1-Two notions serve as the basis for all torts: wrongs and compensation. True False 2-The goal of tort law is to put a defendant in the position that he or she would have been in had the tort occurred to the defendant. True False 3-Hayley is injured in an accident precipitated by Isolde. Hayley files a tort action against Isolde, seeking to recover for the damage suffered. Damages that are intended to compensate or reimburse a plaintiff for actual losses are: compensatory damages. reimbursement damages. actual damages. punitive damages. 4-Ladd throws a rock intending to hit Minh but misses and hits Nasir instead. On the basis of the tort of battery, Nasir can sue: Ladd. Minh. the rightful owner of the rock. no one. 4-Luella trespasses on Merchandise Mart’s property. Through the use of reasonable force, Merchandise Mart’s security guard detains Luella until the police arrive. Merchandise Mart is liable for: assault. battery. false imprisonment. none of the choice 6-The extreme risk of an activity is a defense against imposing strict liability. True False 7-Misrepresentation in an ad is enough to show an intent to induce the reliance of anyone who may use the product. True False 8-Luke is playing a video game on a defective disk that melts in his game player, starting a fire that injures his hands. Luke files a suit against Mystic Maze, Inc., the game’s maker under the doctrine of strict liability. A significant application of this doctrine is in the area of: cyber torts. intentional torts. product liability. unintentional torts 9-More than two hundred years ago, the Declaration of Independence recognized the importance of protecting creative works. True False 10-n 2014, Cloud Computing Corporation registers its trademark as provided by federal law. After the first renewal, this registration: is renewable every ten years. is renewable every twenty years. runs for life of the corporation plus seventy years. runs forever. 11-Wendy works as a weather announcer for a TV station under the character name Weather Wendy. Wendy can register her character’s name as: a certification mark. a trade name. a service mark. none of the choices 12-Much of the material on the Internet, including software and database information, is not copyrighted. True False 13-In a criminal case, the state must prove its case by a preponderance of the evidence. True False 14-Under the Fourth Amendmentt, general searches through a person’s belongings are permissible. True False 15-Maura enters a gas station and points a gun at the clerk Nate. She then forces Nate to open the cash register and give her all the money. Maura can be charged with: burglary. robbery. larceny. receiving stolen property. 16-Reno, driving while intoxicated, causes a car accident that results in the death of Santo. Reno is arrested and charged with a felony. A felony is a crime punishable by death or imprisonment for: any period of time. more than one year. more than six months. more than ten days. 17-Corporate officers and directors may be held criminally liable for the actions of employees under their supervision. True False 18-Sal assures Tom that she will deliver a truckload of hay to his cattle ranch. A person’s declaration to do a certain act is part of the definition of: an expectation. a moral obligation. a prediction. a promise. 19-Lark promises to buy Mac’s used textbook for $60. Lark is: an offeror. an offeree a promisee. a promisor. 20-Casey offers to sell a certain used forklift to DIY Lumber Outlet, but Casey dies before DIY accepts. Most likely, Casey’s death: did not affect the offer. shortened the time of the offer but did not terminated it. extended the time of the offer. terminated the offer.

1-Two notions serve as the basis for all torts: wrongs and compensation. True False 2-The goal of tort law is to put a defendant in the position that he or she would have been in had the tort occurred to the defendant. True False 3-Hayley is injured in an accident precipitated by Isolde. Hayley files a tort action against Isolde, seeking to recover for the damage suffered. Damages that are intended to compensate or reimburse a plaintiff for actual losses are: compensatory damages. reimbursement damages. actual damages. punitive damages. 4-Ladd throws a rock intending to hit Minh but misses and hits Nasir instead. On the basis of the tort of battery, Nasir can sue: Ladd. Minh. the rightful owner of the rock. no one. 4-Luella trespasses on Merchandise Mart’s property. Through the use of reasonable force, Merchandise Mart’s security guard detains Luella until the police arrive. Merchandise Mart is liable for: assault. battery. false imprisonment. none of the choice 6-The extreme risk of an activity is a defense against imposing strict liability. True False 7-Misrepresentation in an ad is enough to show an intent to induce the reliance of anyone who may use the product. True False 8-Luke is playing a video game on a defective disk that melts in his game player, starting a fire that injures his hands. Luke files a suit against Mystic Maze, Inc., the game’s maker under the doctrine of strict liability. A significant application of this doctrine is in the area of: cyber torts. intentional torts. product liability. unintentional torts 9-More than two hundred years ago, the Declaration of Independence recognized the importance of protecting creative works. True False 10-n 2014, Cloud Computing Corporation registers its trademark as provided by federal law. After the first renewal, this registration: is renewable every ten years. is renewable every twenty years. runs for life of the corporation plus seventy years. runs forever. 11-Wendy works as a weather announcer for a TV station under the character name Weather Wendy. Wendy can register her character’s name as: a certification mark. a trade name. a service mark. none of the choices 12-Much of the material on the Internet, including software and database information, is not copyrighted. True False 13-In a criminal case, the state must prove its case by a preponderance of the evidence. True False 14-Under the Fourth Amendmentt, general searches through a person’s belongings are permissible. True False 15-Maura enters a gas station and points a gun at the clerk Nate. She then forces Nate to open the cash register and give her all the money. Maura can be charged with: burglary. robbery. larceny. receiving stolen property. 16-Reno, driving while intoxicated, causes a car accident that results in the death of Santo. Reno is arrested and charged with a felony. A felony is a crime punishable by death or imprisonment for: any period of time. more than one year. more than six months. more than ten days. 17-Corporate officers and directors may be held criminally liable for the actions of employees under their supervision. True False 18-Sal assures Tom that she will deliver a truckload of hay to his cattle ranch. A person’s declaration to do a certain act is part of the definition of: an expectation. a moral obligation. a prediction. a promise. 19-Lark promises to buy Mac’s used textbook for $60. Lark is: an offeror. an offeree a promisee. a promisor. 20-Casey offers to sell a certain used forklift to DIY Lumber Outlet, but Casey dies before DIY accepts. Most likely, Casey’s death: did not affect the offer. shortened the time of the offer but did not terminated it. extended the time of the offer. terminated the offer.

1-Two notions serve as the basis for all torts: wrongs … Read More...
Matlab project Note: Your final project must be uniquely different from anyone else’s including different from the example I posted!! You are NOT allowed to work together because this is your individual final project!! Anyone caught working together or with similar data/answers will get an automatic zero and will be reported to the Dean’s Office!! REQUIREMENTS %%0. Make a main m-file that you use to run and call your function file. Give it a unique name. Make sure and include your name, your section, and date at the top of the m-file. Suppress any extraneous info; only output what is useful and what follows the intent of your program. (8 points) %%1. Create and use at least one anonymous function somewhere in your program. (5 points) %%2. Make a useful function m-file. That is, create and use at least one user-defined function Use comments immediately below the function definition line that describe what the function does and its inputs and outputs. (10 points) %%3. Utilize proper coding and documentation practices. Comment throughout both the main m-file and the function m-file. Create at least one section (cells). (12 points) %%4. Create and use either one subfunction or one nested function within your function mfile, (10 points) %%5. Use some type of numerical approximation technique like Runge Kutta, Euler’s method, Midpoint Rule, some type of numeric series, etc., 10 pts %%6. Create and use at least one loop (for/while/midpoint), 10 pts %%7. Create and use at least one conditional statement, 10 pts %%8. Create at least one plot, including a title and axes labels at a minimum, 10pts %%9. Output an organized display of your values to a text file that can be opened outside of MATLAB. Include headings so that the display makes sense. 10pts Note: Project need not be fancy or overcomplicated. You want to make sure it runs, meets all the listed requirements, is well-commented and is YOUR OWN WORK !! DELIVERABLES:!! %%10. Submit the following files onto blackboard (ZIP them!): 1. A flowchart or pseudocode of your program plan, 5pts 2. Your main project m-file, 0 credit if not included! 3. Your function m-file, -50% if not included!

Matlab project Note: Your final project must be uniquely different from anyone else’s including different from the example I posted!! You are NOT allowed to work together because this is your individual final project!! Anyone caught working together or with similar data/answers will get an automatic zero and will be reported to the Dean’s Office!! REQUIREMENTS %%0. Make a main m-file that you use to run and call your function file. Give it a unique name. Make sure and include your name, your section, and date at the top of the m-file. Suppress any extraneous info; only output what is useful and what follows the intent of your program. (8 points) %%1. Create and use at least one anonymous function somewhere in your program. (5 points) %%2. Make a useful function m-file. That is, create and use at least one user-defined function Use comments immediately below the function definition line that describe what the function does and its inputs and outputs. (10 points) %%3. Utilize proper coding and documentation practices. Comment throughout both the main m-file and the function m-file. Create at least one section (cells). (12 points) %%4. Create and use either one subfunction or one nested function within your function mfile, (10 points) %%5. Use some type of numerical approximation technique like Runge Kutta, Euler’s method, Midpoint Rule, some type of numeric series, etc., 10 pts %%6. Create and use at least one loop (for/while/midpoint), 10 pts %%7. Create and use at least one conditional statement, 10 pts %%8. Create at least one plot, including a title and axes labels at a minimum, 10pts %%9. Output an organized display of your values to a text file that can be opened outside of MATLAB. Include headings so that the display makes sense. 10pts Note: Project need not be fancy or overcomplicated. You want to make sure it runs, meets all the listed requirements, is well-commented and is YOUR OWN WORK !! DELIVERABLES:!! %%10. Submit the following files onto blackboard (ZIP them!): 1. A flowchart or pseudocode of your program plan, 5pts 2. Your main project m-file, 0 credit if not included! 3. Your function m-file, -50% if not included!

No expert has answered this question yet. You can browse … Read More...
GEEN 160 Lab 3 Instructions: Please create two cpp files and having each of them containing one question’s solution. Please only submit the two cpp files onto Blackboard. Requirements: ? You need to put one comment on top of the main function. The comment should explain the general purpose of the main function. ? You need to make a comment whenever you define a variable (or variables). ? You need to make a comment whenever you make a computation (or computations). ? No comment is required for the code that displays something on the screen. However, the message that will be displayed on the screen must be self-explanatory. Question 1 (10 points) Write a program that uses a loop to display the characters for the ASCII codes 0 through 127. Display 16 characters on each line. Question 2 (10 points) Running on a particular treadmill you burn 3.9 calories per minute. Write a program that uses a loop to display the number of calories burned after 10, 15, 20, 25, and 30 minutes

GEEN 160 Lab 3 Instructions: Please create two cpp files and having each of them containing one question’s solution. Please only submit the two cpp files onto Blackboard. Requirements: ? You need to put one comment on top of the main function. The comment should explain the general purpose of the main function. ? You need to make a comment whenever you define a variable (or variables). ? You need to make a comment whenever you make a computation (or computations). ? No comment is required for the code that displays something on the screen. However, the message that will be displayed on the screen must be self-explanatory. Question 1 (10 points) Write a program that uses a loop to display the characters for the ASCII codes 0 through 127. Display 16 characters on each line. Question 2 (10 points) Running on a particular treadmill you burn 3.9 calories per minute. Write a program that uses a loop to display the number of calories burned after 10, 15, 20, 25, and 30 minutes

GEEN 160 Lab 3 Instructions: Please create two cpp files … Read More...
Question 1 When using NTFS as a file system, what can be used to control the amount of hard disk space each user on the machine can have as a maximum? Answer Logical drives Extended partitions Disk quotas Security Center Question 2 Pin 1 of the floppy cable connects to pin 34 of the controller. Answer True False Question 3 What is the primary cause of hard drive failures? Answer Heat Dust Dirty laser lens Moving parts Question 4 The DBR contains the system files. Answer True False Question 5 A spanned volume requires a minimum of three hard drives. Answer True False Question 6 Which situation would not be appropriate for the use of SSDs? Answer A military operation where fast access to data is critical A medical imaging office that needs high-capacity storage A manufacturing plant with heat-sensitive equipment A research facility where noise must be kept to a minimum Question 7 Why are SSDs more susceptible than mechanical hard drives to electrostatic discharge? Answer The internal battery of the SSD provides additional current. SSDs are memory. The voltage level of the SSD is lower than a mechanical hard drive. The SSD is a more fragile component. Question 8 A motherboard has two PATA IDE connectors, A and B. A is nearer the edge than B. The IDE cable from A connects to a 500GB hard drive and then to a 200GB hard drive. The IDE cable from B connects to an R/W optical drive and then to a Blu-ray optical drive. Assuming the setup is optimal, which of the following describes the 500GB hard drive? Answer Primary slave Secondary slave Primary master Secondary master Question 9 The primary IDE motherboard connection normally uses I/O address 1F0 -1F7h and IRQ 15. Answer True False Question 10 A cable with a twist is used when installing two floppy drives. Answer True False Question 11 What does partitioning the hard drive mean? Answer Dividing the hard drive up into three different sections: one for each type of file system Preparing the drive to be mounted Giving the hard drive a drive letter and/or allowing the hard drive to be seen as more than one drive Preparing the drive for an operating system Question 12 The Network Engineering Technology departmental secretary is getting a new computer funded by a grant. The old computer is being moved by the PC technicians to give to the new program facilitator in another department. Which one of the following is most likely to be used before the program facilitator uses the computer? Answer Check Now Tool Backup Tool Disk Management Tool BitLocker Question 13 What is CHKDSK? Answer A command used to scan the disk for viruses during off hours A program used to defragment the hard drive A program used to locate and identify lost clusters A command used to verify the validity of the drive surface before installing a file system or an operating system Question 14 When a disk has been prepared to store data, it has been Answer Cleaned Tracked Enabled Formatted Question 15 Where would you go to enable a SATA port? Answer CMOS BIOS Disk Management Tool Task Manager Question 16 The Windows boot partition is the partition that must contain the majority of the operating system. Answer True False Question 17 Two considerations when adding or installing a floppy drive are an available drive bay and an available power connector. Answer True False Question 18 What is the difference between a SATA 2 and a SATA 3 hard drive? Answer The SATA 3 has a different power connector. The SATA 3 device transmits more simultaneous bits than SATA 2. The SATA 3 device transmits data faster. SATA 3 will always be a larger capacity drive. The SATA 3 device will be physically smaller. Question 19 What command would be used in Windows 7 to repair a partition table? Answer FDISK FORMAT FIXBOOT bootrec /FixMbr FIXMBR Question 20 What file system is optimized for optical media? Answer exFAT FAT32 CDFS NTFS Question 21 One of the most effective ways of increasing computer performance is to increase the size of virtual memory. Answer True False Question 22 Older PATA IDE cables and the Ultra ATA/66 cable differ by Answer Where the twist occurs The number of conductors The number of pins The number of devices they can connect to Question 23 Which of the following is NOT important in assigning SCSI IDs? Answer The hard drive that the system boots to may have a preset ID. ID priority must match the order of appearance on the SCSI chain. All devices must have unique IDs. Slower devices should have higher priority IDs. Question 24 The ATA standard is associated with the SCSI interface. Answer True False Question 25 A striped volume requires a minimum of two hard drives. Answer True False

Question 1 When using NTFS as a file system, what can be used to control the amount of hard disk space each user on the machine can have as a maximum? Answer Logical drives Extended partitions Disk quotas Security Center Question 2 Pin 1 of the floppy cable connects to pin 34 of the controller. Answer True False Question 3 What is the primary cause of hard drive failures? Answer Heat Dust Dirty laser lens Moving parts Question 4 The DBR contains the system files. Answer True False Question 5 A spanned volume requires a minimum of three hard drives. Answer True False Question 6 Which situation would not be appropriate for the use of SSDs? Answer A military operation where fast access to data is critical A medical imaging office that needs high-capacity storage A manufacturing plant with heat-sensitive equipment A research facility where noise must be kept to a minimum Question 7 Why are SSDs more susceptible than mechanical hard drives to electrostatic discharge? Answer The internal battery of the SSD provides additional current. SSDs are memory. The voltage level of the SSD is lower than a mechanical hard drive. The SSD is a more fragile component. Question 8 A motherboard has two PATA IDE connectors, A and B. A is nearer the edge than B. The IDE cable from A connects to a 500GB hard drive and then to a 200GB hard drive. The IDE cable from B connects to an R/W optical drive and then to a Blu-ray optical drive. Assuming the setup is optimal, which of the following describes the 500GB hard drive? Answer Primary slave Secondary slave Primary master Secondary master Question 9 The primary IDE motherboard connection normally uses I/O address 1F0 -1F7h and IRQ 15. Answer True False Question 10 A cable with a twist is used when installing two floppy drives. Answer True False Question 11 What does partitioning the hard drive mean? Answer Dividing the hard drive up into three different sections: one for each type of file system Preparing the drive to be mounted Giving the hard drive a drive letter and/or allowing the hard drive to be seen as more than one drive Preparing the drive for an operating system Question 12 The Network Engineering Technology departmental secretary is getting a new computer funded by a grant. The old computer is being moved by the PC technicians to give to the new program facilitator in another department. Which one of the following is most likely to be used before the program facilitator uses the computer? Answer Check Now Tool Backup Tool Disk Management Tool BitLocker Question 13 What is CHKDSK? Answer A command used to scan the disk for viruses during off hours A program used to defragment the hard drive A program used to locate and identify lost clusters A command used to verify the validity of the drive surface before installing a file system or an operating system Question 14 When a disk has been prepared to store data, it has been Answer Cleaned Tracked Enabled Formatted Question 15 Where would you go to enable a SATA port? Answer CMOS BIOS Disk Management Tool Task Manager Question 16 The Windows boot partition is the partition that must contain the majority of the operating system. Answer True False Question 17 Two considerations when adding or installing a floppy drive are an available drive bay and an available power connector. Answer True False Question 18 What is the difference between a SATA 2 and a SATA 3 hard drive? Answer The SATA 3 has a different power connector. The SATA 3 device transmits more simultaneous bits than SATA 2. The SATA 3 device transmits data faster. SATA 3 will always be a larger capacity drive. The SATA 3 device will be physically smaller. Question 19 What command would be used in Windows 7 to repair a partition table? Answer FDISK FORMAT FIXBOOT bootrec /FixMbr FIXMBR Question 20 What file system is optimized for optical media? Answer exFAT FAT32 CDFS NTFS Question 21 One of the most effective ways of increasing computer performance is to increase the size of virtual memory. Answer True False Question 22 Older PATA IDE cables and the Ultra ATA/66 cable differ by Answer Where the twist occurs The number of conductors The number of pins The number of devices they can connect to Question 23 Which of the following is NOT important in assigning SCSI IDs? Answer The hard drive that the system boots to may have a preset ID. ID priority must match the order of appearance on the SCSI chain. All devices must have unique IDs. Slower devices should have higher priority IDs. Question 24 The ATA standard is associated with the SCSI interface. Answer True False Question 25 A striped volume requires a minimum of two hard drives. Answer True False

Question 1   When using NTFS as a file system, … Read More...
Programming Assignment 7: Poker (5-Card Draw) II. Prerequisites: Before starting this programming assignment, participants should be able to: Apply and implement pointers in C Pass output parameters to functions Analyze a basic set of requirements and apply top-down design principles for a problem Apply repetition structures within an algorithm Construct while (), for (), or do-while () loops in C Compose C programs consisting of sequential, conditional, and iterative statements Eliminate redundancy within a program by applying loops and functions Create structure charts for a given problem Open and close files Read, write to, and update files Manipulate file handles Apply standard library functions: fopen (), fclose (), fscanf (), and fprintf () Apply and implement pointers 2-dimenional arrays Define and apply structs in C Compose decision statements (“if” conditional statements) Create and utilize compound conditions Summarize topics from Hanly & Koffman Chapter 8 including: What is an array? Distinguishing between single dimensional and 2-dimentional arrays What is an index? III. Overview & Requirements: Write a program that allows a user to play 5-Card-Draw Poker against the computer. Start with the following example code supplied by Deitel & Deitel (example code). This will help you get started with the game of Poker. Please read this site to learn the rules of Poker http://en.wikipedia.org/wiki/5_card_draw. Complete the following step and you will have a working Poker game!!! Adapted from Deitel & Deitel’s C How to Program (6th Edition): (1) In order to complete the game of 5-card-draw poker, you should complete the following functions: (a) (5 pts) Modify the card dealing function provided in the example code so that a five-card poker hand is dealt. (b) (5 pts) Write a function to determine if the hand contains a pair. (c) (5 pts) Write a function to determine if the hand contains two pairs. (d) (5 pts) Write a function to determine if the hand contains three of a kind (e.g. three jacks). (e) (5 pts) Write a function to determine if the hand contains four of a kind (e.g. four aces). (f) (5 pts) Write a function to determine if the hand contains a flush (i.e. all five cards of the same suit). (g) (5 pts) Write a function to determine if the hand contains a straight (i.e. five cards of consecutive face values). (2) (20 pts) Use the functions developed in (1) to deal two five-card poker hands, evaluate each hand, and determine which is the better hand. (3) (25 pts) Simulate the dealer. The dealer’s five-card hand is dealt “face down” so the player cannot see it. The program should then evaluate the dealer’s hand, and based on the quality of the hand, the dealer should draw one, two, or three more cards to replace the corresponding number of unneeded cards in the original hand. The program should then re-evaluate the dealer’s hand. (4) (10 pts) Make the program handle the dealer’s five-card hand automatically. The player should be allowed to decide which cards of the player’s hand to replace. The program should then evaluate both hands and determine who wins. Now use the program to play 10 games against the computer. You should be able to test and modify or refine your Poker game based on these results!

Programming Assignment 7: Poker (5-Card Draw) II. Prerequisites: Before starting this programming assignment, participants should be able to: Apply and implement pointers in C Pass output parameters to functions Analyze a basic set of requirements and apply top-down design principles for a problem Apply repetition structures within an algorithm Construct while (), for (), or do-while () loops in C Compose C programs consisting of sequential, conditional, and iterative statements Eliminate redundancy within a program by applying loops and functions Create structure charts for a given problem Open and close files Read, write to, and update files Manipulate file handles Apply standard library functions: fopen (), fclose (), fscanf (), and fprintf () Apply and implement pointers 2-dimenional arrays Define and apply structs in C Compose decision statements (“if” conditional statements) Create and utilize compound conditions Summarize topics from Hanly & Koffman Chapter 8 including: What is an array? Distinguishing between single dimensional and 2-dimentional arrays What is an index? III. Overview & Requirements: Write a program that allows a user to play 5-Card-Draw Poker against the computer. Start with the following example code supplied by Deitel & Deitel (example code). This will help you get started with the game of Poker. Please read this site to learn the rules of Poker http://en.wikipedia.org/wiki/5_card_draw. Complete the following step and you will have a working Poker game!!! Adapted from Deitel & Deitel’s C How to Program (6th Edition): (1) In order to complete the game of 5-card-draw poker, you should complete the following functions: (a) (5 pts) Modify the card dealing function provided in the example code so that a five-card poker hand is dealt. (b) (5 pts) Write a function to determine if the hand contains a pair. (c) (5 pts) Write a function to determine if the hand contains two pairs. (d) (5 pts) Write a function to determine if the hand contains three of a kind (e.g. three jacks). (e) (5 pts) Write a function to determine if the hand contains four of a kind (e.g. four aces). (f) (5 pts) Write a function to determine if the hand contains a flush (i.e. all five cards of the same suit). (g) (5 pts) Write a function to determine if the hand contains a straight (i.e. five cards of consecutive face values). (2) (20 pts) Use the functions developed in (1) to deal two five-card poker hands, evaluate each hand, and determine which is the better hand. (3) (25 pts) Simulate the dealer. The dealer’s five-card hand is dealt “face down” so the player cannot see it. The program should then evaluate the dealer’s hand, and based on the quality of the hand, the dealer should draw one, two, or three more cards to replace the corresponding number of unneeded cards in the original hand. The program should then re-evaluate the dealer’s hand. (4) (10 pts) Make the program handle the dealer’s five-card hand automatically. The player should be allowed to decide which cards of the player’s hand to replace. The program should then evaluate both hands and determine who wins. Now use the program to play 10 games against the computer. You should be able to test and modify or refine your Poker game based on these results!

checkyourstudy.com Whatsapp +919911743277
(b) Based on the lessons learned, best practices and any additional steps you came up with in part (a), what if project manager X then got a job at Bank of America. Would it be possible for him/her to implement lean in the banking industry based on experience from the previous positions held at the automotive plant and the pharmaceutical company? Please state yes or no and explain the logic clearly for the same. Also, explain the steps that project manager X could take to implement lean at Bank of America (in the service industry) [10 points] You can refer to your class notes and will also have to do research online for both parts (a) and (b). Please state all the references used for each question.

(b) Based on the lessons learned, best practices and any additional steps you came up with in part (a), what if project manager X then got a job at Bank of America. Would it be possible for him/her to implement lean in the banking industry based on experience from the previous positions held at the automotive plant and the pharmaceutical company? Please state yes or no and explain the logic clearly for the same. Also, explain the steps that project manager X could take to implement lean at Bank of America (in the service industry) [10 points] You can refer to your class notes and will also have to do research online for both parts (a) and (b). Please state all the references used for each question.

Yes, lean can be applied to the banking industry.   … Read More...
Biomedical Signal and Image Processing (4800_420_001) Assigned on September 12th, 2017 Assignment 4 – Noise and Correlation 1. If a signal is measured as 2.5 V and the noise is 28 mV (28 × 10−3 V), what is the SNR in dB? 2. A single sinusoidal signal is found with some noise. If the RMS value of the noise is 0.5 V and the SNR is 10 dB, what is the RMS amplitude of the sinusoid? 3. The file signal_noise.mat contains a variable x that consists of a 1.0-V peak sinusoidal signal buried in noise. What is the SNR for this signal and noise? Assume that the noise RMS is much greater than the signal RMS. Note: “signal_noise.mat” and other files used in these assignments can be downloaded from the content area of Brightspace, within the “Data Files for Exercises” folder. These files can be opened in Matlab by copying into the active folder and double-clicking on the file or using the Matlab load command using the format: load(‘signal_noise.mat’). To discover the variables within the files use the Matlab who command. 4. An 8-bit ADC converter that has an input range of ±5 V is used to convert a signal that ranges between ±2 V. What is the SNR of the input if the input noise equals the quantization noise of the converter? Hint: Refer to Equation below to find the quantization noise: 5. The file filter1.mat contains the spectrum of a fourth-order lowpass filter as variable x in dB. The file also contains the corresponding frequencies of x in variable freq. Plot the spectrum of this filter both as dB versus log frequency and as linear amplitude versus linear frequency. The frequency axis should range between 10 and 400 Hz in both plots. Hint: Use Equation below to convert: Biomedical Signal and Image Processing (4800_420_001) Assigned on September 12th, 2017 6. Generate one cycle of the square wave similar to the one shown below in a 500-point MATLAB array. Determine the RMS value of this waveform. [Hint: When you take the square of the data array, be sure to use a period before the up arrow so that MATLAB does the squaring point-by-point (i.e., x.^2).]. 7. A resistor produces 10 μV noise (i.e., 10 × 10−6 V noise) when the room temperature is 310 K and the bandwidth is 1 kHz (i.e., 1000 Hz). What current noise would be produced by this resistor? 8. A 3-ma current flows through both a diode (i.e., a semiconductor) and a 20,000-Ω (i.e., 20-kΩ) resistor. What is the net current noise, in? Assume a bandwidth of 1 kHz (i.e., 1 × 103 Hz). Which of the two components is responsible for producing the most noise? 9. Determine if the two signals, x and y, in file correl1.mat are correlated by checking the angle between them. 10. Modify the approach used in Practice Problem 3 to find the angle between short signals: Do not attempt to plot these vectors as it would require a 6-dimensional plot!

Biomedical Signal and Image Processing (4800_420_001) Assigned on September 12th, 2017 Assignment 4 – Noise and Correlation 1. If a signal is measured as 2.5 V and the noise is 28 mV (28 × 10−3 V), what is the SNR in dB? 2. A single sinusoidal signal is found with some noise. If the RMS value of the noise is 0.5 V and the SNR is 10 dB, what is the RMS amplitude of the sinusoid? 3. The file signal_noise.mat contains a variable x that consists of a 1.0-V peak sinusoidal signal buried in noise. What is the SNR for this signal and noise? Assume that the noise RMS is much greater than the signal RMS. Note: “signal_noise.mat” and other files used in these assignments can be downloaded from the content area of Brightspace, within the “Data Files for Exercises” folder. These files can be opened in Matlab by copying into the active folder and double-clicking on the file or using the Matlab load command using the format: load(‘signal_noise.mat’). To discover the variables within the files use the Matlab who command. 4. An 8-bit ADC converter that has an input range of ±5 V is used to convert a signal that ranges between ±2 V. What is the SNR of the input if the input noise equals the quantization noise of the converter? Hint: Refer to Equation below to find the quantization noise: 5. The file filter1.mat contains the spectrum of a fourth-order lowpass filter as variable x in dB. The file also contains the corresponding frequencies of x in variable freq. Plot the spectrum of this filter both as dB versus log frequency and as linear amplitude versus linear frequency. The frequency axis should range between 10 and 400 Hz in both plots. Hint: Use Equation below to convert: Biomedical Signal and Image Processing (4800_420_001) Assigned on September 12th, 2017 6. Generate one cycle of the square wave similar to the one shown below in a 500-point MATLAB array. Determine the RMS value of this waveform. [Hint: When you take the square of the data array, be sure to use a period before the up arrow so that MATLAB does the squaring point-by-point (i.e., x.^2).]. 7. A resistor produces 10 μV noise (i.e., 10 × 10−6 V noise) when the room temperature is 310 K and the bandwidth is 1 kHz (i.e., 1000 Hz). What current noise would be produced by this resistor? 8. A 3-ma current flows through both a diode (i.e., a semiconductor) and a 20,000-Ω (i.e., 20-kΩ) resistor. What is the net current noise, in? Assume a bandwidth of 1 kHz (i.e., 1 × 103 Hz). Which of the two components is responsible for producing the most noise? 9. Determine if the two signals, x and y, in file correl1.mat are correlated by checking the angle between them. 10. Modify the approach used in Practice Problem 3 to find the angle between short signals: Do not attempt to plot these vectors as it would require a 6-dimensional plot!

Whatsapp +919911743277  
Q3b.Explain the possible consequences if the above mentioned principles are not followed

Q3b.Explain the possible consequences if the above mentioned principles are not followed

Access Control is an important part of any company’s Security … Read More...