:

Backup destination restrictions: The backup utility you are using may have restrictions on selecting the system drive as a backup destination. This is often done to prevent accidentally overwriting critical system files or interfering with the operating system's functioning.

Insufficient privileges: If you are not logged in with administrative privileges or do not have the necessary permissions, the system drive may not be available for selection. Some backup tools require elevated privileges to access certain drives or directories.

Drive configuration or formatting: If the system drive is not formatted with a file system that is supported by the backup utility, it may not be visible as an option. For example, if the system drive is formatted with a file system not recognized by the backup software, it may not be displayed.

Software limitations: Certain backup software may have limitations or specific requirements that prevent the selection of the system drive as a backup destination. It is recommended to review the documentation or support resources of the backup software you are using for any specific limitations or guidelines.

In any case, it is generally not recommended to save backups directly to the system drive as it can lead to potential data loss if the drive fails. It is advisable to choose an alternative storage location such as an external hard drive, network storage, or cloud storage for creating backups.

Learn more about system drive here:

https://brainly.com/question/14493375

#SPJ11

In the following code for the ArrayBag class __contains__ method, what is the missing code?

def __contains__(self, item):

left = 0

right = len(self) - 1

while left <= right:

midPoint = (left + right) // 2

if self.items[midPoint] == item:

return True

elif self.items[midPoint] > item:

right = midPoint - 1

else: return False

a. right = left + 1
b. left = midPoint + 1
c. right = midPoint + 1
d. left = midPoint - 1

Answers

The correct answer is (b) left = midPoint + 1. In the given code, we are performing a binary search in a sorted array to check if an item is present in it.

We have initialized the left pointer to the first index of the array and the right pointer to the last index of the array.

We then enter into a while loop and calculate the midpoint of the left and right pointers using:

midPoint = (left + right) // 2

We compare the item with the element at the mid-point index. If they match, we return True as the item is present in the array.

If the item is less than the element at the mid-point index, we set the right pointer to mid-point - 1 and continue the binary search on the left half of the array.

If the item is greater than the element at the mid-point index, we set the left pointer to mid-point + 1 and continue the binary search on the right half of the array.

So, when the element at mid-point is less than the item, we need to update our search space to the right half of the array by updating the value of the left pointer. Hence, the missing code is left = midPoint + 1.

Learn more about array  here:

https://brainly.com/question/13261246

#SPJ11

create a new query using design view. from the transfer students table, add the firstname, lastname, major, class, and gpa fields, in that order. from the transfer schools table, add the admissiondate, tuition due, credits earned, and credits transferred fields, in that order. save the query as transfer credits. set the criteria in the admissiondate field to 8/1/2018. run the query. type $1500 in the tuitiondue field for diana sullivan and type 3.51 as the gpa for audrey owen. save and close the query.

Answers

To create the query using Design View and perform the specified tasks, follow the steps outlined below:

Open your database and go to the "Queries" section.

Click on "Create" and select "Query Design" to open the query designer.

In the "Show Table" dialog box, select the "Transfer Students" table and click "Add."

Repeat step 3 to add the "Transfer Schools" table to the query designer.

Close the "Show Table" dialog box.

Arrange the tables in the query designer window by dragging the field names to match the desired order. The final order should be:

Transfer Students: firstname, lastname, major, class, gpa

Transfer Schools: admissiondate, tuitiondue, credits_earned, credits_transferred

Click on the "Transfer Students" table in the query designer to select it.

In the "Criteria" row under the "admissiondate" field, enter "8/1/2018" to filter the admission date.

Save the query by clicking on the "Save" button on the toolbar and provide the name "Transfer Credits."

Close the query designer.

Now, to update the values for "tuitiondue" and "gpa" fields, follow these additional steps:

Open the "Transfer Credits" query in Design View.

Switch to Datasheet View by clicking on the "View" button on the toolbar.

Locate the row for "Diana Sullivan" and enter "1500" in the "tuitiondue" field.

Locate the row for "Audrey Owen" and enter "3.51" in the "gpa" field.

Save and close the query.

Your query is now created with the specified fields, criteria, and updated values.

Learn more about  Design View  from

https://brainly.com/question/31765061

#SPJ11

________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.

Answers

Data reduction can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or dividing continuous measures into discrete intervals.

Rolling up a data cube involves aggregating data from lower levels to higher levels. This reduces the amount of data that needs to be processed while still providing meaningful information.

Reducing the dimensionality of a dataset involves selecting only the most important or relevant variables and eliminating the rest. This can simplify the analysis and reduce the amount of data that needs to be processed.

Dividing continuous measures into discrete intervals is another way to reduce the amount of data that needs to be processed. For example, instead of analyzing temperature as a continuous variable, it can be divided into discrete ranges like "low," "medium," and "high" to simplify the analysis.

Overall, data reduction techniques can help make large datasets more manageable and easier to analyze, while still providing useful insights and information.

Learn more about data here:

https://brainly.com/question/30028950

#SPJ11

Create three procedures that will convert a value given to Fahrenheit to the following temperatures:

Celsius

Kelvin

Newton

The procedures should be named

C2F

K2F

N2F

The following equations can be used to convert different temperature types to Fahrenheit :

Kelvin - F = (K - 273.15) * 1.8000 + 32

Celsius - F = C * 9/5 + 32

Newton - F = N * 60 / 11 + 32

You should pass the all values to the procedures using the floating point stack. You should return the converted temperature back using the floating point stack. In other words, the converted temperature should be at ST(0)

Once you have the procedures written test them in main by getting a value in Fahrenheit from the keyboard. You might want to store it in a real variable. Convert the value to the three different temperatures and output them.

Your output should look like the following

Enter a value in C
38.1
In Fahrenheit that value is 100.58

Enter a value in K
45.95
In Fahrenheit that value is -376.96

Enter a value in N
23.98
In Fahrenheit that value is 162.8

Press any key to close this window . . .

Do NOT use any global variables. If need be create local variables.

Required:

The temperature conversion procedures must be in a separate asm file called conversion.asm. This means you should have main.asm and conversion.asm. You can use constant values in the data segment of conversion.asm but you MUST pass the temperature to be converted to the procedure through the floating point stack and return the converted value back to main on the floating points stack.

Make sure to do it in assembly language with irvine library and not c++

Answers

Here's an implementation of the three conversion procedures in assembly language using Irvine library:

conversion.asm:

INCLUDE Irvine32.inc

.DATA

   FAHRENHEIT REAL ?

   CELSIUS REAL 9.0, 5.0, 32.0

   KELVIN REAL 273.15, 1.8000, 32.0

   NEWTON REAL 60.0, 11.0, 32.0

.CODE

C2F PROC

   fld     qword ptr [esp+4]        ; load Celsius value from stack

   fmul    celsius                 ; multiply by 9/5

   fadd    kELVIN+8                ; add 32

   fstp    qword ptr [esp+4]       ; store result back on stack

   ret

C2F ENDP

K2F PROC

   fld     qword ptr [esp+4]        ; load Kelvin value from stack

   fsub    kELVIN                  ; subtract 273.15

   fmul    kELVIN+4                ; multiply by 1.8000

   fadd    kELVIN+8                ; add 32

   fstp    qword ptr [esp+4]       ; store result back on stack

   ret

K2F ENDP

N2F PROC

   fld     qword ptr [esp+4]        ; load Newton value from stack

   fmul    newton                  ; multiply by 60/11

   fadd    newton+8                ; add 32

   fstp    qword ptr [esp+4]       ; store result back on stack

   ret

N2F ENDP

main.asm:

INCLUDE Irvine32.inc

.CODE

main PROC

   call    Clrscr

   ; get Fahrenheit value from user

   mov     edx, OFFSET promptF

   call    WriteString

   call    ReadFloat

   ; convert to Celsius

   sub     esp, 8

   fstp    qword ptr [esp]

   call    C2F

   fstp    qword ptr [esp]

   mov     edx, OFFSET resultC

   call    WriteString

   call    WriteFloat

   ; convert to Kelvin

   sub     esp, 8

   fstp    qword ptr [esp]

   call    K2F

   fstp    qword ptr [esp]

   mov     edx, OFFSET resultK

   call    WriteString

   call    WriteFloat

   ; convert to Newton

   sub     esp, 8

   fstp    qword ptr [esp]

   call    N2F

   fstp    qword ptr [esp]

   mov     edx, OFFSET resultN

   call    WriteString

   call    WriteFloat

   exit

main ENDP

.DATA

   promptF BYTE "Enter a value in Fahrenheit: ",0

   resultC BYTE "In Celsius that value is ",0

   resultK BYTE "In Kelvin that value is ",0

   resultN BYTE "In Newton that value is ",0

.CODE

END main

To test the program, assemble and link both files and run the resulting executable. The program will prompt the user for a Fahrenheit temperature, convert it to Celsius, Kelvin, and Newton using the three procedures, and output the results as shown in the example output provided in the question.

Learn more about assembly language here:

https://brainly.com/question/31227537

#SPJ11

A network that runs on the customer premises is a ________. lan wan both lan and wan neither lan nor wan.

Answers

A network that runs on the customer premises can be classified as a LAN (Local Area Network), a WAN (Wide Area Network), or both.

A network that operates on the customer premises refers to the infrastructure and connectivity within a specific location or building. Depending on the scale and reach of the network, it can be categorized as a LAN, WAN, or both.

A LAN is a localized network that covers a limited geographic area, typically within a single building or campus. It connects devices like computers, printers, and servers, allowing them to communicate and share resources. LANs are commonly used in homes, offices, schools, and small businesses.

On the other hand, a WAN spans a broader area, such as multiple buildings, cities, or even countries. It connects LANs across different locations, often utilizing public or private telecommunication networks. WANs enable long-distance communication and facilitate data sharing between geographically dispersed sites.

In some cases, a network on the customer premises may comprise both LAN and WAN components. For example, a company may have a LAN within its headquarters while also connecting remote branches through a WAN. This allows for local communication and resource sharing within each site, as well as inter-site connectivity for data exchange.

Therefore, the answer to whether a network on the customer premises is a LAN, WAN, both, or neither depends on the scope, size, and connectivity requirements of the network in question.

learn more about LAN (Local Area Network) here:

https://brainly.com/question/13267115

#SPJ11

Within which folder would a user of 64-bit windows 8 find 32-bit programs?

Answers

When a user of 64-bit Windows 8 installs a 32-bit program, the program files are typically stored in the "C:\Program Files (x86)" folder. This is because 64-bit operating systems, including Windows 8, are designed to run 32-bit applications through a compatibility layer called WOW64.

This layer allows 32-bit programs to operate normally on a 64-bit system, but the files are stored in a separate directory to avoid conflicts with 64-bit applications.

The "Program Files (x86)" folder is different from the standard "Program Files" folder, which is where system files and 64-bit programs are stored. By separating 32-bit and 64-bit programs into different directories, Windows can keep track of which applications require which resources and allocate memory and processing power more efficiently.

It's worth noting that not all 32-bit programs will be installed in this directory. Some older applications may still use the original "Program Files" folder, or they may have their own installation directory. However, most modern 32-bit programs should be installed in "Program Files (x86)" by default on a 64-bit version of Windows 8.

Learn more about Windows 8 here:

https://brainly.com/question/30463069

#SPJ11

private cloud technicians have configured policies that will shut down and remove virtual machines with no activity for 30 days or more. what are technicians attempting to prevent?

Answers

This is a strategy that ensures that only active virtual machines remain on the cloud server, thereby optimizing resource utilization and eliminating unnecessary wastage of resources that could lead to reduced server performance or capability.

Technicians, by setting up policies, reduce the operational costs and prevent the waste of computational resources. As such, policies that automatically shut down and remove inactive virtual machines are necessary for the management of cloud infrastructures. This is because cloud environments require a considerable investment in terms of hardware and software, and idle virtual machines can consume significant amounts of the available resources.

To know more about  utilization visit:

brainly.com/question/32065153

#SPJ11

A byte-addressable main memory of size 512MB with blocks of 64 bytes in size. The cache memory can hold up to 256 blocks of data in addition to the space for tag and validity bit .For each of the following cache organizations, determine whether each of the following memory address references is a hit or a miss; and whether the replace operation is needed. For Direct- mapped Cache, determine the decimal values of Byte Offset, Tag, and for 2-way set associative, determine the decimal values of Byte Offset, Set#, Tag for O-block, and Tag for 1-block. For fully associative, determine the decimal values of Byte Offset and Tag. Initially all blocks of the cache memory were not used. 2, 215 + 6,7, 214, 210+ 12, 220+1, 4, 216+1, 210+ 3 Index Offset Replace? Hit/Miss Direct-mapped cache Address Tag 2 215 + 6 7 214 210+ 12 220+ 1 4 216+ 1 210+ 3 2-way Set associative cache Address Tag Set Tag of Offset Replace? Hit/Miss Tag of Block 1 Block 0 . 2 215 + 6 7 214 210+ 12 220+ 1 216+ 1 210+ 3 Full associative cache Address Tag Offset Replace? Hit/Miss Cache Block Used 2 215 + 6 7 214 210+ 12 220+ 1 4 216+1 210+ 3

Answers

For Direct-mapped Cache:

Block size = 64 bytes

Total blocks in main memory = (512 MB) / (64 bytes/block) = 8,388,608 blocks

Number of blocks in cache memory = 256

Cache line size = block size = 64 bytes

The cache index is determined by the address bits between byte offset and tag bits. In a direct-mapped cache, there is one cache line per cache index, which means that each block can only be mapped to one specific location in the cache based on its index.

The number of index bits needed is log2(256) = 8 bits.

The number of byte offset bits needed is log2(64) = 6 bits.

The remaining bits are used for the tag.

For the given addresses:

2: Hit, Tag=0, Index=0, Block Offset=2

215+6: Miss, Replace, Tag=3, Index=70, Block Offset=6

7: Hit, Tag=0, Index=7, Block Offset=7

214: Hit, Tag=3, Index=54, Block Offset=6

210+12: Hit, Tag=1, Index=13, Block Offset=12

220+1: Hit, Tag=34, Index=65, Block Offset=1

4: Hit, Tag=0, Index=4, Block Offset=4

216+1: Miss, Replace, Tag=33, Index=68, Block Offset=1

210+3: Hit, Tag=0, Index=13, Block Offset=3

For 2-way Set associative cache:

Block size = 64 bytes

Total blocks in main memory = (512 MB) / (64 bytes/block) = 8,388,608 blocks

Number of blocks in cache memory = 256

Cache line size = block size = 64 bytes

The cache is divided into sets, each containing two cache lines. Each block can be mapped to any one of the two possible locations within the set based on its tag value.

The number of sets needed is 256 / 2 = 128.

The number of index bits needed is log2(128) = 7 bits.

The number of byte offset bits needed is log2(64) = 6 bits.

The remaining bits are used for the tag.

For each set, we need to find the tag of both blocks that could contain the requested memory block. We then check whether either block has a matching tag and if so, it's a hit. If not, we replace the block with the oldest "valid" block (i.e., a block that hasn't been replaced since it was last loaded into the cache).

For the given addresses:

2: Hit, Set=0, Tag0=0, Tag1=0, Block Offset=2

215+6: Miss, Replace, Set=70, Tag0=3, Tag1=5, Block Offset=6, Tag of Block 1=3

7: Hit, Set=3, Tag0=1, Tag1=0, Block Offset=7

214: Hit, Set=54, Tag0=3, Tag1=2, Block Offset=6

210+12: Hit, Set=13, Tag0=0, Tag1=1, Block Offset=12

220+1: Hit, Set=65, Tag0=33, Tag1=34, Block Offset=1

4: Hit, Set=4, Tag0=0, Tag1=0, Block Offset=4

216+1: Miss, Replace, Set=68, Tag0=33, Tag1=35, Block Offset=1, Tag of Block 1=32

210+3: Hit, Set=13, Tag0=0, Tag1=1, Block Offset=3

For fully associative cache:

Block size = 64 bytes

Total blocks in main memory = (512 MB) / (64 bytes/block) = 8,388,608 blocks

Number of blocks in cache memory = 256

Cache line size = block size = 64 bytes

In a fully associative cache, any block can be mapped to any location within the cache. This means that a tag comparison must be performed for every block in the cache.

The number of index bits needed is 0.

The number of byte offset bits needed is log2(64) = 6 bits.

The remaining bits are used for the tag.

For the given addresses:

2: Miss, Replace, Tag=0, Block Offset=2, Cache Block Used=0

215+6: Miss,

Learn more about Direct-mapped Cache from

https://brainly.com/question/31086075

#SPJ11

is this statement true or false? system memory is on a computer motherboard.

Answers

The statement "system memory is on a computer motherboard" is true.System memory, also known as RAM (Random Access Memory), is a type of computer memory that is located on the computer motherboard.

It is a volatile memory that is used by the computer's operating system and applications to store and access data that is frequently used.When a computer is turned on, the operating system is loaded into the system memory. This allows the operating system and applications to access data quickly, which improves overall performance.

The amount of system memory on a computer can vary depending on the computer's specifications and the requirements of the applications being used.

In conclusion, the statement "system memory is on a computer motherboard" is true.

To know more about system memory visit:

https://brainly.com/question/28167719

#SPJ11

Answer:

true

Explanation:

Got scam trojan spyware alert, ran quick scan with windows defender (no threat found) then manually turned ouff pc, Is it virus?

True

False

Answers

False. The absence of threats detected by a quick scan with Windows Defender does not definitively indicate that there is no virus or malware on the PC.

Some malware can remain undetected or may not be detected by a quick scan. It is recommended to run a full system scan with an updated and reputable antivirus software to thoroughly examine the system for any potential threats.

Additionally, receiving a scam trojan spyware alert is a clear indication of a potential security issue. Scammers often use such alerts to deceive users and trick them into downloading malicious software or providing sensitive information. It is important to exercise caution and not solely rely on a single scan result.

To ensure the PC's safety, consider taking further security measures such as updating the operating system and all installed software, enabling a firewall, using strong and unique passwords, and practicing safe browsing habits.

Learn more about Windows  here:

https://brainly.com/question/13502522

#SPJ11

Suppose you are designing a sliding window protocol for a 500-Mbps point-to-point link. The RTT is 20 ms. Assume that each frame carries 2 KB of data. What is the minimum number of bits you need for the sequence number in the following case? Note: please show your justification/calculation steps to get the results. Simply giving the final results without explanation will not get the full credits.
a) RWS=1
b) RWS=SWS
c) Please summarize the key advantages/benefits of the sliding window protocol compared to the stop-and-wait protocol using your own words.

Answers

a) If the receiver window size (RWS) is 1, then only one unacknowledged frame can be in transit at any time. This means that we only need a single bit for the sequence number. The bit can alternate between 0 and 1 for each frame.

Justification:

Since RWS=1, the receiver can only accept one frame at a time. Therefore, the sender can only transmit one frame at a time until it receives an ACK for the previous frame. Hence, if we have two states for sequence numbers such as 0 and 1, we can use them alternatively. So, only one bit is required for the sequence number.

b) If the receiver window size (RWS) is equal to the sender window size (SWS), then the maximum number of unacknowledged frames in transit at any time is SWS. To ensure that each frame in transit has a unique sequence number, we need log2(SWS) bits for the sequence number.

Justification:

If RWS=SWS, then the receiver can accept up to SWS unacknowledged frames at any one time. In this case, the sender can transmit up to SWS frames before pausing to wait for acknowledgments. For every transmitted frame, we need a unique sequence number so that the receiver can identify which frames have been successfully received. Since there can be up to SWS unacknowledged frames in transit at any one time, we need log2(SWS) bits to address all possible sequence numbers.

c) Key advantages/benefits of sliding window protocol compared to stop-and-wait protocol:

The sliding window protocol allows for more efficient use of network resources compared to the stop-and-wait protocol. In the stop-and-wait protocol, the sender has to wait for an acknowledgment before sending the next frame, leading to significant idle periods during data transfer. In contrast, the sliding window protocol allows for multiple frames to be in transit at any one time, increasing the utilization of the network and reducing idle times. Additionally, the sliding window protocol provides flow control by adjusting the window size dynamically based on network conditions, which helps prevent packet loss due to congestion. Finally, the sliding window protocol can provide reliable data transfer by retransmitting lost or corrupted packets, whereas the stop-and-wait protocol does not have mechanisms for recovery if a packet is lost or damaged.

Learn more about   receiver window size (RWS) from

https://brainly.com/question/12971925

#SPJ11

After the following declaration, you can define and initialize a variable birth of this
structure type as follows ____.
struct Date{
int month;
int day;
int year;
};

Answers

To define and initialize a variable birth of the structure type Date, you can use the following syntax:

struct Date birth = {6, 1, 2000};

This creates a variable named birth of the Date structure type and initializes its fields with the values 6 for month, 1 for day, and 2000 for year.

Alternatively, you can also initialize the fields of the birth variable individually, like this:

struct Date birth;

birth.month = 6;

birth.day = 1;

birth.year = 2000;

This creates a variable named birth of the Date structure type and sets the value of its month field to 6, day field to 1, and year field to 2000.

The struct keyword is used to declare a custom data type that consists of multiple variables or data types. In this example, we defined a custom data type called Date that has three integer fields: month, day, and year. Then we created a variable of this structure type named birth and initialized its fields either using a single statement or multiple statements.

Learn more about  type Date here:

https://brainly.com/question/27797696

#SPJ11

"The following describes the role of Distribution Switches and how they are implemented in the design of a local area network on a university or corporate campus? (Select three)
 Connected to high-speed core switches  Linked to each other via high-speed connections  Constitute the second tire in a two-tier network design"

Answers

Options 1, 2, and 3 are the correct answers. The following three statements describe the role of Distribution Switches and how they are implemented in the design of a local area network on a university or corporate campus:

Connected to high-speed core switches: Distribution switches are typically connected to high-speed core switches that provide connectivity between different parts of the network.

Linked to each other via high-speed connections: Distribution switches are also linked to each other via high-speed connections, which allows for redundancy and helps ensure that the network remains operational even if one of the switches fails.

Constitute the second tier in a two-tier network design: In a typical two-tier network design, distribution switches constitute the second tier, with access switches forming the first tier and core switches forming the third tier (if present).

Therefore, options 1, 2, and 3 are the correct answers.

Learn more about local area network here:

https://brainly.com/question/15227700

#SPJ11

the is where directories and files are stored on a disk drive. a. inode block b. superblock c. boot block d. data block

Answers

Data blocks are where directories and files are stored on a disk drive. In a file system, data blocks are allocated to store the actual content of files and the metadata associated with them, such as file names, permissions, and file sizes. These data blocks contain the information that makes up the directories and files stored on the disk drive.

On the other hand, the boot block contains the initial code executed when the computer system starts up, the superblock contains metadata about the file system, and the inode block contains metadata about individual files.

When a file is created, the file system allocates one or more data blocks to store its content. The number of data blocks allocated depends on the size of the file and the block size of the file system. Each data block is typically a fixed size, usually a multiple of the disk sector size. When a file is modified or extended, additional data blocks may be allocated to store the new content.

Directories are also stored using data blocks. A directory is essentially a special type of file that contains a list of file names and their associated metadata. The data blocks allocated to a directory contain this information, making it possible for the file system to locate and access files within the directory.

Learn more about  data blocks are allocated to store from

https://brainly.com/question/31936513

#SPJ11

which network devices rely on access control lists (acl) to permit network connections? [choose all that apply]

Answers

Access Control Lists (ACL) can be defined as a set of regulations used in the controlling of traffic flows in a network. They act as a means of permitting and denying traffic flows from the network and to the network.

The following are network devices that rely on Access Control Lists (ACL) to permit network connections: Router: A Router is a network device that operates at the OSI Network Layer and is used to connect two or more networks.  

The Router is known for its function of filtering traffic as well as restricting and allowing access on different interfaces, hence it relies on Access Control Lists (ACL). Switch: A switch is a network device that connects devices together on a Local Area Network (LAN). It uses the MAC addresses in a packet header to forward data between devices within a network.

To know more about Access Control Lists visit:

https://brainly.com/question/32286031

#SPJ11

All C programmes must have one or
more
A. files.
B. modules.
C. sub-programmes.
D. functions.

Answers

Answer:

Explanation:

The correct answer is D. functions.

All C programs must have one or more functions. Functions are the building blocks of a C program and are used to encapsulate a set of instructions that perform a specific task. A C program typically consists of one or more functions, where the main() function serves as the entry point of the program. Other functions can be defined to perform specific operations and can be called from the main() function or other functions within the program.

While files, modules, and sub-programmes can be components of a C program depending on the program's complexity and organization, the requirement that applies to all C programs is the presence of one or more functions.

An 8-bit shift-right register has 00001101 stored. 0111 needs to be loaded into the register. the contents of the shift register after four clock cycles are:

Answers

After four clock cycles, the contents of the shift register would be 00000111.

A shift-right register is a sequential logic circuit that shifts the contents of the register to the right by one position for each clock cycle. In this scenario, the initial contents of the 8-bit shift-right register are 00001101.

During the first clock cycle, the existing bits in the register are shifted to the right by one position. The least significant bit (LSB) is discarded, and a new bit, 0, is entered at the most significant bit (MSB) position. After the first clock cycle, the register contents become 00000110.

During the second clock cycle, the same shifting operation occurs. The contents of the register become 00000011.

During the third clock cycle, the shifting operation is repeated, resulting in the register contents being 00000001.

Finally, during the fourth clock cycle, the last shift operation takes place, and the register contents become 00000000.

Therefore, after four clock cycles, the shift register would hold the value 00000111.

Learn more about  register here :

https://brainly.com/question/31481906

#SPJ11

After four clock cycles, the contents of the shift register would be 00000111.

A shift-right register is a sequential logic circuit that shifts the contents of the register to the right by one position for each clock cycle. In this scenario, the initial contents of the 8-bit shift-right register are 00001101.

During the first clock cycle, the existing bits in the register are shifted to the right by one position. The least significant bit (LSB) is discarded, and a new bit, 0, is entered at the most significant bit (MSB) position. After the first clock cycle, the register contents become 00000110.

During the second clock cycle, the same shifting operation occurs. The contents of the register become 00000011.

During the third clock cycle, the shifting operation is repeated, resulting in the register contents being 00000001.

Finally, during the fourth clock cycle, the last shift operation takes place, and the register contents become 00000000.

Therefore, after four clock cycles, the shift register would hold the value 00000111.

Learn more about  register here :

https://brainly.com/question/31481906

#SPJ11

OnlyForMen Garments Co. produces three designs of men's shirts- Fancy, Office, and Causal. The material required to produce a Fancy shirt is 2m, an Office shirt is 2.5m, and a Casual shirt is 1.25m. The manpower required to produce a Fancy shirt is 3 hours, an Office shirt is 2 hours, and a Casual shirt is 1 hour.
In the meeting held for planning production quantities for the next month, the production manager informed that a minimum of 3000 hours of manpower will be available, and the purchase manager informed that a maximum of 5000 m of material will be available. The marketing department reminded that a minimum of 500 nos. of Office shirts and a minimum of 900 nos of Causal shirts must be produced to meet prior commitments, and the demand for Fancy shirts will not exceed 1200 shirts and that of Casual shirts will exceed 600 shirts. The marketing manager also informed that the selling prices will remain same in the next month- Rs 1,500 for a Fancy shirt, Rs 1,200 for an Office shirt and Rs 700 for a Casual shirt.
Write a set of linear programming equations to determine the number of Fancy. Office, and Casual shirts to be produced with an aim to maximize revenue. [8]

Answers

Linear programming equations can be used to optimize production when there are constraints on resources. In this problem, we need to maximize the revenue from the sale of men's shirts, subject to constraints on manpower and material availability, as well as prior commitments and demand for each shirt type. Here are the linear programming equations:Let F be the number of Fancy shirts produced.

O be the number of Office shirts produced.C be the number of Casual shirts produced.The objective function is to maximize the revenue, which is given by:Revenue = 1500F + 1200O + 700CThe constraints are:Manpower: 3F + 2O + C ≤ 3000Material: 2F + 2.5O + 1.25C ≤ 5000Office shirt commitment: O ≥ 500Casual shirt commitment: C ≥ 900Fancy shirt demand: F ≤ 1200Casual shirt demand: C > 600Non-negativity: F, O, C ≥ 0These constraints ensure that we do not exceed the available manpower and material, meet the prior commitments, and satisfy the demand for each shirt type.

We also cannot produce a negative number of shirts.Therefore, the complete set of linear programming equations to determine the number of Fancy, Office, and Casual shirts to be produced with an aim to maximize revenue are as follows:Objective function:Maximize Revenue = 1500F + 1200O + 700CSubject to constraints:3F + 2O + C ≤ 30002F + 2.5O + 1.25C ≤ 5000O ≥ 500C ≥ 900F ≤ 1200C > 600F, O, C ≥ 0These equations can be solved using any linear programming software or solver to obtain the optimal production quantities for each shirt type that maximize the revenue.

To know more about Linear visit:

https://brainly.com/question/31510530

#SPJ11

Describe the Microsoft PowerPoint application and its user interface elements related to the status bar.

Answers

Microsoft PowerPoint is a powerful presentation software that allows users to create and deliver effective and engaging presentations. It has an intuitive user interface that includes several elements, including the status bar.



One of the elements related to the status bar is the slide number. The slide number indicates the number of the current slide and is useful for users when navigating through the presentation. The slide number is especially useful when presenting to an audience, as it allows the presenter to easily navigate to a specific slide.

Another element related to the status bar is the view buttons. These buttons allow users to switch between different views, such as Normal, Slide Sorter, and Slide Show. The Normal view is the default view and allows users to create and edit slides. The Slide Sorter view allows users to see all slides in the presentation and reorganize them as needed. The Slide Show view is used to present the slides to an audience.

In conclusion, Microsoft PowerPoint is a user-friendly application that provides an array of features and tools that allow users to create engaging presentations. The status bar is one of the essential elements in the user interface that displays important information about the current slide and application status. Its elements, including slide numbers, view buttons, zoom slider, and language indicator, help users work efficiently and effectively.

To know more about Microsoft PowerPoint visit:

brainly.com/question/30567556

#SPJ11

a data type is defined by (select all answers that apply)group of answer choicesthe operations allowed.the values allowed.the addresses allowed.the locations allowed.

Answers

In computing, a data type refers to a category of values, which determines the type of operations that can be performed on those values.

A data type is defined by the following answers that apply:Group of answer choicesValues allowed.Operations allowed.For example, the integer data type includes values that are whole numbers, such as 0, 1, 2, and so on, and allows operations such as addition, subtraction, multiplication, and division to be performed on those values.The floating-point data type includes values that have decimal points, such as 1.5, 3.14, and so on, and allows the same operations as the integer data type. However, due to the inherent limitations of floating-point representation, additional considerations must be taken into account when performing operations on these values.Data types are an essential component of programming languages, as they provide a way to define variables and constants and ensure that operations are performed correctly. They also allow programmers to write code that is more concise and easier to read, as the data type provides information about the nature of the value stored in the variable or constant.

To know more about data type visit :

https://brainly.com/question/14581918

#SPJ11

Why it is important to share informative and positive messages
using appropriate technology.

Answers

In today’s digital age, technology has made it possible to communicate easily and quickly with individuals around the world.

It’s vital that we communicate effectively and in a positive manner, which can be done by sharing informative and positive messages using appropriate technology. This is important because it has a significant impact on our personal and professional lives.In today’s era, when most of the world is connected to the internet, it has become crucial to spread a positive message and encourage others to do the same. Using technology to spread informative and positive messages can help to raise awareness about important issues, and create positive change in society. The positive messages can inspire and motivate individuals to be their best selves and lead a better life.

Technology has enabled us to share our thoughts, ideas, and opinions with others, regardless of geographical boundaries. We can use various social media platforms to connect with people worldwide. By sharing informative and positive messages, we can make people aware of what is going on in the world, and how they can help to make a difference. Social media has been an effective tool in raising funds for various charitable causes, and it has helped to bring people together from all walks of life.Sharing positive and informative messages using appropriate technology has become increasingly important in today’s world. We need to ensure that our messages are accurate, well-researched, and free from any bias or misinformation. By doing so, we can create a positive impact on our communities and the world around us.

Learn more about technology :

https://brainly.com/question/9171028

#SPJ11

What new geometric data type in teradata's data warehouse captures geospatial features?

Answers

Teradata introduced a new geometric data type called ST_Geometry to capture geospatial features in its data warehouse.

ST_Geometry is an extension to the ISO SQL/MM Part 3 Spatial standard and supports both 2D and 3D spatial data types, including points, lines, polygons, and other complex geometries. It also includes a wide range of spatial functions for analyzing and manipulating geospatial data within the Teradata database.

Teradata introduced a new geometric data type called ST_Geometry to capture geospatial features in its data warehouse. ST_Geometry is a proprietary data type that supports storage, retrieval, and manipulation of geospatial data within Teradata's database platform. It is designed to work seamlessly with Teradata's parallel processing architecture, enabling fast analysis of large volumes of spatial data.

ST_Geometry is based on the standards set by the Open Geospatial Consortium (OGC), which defines a common interface for working with geospatial data across different software platforms. This means that ST_Geometry can be used with other OGC-compliant systems for data interoperability.

Learn more about Teradata from

https://brainly.com/question/30639479

#SPJ11

_____ provide statistics on how many people visit a website as well as what browsers and devices were used and what choices the user made while at a website.

Answers

Website analytics tools provide statistics on website visits, including information about visitor count, browsers and devices used, and user interactions.

Website analytics tools are used to collect and analyze data about website visitors and their behavior. These tools provide valuable insights into various aspects of website performance and user engagement. They gather statistics such as the number of people who visit a website, the browsers and devices they use to access it, and the choices or actions they make while browsing.

Visitor count metrics indicate the popularity and reach of a website, helping to assess its overall performance. Analytics tools can also track user agents, which provide information about the browsers, operating systems, and devices visitors are using. This data helps website owners understand the technology preferences of their audience and optimize their sites accordingly.

Furthermore, website analytics tools can capture user interactions, such as clicks, page views, form submissions, and conversions. This information enables website owners to analyze user behavior, identify patterns, and make data-driven decisions to enhance the user experience and optimize website performance.

In summary, website analytics tools offer comprehensive statistics on website visits, including visitor count, browser and device usage, and user interactions. These insights are crucial for understanding website performance, optimizing user experience, and making informed decisions to improve the effectiveness of a website.

Learn more about  Website here :

https://brainly.com/question/32113821

#SPJ11

Website analytics tools provide statistics on website visitors, including visitor count, browser and device usage, and user choices made while on the website.

Website analytics tools are designed to gather and analyze data related to website traffic and user behavior. They track and record various metrics such as the number of visitors, unique visitors, page views, session duration, and more. These tools also provide insights into the browsers and devices used by visitors, allowing website owners to understand the technology preferences of their audience.

Additionally, website analytics tools offer information on the choices users make while interacting with the website. This includes data on the pages visited, links clicked, conversions, downloads, and other user actions. By capturing these user choices, website owners can gain valuable insights into user preferences, popular content, and areas for improvement.

Overall, website analytics tools serve as a valuable resource for understanding website performance, user engagement, and conversion metrics. The data provided by these tools helps website owners make informed decisions, optimize user experiences, and tailor their content and design to better meet the needs of their audience.

Learn more about Website analytics here:

https://brainly.com/question/32285323

#SPJ11

"When duplicate column names exist in a database and you need to indicate the column to which you are referring, which of the following methods can be used?"

a) Table Aliases
b) Fully Qualified Column Names
c) Primary Key
d) Foreign Key

Answers

When duplicate column names exist in a database and you need to indicate the column to which you are referring, the following methods can be used:

Table Aliases: A table alias is an alternative name given to a table in a query. By using a table alias, you can refer to a specific column in a table without having to use the full table name or schema. For example, if two tables have a column with the same name, you can use a table alias to differentiate between them.

Fully Qualified Column Names: Another way to avoid ambiguity when dealing with duplicate column names is to use fully qualified column names. This means specifying both the table name and the column name when referencing a particular column. For example, "table_name.column_name" can be used to refer to a specific column in a particular table.

Primary key and foreign key constraints are not typically used to disambiguate duplicate column names in a database. Instead, they are used to establish relationships between tables and enforce data integrity within a database.

Learn more about database  here:

https://brainly.com/question/30163202

#SPJ11

Your firm has a 22-bit network part and a 6-bit subnet part. how many hosts can you have per subnet?

Answers

In a network with a 22-bit network part and a 6-bit subnet part, the number of hosts per subnet can be calculated by using the formula 2^n - 2, where "n" represents the number of bits in the host part of the subnet mask.

In this case, the subnet part has 6 bits, so the host part would have 32 - 6 = 26 bits (since an IPv4 address has a total of 32 bits).

Using the formula, we can calculate the number of hosts per subnet as follows:

2^26 - 2 = 67,108,864 - 2 = 67,108,862

Therefore, you can have a total of 67,108,862 hosts per subnet in this network configuration.

Learn more about network  here:

https://brainly.com/question/24279473

#SPJ11

What would you call the number values located on top of the bars in a column chart?

Answers

The number values located on top of the bars in a column chart are commonly known as "data labels."

Data labels serve the purpose of displaying the specific numerical values corresponding to each column or bar in the chart. By providing these labels, the chart becomes more informative and easier to interpret for viewers. Data labels play a crucial role in enhancing the clarity and precision of the chart, enabling individuals to quickly grasp the exact values represented by each column without relying solely on visual estimation.

They are particularly useful when dealing with complex data sets or when it is important to communicate precise information. Data labels help to convey the quantitative information effectively, making the column chart a powerful visual tool for presenting and analyzing data.

Learn more about data labels here:

https://brainly.com/question/29379129

#SPJ11

which pairs of wires change termination order between the 568a and 568b standards?

Answers

The 568A and 568B standards differ in their termination order of two pairs of wires. The pairs of wires that change termination order between the 568A and 568B standards are as follows:Pair 2: In the 568A standard, the second pair consists of the green wire (with a white stripe) and the green wire (without a stripe).

In the 568B standard, the second pair consists of the orange wire (with a white stripe) and the orange wire (without a stripe).Pair 3: In the 568A standard, the third pair consists of the blue wire (with a white stripe) and the blue wire (without a stripe). In the 568B standard, the third pair consists of the green wire (with a white stripe) and the green wire (without a stripe).The 568A and 568B standards are used for wiring Ethernet cables.

The main difference between these standards is the termination order of the wires in the cable. While both standards have the same four pairs of wires, the order in which they are terminated at the connector is different.

To know more about termination visit:

https://brainly.com/question/28527939

#SPJ11

Other Questions
International business can be a powerful political force, in part because:A. a recent Supreme Court ruling in the United States allows corporate contributions to political races.B. many top management team members are willing to accept roles with national security agencies.C. about half the world's 100 largest economic units are firms.D. business is all about achieving political goals.E. two of the above. Topic: Discuss three categories of waste in any society.Create a thesis statement using the topic above. A FLORIDA CITRUS COMPANY HAS 480 ACRES OF LAND FOR GROWING ORANGES AND GRAPE FRUIT. PROFITS PER ACRE ARE $40 FOR OR ANGES AND $30 FOR GRAPE FRUIT. THE TOTAL LABOR HOURS AVAILABLE DURING THE PRODUCTION ARE 800. EACH ACRC FOR ORANGES USES 2 HOURS OF LABOR, AND EACH ACRE FOR GRAPEFRUIT USES I HOUR OF LABOR. IF THE FIXED COSTS ARE $3000, WHAT IS THE MAXIMUM PROFIT? please hurry its timed!!How much time will be needed for $40,000 to grow to $43,737.73 if deposited at 6% compounded quarterly? The integration responsiveness framework contains four basic strategic options: the international strategy, the multidomestic strategy, the global strategy, and the transnational strategy.a. Using concrete examples of companies, discuss the four options by summarising their: Orientation Value Chain Configuration Value Chain Coordination Key Advantage Key Disadvantage (80 marks)b. Argue which of the four options will become less viable due to pressure for global integration and local responsiveness and name some relevant industries that are operating in those strategies. Find the exact values of the sine, cosine, and tangent of the angle. 11 = + 2 12 4 3 11 sin (1177) 12 11 COS (1) - = 12 tan(117) - = How has Nike, Inc performed over the past year in terms ofinvestment, market share, and profitability? Enoch Chemists Ghana Ltd is a company based in Ghana that imports drugs and other pharmaceutical products from the UK for sale in Ghana. It is May 2018 and Enoch Chemists has just received a shipment of goods worth 1 million from its UK supplier, to be paid in exactly three (6) months time. Payment will be made in UK pounds.Additional information is as follows: The current spot exchange rate is GH 6.20/. Interest rate on the pound is 2% per annum Interest rate on the cedi is 18% per annum Available six months forward rate quote from an exchange rate dealer: GH 6.35/ - GH6.50/. Enoch Chemists has access to at the money OTC options on UK pounds, expiring six (6)months from now. The premiums for the options are as follows:o Call a premium of GH 0.10/.o Put a premium of GH 0.05/. Mexico was famous - or infamous - for many years in having two...Mexico was famous - or infamous - for many years in having two things every six years (cada seis aos in Spanish): a presidential election and a currency devaluation. This was the case in 1976, 1982, 1988, and in 1994. In its last devaluation on December 20, 1994, the value of the Mexican peso (Ps) was officially changed from Ps3.30/$ to Ps5.50/$. What was the percentage devaluation? AssumptionsRateValuesSpot rate, December 20, 1994 (Ps/$)S1 3.30 Spot rate, December 21, 1994 (Ps/$)S2 5.50 Calculation percentage of devaluation:Percentage change in the peso versus the dollar-40.00%Percent change = ( S1 - S2 ) ( S2 )The peso since that time, and we have now weathered two additional six-year dates (2000 and 2006), has been remarkable stable against all major currencies, including the dollar. Can water stay liquid below zero degrees Celsius?How bad of an alcoholic do you have to be to have your brain affected?How does dissolving a salt molecule in water make its atoms ionize? Which of the following questions assesses internal validity when evaluating causal claims?a. Are the groups large enough to find a significant difference?b. Does the study establish temporal precedence?c. To what populations can we generalize this claim?d. How well did the experiments manipulate the variables? Find the quadratic function that y=f(x) that has the vertex (0, 0) and whose graph passes through the point (3, -18). Write the function in standard form. y= (Use integers or fractions for any numbers in the expression.) Let X and X be two independent and identically distributed discrete random variables with the following probability mass function: fx(k)= 3+1, k = 0, 1, 2,... = Question 3 (20 marks) Consider two utility functions u(x) and (2) where x is the amount of money consumed by the agent. a) Explain formally what it means that an agent with utility function u is more risk averse than an agent with utility function . b) Show that an agent with utility function u(x) = log x is more risk averse than an agent with utility function (2) = V2. SAMPLE TESTPART 1. VOCABULARY AND GRAMMAR (Questions 1 10) Choose the best answer A, B, C or D to complete the following sentences.1. How often do you ..public transport to work?A. do B. take C. go D. travel [Do at home, this may be reviewed in the week the 12 tutorial] [interest rate/coupon swap] Now suppose the data from the previous questions change to Borrower Fixed rate Floating rate AAA 9.00% p.a. LIBOR BBB 9.70% p.a. LIBOR +0.50% p.a.1. Under the assumption of no intermediation/no intermediation fees and an equal split of savings (if any), determine if a swap can produce cost savings for both parties and if that is true, redesign the swap with these new data. 2. Under the assumption that the swap is intermediated by an investment bank that requests a 0.10% fee to each of the two parties, determine if a swap can produce cost savings and, if that is true, redesign the swap with these new data. Which of the following methods of making scientific measurements of the ocean was NOT available in the early nineteenth century? Natsam Corporation has $263 million of excess cash. The firm has no debt and 527 million shares outstanding with a current market price of $11 per share. Natsam's board has decided to pay out this cash as a one-time dividend. a. What is the ex-dividend price of a share in a perfect capital market? b. If the board instead decided to use the cash to do a one-time share repurchase, in a perfect capital market, what is the price of the shares once the repurchase is complete? c. In a perfect capital market, which policy in part (a) or (b) makes investors in the firm better off? a. What is the ex-dividend price of a share in a perfect capital market? The ex-dividend price is $ ___________on a per share basis. (Round to the nearest cent.) b. If the board instead decided to use the cash to do a one-time share repurchase, in a perfect capital market, what is the price of the shares once the repurchase is complete? The price of the shares once the repurchase is complete is $ ____per share. (Round to the nearest cent.) c. In a perfect capital market, which policy in part (a) or (b) makes investors in the firm better off? (Select the best choice below.) A. Investors are better off with policy in part (a). OB. Investors are better off with policy in part (b). OC. Investors are indifferent to either policy. Develop a sample survey you believe could be used to obtaincritical information on which financial decisions could bemade. Plumb Line Surveyors provides survey work for construction projects. The office staff use office supplies while surveying crews use field supplies. Purchases on completed by plumb line surveyors during May 2014 are as following. Purchased filed supplies on account from Wendell Co, $3.240. Purchased office supplies on account from Lassiter Co, $340 Purchased filed supplies on account from Tri Cities Supplies $ 4.500. Purchased filed supplies on account from Wendell Co, $3.670. Purchased office supplies on account from J-Mart Co, $500. Purchased office equipment on account from Accuse-Vision Supply Co, $8.150 Purchased filed supplies on account from Tri Cities Supplies $2.450. Purchased office supplies on account from Jar Co $265. M Purchased filed supplies on account from Tri Cities Supplies $3.040. Insert the following balances in the general ledger as of May 1: Insert the following balances in the accounts payable subsidiary ledger as of May 1: Journalize the transactions for May, using a purchases journal (p. 50) similar to the one illustrated in this chapter. Prepare the purchases journal with columns for Accounts Payable. Field Supplies, Office Supplies, and Other Accounts. Post to the creditor accounts in the accounts payable subsidiary ledger immediately after each entry. Post the purchases journal to the accounts in the general ledger. What is the son of the creditor balances in the subsidiary ledger at May 31? What Is the balance of the accounts payable controlling account at May 51? What type of e-commerce application would be used to plan and coordinate transactions with suppliers?