A golf club wants to develop software to support a number of its activities. The club secretary will use the system to manage membership details, which includes adding and removing members. To become a member an application has to be recommended by two current members. The secretary can add tournaments as well as printing tournament results. Members of the club can enter tournaments if they wish and can view results.  Draw a use case diagram for the following scenario                                    ​

Answers

Answer 1

In the scenario above the case diagram will have:

Three actors Golf club Tournaments Three  users which will be Clerk Person, Admin Clerk and others.

           ​

What is  case diagram?

Use-case diagrams is known to be a high-level functions and width of a system that tells the interactions between the given system and its actors.

Therefore, In the scenario above the case diagram will have:

Three actors Golf club Tournaments Three  users which will be Clerk Person, Admin Clerk and others.

Learn more about case diagram from

https://brainly.com/question/12975184

#SPJ1


Related Questions

what is data abstraction and data independence?​

Answers

Data abstraction and data independence are two key concepts in computer science and database management systems. They are closely related and aim to improve the efficiency, flexibility, and maintainability of data management.

What is data abstraction and data independence?

The definitions of these two are:

Data Abstraction:

Data abstraction refers to the process of hiding the implementation details of data and providing a simplified view or interface to interact with it. It allows users to focus on the essential aspects of data without being concerned about the underlying complexities. In programming languages, data abstraction is often achieved through the use of abstract data types (ADTs) or classes.

By abstracting data, programmers can create high-level representations of data entities, defining their properties and operations.

Data Independence:

Data independence refers to the ability to modify the data storage structures and organization without affecting the higher-level applications or programs that use the data. It allows for changes to be made to the database system without requiring corresponding modifications to the applications that rely on that data. Data independence provides flexibility, scalability, and ease of maintenance in database systems.

Learn more about data at:

https://brainly.com/question/179886

#SPJ1

How would a malfunction in each component affect the system as a whole ?

Answers

Answer:

The whole system becomes unavaliable

Explanation:

Which kind of wave would be observed in outer space between planets where there is little matter?; What type of waves are observed in outer space?; What type of wave carries energy through space?; Which type of wave Cannot travel in outer space?

Answers

A wave that can cross the vacuum of space is an electromagnetic wave. For their energy to be transferred from one place to another, mechanical waves, unlike electromagnetic waves, need a material medium.

The definition of electromagnetic waves.A wave that can cross the vacuum of space is an electromagnetic wave. For their energy to be transferred from one place to another, mechanical waves, unlike electromagnetic waves, need a material medium.Unlike mechanical waves, which need a medium to travel, electromagnetic waves can move through air or space. This implies that electromagnetic waves can pass not only through solid objects like metals and solid materials, but also through empty space.Electromagnetic waves are similar to other waves in that they can move energy from one location to another. Electromagnetic radiation is the term for the electromagnetic transmission of energy.    

To learn more about Wave refer to:

https://brainly.com/question/15663649

#SPJ4

What’s one task you think would be hard for computers to do as well as humans? Explain.

Answers

One task that could be challenging for computers to perform as effectively as humans is creative and intuitive problem solving. While computers excel at tasks that involve data analysis, calculation, and pattern recognition, they often lack the ability to think critically and creatively in complex and ambiguous situations.

What is the computers  task about?

Creative problem solving often requires human traits such as empathy, emotional intelligence, and intuition, which allow us to consider multiple perspectives, generate novel ideas, and come up with innovative solutions. Humans are capable of leveraging their experiences, emotions, and intuition to tackle problems that do not have clear-cut answers or require subjective judgment.

Furthermore, creative problem solving often involves dealing with uncertainty, making decisions based on incomplete information, and adapting to changing circumstances. Humans are naturally equipped with cognitive flexibility and adaptability, which enable us to navigate uncertain and dynamic situations with agility.

Read more about computers  task here:

https://brainly.com/question/30041193

#SPJ1

Components of a product or system must be
1) Reliable
2) Flexible
3) Purposeful
4)Interchangeable

Answers

Answer:

The correct answer to the following question will be Option D (Interchangeable).

Explanation:

Interchangeability applies towards any portion, part as well as a unit that could be accompanied either by equivalent portion, component, and unit within a specified commodity or piece of technology or equipment.This would be the degree to which another object can be quickly replaced with such an equivalent object without re-calibration being required.

The other three solutions are not situation-ally appropriate, so option D seems to be the right choice.

Please write in Python

Please write in Python

Answers

A program that returns the price, delta and vega for European and American options is given below:

The Program

import jax.numpy as np

from jax.scipy.stats import norm

from jax import grad

class EuropeanCall:

   def call_price(

       self, asset_price, asset_volatility, strike_price,

       time_to_expiration, risk_free_rate

           ):

     

The complete code can be found in the attached file.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

Please help its due on May 7th and the code has to be in python.

Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.

Answers

We can use a list to store the sensor objects, and we can sort the list by room number, room description, or sensor number. However, accessing a sensor by its room number would require iterating through the entire list.

How to explain the information

A tuple is similar to a list, but it is immutable, meaning that it cannot be modified once created. We could use a tuple to store each sensor object, but sorting the tuple would require creating a new sorted tuple. Accessing a sensor by its room number would also require iterating through the entire tuple.

A set is an unordered collection of unique items, and it can be modified. We could use a set to store the sensor objects, but sorting the set is not possible. Accessing a sensor by its room number would also require iterating through the entire set.

Learn more about sensor on

https://brainly.com/question/29569820

#SPJ1

. What is a one-dimensional basic component in art and geometry

Answers

Answer:

a straight line

Explanation:

Anything one dimensional can only be a line

Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box

Answers

Answer: apply heading styles to text.

Explanation:

In addition to letting people share files, what is the most useful feature of
document-synchronization tools?
A. They email updated revisions on a document back and forth to
one another
B. They combine and compress large files into a zip file for sending
through email
C. They schedule appointments for work meetings and personal
reasons
D. They let more than one person work on the same document at the
same time

Answers

Explanation:

B. They combine and compress large files into a zip file for sending through email

Answer:

D. They let more than one person work on the same document at the

same time

Name six different administrative controls used to secure personnel

Answers

The  six different administrative controls used to secure personnel are: Preventative, detective, corrective, deterrent, recovery, directive, and compensation.

What controls have the additional name "administrative controls"?

To lessen or restrict exposure to a particular hazard at work, administrative controls, also known as work practice controls, are used. When substitution, omission, or the use of engineering controls are not practical, this type of hazard control alters the way work is done.

Therefore, Policies, processes, or guidelines that outline employee or company practices in keeping with the organization's security objectives are referred to as administrative security controls.

Learn more about administrative controls from

https://brainly.com/question/15134135
#SPJ1


Help Menu is available at which button in the keyboard?

Answers

Answer: It should be F1.

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

What is the value of grade after this program is executed? Assume the score is 71. if score >= 90: grade = "A" elif score >= 80: grade = "B" elif score >= 70: grade = "C" elif score >= 60: grade = "D" else: grade = "F" grade =

Answers

Answer:

C

Explanation:

if the score is 71 it would fall into 70 because it is not greater than 80 and not less than 70

Answer:

F= 50%

Fail is 50% grades.

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

Question 5 (1 point) When you create a table of contents (TOC) a reader can use the table of contents links to move to the titled section in the document that use heading styles. True False​

Answers

The given statement about TOC is True.

What is a TOC?

A Table of Contents (TOC) provides a quick and easy way for readers to navigate through a document by listing its headings and corresponding page numbers.

The headings used in a TOC are usually formatted with heading styles (e.g. Heading 1, Heading 2, etc.).

When a reader clicks on a heading listed in the TOC, it takes them directly to the corresponding section in the document. This helps the reader to quickly locate the information they are looking for and improves the overall readability and usability of the document.

Read more about table of contents here:

https://brainly.com/question/1493356

#SPJ1

If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the results. d. be unable to search again.

Answers

Answer:

a. clear the history on the compute

Explanation:

Choose the expression that belongs in the blank in order to ask the user the question shown.

>>> answer = input(_____)
What is your name? Juan

Answers

Answer:

"Juan"

Explanation:

If this is script, than that should be the correct argument.

Please need help ASAP will mark brainliest

Please need help ASAP will mark brainliest

Answers

Answer:

x8 negakation with a false

first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.

first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer

Answers

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

A shot made while running is a ____________.

Answers

Answer:

A shot made while running is called a layup.

Creating a company culture for security design document

Answers

Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.

Networks should be monitored and tested on a regular basis. Maintain a policy for information security.

What is a healthy security culture?

Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.

Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.

What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.

To learn more about security culture refer :

https://brainly.com/question/14293154

#SPJ1

the increase and decrease font button and the change text colour button (as shown in the picture )are include in which group ?​

Answers

Answer:

These are the part of FONT Group on MS word / Excel application where you can increase and decrease font, change text color, highlight text, select font from the list and many other functions.

You can also perform advance functions related to Font by clicking on a small arrow like icon in bottom right corner.

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next?
a) Check for data you have previously hidden.
b) Make the columns wider.
c) Check that the worksheet is not Read-Only.
d) Change the format to reduce the font size.

Answers

Answer:

a)

Explanation:

Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.

Can someone help me with this lab assignment? I really do not know what should I do?
This assignment
The program you wrote in Stacks 1 is incomplete. Without a destructor it creates a memory leak. A destructor has been defined in this program but it is incorrect. To visualize how the destructor works, a cout statement has been added. Fix the errors, including the cout statement, to display the value in each node of the stack before releasing the memory.
Write a loop in main() to enter an unknown number of positive integers. The loop stops when you enter 0 or a negative number. As you are entering integers, they are to be pushed onto a stack.
Ex.: If the user enters '10 20 30 -1` the output (from the destructor) should be:
30 - deleted!
20 - deleted!
10 - deleted!
Empty stack!
Ex.: If the user enters '-1` the output should be:
Empty stack!
This is the code:
#include
using namespace std;
class Stack_int
{
private:
// Structure for the stack nodes
struct StackNode {
int value; // Value in the node
StackNode *next; // Pointer to next node
};
StackNode *top; // Pointer to the stack top
int length; // Number of nodes
public:
Stack_int(){ top = NULL; length = 0; } //Constructor
~Stack_int(); // Destructor
// Stack operations
// bool isEmpty();
bool push(int);
// int pop();
// int peek();
// int getLength();
};
/**~*~*
Member function push: pushes the argument onto the stack.
*~**/
bool Stack_int::push(int item)
{
StackNode *newNode; // Pointer to a new node
// Allocate a new node and store num there.
newNode = new StackNode;
if (!newNode)
return false;
newNode->value = item;
// Update links and counter
newNode->next = top;
top = newNode;
length++;
return true;
}
/**~*~*
Destructor
*~**/
Stack_int::~Stack_int()
{
StackNode *currNode;
// Position nodePtr at the top of the stack.
currNode = top;
// Traverse the list deleting each node.
while (currNode)
{
cout << currNode->value << " - deleted!" << endl;
delete currNode;
currNode = NULL;
currNode = currNode->next;
}
cout << "Empty stack!" << endl;
}
int main() {
Stack_int s;
int item;
return 0;
}

Answers

Answer:

your question is too long to read

Explanation:

try explaining it in fewer words

Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.

Answers

Answer:

The program is as follows:

import random

print("Rock\nPaper\nScissors")

points = int(input("Points to win the game: "))

player_point = 0; computer_point = 0

while player_point != points and computer_point != points:

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

   player = input('Choose: ')

   if player == computer:

       print('A tie - Both players chose '+player)

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

       print('Player won! '+player +' beats '+computer)

       player_point+=1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

print("Player:",player_point)

print("Computer:",computer_point)

Explanation:

This imports the random module

import random

This prints the three possible selections

print("Rock\nPaper\nScissors")

This gets input for the number of points to win

points = int(input("Points to win the game: "))

This initializes the player and the computer point to 0

player_point = 0; computer_point = 0

The following loop is repeated until the player or the computer gets to the winning point

while player_point != points and computer_point != points:

The computer makes selection

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

The player enters his selection

   player = input('Choose: ')

If both selections are the same, then there is a tie

   if player == computer:

       print('A tie - Both players chose '+player)

If otherwise, further comparison is made

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

If the player wins, then the player's point is incremented by 1

       print('Player won! '+player +' beats '+computer)

       player_point+=1

If the computer wins, then the computer's point is incremented by 1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

At the end of the game, the player's and the computer's points are printed

print("Player:",player_point)

print("Computer:",computer_point)

Solve recurrence relation x (n) = x(n/3) +1 for n >1,x(1) =1. (Solve for n = 3k)

Answers

To solve this recurrence relation, we can use the iterative method known as substitution method. First, we make a guess for the solution and then prove it by mathematical induction.

Let's guess that x(n) = log base 3 of n. We can verify this guess by induction:

Base Case: x(1) = log base 3 of 1 = 0 + 1 = 1. So, the guess holds for n = 1.

Induction Hypothesis: Assume that x(k) = log base 3 of k holds for all k < n.

Induction Step: We need to show that x(n) = log base 3 of n holds as well. We have:

x(n) = x(n/3) + 1

     = log base 3 of (n/3) + 1 (by induction hypothesis)

     = log base 3 of n - log base 3 of 3 + 1

     = log base 3 of n

     

So, x(n) = log base 3 of n holds for all n that are powers of 3.

Therefore, the solution to the recurrence relation x(n) = x(n/3) + 1 for n > 1, x(1) = 1, is x(n) = log base 3 of n for n = 3^k.

The global communication network that allows computers to connect and pass through information is called?

Answers

Answer: Internet

Explanation:

Answer:

The Internet.

Explanation:

Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.

Answers

The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).

B .Markup languages are used to structure content for computers to interpret is true.

What is a markup language in programming?

A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.

What does a markup language used to identify content?

Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.

To learn more about A markup language, refer

https://brainly.com/question/12972350

#SPJ2

Other Questions
When a peer reader is helping me refine my ideas and flow, i am in this stage of the writing process ____________________________ Consider the following code:a = 3b = 2print (a ** b)What is output?O 8O9O 16 Mark Twain once said, "If you tell the truth, you dont have to remember anything." six pillars of character karl goes to see dr. norton to help him overcome his fear of cats. karl's fear began in childhood when he petted a cat and someone slammed a door. every time karl petted the cat, the door slammed. now whenever karl sees a cat, he becomes very anxious. 29. karl's fear of cats is classified as (a) obsessive-compulsive disorder (b) panic disorder (c) a specific phobia (d) generalized anxiety disorder (e) conversion disorder 30. in the development of karl's fear of cats, what was the unconditioned stimulus (ucs) ? (a) fear (b) the cat (c) the slamming of the door (d) the person who slammed the door (e) the room in which the door slamming took place You are a salesperson for Jiffy Office Supplies. You and three other people (your team) just sealed a deal with the companys major client, Acme Printing. The new agreement would bring Acmes total sales for Jiffy to $20,000 per week. It is 6:30 pm on Friday evening and your phone rings. The caller, John Bly, is the Purchasing Agent for Acme. It seems that a recent deal on Jiffys end has tripled its need for spiral bound tablets. This deal would raise the sales for Jiffy to $30,000 per week. You are excited but there are two facts that nag at you. First, Acme has a credit limit with the company of $1,000,000 and second, this sale would constitute more than one-third of Jiffys sales. Worse yet, Bly intimated that if Jiffy did not agree to the addition he would look elsewhere to fill the need. In the competitive world of office supplies, failing to produce on a small point could lose the whole contract. You are empowered to make this decision, but not sure of the best way to go - accept the offer of the additional sales at this time to avoid Bly looking at a competitor, or put him off until Monday so that you can get together with your team and make the decision as a group? "Are Groups Better and More Capable of Making Critical Decisions than Individuals?" In the presentation, include: The advantages and disadvantages of individual decision making. The advantages and disadvantages of group decision making. Give a clear choice of either individual or group decision making in the answer to the question. Explain how you arrived at your decision using the facts and the assigned reading below or in class material as support. Explain why the option not chosen was eliminated. 6. Based on the results of your investigation, which materialis the best choice to use to pack a cold lunch for a trip tothe beach? Explain your answer. Where is the largest reservoir of nitrogen on earth located? in the oceans on land in the atmosphere in freshwater A car worth Rs. 210000 depreciated by 10%. Find its value after one year. When would we use "Je vous prsente What is the greatest lesson that being a dancer taught you? What is thename of the building above? Predict what you think will happen as aresult of a thief breaking into the bookstore. At the time of this speech in 2005, Jobs said that his cancer was in remission and he believed he had beaten the disease. Later, the cancer returned and Jobs died on Oct. 5, 2011, from complications connected to his pancreatic cancer. How does knowing that Jobs would ultimately lose his battle against cancer change the meaning/impact of his words for todays audience? How has global classification of countries shifted throughout the past 50 years? New lithographic equipment, acquired at a cost of $800,000 at the beginning of a fiscal year, has an estimated useful life of five years and an estimated residual value of $90,000. The manager requested information regarding the effect of alternative methods on the amount of depreciation expense each year. On the basis of the data presented to the manager, the double-declining-balance method was selected. In the first week of the fifth year, the equipment was sold for $135,000. Required: 1. Determine the annual depreciation expense for each of the estimated five years of use, the accumulated depreciation at the end of each year, and the book value of the equipment at the end of each year by the following methods: a. Straight-line method Year Depreciation Expense Accumulated Depreciation, End of Year Book Value, End of Year 1 $ $ $ 2 $ $ $ 3 $ $ $ 4 $ $ $ 5 $ $ $ b. Double-declining-balance method Year Depreciation Expense Accumulated Depreciation, End of Year Book Value, End of Year 1 $ $ $ 2 $ $ $ 3 $ $ $ 4 $ $ $ 5 $ $ $ Hide 2. Journalize the entry to record the sale, assuming double-declining balance method is used. If an amount box does not require an entry, leave it blank. 3. Journalize the entry to record the sale, assuming that the equipment was sold for $88,750 instead of $135,000. If an amount box does not require an entry, leave it blank. Grogon is experiencing a full manic episode. He is very active; he has written a 500-page novel and painted six pictures. Which category of symptoms is Grogon experiencing Write two things about the constitutional convention Sabrina is making a box in the shape of a cube with a side length of s. the volume of the box, s cubed, is 27/1,000 ft cubed. sabrina wants to completely cover two of the faces with labels. ILL GIVE FREE 5O POINT QUESTION IF YOU ANSWER THESE FOR ME!! If the probability that a person has blood type O+ is 0.35 and you have 40 randomly selectedpeople, about how many would you expect to have blood type O+? What is the standard deviationof the number of people who would have blood type O+ among the 40 people?