Create a public class named InsertionSorter. It should provide one class method sort. sort accepts an array of Comparables and sorts them in ascending order. You should sort the array in place, meaning that you modify the original array, and return the number of swaps required to sort the array as an int. That's how we'll know that you've correctly implemented insertion sort. If the array is null you should throw an IllegalArgumentException. You can assume that the array does not contain any null values.
To receive credit implement insertion sort as follows. Have the sorted part start at the left and grow to the right. Each step takes the left-most value from the unsorted part of the array and move it leftward, swapping elements until it is in the correct place. Do not swap equal values. This will make your sort unstable and cause you to fail the test suites.

Answers

Answer 1

Answer:

Explanation:

The following code is written in Java it uses an insertion sort algorithm to sort a Comparable array that is passed as an input. The method itseld returns the number of changes that need to be made in order to fully sort the array.

class InsertionSorter {

   private static Object IllegalArgumentException;

   public static void main(String[] args) throws Throwable {

      Comparable[] myarr = {1, 6, 15, 2, 5, 3, 8, 33, 10};

      System.out.println(insertionSort(myarr));

   }

   public static int insertionSort(Comparable[] array) throws Throwable {

       try {

           int i, j;

           Comparable newValue;

           int count = 0;

           for (i = 1; i < array.length; i++) {

               newValue = array[i];

               j = i;

               while (j > 0 && (array[j - 1].compareTo(newValue)>0)) {

                   array[j] = array[j - 1];

                   j--;

                   count += 1;

               }

               array[j] = newValue;

           }

           return count;

       } catch (Exception e) {

           throw (Throwable) IllegalArgumentException;

       }

   }

}

Create A Public Class Named InsertionSorter. It Should Provide One Class Method Sort. Sort Accepts An

Related Questions

Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box is found in the
File tab.
Home tab.
Design tab.
Slide Show tab.

Answers

Answer: Design tab

Explanation:

The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.

It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.

Which of the following is not the disadvantage of closed
network model?
Select one:
O Flexibility
O Public network connection
O Support
O External access​

Answers

Answer:

public network connection

Answer:

public network connection

which two of the following are goals of the cognitive therapist

Answers

provide answer options and i will try to help in the comments

How many types of video
compressions__
a. 4
b. 2.
• c. 3
d. 6​

Answers

A. I think correct me if I’m wrong

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

a) product = numA * numB
b) product = numA.multiply(numB)
c) product = numA.mul(numB

Answers

For multiplication one: product = numA * numB

For the addition: result = numA + numB

got 100 on this ez

(searched all over internet and no one had the answer lul hope this helps!)

Answer: First option: product = numA * numB

second option-numA + numB

Explanation:

The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads may be in the critical section at the same time, and fewer than L threads might fail (by halting) in the critical section. An implementation must satisfy the following conditions:_____.
L-Exclusion: At any time, at most L threads are in the critical section.
L-Starvation-Freedom: As long as fewer than L threads are in the critical section, then some thread that wants to enter the critical section will eventually succeed (even if some threads in the critical section have halted).
Modify the n-process Bakery mutual exclusion algorithm to turn it into an L-exclusion algorithm. Do not consider atomic operations in your answer. You can provide a pseudo-code solution or written solution.

Answers

Answer:

The solution is as follows.

class LFilters implements Lock {

int[] lvl;

int[] vic;

public LFilters(int n, int l) {

lvl = new int[max(n-l+1,0)];

vic = new int[max(n-l+1,0)];

for (int i = 0; i < n-l+1; i++) {

lvl[i] = 0;

}

}

public void lock() {

int me = ThreadID.get();

for (int i = 1; i < n-l+1; i++) { // attempt level i

lvl[me] = i;

vic[i] = me;

// rotate while conflicts exist

int above = l+1;

while (above > l && vic[i] == me) {

above = 0;

for (int k = 0; k < n; k++) {

if (lvl[k] >= i) above++;

}

}

}

}

public void unlock() {

int me = ThreadID.get();

lvl[me] = 0;

}

}

Explanation:

The code is presented above in which the a class is formed which has two variables, lvl and vic. It performs the operation of lock as indicated above.

2.1 A friend is interested in installing a wireless LAN in her small business. She has about a dozen employees. You are setting up an 802.11g wireless access point for her business. Your aggregate throughput is only about 6 Mbps. List at least two possible reasons for this low throughput.

Answers

Answer:

The two reasons for low throughput are as follows:

1-Low throughput is due to the fall of throughput is more with distance from the source.

2-The throughput is shared by multiple hosts and they are all using at the same time.

Explanation:

As the aggregate throughput of the 802.11g wireless access point is same, thus when you go farther from it or the number of uses increases, the overall value of individual throughput decreases.

C++ coding, help
In this program you will be reading numbers from a file. You will validate the numbers and calculate the average of all of the valid numbers.
Your program will read in a file with numbers. The numbers will be of type double.
The numbers should be in the range from 0 to 110 (inclusive). You need to count all of the numbers between 0 and 110. You also need to calculate the average of these numbers.
If a number is not valid (that is, it is less than 0 or greater than 110) you need to count it (as a count of invalid values) and you need to write out the number to a file called "invalid-numbers.txt". Values written to file invalid-numbers.txt should be in fixed format with two digits to the right of the decimal point.
As you did in lab lesson 7 part 1 you need to read in the input file name using cin.
The output from your program will be written to cout. The output must contain the file being processed, the total number of values read in from the file, the number of invalid values read in, the number of valid values read in.
The last thing you need to output is either the average of the valid values or an error message. The average must have two digits of precision to the right of the decimal point and must be in fixed format. If there is not valid average you should output the message:
An average cannot be calculated
In what case would you display this message?
If the input file cannot be opened, you will need to output a message. Assume the input file name is badinput.txt and it cannot be opened. You will display the following error message to cout
File "badinput.txt" could not be opened
Here is an example of a working program:
Assume the file name read in from cin is:
input.txt
and that input.txt contains:
-12
0
98.5
100
105.5
93.5
88
75
-3
111
89
-12
Your program would output the following:
Reading from file "input.txt"
Total values: 12
Invalid values: 4
Valid values: 8
Average of valid values: 81.19
The contents written out to file invalid-numbers.txt are:
-12
-3
111
-12
You are reading from an input file and you are writing to an output file. Make sure you close both files after you are finished using them. You must do this in your program, you cannot just let the operating system close the files for you.
For tests where there is output written to an output file the contents of the output file will determine if you passed that test or not. For cases where you have written out to cout the tests will check the output sent to cout. In some cases output will be written to a file and to cout. When this is the case the test will be run twice with the same input. Once to test cout and once to test the contents of the output file. An example of this would be tests 2 and 3. Both use the same input file. Test 2 check the output written to cout and test 3 checks the output written to the file invalid-numbers.txt.

Answers

Answer:

The program in C++ is as follows:

#include <fstream>

#include <iostream>

#include <iomanip>

using namespace std;

int main() {

 string filename;

 cout<<"Filename: ";

 cin>>filename;

 ifstream inFile(filename);

 if(!inFile) {

   cout << endl << "Cannot open file " << filename;

   return 1;  }  

 ofstream fout;

 ifstream fin;

 fin.open("invalid-numbers.txt");  

 fout.open ("invalid-numbers.txt",ios::app);  

 double sum = 0; int valid = 0; int invalid = 0;

 double num = 0;

 while(!inFile.eof()) {

   inFile >> num;

   if(num >= 0 && num<=110){   sum+=num; valid++; }

else{ invalid++;

if(fin.is_open()){

   fout<<fixed<<setprecision(2)<<num<<"\n";    }  }  }

 fin.close();

 fout.close();

 inFile.close();

 cout<<"Total values: "<<valid+invalid<<endl;

 cout<<"Invalid values: "<<invalid<<endl;

 cout<<"Valid values: "<<valid<<endl;

 cout<<"Average of valid values: "<<fixed<<setprecision(2)<<sum/valid<<endl;    

 double inv;

 ifstream inFiles("invalid-numbers.txt");

 while(!inFiles.eof()) {

   inFiles >> inv;

   cout<<inv<<"\n";

}

inFiles.close();

 return 0;

}

Explanation:

See attachment for source file where comments are used to explain each line

Which of these is a type of social engineering attack?
Select one:
O Packet Sniffer
O Port Scan
O Phishing
O Ping Sweep​

Answers

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain how they are used in a program.
PLSSSS HELLP MEEE ASAP!!!!​

Answers

Explanation:

Object Oriented Programming (OOPS or OOPS for Object Oriented Programming System) is the most widely used programming paradigm today. While most of the popular programming languages are multi-paradigm, the support to object-oriented programming is fundamental for large projects. Of course OOP has its share of critics. Nowadays functional programming seems the new trendy approach. Still, criticism is due mostly to misuse of OOP.

Careers emerge solely to make profit for the industry.


False

True

Answers

Explanation:

Careers emerge solely to make profit for the industry: False

Brainliest and follow and thanks

morning dude

what is the best plugin for subscription sites?

Answers

Answer:

Explanation:

MemberPress. MemberPress is a popular & well-supported membership plugin. ...

Restrict Content Pro. ...

Paid Memberships Pro. ...

Paid Member Subscriptions. ...

MemberMouse. ...

iThemes Exchange Membership Add-on. ...

Magic Members. ...

s2Member.

determine if each statement is true or false:

graphics designers are responsible for communicating a message: TRUE

portfolios are not important for graphic design careers: FALSE


professional graphic designers join the american institute of graphic arts: TRUE

Answers

Answer:

TRUE

FALSE

TRUE

Explanation:

Graphic designers are sometimes known as communications designers. They communicate information through the creation of visuals. This can be in the form of logos, fliers, animations and so many others.

1) Graphic designers are responsible for communicating a message. This is TRUE because this is the top reason for their profession. They communicate messages/ pass information through their designs to the desired audience.

2) Portfolios are not important for graphic design careers. This is FALSE. Having portfolios is necessary for graphic designers. This enables them to have a record of all their work so as to showcase to new clients that may set them up for more jobs.

3) Professional graphic designers join the American Institute of Graphic Arts. This is TRUE. The American Institute for Graphic Arts is a professional organization meant for people in the design industry and this includes graphic designers.

What is the location used by users to configure delegate access on their own mailboxes? Backstage view > Account Settings Backstage view > Permissions O Inbox > Permissions O Calendar > Permissions​

Answers

Answer:

A: Backstage view > Account Settings

Explanation:

________________risk in payment system requires improvements in the security framework. [ ]
a)Fraud or mistakes b)Privacy issues c)Credit risk d) All of the above.

Please write the answer for 15 points

Answers

Answer:

D. all of the above

Explanation:

sana nakatulong

Fill in the blanks using A to J below.

1. ----- = command driven

2. ----- = general purpose

3. ----- = custom written

4. ----- = icon

5. ----- = menu driven

6. ----- = integrated software

7. ----- = desktop

8. ----- = system software

9. ----- = Window

10. ----- = software house

A. Software written to meet the specific needs of a company.

B. Related specialized programs combined in a unified package.

C. This software can be adapted for specific needs but is not written for any specific business purpose.

D. This interface requires the user to type in codes or words.

E. A pictorial representation of a file, folder, program, task or procedure.

F. This interface allows you to move a mouse or cursor to make a selection.

G. A rectangle that displays information on the screen.

H. A visual background over which all your work is done.

I. This software notifies the computer to begin sending data to the appropriate program to get a document printed.

J. A company that specializes in writing software.

Answers

Answer:

A.software written to meet specific needs of company

B.Related specialized programs combined in a unified package

LAB: Contact list A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Assume that the list will always contain less than 20 word pairs. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309

Answers

Answer:

The program in Python is as follows:

n = int(input(""))

numList = []

for i in range(n):

   word_pair = input("")

   numList.append(word_pair)

name = input("")

for i in range(n):

   if name.lower() in numList[i].lower():

       phone = numList[i].split(" ")

       print(phone[1])

   

Explanation:

This gets the number of the list, n

n = int(input(""))

This initializes list

numList = []

This iterates through n

for i in range(n):

This gets each word pair

   word_pair = input("")

This appends each word pair to the list

   numList.append(word_pair)

This gets a name to search from the user

name = input("")

This iterates through n

for i in range(n):

If the name exists in the list

   if name.lower() in numList[i].lower():

This gets the phone number associated to that name

       phone = numList[i].split(" ")

This prints the phone number

       print(phone[1])

answer any one: write a computer program:​

Answers

Answer:

hope this helps you look it once.

La herramienta …………………………... en el programa CorelDraw X8, está conformado por texto artístico.

Answers

Answer

what are you talking about, thats crazy!

Explanation:

no seriasly, what are you taking about

What’s unique about windows 8 compared to earlier windows

Answers

New Interface, features like start screen, faster boot time, dynamic desktop, improved search function, windows love syncing, windows to go, and improved security.

List the types of infrared we have

Answers

Answer: infared types like the sun, sun light, heat lamps, and radiators

To reduce the number of used digital outputs of the microcontroller, the display board is connected to the main board through the integrated circuit of the decoder, which converts binary coded decimal (BCD) values to signals for the seven-segment display. So, to show any number on the display you need to set the required BCD code on the microcontroller's outputs. Write a program to convert an integer number represented as a string to a BCD code required for the display. In the BCD code, every decimal digit is encoded with its four-bit binary value. Encoding all digits of the decimal number and concatenating the resulting codes into one string you will get a resulting BCD code. A space is used to separate digits in the BCD code and make it more readable. For example, a number 173 will be encoded to BCD as 0001 0111 0011.

Answers

Answer:

The program in Python is as follows:

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

num = input("Decimal: ")

BCDValue = ""

valid = True

for i in range(len(num)):

   if num[i].isdigit():

       if(int(num[i])>= 0 and int(num[i])<8):

           BCDValue += BCD[i]+" "

       else:

           valid = False

           break;

   else:

       valid = False

       break;

if(valid):

   print(BCDValue)

else:

   print("Invalid")

Explanation:

This initializes the BCD corresponding value of the decimal number to a list

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

This gets input for a decimal number

num = input("Decimal: ")

This initializes the required output (i.e. BCD value)  to an empty string

BCDValue = ""

This initializes valid input to True (Boolean)

valid = True

This iterates through the input string

for i in range(len(num)):

This checks if each character of the string is a number

   if num[i].isdigit():

If yes, it checks if the number ranges from 0 to 7 (inclusive)

       if(int(num[i])>= 0 and int(num[i])<8):

If yes, the corresponding BCD value is calculated

           BCDValue += BCD[i]+" "

       else:

If otherwise, then the input string is invalid and the loop is exited

           valid = False

           break;

If otherwise, then the input string is invalid and the loop is exited

   else:

       valid = False

       break;

If valid is True, then the BCD value is printed

if(valid):

   print(BCDValue)

If otherwise, it prints Invalid

else:

   print("Invalid")

draw a flowchart and write the algorithm to find even number between 1 to 50​

Answers

Answer:We Explain the flowchart in following images given below..

Please hit a like and thanks


Explain working principle of computer.​

Answers

Explanation:

The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.

hope it is helpful to you

How can you ensure that the website you are using is secured?
A.
website begins with http://
B.
website begins with https:// and has a green padlock
C.
website doesn’t have any padlock icon
D.
website has a red padlock icon

Answers

The answer is B: website begins with https:// and has a green padlock

Implement the function _isPalindrome() in palindrome.py, using recursion, such that it returns True if the argument s is a palindrome (ie, reads the same forwards and backwards), and False otherwise. You may assume that s is all lower case and doesn’t include any whitespace characters.

Answers

Answer:

The function is as follows:

def _isPalindrome(stri) :

  if len(stri) == 0:

     return True

  if stri[0] == stri[len(stri) - 1]:

     return _isPalindrome(stri[1:len(stri) - 1])

  else:

     return False

Explanation:

This defines the function

def _isPalindrome(stri) :

If the string is empty, then it is palindrome

  if len(stri) == 0:

     return True

This checks if the characters at alternate positions are the same.

If yes, it calls the function to check for other characters

  if stri[0] == stri[len(stri) - 1]:

     return _isPalindrome(stri[1:len(stri) - 1])

If otherwise, the string is not palindrome

  else:

     return False

Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after the shift operation. Does your system place 0s or 1s in the vacated bits?

Answers

Solution :

#include<[tex]$\text{stdio.h}$[/tex]>

#include<conio.h>

void dec_bin(int number) {

[tex]$\text{int x, y}$[/tex];

x = y = 0;

for(y = 15; y >= 0; y--) {

x = number / (1 << y);

number = number - x * (1 << y);

printf("%d", x);

}

printf("\n");

}

int main()

{

int k;

printf("Enter No u wanted to right shift by 4 : ");

scanf("%d",&k);

dec_bin(k);

k = k>>4; // right shift here.

dec_bin(k);

getch();

return 0;

}

Can someone plz answer these questions

Answers

Answer:

11001100 = 204

11111111 = 255

Explanation:

For 11001100:

1*2⁷ + 1*2⁶ + 0*2⁵ + 0*2⁴ + 1*2³ + 1*2² + 0*2¹ + 0*2⁰ = 204

Just replace 1's by 0's in the following calculation to do it for every 8 bit number:

1*2⁷ + 1*2⁶ + 1*2⁵ + 1*2⁴ + 1*2³ + 1*2² + 1*2¹ + 1*2⁰ = 255

If you don't want to do the calculation yourself, you can set the windows calculator in programmer mode, then select binary and key in the number.

This program exercise #4 wants the user to write a program in python that contains a list of movies titles, years and movie rating. You will need to display a menu option that allows the user to list all of the movies, add a movie, delete a movie and exit out of the program. This will be done using lists and the functions to add an element to a list and how to delete an element to a list. The program should be written utilizing functions in python for the main function, the display_menu function, the delete function, the add function and the list movie function. You can place this all in one python file or include them in various python files that include them into the main program. Let me know if you have any questions with this exercise. Output Screen: COMMAND MENU list - List all movies add - Add a movie del - Delete a movie exit - Exit program Command List: list 1. Monty Python and the Holy Grail, 1979, R 2. On the Waterfront, 1954, PG 3. Cat on a Hot Tim Roof, 1958, R Command: add Name: Gone with the Wind Year: 1939 Rating: PG Gone with the Wind was added.

Answers

Answer:

The program in Python is as follows:

def display_menu(titles,years,ratings):

   for i in range(len(titles)):

       print(str(i+1)+". "+titles[i]+", "+str(years[i])+", "+str(ratings[i]))

   

def delete(titles,years,ratings):

   del_item = input("Movie: ")

   if del_item in titles:

       print(del_item,"was deleted")

       index = titles.index(del_item)

       titles.pop(index)

       years.pop(index)

       ratings.pop(index)

   return(titles,years,ratings)

   

def add(titles,years,ratings):

   title = input("Title: ")

   year = int(input("Year: "))

   rating = int(input("Ratings: "))

   print(title,"was added")

   titles.append(title)

   years.append(year)

   ratings.append(rating)

   

   return(titles,years,ratings)

titles = []

years = []

ratings = []

print("COMMAND MENU list\nlist - List movies\nadd - Add movie del\ndel - Delete movie exit\nexit - Exit program")

menu = (input("Command List: "))

while(menu.lower() == "list" or menu.lower() == "add" or menu.lower() == "del"):

   if menu.lower() == "list":

       display_menu(titles,years,ratings)

   elif menu.lower() == "add":

       titles, years, ratings = add(titles,years,ratings)

   elif menu.lower() == "del":

       titles, years, ratings = delete(titles,years,ratings)

   menu = (input("Command List: "))

   elif menu.lower() == "exit":

       break

print("Exited!!!")

Explanation:

See attachment for complete program where comments are used to explain some lines of the program

A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another? Explain.

Answers

Here you go.....................
Other Questions
An ionic compound is what ? Asian carp are fish that were imported into the United States to be raised in captivity as a food source. The carp can grow to 100 pounds and feed on many types of small fish. Over time, the carp escaped into the wild and now exist in several river systems. It has no natural predators and outcompetes native species for resources. What will most likely occur as a result?a.The genetic diversity and the biodiversity of the ecosystem will increase.b.The genetic diversity and the biodiversity of the ecosystem will decrease.c.The genetic diversity will increase and the biodiversity of the ecosystem will decreased.The genetic diversity will decrease and the biodiversity of the ecosystem will increase Which of these space objects is the largest asteroid in the solar system?Select one:a. Plutob. Vestac. Ceresd. Earth's Moon Thanks dont answer any of my questions or post share this to everyone on Brainily Im tired of my phone blowing up not from the nice people some are mean yall will get 71 points I chose that ok peace Can someone pleaseeee help and if youre correct ill give brainliest The stockholders equity section of Velcro World is presented here. VELCRO WORLD Balance Sheet (partial) ($ and shares in thousands) Stockholders' equity: Preferred stock, $1 par value $ 5,800 Common stock, $1 par value 28,000 Additional paid-in capital 1,028,600 Total paid-in capital 1,062,400 Retained earnings 286,000 Treasury stock, 12,000 Common shares (360,000) Total stockholders' equity $ 988,400 Based on the stockholders' equity section of Velcro World, answer the following questions. Remember that all amounts are presented in thousands.1. How many shares of preferred stock have been issued? (Enter you answer in total number of shares, not in thousands.)2. How many shares of common stock have been issued? (Enter you answer in total number of shares, not in thousands.)3. If the common shares were issued at $30 per share, at what average price per share were the preferred shares issued?4. If retained earnings at the beginning of the period was $250 million and $30 million was paid in dividends during the year, what was the net income for the year? (Enter your answer in million (i.e., 5,000,000 should be entered as 5).)5. What was the average cost per share of the treasury stock acquired? Write an expression that represents the volume of a cube with side length 2x^3. (For any cube with side length s, v = s^3 = s.s.s^.) A. 6x^6B.6x^9C. 8x^9D.8x^6 Carlos has 4.5 pounds of flour she needs three out of 4 pound of flour to make pizza what is the greatest number of pizzas Carlos can make. find the value of x then find the angle measures of the polygon 65, x, (x-5) Imagine that a child has a genetic vulnerability to antisocial personality disorder. How might this childs environment shape the likelihood of developing this personality disorder? a couple of sentences, please!!!! The coach purchased new headgear and gave it to his wrestlers.Above each sentence, write an S to identify the subject(s) of the sentence. Underline each verb and identify it as an action verb (AV) or a linking verb (LV). What factors can influence blood pressure? Write a Perl program that uses a hash and a large number of operations on the hash. For example, the hash could store peoples names and their ages. A random- number generator could be used to create three- character names and ages, which could be added to the hash. When a duplicate name was generated, it would cause an access to the hash but not add a new element. Rewrite the same program without using hashes. Compare the execution efficiency of the two. Compare the ease of programming and readability of the two. During transpiration, water goes from a _____ to a _____. Sherwin-Williams employs outside sales representatives who work with customers such as paint contractors and facility managers to procure the Sherwin-Williams paint or wall coatings for their projects. A typical sales representative maintains approximately 150 accounts, and the sales representative identifies the annual revenue potential for each account. Sales managers oversee this process and establish _______, The Northern Ring Company manufactures 2,000 telephones per year. The full manufacturing costs per telephone are as follows: Direct materials $ 2 Direct labor 8 Variable manufacturing overhead 6 Average fixed manufacturing overhead 6 Total $22 The Texas Ring Company has offered to sell Northern Ring Company 2,000 telephones for $15 per unit. If Northern Ring Company accepts the offer, $10,000 of fixed overhead will be eliminated. Northern Ring should: Select one: A. Buy the telephones; the savings is $12,000 B. Make the telephones; the savings is $2,000 C. Buy the telephones; the savings is $24,000 D. Make the telephones; the savings is $12,000 XYZ Office Supplies is about to introduce a new customer service program that will affect all its 355 sales and service employees. Job duties will be changed, and the employee rewards system will be altered to fit this new customer focus. Moreover, the company wants to improve the efficiency of work processes, thereby removing some of the comfortable (and often leisurely) routines that employees have followed over the years. Top management is concerned about the different types of forces resisting change that the company will potentially experience during this change process. The employees at XYZ discreetly weaken the new customer service program to prove that the decision is wrong and that the new program is not effective. Which of the following reasons to resist change is depicted in this scenario?a. induce organizational learning.b. negotiate with the employees.c. use the stress management technique.d. create an urgency for change. I don't know what what to do here 1. Gabriela tiene tres hermanas. (Her) hermanas sonSus, bonitasSus, bonitaSu, bonitasTus, bonita2. Los mircoles mi noviogimnasio cerca de su casa.va alva a elvas a lava a los Kerry puts pennies into a jar every day. On the first day, she puts 2 pennies into the jar. On the second day, she adds double the number of pennies she put into the jar on the first day. On the third day, she adds double the number of pennies she put into the jar on the second day. This pattern follows for a week.