The journal entry for the transactions will be:
1st April
Debit Account receivables $7200
Credit Sales $7200
(To record sales)
Debit Cost of goods sold $5400
Credit Inventory $5400
(To record cost of goods sold)
10th June
Debit Cash $2400
Credit Account receivable $2400
(To record cash received from customer)
Debit Allowance for uncollectible items $4800
Credit Account receivable $4800
(To record write-off)
11th October
Debit Account receivable $4800
Credit Allowance for uncollectible items $4800
( To record reinstatement of account)
Debit Cash $4800
Credit Account receivable $4800
( To record full cash gotten from customer)
The account receivable on 10th June was calculated as:
= (1/3 × $7200) = $2400
Learn more about journal entry on:
https://brainly.com/question/8913038
what is a survey? plz hel
Answer:
The act of seeing and recording information.
Answer:
a method of collecting data tell me if i'm wrong or right plz
Explanation:
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
Game Changer Technologies has four software teams. Each of them is developing four different examples of its new game app. Which software development methodology is used by the Game Changer teams
The software development methodology used by the Game Changer teams is called; Prototyping
We are given that;
- Game changer technologies has four software teams
- Each of the teams develops 4 different examples of the new game app.
Now, since each of them is developing four four different examples of its new game app, the method being used is called prototyping. This is because prototyping is referred to as the early approximation of the final system of a product whereby such a product is built, tested and rebuilt if required until an acceptable prototype is achieved.
When the acceptable prototype is gotten, then it will be used to develop its final game app.
Read more about prototype at; https://brainly.com/question/25824140
What is property in educational technology
1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constructors headings and method headings 3. Edit the file to build and add the UML in the Header comment of the code. You must do a very thorough job and be sure to pay attention to the details. 4. Save your Flower.java file. 5. Upload your updated Flower.java file here.package during_class_session;public class Flower{private String NameofFlower;private double PriceofFlower;public Flower() {this.setNameofFlower("No name yet");this.setPriceofFlower(0.0);}public Flower(String nameofFlower_initial, double priceofFlower_initial) {this.setNameofFlower(nameofFlower_initial);this.setPriceofFlower(priceofFlower_initial);}public String getNameofFlower() {return NameofFlower;}public void setNameofFlower(String nameofFlower) {NameofFlower = nameofFlower;}public double getPriceofFlower() {return PriceofFlower;}public void setPriceofFlower(double priceofFlower) {PriceofFlower = priceofFlower;}}
Answer:
/
Explanation:
Which part of the computer coordinates all computer operations and performs arithmetic and logical operations on data
Answer:
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s.
BEBE
What options does the Table Tools Layout contextual tab contain? Select three options.
O modify text direction
change font
insert rows and columns
O add border and shading
O split table
Answer:
Modify text direction.change font, and insert row and coulumns
Explanation:
Answer:
What options does the Table Tools Layout contextual tab contain? Select three options.
modify text direction
insert rows and columns
split table
Explanation:
At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
a) message content
b) source address
c) type of application
The answer is c) type of application
The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name. Thus, option C is correct.
What are the TCP/IP protocol hierarchy could a firewall?Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).
Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.
Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.
Learn more about TCP/IP here:
https://brainly.com/question/27742993
#SPJ2
- Are you interested in modern technology? Why/why not?
Answer:
yes
Explanation:
cause it is very intrested
LIKE sitting in the house and turning on your car and alexa all the stuff
What type of control system has the ability to measure the controlled variable and the system output and dynamically adjust the setpoint to achieve more precise control
Proportional integral derivative (PID) control can measure the controlled variable and the system output and dynamically adjust the setpoint to achieve more precise control. It is an algorithm used in the industry.
An algorithm can be defined as a well-established list of rules/steps to follow to solve a given problem.
Proportional integral derivative (PID) control is the most widely used algorithm used in industry.
This type of control (PID) has different coefficients, i.e., proportional, integral and derivative coefficients, which vary in order to obtain an optimal response.
Learn more about proportional integral derivative control here:
https://brainly.com/question/20164864
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected
Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.
What is a virtual machine?Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.
How Virtual Machine is used to ensure that the host OS is protectedVirtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.
This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.
Hence, in this case, it is concluded that the correct answer is to install a virtual machine.
Learn more about Virtual Machine here: https://brainly.com/question/24865302
Complete the sentence based on the given information.
______ are responsible for analyzing the client business model, whereas _____ are responsible for identifying errors in the software product to confirm that it meets the client model.
Answer:
blank answer so brainly doesnt delete your question.
Explanation:
list different examples of models
Answer:
Planet 3D model
Chemical reactions on a computer simulation
Flowchart of how science has changed over time
Tectonic plate movement in a drawing or picture
Making an Atom cake (i've done it and it was fun)
Earth foam Structure with a quarter or it cut out to show the inside
Responsible manner in video and audio conferencing
Answer:
1.Mute yourself when not speaking.
2.Be on time.
3.Ensure your technology works correctly.
4.Use technology to fully engage remote participants.
Explanation:
a
2 A car is fitted with the latest GPS navigation system. This device is controlled
by an embedded system in the form of a microcontroller.
Describe the inputs needed by the embedded system and describe which
outputs you would expect it to produce.
b Since updates to the GPS device are required every six months, explain how
the device is updated without the need to take the car to the garage every six
months.
Answer:
It probaly connected to the internet in some way to resieve updates
Hope This Helps!!!
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
what does PR stand for ?
Answer:
Public Relations or Pull Request (computer programming)
Explanation:
Hope this helps
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60
In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector list;
vector row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about JAVA at brainly.com/question/2266606
Match the vocabulary to the appropriate definition.
•Organizes data to allow it to be easily retrieved
and read
•Extremely versatile data structures
•Pulling related code together in objects
•Helps programmers when they revisit code or
are new to the code
•Storing code in a centralized servers
*Arrays
*Data Structures
*Hierarchies
*Repository
*Documentation
Answer:
Pulling related code together in objects is Arrays
Helps programmers when they revisit code or are new to code-- Documentation
Explanation:
This is all I know
Good documentation Helps programmers when they revisit code or are new to the code.
What is good documentation?Good Documentation is known to be the guidelines that helps one or allows one to follows the steps for recording raw data entries in a legible, right and reproducible way.
Note that Good documentation Helps programmers when they revisit code or are new to the code.
Learn more about code from
https://brainly.com/question/4514135
#SPJ1
When defining a system
landscape, the following are all
necessary to operate the ERP
system,
except
Select one:
O a. Techincal expertise.
O b. Computer hardware.
O c. Networking hardware.
O d. None of the above.
O e. All of the above.
All of the given answer options are necessary to operate the enterprise resource planning (ERP) system when defining a system landscape.
Enterprise resource planning (ERP) can be defined as a business strategy process through which business firms manage and integrate the main parts of their day-to-day business activities by using software applications.
The main objective and purpose of an enterprise resource planning (ERP) system is to significantly reduce costs by integrating all the operations of a business firm.
In Computer science, when defining a system landscape, all of the following are necessary to operate the enterprise resource planning (ERP) system:
Technical expertiseComputer hardwareNetworking hardwareRead more on ERP system here: https://brainly.com/question/25752641
A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
for item in data:
if item[0] == 'male':
males = males + 1
if item[___
]:
malesOnPhone = malesOnPhone + 1
Choices are 1, 2, 3. Answer is for if item[___]:
Three steps can be taken to construct a list of elements using a for loop: Make an empty list appear. Iterate through an iterable or set of elements. Add each component to the list's end.
What loop for sample member of the list data?An Array List can be looped through using an Iterator. If there are additional members in the Array List, the method hasNext() returns true; otherwise, it returns false. If there is no next element, the method next() raises the No Such Element Exception and returns the next element in the Array List.
FOR LOOPS and WHILE LOOPS are two popular types of loops. A For loop runs a variable number of times. LOOP TYPE — FOR LOOP When you know how many times you want to run an algorithm before stopping, you use for loops.
Therefore, Since indexation in lists begins at 0, we must compare item[0], which is “male,” with “male” in the if statement before iterating through males in the for loop.
Learn more about loop here:
https://brainly.com/question/14390367
#SPJ2
When do you think is the right time to use Styles,
Answer:
1. Democratic Management Style
2. Coaching Management Style
3. Affiliative Management Style
4. Pacesetting Management Style
5. Authoritative Management Style
6. Coercive Management Style
7. Laissez-Faire Management Style
8. Persuasive Management Style
The collection of ____ bits make one nibble
Answer:
Hewo There!!
__________________
4
__________________
“It's really a wonder that I haven't dropped all my ideals, because they seem so absurd and impossible to carry out. Yet I keep them, because in spite of everything, I still believe that people are really good at heart.”
― Anne Frank, The Diary of a Young Girl
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation
There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called Dayton.
Wildcard is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.
Some wildcards are;
The asterisk (*)The question mark (?) Percent ( % )Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.
Learn more about Wildcard from
https://brainly.com/question/7380462
Which of the following is an example of power redundancy?
UPS
Backup server
RAID
Fault tolerance
state the base of correct addition of 27 + 6 =34
Answer:
9
Explanation:
lets do calculations with ONLY the rightmost digits, ie., 7 + 6 = 4, so we're ignoring the carry.
Then, following must be true as well:
7+5 = 3
7+4 = 2
7+3 = 1
7+2 = 0 <= this reveals our base 9
7+1 = 8
7+0 = 7
The internet advertisement below is known as a __________. CSS tag web banner title sequence hotspot
The internet advertisement that is illustrated in the image attached below is known as a: B. web banner.
An internet advertisement can be defined as a promotional multimedia message (information) that is designed and developed with the intention to make products or services that are offered by a business firm to become known and familiar to all of its customers and potential customers over the Internet.
Generally, there are various techniques used by web developers for internet advertisements and these include:
CSS tagTitle sequenceHotspotWeb bannerA web banner is a form of advertising which embeds an advertisement that is delivered by a web server into a webpage over the Internet or the World Wide Web (www).
In conclusion, the internet advertisement that is illustrated in the image attached below is known as a web banner.
Read more on web banner here: https://brainly.com/question/10196860
CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
Answer:
Introductions
1.Attract the Reader's Attention. Begin your introduction with a "hook" that grabs your reader's attention and introduces the general topic. ...
2.State Your Focused Topic. After your “hook”, write a sentence or two about the specific focus of your paper. ...
3.State your Thesis. Finally, include your thesis statement.
Add comma(s) where needed, if needed.
My birthday October 31 2005 is on Halloween.
My birthday October 31 2005 is on Halloween. (no change)
My birthday October 31, 2005, is on Halloween.
My birthday October 31, 2005 is on Halloween.
My birthday, October 31, 2005, is on Halloween.
Answer:
My birthday, October 31, 2005, is on Halloween.
Explanation:
The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Why is this correct?The revised sentence "My birthday, October 31, 2005, is on Halloween." correctly uses commas to separate the date from the year and to set off the date as an appositive.
This improves clarity and follows proper punctuation rules.
Hence,. The correct option with commas is "My birthday, October 31, 2005, is on Halloween."
Read more about commas here:
https://brainly.com/question/2142088
#SPJ2
how to set brainlyest