which instruction completes the program to compute a triangle's area? the equation for a triangle's area is 1/2 * base * height.

Answers

Answer 1

Set output to x. The program  instruction to calculate a triangle's area is Multiply x by 1/2.

Is it a list of steps the computer must take to process it?

A program is a set of instructions that the computer can use to process input and create information. A programming language, such as BASIC, C, or Java, is used to create the instructions.

What is an example-based instruction?

instructions A technical procedure's overview or manual, in plural: a command that demands compliance is called a "order." typically used in the plural. had a rule not to let in strangers: a code instructing a machine to carry out a specific task.

To know more about program  visit:-

https://brainly.com/question/29133726

#SPJ4

Question:

Which instruction completes the program to compute a triangle's area?

base = Get next input

height = Get next input

Assign x with base * height

Put x to output

A. Multiply x by 2.

B. Add 2 to x

C. Multiply x by 1/2.


Related Questions

You will create a simple client server program with a language of your choice (python is highly recommended) where a server is running and a client connects, sends a ping message, the server responds with a pong message or drops the packet.
You can have this program run on your machine or on the cse machines. Note that you will run two instances of your shell / IDE / whatever and they will communicate locally (though over the INET domain) - you can connect to your localhost (127.0.0.1 or make use of the gethostname() function in python).
Use UDP (SOCK_DGRAM) sockets for this assignment (parameter passed to socket()).

useful links:

https://docs.python.org/3/library/socket.html

https://docs.python.org/3/library/socket.html#example
details:

client.py

create a UDP socket (hostname and port are command line arguments or hard coded).
send 10 (probably in a loop) 'PING' message (hint: messages are bytes objects (Links to an external site.))
wait for the response back from the server for each with a timeout (see settimeout() (Links to an external site.))
if the server times out report that to the console, otherwise report the 'PONG' message recieved
server.py

create a UDP socket and bind it to the hostname of your machine and the same port as in the client (again either command line or hardcoded).
infinitely wait for a message from the client.
when recieve a 'PING' respond back with a 'PONG' 70% of the time and artificially "drop" the packet 30% of the time (just don't send anything back).
Server should report each ping message and each dropped packet to the console (just print it)
hint: for the dropping of packets, use random number generation (Links to an external site.)
You will submit 2 source code files (client.py and server.py), a README file that explains how to run your program as well as screenshots of your program running (they can be running on your own machine or the CSE machine). NOTE: your screenshot should include your name / EUID somewhere (you can print it at the beginning of your program or change the command prompt to your name, etc)

Example client output (Tautou is the hostname of my machine, 8008 is a random port i like to use - note you can hard code your hostname and port if you prefer):

λ python client.py Tautou 8008
1 : sent PING... received b'PONG'
2 : sent PING... Timed Out
3 : sent PING... Timed Out
4 : sent PING... received b'PONG'
5 : sent PING... received b'PONG'
6 : sent PING... Timed Out
7 : sent PING... received b'PONG'
8 : sent PING... received b'PONG'
9 : sent PING... received b'PONG'
10 : sent PING... received b'PONG'

example server output:

λ python server.py 8008
[server] : ready to accept data...
[client] : PING
[server] : packet dropped
[server] : packet dropped
[client] : PING
[client] : PING
[server] : packet dropped
[client] : PING
[client] : PING
[client] : PING
[client] : PING

Answers

python server.py 8000.

I can definitely help you with that! Here's a sample code in Python for a simple client-server program using UDP sockets:

client.py

import socket

import sys

SERVER_HOST = sys.argv[1]

SERVER_PORT = int(sys.argv[2])

PING_MESSAGE = b'PING'

# Create a UDP socket

client_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

for i in range(1, 11):

   # Send a ping message to the server

   print(f'{i} : sent PING...')

   client_socket.sendto(PING_MESSAGE, (SERVER_HOST, SERVER_PORT))

   try:

       # Wait for a pong message from the server

       client_socket.settimeout(3.0)

       response, server_address = client_socket.recvfrom(1024)

       # If a pong message is received, print it

       if response == b'PONG':

           print(f'{i} : received {response}')

   except socket.timeout:

       # If the server times out, report it to the console

       print(f'{i} : Timed Out')

# Close the connection

client_socket.close()

server.py

import socket

import sys

import random

SERVER_PORT = int(sys.argv[1])

PONG_MESSAGE = b'PONG'

# Create a UDP socket and bind it to the server address

server_socket = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

server_address = ('', SERVER_PORT)

server_socket.bind(server_address)

print('[server]: ready to accept data...')

while True:

   # Wait for a ping message from the client

   data, client_address = server_socket.recvfrom(1024)

   if data == b'PING':

       # Drop packet 30% of the time

       drop_packet = random.random() < 0.3

       

       # If packet is dropped, do not send a pong message

       if drop_packet:

           print('[server]: packet dropped')

       else:

           # Send a pong message to the client

           server_socket.sendto(PONG_MESSAGE, client_address)

           print('[client]: PING')

   

# Close the connection

server_socket.close()

To run the program, you can open two terminal windows and run the server.py file on one window and the client.py file on another window. In the client window, you will need to provide the hostname and port number for the server as command-line arguments. For example, to connect to a server running on localhost with port 8000:

python client.py localhost 8000

In the server window, you only need to provide the port number as a command-line argument:

python server.py 8000

Learn more about  sample code in Python from

https://brainly.com/question/17156637

#SPJ11

What can always be seen in the Styles gallery?

O built-in styles with samples

O the original formatting of the document

O changes that have been made to the document's text

O examples of the last five formats used

Please help ASAP

Answers

Examples of the last five formats used

Answer:

examples of the last five formats used

please mark me as brainliest i dont have 1 yet :/

Write a method that takes a Rectangle as a parameter, and changes the width so it becomes a square (i.e. the width is set to the value of the length) (java)

Answers

Answer:

Explanation:

The following code is written in Java, it is a function/method that takes in the length and width of the Rectangle as parameters and then overwrites the width to match the length. Then it prints both the length and width.

   public static void rectangleToSquare(int width, int length) {

       width = length;

       System.out.println("Width: " + width);

       System.out.println("Length: " + length);

       

   }

The program takes the dimension of rectangle and transforms the width to the value of the length in other to be use to calculate the value of square. The program goes thus :

def change_width(length, width):

#initialize a function which takes two parameters

width = length

#assign the value of length to width

return length * width

#returns the area of square

print(change_width(6,2))

A sample run of the program is attached.

Learn more : https://brainly.com/question/15180104

Write a method that takes a Rectangle as a parameter, and changes the width so it becomes a square (i.e.

6.3.6: Create your own Encoding on codehs be confusing.

6.3.6: Create your own Encoding on codehs be confusing.
6.3.6: Create your own Encoding on codehs be confusing.

Answers

A general example of an encoding scheme that contains A-Z and space is given below.

How to illustrate the information

In this example, we can assign the following binary codes to each character:

A: 00

B: 01

C: 10

...

Z: 10101

Space: 10110

Using this encoding scheme, the phrase "HELLO WORLD" would be represented as:

00010101100101100110000010101011001010000001101

As you can see, this encoding scheme requires a varying number of bits to represent each character, with shorter codes assigned to more commonly used letters and longer codes assigned to less commonly used letters. This can help to minimize the total number of bits required to encode a message.

Learn more about encoding on

https://brainly.com/question/3926211

#SPJ1

how have the computers contributed in the banking ?

Answers

Answer:

manage financial transactions

Explanation:

through the use of special cash dispensing machines called ATMs used for cash deposit & withdrawal services

Since UDP is a connectionless protocol, timeout periods between segment receipt and ACK are not required.
True
False

Answers

False. Timeout periods between segment receipt and ACK are required in UDP to ensure reliable data transmission..

How are timeout periods utilized in UDP?

Timeout periods between segment receipt and ACK are still required even in UDP, despite it being a connectionless protocol. In UDP, there is no inherent mechanism for guaranteeing reliable delivery of data or ensuring the order of packets.

The lack of a formal connection and acknowledgment process means that UDP does not have built-in mechanisms for detecting lost or delayed packets.

To address this, timeout periods are commonly employed in UDP-based applications. After sending a packet, the sender waits for a certain period of time for an acknowledgment (ACK) from the receiver.

If the acknowledgment is not received within the timeout period, it is assumed that the packet was lost or delayed, and appropriate measures can be taken, such as retransmitting the packet.

Timeout periods in UDP allow for error detection and recovery, improving the reliability of data transmission. While UDP itself does not enforce these timeout mechanisms, they are implemented at the application or transport layer to ensure reliable communication when needed.

Lern more about Timeout

brainly.com/question/31711257

#SPJ11

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!


1.Explain five measures that protect users in the computer laboratory (10mks)

Answers

This chapter covers safe lab techniques, fundamental workplace safety precautions, proper instrument usage, and computer disposal.

What security precautions are in place in the computer lab?

When you are through using the device, turn it off. Never connect external devices without first checking them for malware. Since there are numerous devices and they might rapidly overheat in a lab, it is important to maintain a cool temperature in the space.

What safety measures in laboratories are most crucial?

Put on safety lab gear: As soon as you enter the lab, make sure you are wearing PPE. Before entering the lab, put on a lab coat with long sleeves, closed-toe shoes, and safety goggles. Keep your hair long if you have long hair.

To know more about computer laboratory visit:-

https://brainly.com/question/14751939

SPJ1

a developer manages an application that interacts with amazon rds. after observing slow performance with read queries, the developer implements amazon elasticache to update the cache immediately following the primary database update. what will be the result of this approach to caching?

Answers

Caching will slow performance of the read queries because the cache is updated when the cache cannot find the requested data.

What is RDS?

A distributed relational database service provided by Amazon Web Services is known as Amazon Relational Database Service (or Amazon RDS) (AWS).  It is a "cloud-based" web service created to make it easier to set up, manage, and scale a relational database for use in applications. Automatic management is used for administration tasks including patching the database software, backing up databases, and enabling point-in-time recovery. A single API call to the AWS control plane on demand can scale storage and compute resources. As part of the managed service, AWS does not provide an SSH connection to the underlying virtual machine. The AWS Management Console or the Amazon Cloud Watch API both provide performance data for Amazon RDS.

To know more about RDS visit:

https://brainly.com/question/28209824?referrer=searchResults

#SPJ1

A USB flash drive uses solid
technology to store data and programs.

Answers

Answer:

This is true.

Becky is preparing a document for her environmental studies project. She wants to check her document for spelling and grammar errors. Which function key command should she use?

A.

F1

B.

F2

C.

F5

D.

F7

E.

F12

Becky is preparing a document for her environmental studies project. She wants to check her document

Answers

According to what I know, I think it is F7.

what is the minimum disk space to install the 64-bit version of windows 7?

Answers

The minimum disk space required to install the 64-bit version of Windows 7 depends on the edition you are installing. For Windows 7 Home Premium, Professional, and Ultimate editions, the minimum disk space required is 20GB.

However, it is important to note that this minimum requirement may not provide enough space for updates, temporary files, and other software installations. Therefore, it is recommended to have at least 50GB of free disk space to ensure a smooth installation process and optimal performance. It is also important to regularly maintain your disk space by deleting unnecessary files and using disk cleanup tools to ensure that your computer runs smoothly and efficiently.

To know more about Disk space visit:

https://brainly.com/question/29526724

#SPJ11

Please help!!
What does a for loop look for in the sequence of
data? Check all that apply
the first variable
the second variable
the third variable
the last variable

Answers

Answer:

The first and last variable

Explanation:

Answer:

A) the first variable and D) the last variable

Explanation:

because i said so, you're welcome !

Which of the following is not a thing needed to make a network?
a)Network software b)Network devices c)Motherboard d)Cables

Answers

Answer:

d) cables is your answer

Answer:

Motherboard is not a thing needed to make network

how to find the volume of cube in computer in QBASIC program ​

Answers

Answer:

QBasic Programming

REM PROGRAM TO DISPLAY VOLUME OF CUBE. CLS. INPUT “ENTER LENGTH”; L. ...

USING SUB PROCEDURE.

DECLARE SUB VOLUME(L) CLS. INPUT “ENTER LENGTH”; L. ...

SUB VOLUME (L) V = L ^ 3. PRINT “VOLUME OF CUBE ”; V. ...

USING FUNCTION PROCEDURE.

DECLARE FUNCTION VOLUME (L) CLS. ...

FUNCTION VOLUME (L) VOLUME = L ^ 3.

Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.

Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs

Answers

Answer:

Good, clean designs depicts the logic link of the company and easy to remember as compared to the bad, cluttered designs

Explanation:

The major difference between the good, clean designs and the bad, cluttered designs is that the good, clean designs depicts the logic link of the company and it is easy to remember such symbols but in case of bad, cluttered designs it is not that easy to find the logic link and also it is difficult to remember the logo.

examine the multicast and broadcast packets that you captured, looking at the details of the source and destination addresses. most likely one has the broadcast ethernet address, as broadcast frames tend to be more common than multicast frames. look at a broadcast frame to see what address is used for broadcast by ethernet. expand the ethernet address fields of either broadcast or multicast frames to see which bit is set to distinguish broadcast/multicast or group traffic from unicast traffic. answer the following questions: 1. what is the broadcast ethernet address, written in standard form as wireshark displays it? 2. which bit of the ethernet address is used to determine whether it is unicast or mul-ticast/broadcast?

Answers

In local area networks, metropolitan area networks, and wide area networks, Ethernet is a family of wired computer networking protocols. It was initially standardized as IEEE 802.3 in 1983 after being commercially released in 1980.

What purposes does Ethernet serve?Ethernet is still a widely used type of network connection and is used to connect devices in a network. Ethernet is utilized for local networks because of its high speed, security, and dependability in places where it is specifically needed, including company offices, campuses of educational institutions, and hospitals.In general, an Ethernet connection is quicker than a WiFi connection and offers more security and dependability.Here's how to get a faster connection while connecting to the internet without Wi-Fi. You can physically connect your computer to the internet using an Ethernet cable. Wi-Fi connections are rarely quicker than Ethernet connections, and Ethernet connections are typically more reliable.Users from all around the world are linked together by the internet in a single, global network. The global infrastructure allows devices connected to the internet to communicate with one another. Local area networks (LANs), a much smaller group of networked devices, are connected by Ethernet.

To learn more about Ethernet refer to:

https://brainly.com/question/1637942

#SPJ4

According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.

educational software
financial planning software
computer hardware
games
installing networks

Answers

Answer:

educational software

financial planning software

and games

Explanation:

The kind of projects that would Computer Programmers be most likely to work on are educational software, financial planning software, and games The correct options are a, b, and d.

What are computer programmers?

A computer programmer designs computer codes for websites, while an Information Support Specialist oversees the design and maintenance of websites. Computer programming has a close relationship with mathematics.

Code and scripts are written by computer programmers, modified, and tested to ensure that software and applications work as intended. They convert the blueprints made by engineers and software developers into computer-readable instructions.

Therefore, the correct option is

a. educational software

b. financial planning software

d. games

To learn more about computer programmers, refer to the link:

https://brainly.com/question/30307771

#SPJ6

______ consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them.

Answers

Answer: Managing Memory

Explanation:

Hope this helps!

What are the three most important tasks accomplished at a party’s national convention are nominating the party’s?

Answers

The  three most important tasks are:

The selection and naming the party's presidential and vice-presidential candidatesThe act of promoting party unityThe  adopting of the party's platform.

What is the task of a national convention?

The formal aim of such a convention is to take the party's nominee for any popular election such as the President and also to adopt a idea of party principles and goals.

Hence, the  three most important tasks are:

The selection and naming the party's presidential and vice-presidential candidatesThe act of promoting party unityThe  adopting of the party's platform.

Learn more about  national convention from

https://brainly.com/question/2199497

#SPJ1

When and how should internet service providers be allowed to treat some kinds of internet traffic different from others?

Answers

Answer:

When the content of the internet traffic is deemed unlawful the internet service provider can discriminate,  block or slow down the internet traffic

Explanation:

The internet service providers have the right to block website that promote terrorists views or are used for recruitment by terrorists as well as other materials that are objectionable

The internet service providers can also discriminate against materials that are obscene, lascivious, indicate harassment, contains severe or exceptionally high violence based on preparation of materials to be published through them on the internet, according to a 1996 federal law

Internet service providers can also provide as zero rating sites that are exempted from requiring data allowance so that they can then be viewed for free by the client.

Write this name in your handwriting on a piece of paper best handwriting gets branilist

Write this name in your handwriting on a piece of paper best handwriting gets branilist

Answers

Cursive and continuous cursive are often considered to be the best handwriting styles for students to learn.

Which handwriting style is best?

The two handwriting techniques that are generally regarded as the finest for students to acquire are cursive and continuous cursive.

Narrow right margins, a clear right slant, and lengthy, tall T-bars are all common writing characteristics. Other characteristics of the writers of the writing were also revealed by other handwriting characteristics.

Even writing with a pen and paper requires the use of muscle memory. Writing nicely will be more difficult for you if you don't regularly practise. Your handwriting will get much better if you spend 10 to 15 minutes each day writing neatly and slowly.

There are three of them: print, pre-cursive, and cursive.

1. Cursive

2. Pre-cursive

3. Print

To learn more about handwriting refer to:

https://brainly.com/question/1643608

#SPJ1

Create a C++ program that will accept five (5) numbers using the cin function and display the numbers on different lines with a comma after each number.

Answers

Answer:

code:

#include<iostream>

using namespace std;

int main()

{

//declare an array of size 5

int array[5];

cout<<"Enter the numbers"<<endl;

//applying the for loop

for(int i=0;i<5;i++)

{

   //taking the input from user

   cin>>array[i];

}

cout<<"The Entered numbers are : "<<endl;

for(int i=0;i<5;i++)

{

   //displaying the output

   cout<<array[i]<<", "<<endl;

}

return 0;

}

Explanation:

First of all you will declare an array of size 5

then you are going to apply the for loop logic where you will take input from the user

again you will apply the for loop to print the entered numbers on screen

#include <iostream>

int store[5];

int main() {

   

   for(int i=0;i<5;i++) {

       std::cin>>store[i];

   }

   

   for(auto& p:store) {

       std::cout << p << ",\n";

   }

   return 0;

}

explain the difference between a pretest loop and a posttest loop. give an example of when we might use one type of loop instead of the other.

Answers

A pretest loop is a type of loop where the condition is checked before the loop starts executing. On the other hand, a posttest loop is a type of loop where the condition is checked after the loop has executed at least once.

A pretest loop is a type of loop where the condition is checked before the loop starts executing. This means that if the condition is not met, the loop will not execute at all. An example of a pretest loop is a while loop.

On the other hand, a posttest loop is a type of loop where the condition is checked after the loop has executed at least once. This means that the loop will always execute at least once before checking the condition. An example of a posttest loop is a do-while loop.

When deciding which type of loop to use, it is important to consider the specific requirements of the program. If you need to execute the loop at least once before checking the condition, a posttest loop may be more appropriate. If you only want to execute the loop if the condition is met, a pretest loop may be a better choice. For example, if you are asking a user to enter a password and want to ensure that the password is at least a certain length, you would want to use a pretest loop such as a while loop to repeatedly ask the user to enter a valid password until the condition is met.


The main difference between a pretest loop and a posttest loop is the point at which the loop's condition is evaluated.

In a pretest loop, the condition is checked before executing the loop body. If the condition is false initially, the loop body will not be executed at all. An example of a pretest loop is the "while" loop in many programming languages. Here's an example:

```
while (count < 10) {
   // Do something
   count++;
}
```

In this example, if `count` is initially greater than or equal to 10, the loop body will not be executed.

On the other hand, in a posttest loop, the condition is checked after the loop body has been executed at least once. This means the loop body will always run at least one time, regardless of the initial condition. An example of a posttest loop is the "do-while" loop. Here's an example:

```
do {
   // Do something
   count++;
} while (count < 10);
```

In this example, the loop body will execute at least once, even if `count` is initially greater than or equal to 10.

You might choose a pretest loop when you want to ensure the loop body is only executed if a specific condition is met from the beginning. In contrast, you might choose a posttest loop when you want the loop body to always execute at least once, regardless of the initial condition.

Learn more about pretest loop at: brainly.com/question/28146910

#SPJ11

Read the question very carefully. In the following, if the check box is selected, the value is 1, if it is not selected the value is 0. Now, complete the remaining part of the Truth table for the expression A' + B by clicking on the check boxes.

Read the question very carefully. In the following, if the check box is selected, the value is 1, if

Answers

Answer:

See attachment for truth table

Explanation:

Required

Complete the table

As a general rule;

A' means Not A and the value will be the opposite of A;

If A = 1, then A' = 0

Also:

A' + B will be 0 if A' and B are 0, otherwise A' + B will be 1

Using the above analysis, we have:

\(A = 0; B = 0\)

\(A' = 1\)

\(A' + B = 1 + 0 = 1\)

\(A = 0; B = 1\)

\(A' = 1\)

\(A' + B = 1 + 1 = 1\)

\(A = 1; B = 0\)

\(A' = 0\)

\(A' + B = 0 + 0 = 0\)

\(A = 1; B = 1\)

\(A' = 0\)

\(A' + B = 1 + 1 = 1\)

See attachment for truth table

According to the question, only outputs with "1" will be checked.

Read the question very carefully. In the following, if the check box is selected, the value is 1, if

write the turtle graphics statements to draw a square that is 100 pixels wide on each side and filled with the color blue.

Answers

It draws the blue square at coordinated(100,0) 50 pixel wide, and in the lower-left corner. You should know that the lower-left corner of the square should be at position x, y. Hence, The answer.

And this is true for any shape that you draw using turtle graphics in Python.

You should also know the function format of Python, and how it is defined, declared  and called. The penup command tells the turtle to not show what is drawn, or hide the link. The pen down is just opposite to this.

The count is an above with range to create a for the look .Forward moves the cursor according to width mentioned.

See how to pen down is called before beginning fill. And how we move to x, y using go to, and how the penup is used to hide ink while  fill color is in effect, and we move to x, y.

To learn more about Turtle Graphics, Click here

brainly.com/question/20718793

#SPJ4

Devin is arranging a scavenger hunt for five of his friends, but some of them are much better at solving clues than others, so he wants to give some of them a head start. Everyone knows that Emil is the slowest, but with his other friends there are a few things to think about: Before John can start, Taylor must get a head start Before Nkosi can start, Emil must get a head start Before Tanya can start, Nkosi and John must both have a head start Before Taylor can start, Nkosi and Emil must both have a head start In what order should Devin’s friends start the scavenger hunt? Explain how you went about figuring out the order

Answers

To figure out the order in which Devin’s friends should start the scavenger hunt, we need to work backwards from a known starting point.

We know that Taylor must get a head start before John can start, so Taylor should be the first to start. Next, we know that Nkosi must get a head start before Tanya can start, so Nkosi should be the second to start.

After that, we know that Emil must get a head start before Nkosi can start, so Emil should be the third to start. Finally, we know that both Nkosi and John must get a head start before Tanya can start, so John should be the fourth to start and Tanya should be the last to start. Thus, the order in which Devin’s friends should start the scavenger hunt is Taylor, Nkosi, Emil, John, and Tanya.

Learn more about arranging

https://brainly.com/question/1460072

#SPJ4

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. On average, 7 days elapse between the time the checks are deposited in the local bank and the time the funds become collected funds (and available for disbursements) at the concentration bank. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. Depository transfer checks cost $0.50 (including postage), and wire transfers.cost $19. Assume there are 250 working days per year. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. Assume that there are 365 days per year. Determine the net (pretax) benefit to Peterson of using wire transfers if annual sales are $61m. Round your answer to the nearest dollar. Enter your answer in whole dollars. For example, an answer of $1.20 million should be entered as 1,200,000 not 1.20. Don't forget the negative sign if it is negative.
Hint: There are six centers so multiply by the wire transfer cost by six.
Hint: Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer.

Answers

Peterson Electronics should use wire transfers because it reduces elapsed time by 5 days.

Peterson Electronics uses a decentralized collection system whereby customers mail their payments to one of six regional collection centers. The checks are deposited each working day in the collection center's local bank, and a depository transfer check for the amount of the deposit is mailed to the firm's concentration bank in New York. Peterson is considering using wire transfers instead of depository transfer checks in moving funds from the six collection centers to its concentration bank. Wire transfers would reduce the elapsed time by 5 days. The net pretax benefit to Peterson of using wire transfers is $154, 000 per annum. Wire transfers are expensive compared to depository transfer checks which cost $0.50 (including postage). But it will reduce the elapsed time by five days. Therefore, it is more efficient. Peterson can earn 8 percent before taxes on any funds that are released through more efficient collection techniques. There are 250 working days in a year. Therefore, there will be 250/365 days of collection.  The annual sales of Peterson are $61 million. Sales occur 365 days out of the year but someone has to be in the office to make a wire transfer. A wire transfer cost $19. There are six centers so the wire transfer cost is multiplied by six.

Therefore, the net pretax benefit to Peterson of using wire transfers is $154, 000 per annum.

To know more about elapsed time visit:

brainly.com/question/16277579

#SPJ11

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

In the flowchart, the diamond symbol indicates?


A. the program halts

B. some condition that must be tested

C. calculations are performed

D. the program starts

Answers

In a flowchart, the diamond symbol is used to indicate a decision point or b) some condition that must be tested.

A decision point is a crucial part of the flowchart, as it helps determine the next course of action based on whether the condition is met or not. This often involves a comparison or evaluation of variables or values. Based on the outcome, the flowchart branches into different paths, allowing for different actions or calculations to be performed.

In contrast, other flowchart symbols have different meanings: a rectangle represents a process or calculation, an oval indicates the start or end of the program, and a parallelogram signifies input or output. Understanding these symbols is essential for effectively analyzing and designing algorithms, programs, or processes.

Therefore, the correct answer is B. some condition that must be tested

Learn more about flowchart here: https://brainly.com/question/30479146

#SPJ11

Other Questions
the doctor writes an order a liquid oral medication. the order says to administer 20 grams by mouth twice a day. pharmacy dispenses you with 10 gram/15 ml. how many ml will you administer per dose? A 30 in wide single edge notched plate is subjected to a far field uniform stress of 25 Ksi. Determine the critical crack length if the plate material has Kic= 100 ksi(in)^(1/2), and yield strength stress of 40 ksi. When Walter says: "That money was made out of my father's flesh", he means...Select one:a. his father worked hard and saved it.b. his father sold out his dreams to earn it.c. it was all his father had to show for his life, a life insurance check received due to his death.d. All of the abovee. None of the above IV. Answer the following:- 1. The present age of Reema is x years. (a) What will be her age after 5 years ? (b)How old was she 3 years back? (c)Her father's age is 7 years more than 3 times her age. What is her father's age? (d)Her grandfather is twice the age of her father. What is the age of her grandfather? (e) Her grandmother is 5 years younger than her grandfather. What is the age of her grandmother? If the probability of a chance event is 0.22, it is less likelyto happen than which of the following probabilities ofanother chance event?00.360.20.18 Fill in the diagram to show how two objects with different speeds move in the sameamount of time.More speed _________________________ in the same amount of time.Less speed _________________________ in the same amount of time. Can you provide the solution for this task? 1.59 If e(p, u) = z(p1, p2)pm3 u, where m > 0, what restrictions must z(p1, p2) satisfy for this to be a legitimate expenditure function? Karl does laundry every 12 days and sweeps the floor every 14 days. If Karl does both chores today, how many days from now will he do both chores again? In hamsters, black fur and white fur are codominant. Heterozygous individuals are spotted. What is the expected phenotypic ratio of offspring from two spotted hamsters Which of the following is considered a risk of driving?A. Spending too much on gasB. Getting lostC. Causing damage which of the following statements is true of learning effects? group of answer choices there are substantial differences in the rates at which organizations learn. the cost of producing a unit rises as the number of units produced increases. as a technology is adopted, further development and refinement of the technology reduce. the learning rate is impervious to organizational factors such as firm strategy. good evening! Can someone please answer this, ill give you brainliest and your earning 50 points. Would be very appreciated. CALLING ALL EXPERTS PLS ILL GIVE BRAINLIEST On Monday, Gian spent 5 minutes watching videos. On Tuesday, he spent 25 minutes watching videos. Place points on the graph to show Gian's activity for Monday and Tuesday. In a right triangle, a and b are the lengths of the legs and c is the length of the hypotenuse. Of a = 7 miles and b = 3 miles, what is the perimeter? If necessary, round to the nearest tenth. In order to tell the impact of a change in a constraint coefficient, the change must be made and then the model resolved. True or False When describing the events in the woods, count how many times Hawthorne uses ambiguous language in diction like seems, must, appears, perhaps, and maybe. Why does Hawthorne want to leave all this so ambiguous Pls help pls/plz/plxA 2-column table with 4 rows. Column 1 is labeled x with entries 1, 2, 4, 5. Column 2 is labeled y with entries 15, 30, 60, 75.Does this table represent a proportional relationship?No. The points are not on the same line.No. The line does not pass through the origin.No. The ordered pairs do not make equivalent ratios.Yes. The points are on a line that passes through the origin. why did victor pretend he was studying What is the role of the US Department of Education?. consider this function: f(x)=-4x+7 . which polynomial is equivalent to f(f(x))?