Problem 3
Get the task network titled Midterm Task Network available in the Articles and Other Tools folder, within Modules on Canvas. The boxes on the network represent tasks where the top item in each box is the task name, the middle item is the resource, and the bottom item is the task duration in days. The task durations have already been cut by 50%.
a) Lay out the Critical Chain schedule for this project. You will first need to lay out the project network. You may use Microsoft Project, Excel, PowerPoint, or any other tool that allows you to draw the network. A hand drawn view of the project network for each step is okay if you don’t have a tool, you can easily use. Start the project on March 7, 2022. What is the project end date before leveling any resource conflicts? What is the project end date after leveling resources?
b) Identify the critical chain.
c) Lastly, size and insert the project and feeding buffers. Be sure to identify the approach you used for sizing the buffers. What is the project end date after inserting the appropriate buffers?

Answers

Answer 1

By laying out the Critical Chain schedule, identifying the critical chain, and inserting appropriate buffers, we can achieve a more efficient and effective project management approach that helps to reduce delays and manage risks.

What are the tasks as given for the project management?

a) The project starts on March 7, 2022 and the project end date before leveling any resource conflicts is April 20, 2022. After leveling resources, the project end date is May 20, 2022.

b) The critical chain is composed of tasks 1-4-6-9-10-12-14-15-16-17-18.

c) To size the buffers, we can use the following approach:

Estimate the total duration of the critical chain (35 days in this case).Calculate 50% of the critical chain duration (17.5 days).Add a project buffer of 5-10% of the critical chain duration (1.75 - 3.5 days).Add a feeding buffer for each non-critical chain path equal to the duration of the longest path (10 days).Using this approach, we can add a project buffer of 3.5 days and feeding buffers of 10 days each to tasks 5, 7, 8, 11, and 13. The updated project end date with buffers is June 2, 2022.

Note: The size of the buffers can vary depending on the project and organization's risk tolerance and other factors. The approach used here is just one possible method.

Read more about project management

brainly.com/question/16927451

#SPJ1


Related Questions

what type of causal relationship is a way to organize how things occur in the human body & nature?

Answers

The term "mechanistic" refers to the kind of causal link that organize

how events take place in the human body and in nature.

This kind of connection implies that certain, recognisable mechanisms or processes are responsible for events or phenomena. A typical sort of causal link utilised in scientific research to explain how things happen in the real world is mechanistic causality. This method makes the assumption that certain mechanisms or processes that can be observed, measured, and repeated are what cause events or phenomena. Mechanistic causality, for instance, can be used to explain how many physiological systems in the human body function, such as how the neurological system receives information or how the digestive system processes food. Mechanistic causality can be used to explain the occurrence of natural occurrences in nature, such as how the moon's gravitational influence affects tides. In general, mechanical causality offers a method for classifying and comprehending the intricate processes that take place in the human body and the natural world.

learn more about human body here:

https://brainly.com/question/11738302

#SPJ11

You walk 3km west and then 4km headed 60 degree north of east. What is your total displacement?O 7km
O 3.6km
O 5km
O 5.6km
O 2.6km

Answers

the total displacement is 6.17 km at a direction of 37.5 degrees north of west. The closest answer choice is O 5.6km.

The total displacement can be found by adding the two displacement vectors using the Pythagorean theorem. The first displacement of 3km west can be represented as a vector pointing to the left with a magnitude of 3km. The second displacement of 4km headed 60 degrees north of east can be represented as a vector pointing up and to the right at a 30 degree angle with a magnitude of 4km.

To add these two vectors, we can draw them on a graph and use the head-to-tail method. Starting at the tail of the first vector, we draw the second vector with its tail at the head of the first vector. The resultant vector, or the total displacement, is the vector drawn from the tail of the first vector to the head of the second vector.

Using trigonometry, we can find the angle between the resultant vector and the x-axis, which is the direction of the displacement. The angle is arctan(4*sin(60)/(3+4*cos(60))) = 37.5 degrees north of west.

The magnitude of the resultant vector is the square root of the sum of the squares of the x-component and the y-component. The x-component is 3 + 4*cos(60) = 5 km, and the y-component is 4*sin(60) = 3.46 km. Therefore, the magnitude of the resultant vector is sqrt(5^2 + 3.46^2) = 6.17 km.

learn more about total displacement here:

https://brainly.com/question/6516113

#SPJ11


You walk 3km west and then 4km headed 60" north of east What is your total displacement?

Give the distinctive features, limitations, and applications of the following alloy groups: (24 total points 8 pts ea.) a. titanium alloys: features limitations sample application b. refractory metals: features limitations sample application C. noble metals: features limitations sample application

Answers

Here are the distinctive features, limitations, and applications of the alloy, Titanium is lightweight but expensive, refractory metals have high melting points but are brittle and noble metals are resistant to corrosion but are costly.

a. Titanium alloys:

Features: Titanium alloys are lightweight, have high strength, excellent corrosion resistance, and the ability to withstand extreme temperatures.

Limitations: They can be expensive, have lower wear resistance compared to other alloys, and can be challenging to fabricate or process.

Sample Application: Titanium alloys are commonly used in aerospace components, such as aircraft engines and airframes.

b. Refractory metals

Features: Refractory metals have high melting points, good wear resistance, and high hardness.

Limitations: These metals can be brittle, expensive, and difficult to work with due to their high melting points and reactivity.

Sample Application: Tungsten, a refractory metal, is often used in the production of electrical contacts and filaments due to its high melting point.

c. Noble metals:

Features: Noble metals, such as gold, silver, and platinum, are resistant to corrosion and oxidation in moist air.

Limitations: They are often expensive and may not have the mechanical strength required for certain applications.

Sample Application: Gold is used in the electronics industry for connectors, switches, and relay contacts because of its high conductivity and resistance to corrosion.

To learn more about alloy visit:

https://brainly.com/question/16935193

#SPJ11

The most important fact about a cluster of stars that makes them useful for studying star formation is that:
Select one:
A. all the stars are the same spectral type.
B. all the stars formed at about the same time.
C. all the stars formed from the same cloud.
D. all the stars have the same chemical composition.
E. all the stars are at the same distance from Earth.

Answers

The correct answer is B. All the stars formed at about the same time. Clusters of stars are useful for studying star formation because they allow astronomers to observe a group of stars that formed under similar conditions.

By studying the properties of these stars, astronomers can gain insights into the processes and conditions that led to their formation. One of the most important factors in understanding star formation is the age of the stars. Stars that form from the same cloud of gas and dust are likely to have similar ages. By observing a cluster of stars and determining their ages, astronomers can gain insights into the timescales and conditions of star formation. In addition, by studying a cluster of stars, astronomers can examine how the properties of stars vary as a function of mass. This is because stars in a cluster will have a range of masses but will all have formed under similar conditions. By studying the properties of stars across this mass range, astronomers can gain a better understanding of how stellar properties, such as luminosity and temperature, depend on mass. Therefore, the most important fact about a cluster of stars that makes them useful for studying star formation is that all the stars formed at about the same time.

Learn more about astronomers here:

https://brainly.com/question/14853303

#SPJ11

: A wastewater bar screen is constructed with 0.25 in wide bars spaced 2 in apart center to center. If the approach velocity in the channel is 2 ft/sec, what is the velocity through the careen openings (ft/sec)? a. 2.67 b. 0.44 C. 0.37 d. 2.29 e. none

Answers

A wastewater bar screen is constructed with 0.25 wide bars spaced 2 in apart center to center. If the approach velocity in the channel is 2 ft/sec, the velocity through the bar screen openings is approximately 2.29 ft/sec.

The answer is d. 2.29.
To find the velocity through the bar screen openings, we can use the continuity equation:
Q = A x V
where Q is the flow rate (in cubic feet per second), A is the cross-sectional area of flow (in square feet), and V is the velocity (in feet per second).
Assuming a rectangular cross-section, the area of flow through the screen openings can be calculated as:
A = (0.25/12) x (2/12) x W
where W is the width of the channel (in feet). Plugging in the given values, we get:
A = (0.25/12) x (2/12) x 1
A = 0.0003472 sq ft
Now, we can rearrange the continuity equation to solve for V:
V = Q / A
We know that the approach velocity in the channel is 2 ft/sec, so the flow rate can be calculated as:
Q = A_channel x V_channel
where A_channel is the cross-sectional area of the channel. Assuming a rectangular channel, we get:
A_channel = (2/12) x 1
A_channel = 0.1667 sq ft
Plugging in the given values, we get:
Q = 0.1667 sq ft x 2 ft/sec
Q = 0.3333 cubic ft/sec
Now, we can solve V:
V = 0.3333 cubic ft/sec / 0.0003472 sq ft
V = 962.7 ft/sec
However, this velocity is in feet per hour, not per second. To convert to feet per second, we need to divide by 3600:
V = 962.7 ft/hr / 3600 sec/hr
V = 0.267 ft/sec

Learn more about velocity here:

https://brainly.com/question/17127206

#SPJ11

A singly-linked list is built by following the steps in the order given below:Create an empty listappend("Jazz")append("Techno")prepend("Rock")removeFront()Draw a sketch of this singly-linked list, resulting from the above steps. Assume an implementation that does not use dummy nodes, and that both the head and the tail pointers are maintained. The sketches should show all pointers involved, including head and tail.The sketch can show intermediate lists, leading to the final sketch. But just the sketch showing the final linked list after all steps, is good enough.

Answers

The final singly-linked list after following the given steps would contain two nodes, one with the value "Jazz" and the other with the value "Techno". The head pointer would be pointing to the first node with the value "Jazz", and the tail pointer would be pointing to the second node with the value "Techno".

Initially, an empty singly-linked list is created with both the head and tail pointers pointing to null. Then, the value "Jazz" is appended to the list, which creates a node with the value "Jazz" and sets both the head and tail pointers to point to this node. Next, the value "Techno" is appended to the list, which creates a new node with the value "Techno" and updates the tail pointer to point to this new node.

After this, the value "Rock" is prepended to the list, which creates a new node with the value "Rock" and sets its next pointer to point to the first node with the value "Jazz". The head pointer is then updated to point to the new node with the value "Rock".

Finally, the removeFront() method is called, which removes the first node with the value "Rock" from the list and updates the head pointer to point to the second node with the value "Techno". Thus, the final singly-linked list contains two nodes with the values "Jazz" and "Techno", and the head and tail pointers point to the first and second nodes, respectively.

To learn more about Data Structures, visit:

https://brainly.com/question/12977982

#SPJ11

• list and describe both simple and controlled input/output. • describe both pipelining and pic multistage pipelining.

Answers

Simple input/output (I/O) refers to the basic method of transferring data between a computer system and peripheral devices, such as keyboards, mice, or printers. In simple I/O, data is directly read from or written to the device without any intermediate processing or buffering.


Controlled input/output, also known as programmed I/O, involves the use of a dedicated control unit to manage the data transfer between the system and peripheral devices. This approach allows for greater control over the data transfer process and can improve the overall efficiency of the system.
Pipelining is a technique used in computer architecture to improve the performance of a processor. It involves breaking down the processing of an instruction into multiple stages and overlapping the execution of these stages for different instructions. This allows multiple instructions to be processed simultaneously, increasing the overall throughput of the processor.
PIC multistage pipelining refers to a specific implementation of pipelining in a Programmable Interrupt Controller (PIC) chip. This involves dividing the interrupt handling process into multiple stages, allowing the PIC to manage and process several interrupts simultaneously. By using multistage pipelining, the PIC can efficiently handle complex and high-speed interrupt scenarios, improving overall system performance.

To learn more about Data Here:

https://brainly.com/question/13650923

#SPJ11

stream cipher works using the ‘xor’ operation. assume the first ten bits of plaintext are 1101010010.... the key starts with 1101110100.... what is the cipher text after encryption?

Answers

To find the ciphertext after encryption using a stream cipher with XOR operation, use XOR the first ten bits of the plaintext with the first ten bits of the key.

Plaintext: 1101010010
Key:       1101110100

Steam cipher:

Step-by-step XOR operation:
1. 1 XOR 1 = 0
2. 1 XOR 1 = 0
3. 0 XOR 0 = 0
4. 1 XOR 1 = 0
5. 0 XOR 1 = 1
6. 1 XOR 1 = 0
7. 0 XOR 0 = 0
8. 0 XOR 1 = 1
9. 1 XOR 0 = 1
10. 0 XOR 0 = 0

Ciphertext: 0000100100

So, the ciphertext after encryption is 0000100100.

Learn more about steam cipher text: https://brainly.com/question/24261371

#SPJ11

To find the ciphertext after encryption using a stream cipher with XOR operation, use XOR the first ten bits of the plaintext with the first ten bits of the key.

Plaintext: 1101010010
Key:       1101110100

Steam cipher:

Step-by-step XOR operation:
1. 1 XOR 1 = 0
2. 1 XOR 1 = 0
3. 0 XOR 0 = 0
4. 1 XOR 1 = 0
5. 0 XOR 1 = 1
6. 1 XOR 1 = 0
7. 0 XOR 0 = 0
8. 0 XOR 1 = 1
9. 1 XOR 0 = 1
10. 0 XOR 0 = 0

Ciphertext: 0000100100

So, the ciphertext after encryption is 0000100100.

Learn more about steam cipher text: https://brainly.com/question/24261371

#SPJ11

When is a sprint retrospective meeting held?

Answers

The sprint retrospective meeting is held at the end of each sprint in the Agile development process to evaluate the team's performance and identify areas for improvement.

During this meeting, the team discusses what went well and what could have been improved in terms of processes, communication, and teamwork. The goal is to identify areas for improvement and make changes for the next sprint.

The retrospective is a crucial part of the Agile development process as it allows the team to continuously improve and adapt to changing circumstances.

It is a time for open and honest feedback and should be approached with a mindset of learning and growth. The retrospective helps to build a culture of continuous improvement and fosters a sense of ownership and accountability within the team.

For more questions like Retrospective click the link below:

https://brainly.com/question/31165373

#SPJ11

\Prand Vr: Ideal Gas Property Tables ► 0:00 / 1:47 Ln V, = Ln P, $; R R The relative volume and relative pressure depend only, on temperature. Values of V, and P, are tabulated in the Ideal Gas Property Tables, along with SºT in the LT Workbook. Click here to get a copy! Ideal Gas Entropy Table for Air т P. (K) (J/mol) (J/mol) (J/mol*K) 300 38.06 53.44 0.179 11.021720.98481

Answers

Hi, it seems like there is some information missing or unclear in your question. However, I will try my best to provide a general explanation of ideal gases and how they relate to the Ideal Gas Property Tables.

An ideal gas is a hypothetical gaseous substance whose behavior is independent of attractive and repulsive forces and can be entirely described by the ideal gas law, PV = nRT, where P is the pressure, V is the volume, n is the amount of substance (in moles), R is the ideal gas constant, and T is the temperature in Kelvin.

The Ideal Gas Property Tables provide information about the properties of ideal gases, such as air, at different temperatures. These tables typically include values for relative volume (Vr), relative pressure (Pr), and entropy (S) as a function of temperature. In your provided data, it seems like you have temperature (T), pressure (P), volume (V), and entropy (S) values for air at 300 K.

To use the Ideal Gas Property Tables, follow these steps:

1. Identify the substance and its properties (temperature, pressure, volume, and/or entropy) that you are interested in.

2. Look up the values for the relevant properties in the Ideal Gas Property Tables.

3. Use these values in combination with the ideal gas law (PV = nRT) or other relevant equations to solve for the missing properties or parameters.

In summary, ideal gases are hypothetical substances that can be described by the ideal gas law, and the Ideal Gas Property Tables provide useful data for these gases at various temperatures. To use these tables effectively, locate the desired properties in the tables and apply them in the appropriate equations to solve your problem.

Learn more about Ideal Gas: https://brainly.com/question/25290815

#SPJ11

Which intron component is the first to be cleaved during the splicing process ? O A. 5' splice site B. branch point C. 3' splice site D. All cleaved simultaneously

Answers

The intron component that is the first to be cleaved during the splicing process is A. 5' splice site.

The splicing process occurs in the following steps:

1. Recognition of the 5' splice site, branch point, and 3' splice site by the spliceosome.
2. Cleavage of the 5' splice site, which is the first cleavage event.
3. Formation of the lariat structure by the attack of the branch point on the 5' splice site.
4. Cleavage of the 3' splice site, which occurs after the 5' splice site cleavage.
5. Ligation of the exons, completing the splicing process.

So, the first intron component to be cleaved is the 5' splice site.

You can learn more about the splice site at: brainly.com/question/15229145

#SPJ11

the following is a reasonable recursive definition for computing a string's length: int strlen (string s) { if (s == null) return 0; // base case return 1 + strlen(s); // recursive step }

Answers

The recursive definition provided is not entirely correct. The base case checks if the string is null and returns a length of 0, which is correct.

However, the recursive step calls the strlen function with the same string s as an argument, which would result in an infinite recursive loop and a stack overflow error. Instead, the recursive step should call strlen with the substring of s starting from the second character, until the base case is reached. The correct recursive definition for computing a string's length would be:

int strlen(string s) {
 if (s == null) return 0; // base case
 return 1 + strlen(s.substring(1)); // recursive step
}

This recursive function works by removing the first character of the string at each recursive step until the base case is reached, where the string is null. The length of the string is then the sum of 1 and the length of the substring is obtained by removing the first character.

You can learn more about recursive definition at: brainly.com/question/17298888

#SPJ11

1. Write the statement that will display all of the information in the PetOwner table using the asterisk (*) notation.2. Write the statement that will display all of the information in the PetOwner table without using the asterisk (*) notation.3. Write the statement that will display the first and last names of the owners in that order.4. Write the statement to display the breed, type and DOB of all pets having a type of Cat.5. Write the statement to display the names of the pets that have an annotated birthdate.6. Write the statement to display all of the listed pet breeds.

Answers

1. To display all information in the PetOwner table using the asterisk (*) notation, you can use this SQL statement:
```sql SELECT * FROM PetOwner.

To display all information in the PetOwner table without using the asterisk (*) notation, list all column names:
```sql
SELECT column1, column2, column3, ... FROM PetOwner;
```(Replace column1, column2, etc. with the actual column names in the table.)
3. To display the first and last names of the owners in that order:
```sql
SELECT first_name, last_name FROM PetOwner;
```
4. To display the breed, type, and DOB of all pets having a type of Cat:
```sql
SELECT breed, type, DOB FROM PetOwner WHERE type = 'Cat';
```
5. To display the names of the pets that have an annotated birthdate (assuming there's a column named 'birthdate_annotated'):
```sql
SELECT pet_name FROM PetOwner WHERE birthdate_annotated IS NOT NULL;
```
6. To display all of the listed pet breeds:
```sql
SELECT DISTINCT breed FROM PetOwner;

To learn more about sql click the link below:

brainly.com/question/29973150

#SPJ11

is heat that is obtained from a flat-plate solar collector best used for running a heat engine or for space heating? explain.

Answers

The heat obtained from a flat-plate solar collector can be used for both running a heat engine and for space heating, but it depends on the specific needs of the situation.

If the goal is to generate electricity or mechanical work, then using the heat to run a heat engine would be the best option. However, if the goal is to provide warmth to a building or space, then using the heat for space heating would be the most appropriate choice.

Flat-plate solar collectors are often used for space heating because they can efficiently capture the sun's energy and convert it into heat. This heat can then be used to warm up a building, provide hot water, or even heat a swimming pool.

Space heating is a more common application for flat-plate solar collectors because it doesn't require as high of temperatures as running a heat engine would, and therefore is a more efficient use of the collected heat.

Overall, the choice between using the heat from a flat-plate solar collector for running a heat engine or for space heating depends on the specific needs and goals of the situation.

Learn more about space heating: https://brainly.com/question/23840847

#SPJ11

The heat obtained from a flat-plate solar collector can be used for both running a heat engine and for space heating, but it depends on the specific needs of the situation.

If the goal is to generate electricity or mechanical work, then using the heat to run a heat engine would be the best option. However, if the goal is to provide warmth to a building or space, then using the heat for space heating would be the most appropriate choice.

Flat-plate solar collectors are often used for space heating because they can efficiently capture the sun's energy and convert it into heat. This heat can then be used to warm up a building, provide hot water, or even heat a swimming pool.

Space heating is a more common application for flat-plate solar collectors because it doesn't require as high of temperatures as running a heat engine would, and therefore is a more efficient use of the collected heat.

Overall, the choice between using the heat from a flat-plate solar collector for running a heat engine or for space heating depends on the specific needs and goals of the situation.

Learn more about space heating: https://brainly.com/question/23840847

#SPJ11

append textnode to newelement as a child, and append newelement to parenttag as a child.

Answers

To append a text node to a new element as a child, you can use the following code:

```
// create a new element
var newElement = document.createElement("p");

// create a new text node
var textNode = document.createTextNode("This is some text.");

// append the text node to the new element
newElement.appendChild(textNode);
```

This will create a new paragraph element (`

`) and a new text node (`This is some text.`), and then append the text node to the new element as a child.

To append the new element to a parent tag as a child, you can use the following code:

```
// select the parent tag you want to append the new element to
var parentTag = document.getElementById("parent");

// append the new element to the parent tag
parentTag.appendChild(newElement);
```

This will select the parent tag with the ID of `parent`, and then append the new element (with the text node as a child) to it.

Learn More about element here :-

https://brainly.com/question/13025901

#SPJ11

What is the gain (unit conversion) at the output of the plant model and explain how you come up with that value?

Answers

The answer to the question is that the gain at the output of the plant model can be obtained by converting the units of the output variable to the desired units.

The answer involves the following steps:

1. Determine the output variable of the plant model that represents the quantity of interest.

2. Identify the units of the output variable and the desired units for the gain.

3. Convert the output variable to the desired units using the appropriate conversion factor.

4. Calculate the gain as the ratio of the output variable in the desired units to the input variable in its original units.

For example, let's say the output variable of the plant model is the flow rate of a liquid and its units are cubic meters per hour (m3/h). If we want to express the gain in terms of liters per minute (L/min), we can use the conversion factor 1 m3/h = 1000 L/h and 1 h = 60 min. Therefore:

- To convert m3/h to L/min, we multiply by (1000/60) = 16.67.
- Let's say the input variable is a valve opening expressed as a percentage. If the valve is fully open, the flow rate is 10 m3/h.
- To calculate the gain at full valve opening, we convert the flow rate to L/min: 10 m3/h * (1000 L/m3) * (1 h/60 min) = 166.67 L/min.
- The gain is then calculated as 166.67 L/min / 100% = 1.67 L/min per %.

Therefore, the gain at the output of the plant model for this example is 1.67 L/min per %.

Learn more about conversion factor: https://brainly.com/question/30166433

#SPJ11

using the hash function described in section 8.2.1, find the encrypted forms of the following passwords: a. fido b. blank c. ti34pper

Answers

Since the   hash function described in Section 8.2. 1 is not given, a general description will be made:

What is the hash function?

Below is an example of how you can hash the passwords "fido", "blank", and "ti34pper" using MD5 in Python:

python

import hashlib

# Define the passwords

passwords = ["fido", "blank", "ti34pper"]

# Loop through the passwords and hash them using MD5

for password in passwords:

   # Create an MD5 hash object

   md5_hash = hashlib.md5()

   # Hash the password

   md5_hash.update(password.encode('utf-8'))

   # Get the hexadecimal representation of the hash

   hash_hex = md5_hash.hexdigest()

   # Print the password and its hash

   print("Password: ", password)

   print("Hash: ", hash_hex)

   print("--------------------------")

Please note that MD5 is considered a weak hash function for password hashing due to its vulnerability to collisions and other security concerns, and it is not recommended for use in modern security practices.

Therefore, The output will show the hashed forms of the passwords using the MD5 hash function. Again, please note that MD5 is not recommended for secure password hashing in modern security practices, and it's important to use stronger and more secure hashing algorithms, such as bcrypt, scrypt, or Argon2, for password storage to ensure better security.

Read more about hash function here:

https://brainly.com/question/13164741

#SPJ1

Which line in Text 1 sets a variable to tell the state machine to reset when the program starts running 115 transition change of state 19 set number of tasks 53 initial state 74 switch logical break

Answers

In Text 1, the line that sets a variable to tell the state machine to reset when the program starts running is line 53, which sets the initial state. This line is responsible for defining the starting point of the state machine, allowing for a proper 115 transition change and managing the 74 switch logical break when needed.

A state machine is a behavior model. It consists of a finite number of states and is therefore also called finite-state machine (FSM). Based on the current state and a given input the machine performs state transitions and produces outputs. There are basic types like Mealy and Moore machines and more complex types like Harel and UML statecharts.The basic building blocks of a state machine are states and transitions. A state is a situation of a system depending on previous inputs and causes a reaction on following inputs. One state is marked as the initial state; this is where the execution of the machine starts. A state transition defines for which input a state is changed from one to another. Depending on the state machine type, states and/or transitions produce outputs.

learn more about state machine here:

https://brainly.com/question/31321877

#SPJ11

A vertical curve crosses a 1-m diameter pipe at right angles. The pipe is located at station
3+420 and its centerline is at elevation 333m. The PVI of the vertical curve is at
station 3+400 and elevation 335m. The vertical curve is equal tangent, 180m long,
and connects an initial grade of +1.20% and a final grade of -1.08%. Using offsets,
determine the depth, below the surface of the curve, of the top of the pipe and determine the station of the highest point on the curve.Does this curve provide sufficient stopping sight distance for a speed of 100 km/h? Solve it step by step.

Answers

Note that the vertical curve provides sufficient stopping sight distance for a speed of 100 km/h.

What is the explanation for the above response?

To solve this problem, we need to use the following equations for vertical curves:

VC = vertical point of curvature

PVI = point of vertical intersection

PT = point of tangency

g1 = initial grade

g2 = final grade

L = length of curve

E = elevation

First, let's calculate the elevation of the VC:

g1 = +1.20% = 0.012

g2 = -1.08% = -0.0108

L = 180 m

VC = E + (L/2) * ((g2-g1)/(2*A))

where A is the algebraic difference between g2 and g1.

A = -0.0108 - 0.012 = -0.0228

VC = 335 + (180/2) * ((-0.0228)/(2*-0.001))

VC = 333.744 m

Next, let's determine the station of the PT:

PT = PVI + ((E-EPVI)/K)

where K is the vertical curvature at the PVI and EPVI is the elevation of the PVI.

K = (g2-g1)/L = (-0.0108 - 0.012)/180 = -0.000102

EPVI = 335

PT = 3+400 + ((333-335)/-0.000102)

PT = 3+438.2

Therefore, the station of the PT is 3+438.2.

To determine the depth of the pipe, we need to calculate the distance between the centerline of the pipe and the centerline of the vertical curve at the point where they intersect. Let's call this distance "d".

d = √((PT - 3-420)^2 + (335-333)^2)

d = √(18.2^2 + 2^2)

d = 18.23 m

The depth of the top of the pipe below the surface of the curve is then:

depth = radius - d/2

depth = 0.5 - 18.23/2

depth = -8.865 m

Therefore, the top of the pipe is 8.865 m below the surface of the curve.

Finally, let's determine if the curve provides sufficient stopping sight distance (SSD) for a speed of 100 km/h. SSD is defined as the distance required for a driver to see a hazard ahead, recognize it, and bring the vehicle to a stop before reaching the hazard.

SSD = (V^2/(254f)) + (V/2g)(1.467 + 0.1383*f)

where V is the design speed (in km/h), f is the coefficient of friction (assumed to be 0.35), and g is the gravitational acceleration (9.81 m/s^2).

SSD = (100^2/(2540.35)) + (100/29.81)(1.467 + 0.13830.35)

SSD = 95.5 m

The curve length is 180 m, which is greater than the SSD of 95.5 m. Therefore, the curve provides sufficient stopping sight distance for a speed of 100 km/h.

Learn more about vertical curve at:

https://brainly.com/question/15062059

#SPJ1

Where should the beam ABC be loaded with a 300-lb/ft uniform distributed live load so it causes (a) the 6 largest live moment at point A and (b) the largest live shear at D? Calculate the values of the moment and shear. Assume the support at A is fixed, B is pinned and C is a roller.

Answers

The 300-lb/ft load can be placed anywhere on the beam to produce the greatest live shear at point D, and the shear force at point D is 2400 lb.

How to calculate moment and shear?

To determine the position of the 300-lb/ft load to cause the 6 largest live moment at point A, we need to calculate the bending moments at A for different positions of the load.

Let x be the distance from point A to the left end of the load. The total distributed load on the beam is w = 300 lb/ft, and the length of the beam is L = 20 ft. The reactions at A and B are:

RA = RB = wL/2 = 300 lb/ft × 20 ft / 2 = 3000 lb

The shear force and bending moment at any point x along the beam can be calculated as follows:

V(x) = RA - wx = 3000 - 300x (shear force equation)

M(x) = RA x - w/2 x² (bending moment equation)

To find the position of the load that causes the 6 largest live moments at point A, we need to calculate M(x) at A for different values of x. We can do this using calculus by taking the derivative of M(x) with respect to x and setting it equal to zero to find the maximum value of M(x).

dM/dx = RA - wx (derivative of M(x) with respect to x)

Setting dM/dx = 0:

RA - wx = 0

x = RA/w = 10 ft

Therefore, the 300-lb/ft load should be placed 10 ft to the left of point A to cause the 6 largest live moment at point A.

To calculate the value of the moment at A, we substitute x = 0 into the bending moment equation:

M(A) = RA × 0 - w/2 × 0² = 0

So the moment at A is zero.

To determine the position of the 300-lb/ft load to cause the largest live shear at point D, calculate the shear force at D for different positions of the load.

Let x be the distance from point D to the left end of the load. The reactions at D and C are:

RD = wL - RA = 300 lb/ft × 20 ft - 3000 lb = 3000 lb

RC = RA - RD = 0

The shear force at any point x along the beam can be calculated as follows:

V(x) = RD - wx (shear force equation)

To find the position of the load that causes the largest live shear at point D, calculate V(x) at D for different values of x. Do this using calculus by taking the derivative of V(x) with respect to x and setting it equal to zero to find the maximum value of V(x).

dV/dx = -w (derivative of V(x) with respect to x)

Setting dV/dx = 0:

-w = 0

w = 0

This means that the shear force is the same at all points along the beam, regardless of the position of the load.

Therefore, the 300-lb/ft load can be placed anywhere on the beam to cause the largest live shear at point D, and the value of the shear force at D is:

V(D) = RD - wL = 3000 lb - 300 lb/ft × 20 ft = 2400 lb.

Find out more on moment and shear here: https://brainly.com/question/12950078

#SPJ1

A spur gear having 35 teeth is rotating at 350 rev/min and is to drive another spur gear at 520 rev/min. What is the value of the velocity ratio? VR =1.981 VR = 1.486 VR = 4.125 VR = 2.784

Answers

The VR is 1.486

The teeth which the second gear has is B. N= 24 teeth

What is Velocity Ratio?

Velocity Ratio refers to the ratio of the distance moved by the effort to the distance moved by the load in a simple machine. In other words, it is the ratio of the velocity of the effort to the velocity of the load.

In simple terms, the velocity ratio is a measure of the effectiveness of a simple machine in multiplying force or speed. The greater the velocity ratio, the greater the mechanical advantage of the machine.


Read more about velocity ratio here:

https://brainly.com/question/30349580

#SPJ1

The peg A is confined between the vertical guide and The rotating slotted rod. (Figure 1)Part ADetermine the velocity of the peg. Express your answer in terms of some or all of the variables alpha, omega, theta, and b.Part B Determine the acceleration of the peg. Express your answer in terms of some or all of the variables alpha, omega, theta, and b.

Answers

Unfortunately, without a visual representation of Figure 1 and more context surrounding the scenario, I am unable to accurately provide an answer to your question. Please provide more information or clarify the scenario for me to assist you further.
Hi! I'd be happy to help you with your question.

Part A: The velocity of the peg A confined between the vertical guide and the rotating slotted rod (Figure 1) can be expressed as v = b * omega * cos(theta), where v is the velocity, b is the distance from the center of rotation to the peg, omega is the angular velocity, and theta is the angle between the slotted rod and the horizontal.

Part B: The acceleration of the peg A can be expressed as a = b * (alpha * cos(theta) - omega^2 * sin(theta)), where a is the acceleration, alpha is the angular acceleration, and the other variables are the same as in Part A.

The following is an incomplete implementation of the compare function in MIPS assembly language. This subroutine receives the addresses of two strings (which have the same length) in registers $a0 and $a1. If the two strings are equal, this routine will return the value 1 in $v0, and if they differ, it will return the value 0 in $v0. Complete this function by filling in the blanks. NOTE: Blackboard is very finicky, so you have to be exactly correct on the spelling!

Answers

To complete the implementation of the compare function in MIPS assembly language, we need to first load the addresses of the two strings into separate registers using the lw instruction. We can then loop through the strings character by character, using the lb instruction to load each byte into a temporary register. We can compare the bytes using the bne instruction and branch to a label if they are not equal. If we reach the end of the strings without finding any differences, we can set the return value to 1 using the li and jr instructions. Here is the complete implementation:


complete implementation of the compare  function in MIPS assembly language:
compare:
   lw $t0, 0($a0)        # load address of string 1
   lw $t1, 0($a1)        # load address of string 2
loop:
   lb $t2, 0($t0)        # load byte from string 1
   lb $t3, 0($t1)        # load byte from string 2
   bne $t2, $t3, not_equal   # if bytes are not equal, branch to not_equal
   addi $t0, $t0, 1      # increment string 1 pointer
   addi $t1, $t1, 1      # increment string 2 pointer
   bne $t2, $zero, loop      # if we haven't reached the end of the strings, loop again
   li $v0, 1          # if we reach the end of the strings, they are equal
   jr $ra            # return to calling routine
not_equal:
   li $v0, 0          # if we find a difference, they are not equal
   jr $ra            # return to calling routine

to know more about assembly language:

https://brainly.com/question/14728681

#SPJ11

the von neuman model proposes among other things

Answers

The von Neumann model is a theoretical framework for digital computers that proposes several key features, including a central processing unit (CPU) that can execute instructions stored in memory, a memory unit that stores both data and instructions, and input/output (I/O) devices that allow for interaction with the outside world.

Additionally, the von Neumann model emphasizes the importance of a stored-program concept, where both data and instructions are stored in the same memory space and can be accessed and manipulated by the CPU. Overall, the von Neumann model has been instrumental in shaping the development of modern computers and continues to inform our understanding of computer architecture today.

The von Neumann model is based on the idea of a stored-program computer, in which instructions and data are stored together in the same memory. This is in contrast to earlier models of computers, in which programs were stored on external media such as punched cards or tape, and data was processed separately.

Learn more about von Neumann model: https://brainly.com/question/30051840

#SPJ11

The sum of the moments of all external forces acting on a particle is equal to? a. angular momentum of the particle b. linear momentum of the particle c. time rate of change of angular momentum d. time rate of change of linear momentum

Answers

The correct answer is c. The sum of the moments of all external forces acting on a particle is equal to time rate of change of angular momentum.

The rotating equivalent of linear momentum is angular momentum. It is a conserved quantity, meaning that the total angular momentum of a closed system stays constant, making it a significant physical quantity. Both the direction and the amplitude of angular momentum are preserved.

This is known as the principle of angular momentum, which states that the sum of the moments of all external forces acting on a particle is equal to the time rate of change of its angular momentum. Linear momentum, on the other hand, is related to the motion of the particle in a straight line, while force is the cause of any change in momentum.

So, the correct option is c.

Learn more about "angular momentum" at: https://brainly.com/question/29563080

#SPJ11

Which four member of the <111> family of directions lie in a plane that is parallel to the (110) plane? Make clear sketches of all your work to get full credit. Useful protocol to locate plane: Algorithm for determining the Miller Indices of a plane 1. If plane passes through selected origin, establish a new origin in another unit cell 2. Read off values of intercepts of plane designated A, B, C) with x, y, and z axes in terms of a, b, o 3. Take reciprocals of intercepts 4. Normalize reciprocals of intercepts by multiplying by lattice parameters a, b, and 4. Reduce to smallest integer values 5. Enclose resulting Miller Indices in parentheses, no commas i.e., (hkl)

Answers

Explanation:

The <111> family of directions includes four directions: <111>, <1-1-1>, <11-2>, and <1-12>.

To find the planes parallel to the (110) plane, we need to use the Miller Indices of the (110) plane, which are (1 1 0).

Using the algorithm for determining Miller Indices of a plane:

We can choose any point on the plane, but for simplicity, let's choose the origin.

The plane intercepts the x, y, and z axes at (1,0,0), (0,1,0), and (0,0,1), respectively, since it passes through the points (0,0,0) and (1,1,0).

Taking the reciprocals of these intercepts, we get (1/1, 1/1, 1/0) = (1, 1, ∞).

Normalizing by multiplying by the lattice parameters a, b, and c, we get (a, b, ∞). Since we do not know the value of c, we cannot normalize the third index.

To reduce to smallest integer values, we take the reciprocals of the indices and multiply by a common factor to get integers. Since the third index is infinity, we can ignore it. Taking the reciprocals of the first two indices, we get (1/1, 1/1, 1/1/2) = (1, 1, 2).

Enclosing the indices in parentheses, we get the Miller Indices of the (110) plane: (1 1 0).

Now, to find the planes parallel to the (110) plane, we need to find the directions that are perpendicular to the (110) plane. We know that the normal vector to the (110) plane is <1 1 0>, so any direction that is perpendicular to this vector will lie in a plane parallel to the (110) plane.

The four <111> family directions that are perpendicular to <1 1 0> are <11-2>, <1-12>, <-112>, and <-1-1-2>. These four directions lie in a plane that is parallel to the (110) plane.

Note that <111> and <1-1-1> do not lie in a plane parallel to the (110) plane.

Explanation:

The <111> family of directions includes four directions: <111>, <1-1-1>, <11-2>, and <1-12>.

To find the planes parallel to the (110) plane, we need to use the Miller Indices of the (110) plane, which are (1 1 0).

Using the algorithm for determining Miller Indices of a plane:

We can choose any point on the plane, but for simplicity, let's choose the origin.

The plane intercepts the x, y, and z axes at (1,0,0), (0,1,0), and (0,0,1), respectively, since it passes through the points (0,0,0) and (1,1,0).

Taking the reciprocals of these intercepts, we get (1/1, 1/1, 1/0) = (1, 1, ∞).

Normalizing by multiplying by the lattice parameters a, b, and c, we get (a, b, ∞). Since we do not know the value of c, we cannot normalize the third index.

To reduce to smallest integer values, we take the reciprocals of the indices and multiply by a common factor to get integers. Since the third index is infinity, we can ignore it. Taking the reciprocals of the first two indices, we get (1/1, 1/1, 1/1/2) = (1, 1, 2).

Enclosing the indices in parentheses, we get the Miller Indices of the (110) plane: (1 1 0).

Now, to find the planes parallel to the (110) plane, we need to find the directions that are perpendicular to the (110) plane. We know that the normal vector to the (110) plane is <1 1 0>, so any direction that is perpendicular to this vector will lie in a plane parallel to the (110) plane.

The four <111> family directions that are perpendicular to <1 1 0> are <11-2>, <1-12>, <-112>, and <-1-1-2>. These four directions lie in a plane that is parallel to the (110) plane.

Note that <111> and <1-1-1> do not lie in a plane parallel to the (110) plane.

3. 2. Challenge
Content concatenation
Evaluate your content concatenation skills by completing the following tasks:
Append the current user to the ~/workspace/project-log/changelog.txt file:
Changelog:
Version: 1.0
username: current_user
Append the ~/workspace/project-log/file-list.txt file content to the ~/workspace/project-log/changelog.txt file:
Changelog
Version: 1.0
username: current_user
hello.txt
hi.txt
project-log
TIP: Use the tab autocompletion shortcut
Once you have completed these tasks press the Check It button to have your solution assessed.
Check It!

Answers

To complete the content concatenation challenge, follow these steps:

1. Append the current user to the ~/workspace/project-log/changelog.txt file:

Open the terminal and enter the following command:
```bash
echo "username: $(whoami)" >> ~/workspace/project-log/changelog.txt
```
This will append the current user to the changelog.txt file.

2. Append the ~/workspace/project-log/file-list.txt file content to the ~/workspace/project-log/changelog.txt file:

In the terminal, enter the following command:
```bash
cat ~/workspace/project-log/file-list.txt >> ~/workspace/project-log/changelog.txt
```
This will append the content of file-list.txt to the changelog.txt file.

After completing these tasks, the content of the changelog.txt file should look like this:

```
Changelog
Version: 1.0
username: current_user
hello.txt
hi.txt
project-log
```

Remember to press the "Check It" button to have your solution assessed.

To know more about content concatenation

https://brainly.com/question/28272351?

#SPJ11

How many days is a typical sprint in the Scrum methodology? A. 24 hours B. 1 day C. 15 - 30 days D. 90 days

Answers

The number of days which is a typical sprint in the Scrum methodology is C. 15 - 30 days.

What Is a Scrum Sprint Cycle?

A Scrum sprint cycle is a timeboxed period when a team delivers a set amount of work. It is typically two to four weeks in duration and each sprint starts the moment the previous one is completed.

The Scrum sprint cycle is often referred to as a process of continuous development. It delivers a consistent work cadence for product releases and keeps the project’s momentum going until complete.

Read more about Scrum Sprint

brainly.com/question/2854435

#SPJ1

The number of days which is a typical sprint in the Scrum methodology is C. 15 - 30 days.

What Is a Scrum Sprint Cycle?

A Scrum sprint cycle is a timeboxed period when a team delivers a set amount of work. It is typically two to four weeks in duration and each sprint starts the moment the previous one is completed.

The Scrum sprint cycle is often referred to as a process of continuous development. It delivers a consistent work cadence for product releases and keeps the project’s momentum going until complete.

Read more about Scrum Sprint

brainly.com/question/2854435

#SPJ1

How to pass a typedef struct to a function in C?

Answers

The typedef struct 'Person' is passed to the function 'displayPersonInfo' using a pointer, allowing the function to access and display the information contained in the struct.

To pass a typedef struct to a function in C, you can follow these steps:

1. Define the typedef struct: First, define the struct using the typedef keyword to create an alias for the struct. For example:
```c
typedef struct {
   int id;
   char name[50];
} Person;
```

2. Declare the function: Declare a function that takes a pointer to the typedef struct as an argument. For example:
```c
void displayPersonInfo(Person *person);
```

3. Define the function: In the function definition, use the pointer to access the members of the typedef struct. For example:
```c
void displayPersonInfo(Person *person) {
   printf("ID: %d\n", person->id);
   printf("Name: %s\n", person->name);
}
```

4. Call the function: Create an instance of the typedef struct and pass its address to the function when calling it. For example:
```c
int main() {
   Person person1 = {1, "John Doe"};
   displayPersonInfo(&person1);
   return 0;
}
```

You can learn more about typedef struct at: brainly.com/question/29892943

#SPJ11

The typedef struct 'Person' is passed to the function 'displayPersonInfo' using a pointer, allowing the function to access and display the information contained in the struct.

To pass a typedef struct to a function in C, you can follow these steps:

1. Define the typedef struct: First, define the struct using the typedef keyword to create an alias for the struct. For example:
```c
typedef struct {
   int id;
   char name[50];
} Person;
```

2. Declare the function: Declare a function that takes a pointer to the typedef struct as an argument. For example:
```c
void displayPersonInfo(Person *person);
```

3. Define the function: In the function definition, use the pointer to access the members of the typedef struct. For example:
```c
void displayPersonInfo(Person *person) {
   printf("ID: %d\n", person->id);
   printf("Name: %s\n", person->name);
}
```

4. Call the function: Create an instance of the typedef struct and pass its address to the function when calling it. For example:
```c
int main() {
   Person person1 = {1, "John Doe"};
   displayPersonInfo(&person1);
   return 0;
}
```

You can learn more about typedef struct at: brainly.com/question/29892943

#SPJ11

Consider the grammar G with start variable S and the following rules. S→aAa I Bb A→C I a B → C I b C→CDE I E
D → A I B I ab E → AEC Perform the following sequence of transformations obtaining in each step a grammar that generates the same language as G. 1. Find the nullable variables and eliminate the x-rules from the grammar G. 2. Eliminate the unit rules from the grammar resulting from part 1. 3. Eliminate any useless symbols (i.e. variables that are not generating or reachable) in the resulting grammar from part 2. 4. Put the resulting grammar from part 3 into Chomsky Normal Form.

Answers

1)Nullable variables and elimination of ε-rules:

The nullable variables in G are C and E.

Rule 1: S → aAa | Bb

Rule 2: A → C | a

Rule 3: B → C | b

Rule 4: C → CDE | E

Rule 5: D → A | B | ab

Rule 6: E → AEC

2)Eliminating ε-rules:

Rule 1: S → aAa | Bb | aa | ab | ba | bb

Rule 2: A → C | a

Rule 3: B → C | b

Rule 4: C → CDE | DE | CE | E

Rule 5: D → A | B | ab

Rule 6: E → AEC | AC | EC | E

3)Elimination of unit rules:

There are no unit rules in the modified grammar.

4)Elimination of useless symbols:

All variables in the modified grammar are generating or reachable.

5)Conversion to Chomsky Normal Form:

Rule 1: S → AB | BC | a | b

Rule 2: A → CE | a

Rule 3: B → CE | b

Rule 4: C → DF | DE | CE | EC

Rule 5: D → a | b

Rule 6: E → AC | EC

Rule 7: F → DE

The resulting grammar is in Chomsky Normal Form and generates the same language as the original grammar G.

Learn more about nullable variables here:

https://brainly.com/question/15170534

#SPJ11

Other Questions
You have three sodium carbonate solutions on a lab table in front of you. All of the solutions came from a 500.0-mI. volumetric flask containing 3.00 M sodium carbonateSolution 1 contains 100.0 mL of the 3.00 M solution.Solution 2 contains 50.0 mL of the 3.00 M solution.Solution 3 contains 10.0 mL of the 3.00 M solution.What is the new concentration of Solution 2 if 15.8 g of solid sodium carbonate is added and dissolved? (Assume no volume change.) Solve the system using substitution. Check your answer 7x-2y=12y=x-1The solution is _Simplify your answer. Type an ordered pair Select the correct answers from each drop-down menu.This construction can be used to prove the angle bisector theorem.BA302ACEUsing triangle proportionalityis proportional toUsing the isosceles triangle in the construction EC =These lead to the proportion that corresponds to the angle bisector theorem of AB = 18. Selling more rainwear in Seattle than in San Diego due to the annual rainfall is an example of which type of marketing segmentation? GOVERNMENT: i need help with the courts and all the information please!! Managing diversity Management at Work Felix is conducting diversity training and has given each person a description of a difficult situation at work that requires their response, often to the extent of needing to provide assistance outside of their normal work role. They are then tasked with coming up with ways that they could provide assistance in order to resolve the issue. There are two basic types of diversity training programs: awareness training and skills-based diversity training. Felix's training session is an example of ___ the goal of which is to ____. Felix's supervisor recognizes the success of his training and wants to implement some strategies to better manage diversity at the executive level. He has come up with the three ideas listed in the following table.Identify whether each idea is an example of a diversity audit, diversity pairing, or minority experience. (Hint: Use each category only once.) Diversity Audit /Diversity Pairing/Minority Experience Idea 1. All employees will receive a survey to measure attitudes toward coworkers, staff, and supervisors. 2. David a man and the most senior executive at the company, will attend the Women in Business seminars that are put on by the local chamber of commerce for the next 3 months. 3. While Jamal and Robert are the same sex, they are of different ethnicities. They will be tasked with working on a project together in an effort to allow them to get to know each other better. The circumference of a circle is 137 in. What is the area, in square inches?Express your answer in terms of pi. suppose that na a changing by a = 12 j mol1 e5a.3(b) suppose that na a changing by a = 15 j mol1 . = 0.10nb and a small change in composition results in , by how much will b change? write the statement to display the name, breed and type of the pets sorted by the type in ascending order and breed in descending order within the breed. 1.2 g of the strong base naoh are dissolved in water and diluted to 50ml. what is the ph of this solution? The sale price of a bond issued at a premium is the present value of its principal amount at the market (effective) rate of interest.a. plus the present value of all future interest payments at the market (effective) rate of interestb. plus the present value of all future interest payments at the rate of interest stated on the bondc. minus the present value of all future interest payments at the market (effective) rate of interestd. minus the present value of all future interest payments at the rate of interest stated on the bond what is the probability that the mean play time in a random sample of 100 songsis less than 240 seconds (4 minutes)?round your answer to 4 decimal places.leave your answer in decimal form. if the downward-directed electric field of the earth is 150 n/c , how many excess electron charges must the water droplet have? Select the reagent for the following reaction. ? benzoic anhydride propyl benzoate Acid halide Anhydride Ester Amide Alcohol Amine Carboxylic acid or carboxylate (the conjugate base of carboxylic acid) A hanging Slinky toy is attached to a powerful battery and a switch. When the switch is closed so that the toy now carries current, does the Slinky compress or expand? Four regional less-than-truckload (LTL) carriers handle shipments traveling from Lexington, Kentucky to Springfield, Illinois. All four companies say that their normal service time to deliver these shipments is two business days. The four carriers compete with each other on the basis of price and service quality rating, as shown in the following table. The price reported in the table is the (oandiscounted) cost per hundredweight (cwt) of sending a 600-pound shipment from Lexington to Springfield at freight class 70. The service quality rating measures a carrier's loss and damage record and goes from 0 (poor quality) to 100 (high quality). Carrier Price $103.90 $98.50 $127.20 $11140 Service Quality Rating 95 91 98 94 Which of these LTL carriers are on the efficient frontier? a die is rolled 2 times and the sum of the spots is counted. this corresponds to drawing Types of South African Businesses and Market Share Omar is a potato farmer and the world potato market is perfectly competitive. The market price is $10 a basket. Omar sells 700 baskets a week and his marginal cost is $15 a basket. The market price falls to $4 a basket, and Omar cuts his output to 438 baskets a week. Omar's average variable cost and marginal cost fall to $4 a basket. Omar is _____.a. not maximizing profit because marginal revenue does not equal marginal cost,b. maximizing profit and he is making an economic profit,c. not maximizing profit because he is incurring an economic loss,d. maximizing profit and he is incurring an economic loss,e. not maximizing profit because he has cut his potato production. Mea drove 180 miles in 3 hourse if she continues at this rate how far will she drive in 12 hourse