Categories
professional essay writers

“What are Incentives? Why are they important? Illustrate and explain examples.”

What are Incentives? Why are they important? Illustrate and explain examples.”

The term “Incentive” in the economy could be a general term; the term, which is important in the different sphere of the life, in economics if one does not know that, what incentives are then one, can never understand that what is economics. However, an American economist says “Economics in it’s entirely is a study of people’s response to incentive.” The term incentive is related to the economies, so it is a clear fact that incentives are central to do the study from the economical point.

Incentives could be defined as the benefits, rewards, or something which motivates you to do something; there could be the own decision and action of a person involves in the term. No one does something, for no reason, however, trade and economies can be related to the term incentive because when, a person or a customer buying anything, he/she have the concepts or the benefits of the product in mind, so every action is done can be called as human nature. Human nature can be described as the wish for something that is always related to the study of economies.

Types of the Economic Incentives

The incentives help the people to behave in a certain way, there are the preferences, desire, and need associated with the incentive, economic incentives can be related to the preferences, economic disincentives can discourage the behavior of the people, taxes can be a good example of disincentives, as the people never feel happy, in paying the taxes. The product and services in the economy can be more expensive, there are the extrinsic incentives and the intrinsic incentive that are also related to the growth of the economy, as both are the accumulation of the wealth.

Extrinsic incentives can be related to the rewards, which are given in the form of the bonuses, output or profit, it is also related to the social status and the power, it depends on the power of the people, however, these incentive are better and can work better as compared to the other incentives. Moreover, the intrinsic incentives are the incentive related to the internal, which can be related to psychological perspectives. Example getting the satisfaction from work, the intrinsic incentives gives motivation to the people, so they feel themselves the important part of the organization, they can be motivated by managers, they can be given the appreciations on the work they have done. 

Financial incentives are the incentives that are more dominant, in the economic field; the employment of any employee is related to the remuneration and the salaries, to win a certain amount of money. The employees of the company may be performed in the better way, example, if there is the idea of the product promotion, then the employee could be called to do the promotion and in that sense the incentive, can be given to him in the form of money. However, to promote those products or the services, the employee will work effectively to win a certain amount of money. 

Moral incentives are also there, which can also motivate the people to do good in the society. However, it could be related to the good and bad of the society; there are the moral actions in the moral incentives. Moreover, people do not do bad to get the moral incentives, and these incentives can be related to the term, welfare evolution, as the people will do the effort to bring the welfare in the society. People do not behave in a bad manner or the things where there are bad consequences so welfare evolution can be bought in the society and organizations can be effected through moral incentives (Acs, Szer, & Autio, 2015).

Importance of Incentives

Incentives can be described as the inducement; they can be related to the demand and supply, cost and benefits and the scarcity. However, there is the need to identify that what rewards should be given to the workers. Intrinsic and extrinsic both rewards are equally important, but there is the need to do the analyses, that how could workers and employees can be satisfied. Incentive programs are the motivational tool, and there could be the higher degree of the productivity, if incentives are given in an effective way, it can increase the earning of the companies, this, economies can also give effective results.

The importance of incentives should be focused; there is the need to promote the teamwork, as the teamwork can only be promoted if the incentives are there, because incentives can promote the collaboration, and everyone can work hard to get those incentives. There will be competition in the team members that who is performing better, and who is taking the maximum advantages of the incentives. However, to boost the moral economically, an incentive can play important role in any field of the economies. The service level can be enhanced and people can be satisfied (Wheelan, 2010).

Reciprocity can also be there in the organization, as the company gets the benefits from the employees and the employees get the benefits from the company, however, people can become rich, and when the people of any country are rich, they spend more in the economy and economy of the country get strengthen. Moreover, there is need to consider all the aspects of the incentives.

Lehman Brothers and Bear Stearns Study

Incentives can be given by the organization or the person, to make the other person happy, however, the organizations give the incentives to the worker, so that there could be the efficiency in their work and they can perform better. When employee know that he is going to evaluate and going to get on what he has performed, his performance can be automatically improved. Moreover, there are the various studies on the incentives and the employee’s performance. A study of 2009 at the universities indicates that companies pay the considerable incentives to the employees and executives to take the risk. Lehman Brothers and Bear Stearns have the top executive teams, and they have earned about $1.4 billion and $1 billion, in the form of the bonuses, cash and equity (Kille, 2010).

They have anticipated that the firms are getting benefits because the employees are happy and it is important to give benefits to the employees so that there could be productivity and profitability in the organization, the companies faced the losses because they did not anticipate the risks. The executives may fail to manage the risk; there is the need to impose the limits in the sales executives. Incentives can be related to the people and change; positive change can be brought in the organization.

Non-Discrimination

In the organizations, there is need to give the incentives on the fairness basis so that employees can be motivated. There should be non-discrimination principle follows in the organizations, there should be no discrimination based on the regional, ethnic, background differences. Here come the responsible of the managers to give the incentives with the fairness, if they want the economic stability and want to run the economic functions smoothly, then there is the need to think of the employees and need to give the incentives based on fairness (Prud’homme & Song, 2016).

However, there should be no biases in the organizations, because if the employees feel the discrimination or they come to know that they are not given the incentives on the fair basis, then they can leave the organization and productivity can be affected. However, all the activities of the companies or industries are related to the economic activities because when the companies or industries get strengthen in the market, the economy of the country can also get strengthen and better results in growth can be there.

Market liberalism and liberalism, regarding to the liberty and equality for the people or employees can also be related to the fairness of the incentives as there is free market economy, and people rights are concerned, so the companies need to protect the human rights, so there could be the ethnicity or culture of market liberalism. In this way, there will be the market growth and people will work effectively, to get the benefits, organizational performance will be increases, and the support will be given to the market economies, and the personal liberty regarding human rights can be focused. To promote the worldwide philosophy of the liberalism, the rights need to be promoted.

Economic Development Incentives

Economic development incentives are the incentives, which is taken by the government from the people of the country, they are may be in the form of tax, such incentives are taken to give the ultimate advantages to the people, however, the local government can also indulge in the programs, related to the economic development incentives.

There are the works in the country or cities; collective action problems are being focused in the countries through indulging the economic development, through taking the incentives, the work is done in the remote areas of the city or country. However, the poor areas or poor populations focused through concerning the economic development incentives. Through focusing on the economic development incentives, there can also be the emphasis on the big push model, as there will be the welfare of the economy. It is the need of the citizens because countries are because there is the increase in the unemployment level, the poverty is there. However, development incentives can play a role in attracting the businesses, so that maximum job opportunities can be there in the country (Bardsley, 2010).

In the end, the main purpose of the economic development incentives is to make the country prosperous, there is focus on changing the condition of the people who are living in the poverty, and however, however, there are the long-term and short-term incentives plans, so that people of the country can be helped in the better way. Infrastructure can be the main target of the economic development incentives, the ultimate benefits if the incentives are there, in the country, for the people. Incentives play an important role in the economy of the country; there can be benefits if the employees in the companies or industries work better for the incentives. However, economic development incentive can also be there, and the country can be improved.

References

Acs, Z. J., Szer, L., & Autio, E. (2015). Global Entrepreneurship and Development Index 2014. Springer.

Bardsley, N. (2010). Experimental Economics: Rethinking the Rules. Princeton University Press.

Kille, L. W. (2010, April 7). Executive compensation at Bear Stearns and Lehman Brothers, 2000-2008. Retrieved October 15, 2016, from http://journalistsresource.org/studies/economics/banks/executive-compensation-at-bear-stearns-and-lehman

Prud’homme, D., & Song, H. (2016). Economic Impacts of Intellectual Property-Conditioned Government Incentives. Springer.

Wheelan, C. (2010). Introduction to Public Policy. W. W. Norton & Company.

Categories
essay writing services how to write an admission essay professional essay writers

landsea tours

Company Background:

The Landsea Tours was founded in 1985 by Scott Mason. Scott is an entrepreneur who saw a chance to capitalize on the growing sightseeing market in Vancouver. He started by giving fun tours on a mini-coach. Since then, the company has been growing and had a big break through the enthusiasm of a young co-op student called Kevin Pearce. Pearce helped rebrand the company, and is now the current President and co-owner. Landsea Tours is one of the market leaders in the booing sightseeing market which is vital to Vancouver’s economy.

Our Mission and Vision statements;

· Vision: Landsea Tours elite team provides a year-round premium boutique sightseeing experiences. We strive to be the innovators and the company of choice in Vancouver/s tourism industry

· Mission: exceed expectations by providing world-class service excellence. Sightseeing the way, it should be

Landsea Tours competes in a very diverse market, as they provide services for a range of people. From luxury buses to ordinary coaches, they provide full day, multi-day and half day tours to ten destinations for both locals and tourists. Vancouver is a very big city with about 647,000 people who are all potential customers. In 2015, the city of Vancouver had 2.1 million visitors from the U.S, 940 000 from the Asia-Pacific region and 424,000 from Europe. Landsea Tours is also the only company that provides sea to sky tours, and this gives them an edge over the competition.

Westcoast Sightseeing offers similar tours of Vancouver as well as guided tours to the same destinations as Landsea, and are regarded as their most fierce competition. They also have similar social media ratings, and are licensed by Gray Line, a Denver-based tour company that offers sightseeing tours all over the world. The Vancouver Trolley Company and Star Limousine are both indirect competitors of Landsea Tours, as they offer similar services. The industry has very low barriers to entry, and there are frequent new entrants.

Landsea Tours brand is to pride themselves on being cleaner and more fuel-efficient than their competition. The company has been awarded Silver Certification from Green Tourism Canada and is Climate Smart certified. They also pride themselves on carefully selecting their guides through an extensive hiring process. Landsea hires based on personality and teach employees the skills they need. Above all, they look for people who genuinely care about their visitors’ vacation experience. This is evident in the fact that new employees spend five weeks in training, including two-and-a-half weeks of driver training to complete commercial driver licensing requirements. On social media, Landsea has a relatively small but engaged network and they are also rated highly by TripAdvisor.

Landsea’s target market can be segmented as follows;

1. Authentic experiences: These are people looking for authentic, tangible engagement with the destinations, with a particular interest in understanding the history of the places they visit. They are 55+ older. A significantly higher proportion of these visitors (17%) are from short-haul markets within BC, Alberta, and Washington State (most using their own vehicle) and 20% of these visitors are from long-haul North American markets like Ontario and California. Their top sources for trip planning are: airline websites, hotels and attractions. They seek good value and like tours that show the highlights but focus on nature

2. Cultural Explorers: They are “defined by their love of constant travel and continuous search for opportunities to embrace and discover cultures. They are younger than the ‘authentic experiences’ and are usually mostly aged 35-45. They don’t want to feel like tourists; they enjoy shared authentic experiences and don’t require pampering or luxury. Their primary trip planning sources are: websites of airlines, hotels, attractions or other services at destination; travel guides and books; and websites of regional or city tourism offices.

Competitive Analysis:

Target Audience:

· Landsea Tours & Adventures: Landsea is serving pleasant service to their customers since last 30 years and continuously doing so. They have a kind of niche market but to be the first position they have to take care of their customers. Landsea is targeting on the people from small age group to old age group people who is seeking to do adventures on their vacations. The activities that Landsea is doing are a proper package for children, young age group to old age group.

· Westcoast sightseeing is a competitor of Landsea. They are also offering same facilities except sea to sky trip. They are also targeting same age group as Landsea. Westcoast is a Denver based company that offers sightseeing tours all over the world.

· The Vancouver Trolly company is indirect competitor of Landsea. They are not offering lots of activities but they have low price range of offers. Landsea and this company sell each other’s products. This company target audience is limited but they are charging less compare to Landsea.

· Star Limousine is an indirect competitor of Landsea charters. This company offers VIP facilities and people who want first class facilities they can get it from Star Limousine Company. They have high range of charters which attract lots of customers.

Promotion Vehicle Used:

· Landsea Tours and Adventures: Promotion is the main part of the any business and Landsea needs to do more promotion because they have limited marketing budget. Landsea has partnership with the hotel concierges from last so many years. Concierges is number one driver for business, they are recommending Landsea to their customers for charters and trips which helps them a lot to grow their business.

· Company is doing promotion by social media, news papers, partnership, trade promotions bus adverts, sharing customers experience to the customers.

· Landsea has their website called “Landsea Tours and Adventures”. Landsea has top ranking position on “Vancouvertours.com” where most of the people visit this website.

· Viator is the biggest wholesaler for Landsea. Viator is owned by TripAdvisor and it has largest amount of customer reachability. Around 11 million travelers visit this site and have more than 3000 partners. So the Landsea tours booked by largest ravel website. (LANDSEA TOURS & ADVENTURES, 2017)

Westcoast sightseeing: Westcoast sightseeing is the competitor of the Landsea and this company is also a partner with the hotel Concierge.

· Westcoast sightseeing is doing marketing by broachers, social media, news papers, blogs, and many more.

· They have partnership with Tourism Industry BC, North Shore Tourism, Tourism Richmond, and Tourism Vancouver.

· They are very active on social media like twitter, Facebook, instagram, Google+. Compare to Landsea they are more active. (Sightseeing., 2017)

Vancouver Trolly Company: Vancouver Trolly Company is partner with hotel Concierge. This company is indirect competitor of Landsea.

· Vancouver Trolly Company has less appearance on social media. They are available on Facebook, Twitter only.

· They have top ratings on Viator and the rating was stated on 2011.

· Vancouver Trolly does the marketing by broachers, partnership, and social media. They charge less to the customers compare to others. (Trolley, 2017)

Star Limousine: Star Limousine is providing first class amenities service to their customers. They have wide range of luxurious vehicles. Recently they have introduced TESLA cars for their customers who want to enjoy the ride without burning fossil fuels.

· Star Limousine is located in so many places. They have wide range of network in Canada. They are doing marketing by showing their brand image to their customer by social media, customer’s feedback, and many more.

· They have partnership with so many hotel and motels. they are partnered with Tourism Vancouver, Whistler British Columbia, NLA, and The Vancouver Board of Trade. (Limousine, 2012)

Slogan and positioning:

1. Landsea Tours and Adventures: “Guided By Passion”. (Adventures, 2017)

2. Westcoast sightseeing: “Let’s explore together”. (Sightseeing., 2017)

3. Vancouver Trolly Company: “The Fun Begins The Minute You Board!”.

“THE TROLLEY WAS A MUCH BETTER OPTION THAN A LIMO!” (Trolley, 2017)

4. Star Limousine: “Exceeding Expectation”. (Limousine, 2012)

Brand Strength and Weakness:

Landsea Tours and Adventures:

Strengths:

1. Landsea has a wide range of activities for the tourist.

2. They have great facilities like hotel pickup and drop off.

3. They train their employees very well and they spend at least $5000 for training one employee which shows their affection.

4. Landsea is partnered with hotels and Viator which can enhance their network around the world.

5. They have wide range of charters. They have buses, cars, as well electric cars and each one cost them around $150,000. This shows that they are using premium product for their customer. (LANDSEA TOURS & ADVENTURES, 2017)

Weaknesses:

1. They don’t have Hop on-Hop off tours.

2. They have little bit high cost of trips compare to their competitors.

3. They are less active on social media.

4. Compare to their competitors Landsea has less attractive website. (LANDSEA TOURS & ADVENTURES, 2017)

Westcoast sightseeing:

Strengths:

1. They are also offering same adventure as Landsea and even more.

2. They have good appearance on social media

3. They are offering hop on-hop off facilities.

4. They have good website compare to Landsea. (Sightseeing., 2017)

Weaknesses:

1. They don’t have good vehicle as Landsea has.

2. Hey have less rating on their website compare to Landsea. (Sightseeing., 2017)

Vancouver Trolly Company:

Strengths:

1. Offers hop on-hop off facilities to the customers.

2. They have affordable offers compare to their competitors. (Trolley, 2017)

Weaknesses:

1. They are not active on social media.

2. Their website is not so attractive

3. Their marketing strategy weak compare to their competitors. (Trolley, 2017)

Star Limousine:

Strengths:

1. They have awesome cars and offer luxury to their customers.

2. They have wide range of market and they are located in different parts of the Canada.

3. Offering service to their customers from last so many years. (Limousine, 2012)

Weaknesses:

1. They charging more compare to their competitors.

2. They don’t offer other adventures offer like their competitors do.

3. They are the only transportation mode. (Limousine, 2012)

USP (Unique Selling Point):

Landsea Tours & Adventures: Landsea is one of the best companies for the tourists. Landsea USP is their wide range of offers for anyone. They have best employees to take care of you, best vehicles, and their affection towards their company. (Adventures, 2017)

Westcoast sightseeing: Westcoast is the direct competitor of Landsea and they offer same as compare to Landsea. But their unique selling point is their appearance on social media and on website. (Sightseeing., 2017)

Vancouver Trolly Company: Vancouver Trolly has less appearance on social media but they are offering good activities to their customer and their unique selling point is their low price range. (Trolley, 2017)

Star Limousine: Star Limousine is offering first class charters to their customer but they charge higher compare to their competitors. Their unique selling point is their appearance in the market as a luxury car brand company who offers extreme comfort travel ride. (Limousine, 2012)

OPPORTUNITY IDENTIFICATION:

For the clients most viable areas of opportunity from a positioning perspective there are five forces of competitive position analysis. They are:

· Supplier power

· Buyer power

· Rivalry competitors

· Threat of entrants

· Threat of substitute products or services

1. Supplier power

It is an evaluation of how the providers increase the costs. The costs are driven depending on the quantity of provider basic information, different feature in their item size and quality of the provider and cost of changing from one provider then onto the next.

2. Buyer power

It is an evaluation of how simple the purchaser makes the costs down. The costs are reduced down by the quantity of purchaser in the market, significance of every individual purchaser to the association and cost to the purchaser of changing starting with one provider then onto the next.

3. Rivalry among existing competitors

This depends on the capacity of adversaries in the market. Various sponsors, offering various things and also organizations, reduce the feature appeal.

4. Threat of new entrants

Beneficial markets pull in new hopefuls, which crumble benefit. Until tenants have very strong limits to entry, then the advantages will have reduction for the forceful price. Alternatively the control and impose appraisal procedures makes the government a sixth power for few organizations.

5. Threat of substitute products or services

Whenever similar substitute items exist in the market, it improves the chances of clients changing to options in light of cost increments. This declares both the energy of providers and the market.

Points of parity:

Points of parity are the difference in points between the competitors over your brand that you need to prevent. This is the place where you need to show you as a good competitor, so that you can ignore the advantage and focus on your points of difference.

In some cases points of parity are called as table stakes, these are the points you simply need to enter in to a market. Other times, points of parity are the advantages that competitors have that are valued by the customers.

Segmentation & target Audience:

In Canada, there is an extensive research made into visitor profiles in nation. There are some experiences of travel which are developed and those are marketed and sold by the government.

There are some travellers who are eventually look for destinations and also shows more interest of knowing the history of the places. Also, there are very much interested in travel to learn and experience.

The primary target audience are:

· Authentic Experiences: These travellers are mainly concentrating on understanding the history of the places which they tend to visit. They can gain some knowledge and experience while travelling to the new places. This type of travellers can mainly have seen in the age of above 55, in those 9% from the global countries travellers and 12% from the Canadian travelers.17% of visitors are from the short-haul markets and 20 % of visitors are from long haul markets. Mainly these types of travellers are open minded and independent. They prefer the integrating of local culture. They can learn everything about the place they visit. They can also have the improvement of understanding the others.

· Cultural Explorers: These types of travellers can be defined by their love of constant travel. They can have the habit of discover and can immerse themselves in the culture, people and the places they can visit. Young age grouper mainly follows this type of travelling. The age may be 35-45. They cannot be like tourists; they can enjoy the experience which is authenticated. They didn’t expect any luxury things in the travelling. The sources they used for travelling are air lines, hotels and other services. The cultural explorers are open minded and easy going. Also, they are more energetic, risk taker. They have constant exploration i.e. they always plan for the next outing.

Market Segmentation

Market Segmentation: It is a process of dividing a broad business market; it consists of both extension and potential consumers into subgroup of segments based on their characteristics.

Strategic approach to Segmentation

Number of SegmentsSegmentation StrategyComments
ZERONo strategyThere is no segmentation
OneThis segmentation is focus strategyIt focuses on a Small, tightly defined target market
Two or moreIt is a differentiated strategyThey focus on two or more targeted targets which they define

Segmentation

Segmentation baseExplanations
DemographicThose are individuals and aged above 18+.And couples, age from 25-34
GeographicThis type of travelers from different countries and remaining from the Canada.
PsychographicsThis type of experience travelers is having desire to find the new places to travel and they travel for free time to get away their stress.
BehaviouralThis type of travelers seen the adventures and cultural experiences.

Communication Objectives:

1 Marketing objectives:   To develop our Marketing plan

. Proposals of where the business should be, helping customers to set their business objectives and         illumination of the chances to seek after.

. Division, Focusing on and Situating

. Laying out proposals with respect to marking to help separate and recognize your organization.

. Observing and Control

. Budget plans 

. Assets

Marketing strategy: A marketing strategy is about formulating your company’s marketing direction. A marketing strategy will ask a number of business questions seeking to provide answers covering:

.   build up the brand awareness.

.   increase in market sales.

.   start new products and sales. 

.  new markets international or locally  

. increase profit 

Developing smart objectives:

. specific

.  time

.  realistic 

 .  Achievable

1. Create Brand Awareness: Making brand care is to light up your planned intrigue assemble about your picture of your thing or organization. Making brand care does not so much apply to another brand, yet rather often applies to a present brand which may endeavor to invade new markets. The brand message can be passed on through a couple of sorts of correspondence stations, for instance, standard mail, radio, TV publicizing, natural advancing.

2. Define a Fulfilling Need for Your Product/Service: In the broad exchanges framework part of your moving strategy, you will design the innovative structure for planning your connection, thing, or relationship in the proposed intrigue groups psyche to induce them to use your thing/ideal position.

Some of the methods that fulfilling need for their products. Few of them are 

• Low interest rates 

• A buy one get one free

• Reasonable price

• Provide a money-back guarantee

         3. Encourage Action from Your Target Audience: While engaging your planned intrigue gathering may have all the earmarks of resembling initiating them to make a get, it goes further. It’s totally veritable that using a get one, get one FREE offer is bolster, in any case, if you simply broadcast using one correspondence channel and only for a brief period, for example a one week time span, you will see a drop in purchaser interest and purchases.

References: Adventures, L. T. (2017). Tour of the Week. Retrieved from https://vancouvertours.com/ LANDSEA TOURS & ADVENTURES (February 12, 2017). Limousine, S. (2012). Retrieved from https://www.starlimousine.com/index.php Sightseeing., W. (2017). Westcoast Sightseeing. Retrieved from https://westcoastsightseeing.com/ Trolley, V. (2017). THE VANCOUVER TROLLEY COMPANY. Retrieved from http://www.vancouvertrolley.com/ Whittle, E. (2017, February 12). Landsea-Tours-Vanier 2016 Case Study. Retrieved September 28, 2017, fromhttps://www.fanshaweonline.ca/d2l/le/content/824561/viewContent/5406596/View http://newkind.com/how-to-position-technology-brand-points-parity/ https://www.cgma.org/resources/tools/essential-tools/porters-five-forces.html https://en.wikipedia.org/wiki/Market_segmentation#Bases_for_segmenting_consumer_markets https://en.wikipedia.org/wiki/Market_segmentation http://www.winmarketing.co.uk/marketing-strategy/marketing-objectives/ https://www.marketingbinder.com/writing-marketing-communication-objectives/

Categories
essay writing services how to write an admission essay professional essay writers

cv1 coffee makers

MAKING COFFEE WITH CV1 COFFEE MAKER 7

Making Coffee with CV1 Coffee Maker

Student

School

Making Coffee with CV1 Coffee Maker

The CV1 Coffee Maker is an excellent convenient, and compact, 8″H x 4.5″W x W x 8”D, coffee maker, it’s reliable, single serve, with a personal cup brewer, which uses a disposable brew basket and filter. The CV1 Coffee Maker comes out of the box ready to use, it has an automatic shut off when coffee is ready (Courtesy Products (n.d.).

The instructions will guide anyone from an expert coffee drinker/maker or beginners to use this machine.

All the items listed below are necessary to complete a single cup of coffee. (See Figure 1), and the diagram illustrates the coffee maker components (See Figure 2).

Figure 1 – Coffee Maker/Brew Basket & Filter/Condiments & Coffee Cup

Figure 2 – Coffee Maker Components

Follow the step by step instructions below to using the CVI Coffee Maker.

Step 1. Remove your CV1 from the box and plug in electrical socket (See Figure 2).

Figure 2 – Coffee Maker Plugged In

Step 2. Open Brew Basket and Filter and slide it into the Brew Basket compartment. (See Figure 3)

Figure 3 – Coffee, Brew Basket Filter and Brew Basket Compartment

Step 3. To filter the coffee through the Brew Basket filter, open door located on the top of the coffee maker, fill the coffee cup with water and pour into the water compartment and close the water compartment door. (See Figure 4). Comment by Darlene: Omit. Each step should begin with a verb.

Figure 4 – Filling the Water Compartment for Brewing

Step 4. The Coffee Maker is ready for Brewing. Place the cup under the Brew Basket compartment and push the On/Off button down and wait for the coffee to fill your cup. (See Figure 5).

Figure 5 – Coffee Cup in place and Push Down On/Off Button

Step 5. Mix in the condiment and have a delicious cup of coffee. (See Figure 6).

Figure 6 – Brewed Cup of Coffee and Condiments. Enjoy!

Coffee Maker will automatically turn off once the brewing is completed.

References:

Courtesy Products (n.d.). Retrieved from https://www.courtesyproducts.com/order.php?view=item&cview=category&ItemID=484

Feedback/Instructions

This is a good start, and the way you organized the document generally works. The topic is perfect for the assignment.

When it comes to writing instructions, remember that you don’t have much leeway in how you’ll phrase each step: each one should begin with a verb and end with a period. Likewise, you’ll format the graphics following the APA Style guidelines. I find this resource super useful when incorporating photographs or drawings, which can also be applied to screenshots, should you decide to include some in this paper or in the future (just scroll toward the bottom): https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_tables_and_figures_2.html.

For this project, you’re also required to figure out a way to break down the process into 2-3 separate phases with smaller steps “nested” within.

Check out my comments in the margins and let me know if you have any questions!

Best,

Sneza

Categories
essay writing services how to write an admission essay professional essay writers

outline of wyoming

Outlining a statute facilitates your understanding of the specific conduct that is regulated by the statute. It also provides details on how a court case resolves ambiguities and applies statutes to particular legal issues.

The first step in outlining a statute involves determining the elements, results, and exceptions of the statute in question. If the elements are linked with the word and, they must all be met to trigger the results. If elements are linked with the word or, only one of the elements must be established. If all of the elements are relevant but only some are needed, then the statute contains a factors test. A commonly known factors test is when child custody is determined by what is in the best interest of the child. The court considers factors such as: the fitness of the parent, the relationship between child and parent, living accommodations, placement of siblings, educational opportunities, religious education, etc. The result is what will happen when the elements of the statute are met. Exceptions occur when an additional element is established and the usual result does not follow.

Once you have outlined a relevant statute, you can use the LexisNexis Academic database to consult the Interpretive Notes and Decisions that follow federal statutes and the Notes section that follows state statutes. They will direct you to cases that interpret specific elements of the relevant statute.

The following are two examples of a statute and an outline of that statute:

Dog Bite Statute

If a dog or other animal, without provocation, attacks or injures any person who is peacefully conducting himself in any place where he may lawfully be, the owner of such dog or other animal is liable in damages to such person for the full amount of the injury sustained.

Dog Bite Statute Outline

  • Elements
    • If dog or other animal
    • Without provocation
    • Attacks or injures
    • Person
    • Peacefully conducting himself
    • In lawful location



  • Results
    • Owner of dog or animal is liable for damages for all injuries sustained



  • Exceptions
    • None

Escape from Prison Statute

If any person committed to prison shall break and escape there from or shall escape or leave without authority any building, camp, or place in which he is placed or directed to go or in which he is allowed to be, he shall be deemed guilty of an escape and shall be punished by imprisonment for a term not to exceed 5 years, to commence immediately upon the expiration of the term of his previous sentence.

Escape from Prison Statute Outline

  • Elements
    • Person committed to prison
    • Break, escape, or leave without authority
    • Any building, camp, or place
    • Where he is placed, directed to go, or allowed to be



  • Results
    • Guilty of escape
    • Prison term not to exceed 5 years to follow previous sentence



  • Exceptions
    • None

To prepare for this assignment:

  • Review the assigned pages of Chapter 3 in your course text, Principles of Legal Research. Focus on sources of and research methods for locating statutes.
  • Locate one court interpretation of the Wyoming blackmail statute.
  • Use the LexisNexis Academic database in the Walden Library and search for Wyo. Stat. § 6-2-402 using the following sources under the Federal & State Codes section of the Legal tab:
    • WY-Wyoming Statutes Annotated, Constitution
    • Search: 6-2-402
    • Select a court interpretation in the Notes section that follows the statute
  • Review the Wyoming blackmail statute.
  • Outline the statute using the examples provided above for guidance.

The assignment: (1–2 pages)

  • Outline the Wyoming blackmail statute. List the elements, results, and exceptions of the statute.
  • Provide a brief explanation of the statute.
  • Analyze and explain at least one court interpretation of the Wyoming blackmail statute.

Support your Application Assignment with specific references to all resources used in its preparation. You are asked to provide a reference list only for those resources not included in the Learning Resources for this course.

Categories
essay writing service how to write an admission essay professional essay writers

the ____ option button lists formatting options following an insertion of cells, rows, or columns.

with Microsoft®

Office 2010 V O L U M E 1

PEARSON T O W N S E N D FERRETT HAIN VARGAS

with M ic roso f t

Office 2010 V O L U M E

T O W N S E N D I FERRETT I H A I N I VARGAS

Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River

Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Library of Congress Cataloging-in-Publication Data Townsend, Kris. Skills for success with Office 2010 / by Kris Townsend.

p. cm. ISBN 978-0-13-703257-0 (alk. paper) 1. Microsoft Office. 2. Business—Computer programs. I, Title.

HF5548.4.M525T692 201 I 005.5—dc22 2010016531

Editor in Chief: Michael Payne AVP/Executive Acquisitions Editor: Stephanie Wall Product Development Manager: Eileen Bien Calabro Editorial Project Manager: Virginia Gitariglia Development Editor: Nancy Lamm Editorial Assistant: Nicole Sam AVP/Director of Online Programs, Media: Richard Keaveny AVP/Dircctor of Product Development, Media: Lisa Strife Editor—Digital Learning & Assessment: Paul Gentile Product Development Manager, Media: Calhi Projitko Media Project Manager, Editorial: Alana Coles Media Project Manager, Production: John Cassar Director of Marketing: Kate Valentine Senior Marketing Manager: Tori Olscn Alves Marketing Coordinator SI/<<I« Osterlitz

Marketing Assistant: Darshika Vyas Senior Managing Editor: Cynthia /.onneveld Associate Managing Editor: Camille Trentacoste Production Project Manager: Camille Trentacoste Senior Operations Supervisor: Natacha Moore Senior Art Director: Jonathan Boylan Art Director: Anthony Gemmellaro Text and Cover Designer: Anthony Gemmellaro Manager, Rights and Permissions: Ilessa Albader Supplements Development Editor: Vonda Keator Full-Service Project Management: MPS Content Services, a Macmiilan Company Composition: MPS Content Services, a Macmiilan Company Printer/Binder: Quad/Graphics Taunton Cover Printer: Lchigli/Phocnix Typeface: Minion 10.5/12.5

Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft’ and Windows* are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Copyright © 2011 Pearson Education, Inc., publishing as Prentice Hall. All lights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, Upper Saddle River, New Jersey, 07458 Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Prentice Hall is an imprint of

P E A R S O N www.pearsonhighered.com

1 0 9 8 7 6 5 4 3 2

1 S B N – I 0 : 0 – 1 3 – 7 0 3 2 5 7 – 9

I S B N – 1 3 : 9 7 8 – 0 – 1 3 – 7 0 3 2 5 7 – 0http://www.pearsonhighered.com

Contents in Brief

Common Features Chapter 1 Common Features ot Office 2010 2

More Skills 26

Word Chapter 1 Create Documents with Word 2010 30

More Skills 54 Chapter 2 Format and Organize Text 64

More Skills 88 Chapter 3 Work with Graphics, Tabs, and Tables 98

More Skills 122 Chapter 4 Apply Special Text, Paragraph and

Document Formats 132 More Skills 156

Excel Chapter 1 Create Workbooks with Excel 2010 166

More Skills 190

Chapter 2 Create Charts 200 More Skills 224

Chapter 3 Manage Multiple Worksheets 234 More Skills 258

Chapter 4 Use Excel Functions and Tables 268 More Skills 292

Access Chapter 1 Work with Databases and

Create Tables 302 More Skills 326

Chapter 2 M a n a g e Datasheets and Create Queries 336 More Skills 360

Chapter 3 Create Forms 370 More Skills 394

Chapter 4 Create Reports 404 More Skills 428

PowerPoint Chapter 1 Getting Started with PowerPoint 2010 438

More Skills 462 Chapter 2 Format a Presentation 472

More Skills 496 Chapter 3 Enhance Presentations with Graphics 506

More Skills 530 Chapter 4 Present Data Using Tables, Charts,

and Animation 540 More Skills 564

Integrated Projects Chapter 1 Integrating Word, Excel, A c c e s s ,

and PowerPoint 574 More Skills 598

Chapter 2 More Integrated Projects for Word, Excel, A c c e s s , and PowerPoint 610 More Skills 634

Glossary 646

Index 654

Contents in Brief iii

Table of Contents

C o m m o n Fea tu res C h a p t e r 1 C o m m o n F e a t u r e s of Office 2 0 1 0 2

Skill 1 Start Word and Navigate the Word Window 6 Skill 2 Start Excel and PowerPoint and Work with

Multiple Windows 8 Skill 3 Save Files in New Folders 10 Skill 4 Print and Save Documents 12 Skill 5 Open Student Data Files and Save Copies

Using Save As 14 Skill 6 Type and Edit Text 16 Skill 7 Cut, Copy, and Paste Text 18 Skill 8 Format Text and Paragraphs 20 Skill 9 Use the Ribbon 22

Skill 10 Use Shortcut Menus and Dialog Boxes 24

More Skills More Skills 11 Capture Screens with the Snipping

Tool 26 More Skills 12 Use Microsoft Office Help 26 More Skills 13 Organize Files 26 More Skills 14 Save Documents to Windows Live 26

W o r d C h a p t e r 1 C r e a t e D o c u m e n t s with Word 2 0 1 0 3 0

Skill 1 Create New Documents and Enter Text 34 Skill 2 Edit Text and Use Keyboard Shortcuts 36 Skill 3 Select Text 38 Skill 4 Insert Text from Other Documents 40 Skill 5 Change Fonts, Font Sizes, and Font Styles 42 Skill 6 Insert and Work with Graphics 44 Skill 7 Check Spelling and Grammar 46 Skill 8 Use the Thesaurus and Set Proofing Options 48 Skill 9 Create Document Footers 50

Skill 10 Work with the Print Page and Save Documents in Other Formats 52

More Skills More Skills 11 Split and Arrange Windows 54 More Skills 12 Insert Symbols 54 More Skills 13 Use Collect and Paste to Create a

Document 54 More Skills 14 Insert Screen Shots into Documents 54

C h a p t e r 2 Format a n d O r g a n i z e Text 6 4 Skill 1 Set Document Margins 68 Skill 2 Align Text and Set Indents 70 Skill 3 Modify Line and Paragraph Spacing 72 Skill 4 Format Text Using Format Painter 74 Skill 5 Find and Replace Text 76 Skill 6 Create Bulleted and Numbered Lists 78 Skill 7 Insert and Format Headers and Footers 80 Skill 8 Insert and Modify Footnotes 82 Skill 9 Add Citations 84

Skill 10 Create Bibliographies 86

More Skills More Skills 11 Record AutoCorrect Entries 88 More Skills 12 Use AutoFormat to Create

Numbered Lists 88 More Skills 13 Format and Customize Lists 88 More Skills 14 Manage Document Properties 88

C h a p t e r 3 Work with G r a p h i c s , Tabs , a n d T a b l e s 9 8

Skill 1 Insert Pictures from Files 102 Skill 2 Resize and Move Pictures 104 Skill 3 Format Pictures Using Styles and

Artistic Effects 106 Skill 4 Set Tab Stops 108 Skill 5 Enter Text with Tab Stops 110 Skill 6 Apply Table Styles 112 Skill 7 Create Tables 114 Skill 8 Add Rows and Columns to Tables H6 Skill 9 Format Text in Table Cells 118

Skill 10 Format Tables 120

iv Table of Contents

More Skills More Skills 11 Insert Text Boxes 122 More Skills 12 Format with WordArt 122 More Skills 13 Create Tables from Existing Lists 122 More Skills 14 Insert Drop Caps 122

C h a p t e r 4 A p p l y S p e c i a l T e x t , P a r a g r a p h , a n d D o c u m e n t F o r m a t s 1 3 2

Skill 1 Create Multiple-Column Text 136 Skill 2 Insert a Column Break 138 Skill 3 Apply and Format Text Effects 140 Skill 4 Use and Create Quick Styles 142 Skill 5 Add Borders and Shading to Paragraphs

and Pages 144 Skill 6 Insert and Format Clip Art Graphics 146 Skill 7 Insert SmartArt Graphics 148 Skill 8 Format SmartArt Graphics 150 Skill 9 Create Labels Using Mail Merge 152

Skill 10 Preview and Print Mail Merge Documents 154

More Skil ls More Skills 11 More Skills 12 More Skills 13 More Skills 14

Create Resumes from Templates 156 Create Outlines 156 Prepare Documents for Distribution 156 Preview and Save Documents as Web Pages 156

Exce l C h a p t e r 1 C r e a t e W o r k b o o k s w i t h

Exce l 2 0 1 0 Skill 1 Create and Save New Workbooks Skill 2 Enter Worksheet Data and Merge and

Center Titles Skill 3 Construct Addition and

Subtraction Formulas Skill 4 Construct Multiplication and

Division Formulas Skill 5 Adjust Column Widths and Apply Cell Styles Skill 6 Use the SUM Function Skill 7 Copy Formulas and Functions

Using the Fill Handle

1 6 6 170

Skill 8 Format, Edit, and Check the Spelling of Data 184 Skill 9 Create Footers and Change Page Settings 186

Skill 10 Display and Print Formulas and Scale Worksheets for Printing

More Skil ls More Skills 11

More Skills 12 More Skills 13 More Skills 14

Create New Workbooks from Templates Use Range Names in Formulas Change Themes Manage Document Properties

C h a p t e r 2 Skill 1 Skill 2

Skill 3 Skill 4 Skill 5 Skill 6 Skill 7

Skill 8

Skill 9 Skill 10

C r e a t e C h a r t s Open Existing Workbooks and Align Text Construct and Copy Formulas Containing Absolute Cell References Format Numbers Create Column Charts Format Column Charts Create Pie Charts and Chart Sheets Apply 3-D Effects and Rotate Pie Chart Slices Explode and Color Pie Slices, and Insert Text Boxes Update Charts and Insert WordArt Prepare Chart Sheets for Printing

More Ski l ls More Skills 11 More Skills 12 More Skills 13

Insert and Edit Comments Change Chart Types Copy Excel Data to Word Documents

More Skills 14 Fill Series Data into Worksheet Cells

188

190 190 190 190

2 0 0 204

206 208 210 212 214

216

218 220 222

224 224

224

224

172 C h a p t e r 3 M a n a g e M u l t i p l e W o r k s h e e t s 2 3 4

172 Skill 1 Work with Sheet Tabs 238

174 Skill 2 Enter and Format Dates 240 174 Skill 3 Clear Cell Contents and Formats 242

176 Skill 4 Move, Copy, Paste, and Paste Options 244

178 Skill 5 Work with Grouped Worksheets 246

180 Skill 6 Use Multiple Math Operators in a Formula 248 Skill 7 Format Grouped Worksheets 250

182 Skill 8 Insert and Move Worksheets 252

Table of Contents v

Skill 9 Construct Formulas That Refer to Cells in Other Worksheets 254

Skill 10 Create Clustered Bar Charts 256

More Skills More Skills 11 Create Organization Charts 258 More Skills 12 Create Line Charts 258 More Skills 13 Set and Clear Print Areas 258 More Skills 14 Insert Hyperlinks 258

C h a p t e r 4 U s e Exce l F u n c t i o n s a n d T a b l e s 2 6 8 Skill 1 Use the SUM and AVERAGE Functions 272 Skill 2 Use the MIN and MAX Functions 274 Skill 3 Move Ranges with Functions,

Add Borders, and Rotate Text 276 Skill 4 Use the IF Function 278 Skill 5 Apply Conditional Formatting with

Custom Formats, Data Bars, and Sparklines 280 Skill 6 Use Find and Replace and Insert

the NOW Function 282 Skill 7 Freeze and Unfreeze Panes 284 Skill 8 Create and Sort Excel Tables 286 Skill 9 Use the Search Filter in Excel Tables 288

Skill 10 Convert Tables to Ranges, Hide Rows and Columns, and Format Large Worksheets 290

More Skills More Skills 11 Apply Conditional Color Scales

with Top and Bottom Rules 292 More Skills 12 Use the Payment (PMT) Function 292 More Skills 13 Create PivotTable Reports 292 More Skills 14 Use Goal Seek 292

A c c e s s C h a p t e r 1 Work with D a t a b a s e s

a n d C r e a t e T a b l e s 3 0 2 Skill 1 Open and Organize Existing Databases 306 Skill 2 Enter and Edit Table Data 308 Skill 3 Create Forms and Enter Data 310 Skill 4 Filter Data in Queries 312 Skill 5 Create, Preview, and Print Reports 314 Skill 6 Create Databases and Tables 316

vi Table of Contents

Skill 7 Change Data Types and Other Field Properties 318

Skill 8 Create Tables in Design View 320 Skill 9 Relate Tables 322

Skill 10 Enter Data in Related Tables 324

More Skills More Skills 11 Compact and Repair Databases 326 More Skills 12 Import Data from Excel 326 More Skills 13 Work with the Attachment Data

Type 326 More Skills 14 Work with the Hyperlink

and Yes/No Data Types 326

C h a p t e r 2 M a n a g e D a t a s h e e t s a n d C r e a t e Q u e r i e s 3 3 6

Skill 1 Find and Replace Data 340 Skill 2 Filter and Sort Datasheets 342 Skill 3 Use the Simple Query Wizard 344 Skill 4 Format Datasheets 346 Skill 5 Add Date and Time Criteria 348 Skill 6 Create Queries in Design View 350 Skill 7 Add Calculated Fields to Queries 352 Skill 8 Work with Logical Criteria 354 Skill 9 Add Wildcards to Query Criteria 356

Skill 10 Group and Total Queries 358

More Skills More Skills 11 Export Queries to Other Fie Formats 360 More Skills 12 Find Duplicate Records 360 More Skills 13 Find Unmatched Records 360 More Skills 14 Create Crosstab Queries 360

C h a p t e r 3 C r e a t e Forms 3 7 0 Skill 1 Use the Form Wizard 374 Skill 2 Format Forms in Layout View 376 Skill 3 Use Forms to Modify Data 378 Skill 4 Use the Blank Form Tool 380 Skill 5 Customize Form Layouts 382 Skill 6 Add Input Masks 384 Skill 7 Apply Conditional Formatting 386 Skill 8 Create One-to-Many Forms 388 Skill 9 Enter Data Using One-to-Many Forms 390

Skill 10 Create Forms from Queries 392

More Skills More Skills 11 Validate Fields 394 More Skills 12 Add Combo Boxes to Forms 394 More Skills 13 Create Multiple Item Forms 394 More Skills 14 Create Macros 394

C h a p t e r 4 C r e a t e R e p o r t s 4 0 4 Skill 1 Create Reports and Apply Themes 408 Skill 2 Modify Report Layouts 410 Skill 3 Prepare Reports for Printing 412 Skill 4 Use the Blank Report Tool 414 Skill 5 Group and Sort Reports 416 Skill 6 Format and Filter Reports 418 Skill 7 Create Label Reports 420 Skill 8 Use the Report Wizard 422 Skill 9 Modify Layouts in Design View 424

Skill 10 Add Totals and Labels to Reports 426

More Skills More Skills 11 Export Reports to Word 428 More Skills 12 Export Reports to HTML Documents 428 More Skills 13 Create Parameter Queries 428 More Skills 14 Create Reports for Parameter Queries 428

PowerPo in t C h a p t e r 1 G e t t i n g S t a r t e d w i t h

P o w e r P o i n t 2 0 1 0 4 3 8 Skill 1 Open, View, and Save Presentations 442 Skill 2 Edit and Replace Text in Normal View 444 Skill 3 Format Slide Text 446 Skill 4 Check Spelling and Use the Thesaurus 448 Skill 5 Insert Slides and Modify Slide Layouts 450 Skill 6 Insert and Format Pictures 452 Skill 7 Organize Slides Using Slide Sorter View 454 Skill 8 Apply Slide Transitions and View Slide Shows 456 Skill 9 Insert Headers and Footers

and Print Presentation Handouts 458 Skill 10 Add Notes Pages and Print Notes 460

More Skil ls More Skills 11 Type Text in the Outline Tab 462 More Skills 12 Use Keyboard Shortcuts 462

More Skills 13 Move and Delete Slides in Normal View 462

More Skills 14 Design Presentations for Audience and Location 462

C h a p t e r 2 F o r m a t a P r e s e n t a t i o n 4 7 2 Skill 1 Create New Presentations 476 Skill 2 Change Presentation Themes 478 Skill 3 Apply Font and Color Themes 480 Skill 4 Format Slide Backgrounds with Styles 482 Skill 5 Format Slide Backgrounds with Pictures

and Textures 484 Skill 6 Format Text with WordArt 486 Skill 7 Change Character Spacing and Font Color 488 Skill 8 Modify Bulleted and Numbered Lists 490 Skill 9 Move and Copy Text and Objects 492

Skill 10 Use Format Painter and Clear All Formatting Commands 494

More Skil ls More Skills 11 Edit Slide Master 496 More Skills 12 Save and Apply Presentation

Template 496 More Skills 13 Create Slides from Microsoft Word

Outline 496 More Skills 14 Design Presentations with Contrast 496

C h a p t e r 3 E n h a n c e P r e s e n t a t i o n s w i t h G r a p h i c s 5 0 6

Skill 1 Insert Slides from Other Presentations 510 Skill 2 Insert, Size, and Move Clip Art 512 Skill 3 Modify Picture Shapes, Borders, and Effects 514 Skill 4 Insert, Size, and Move Shapes 516 Ski l l5 Add Text to Shapes and Insert Text Boxes 518 Skill 6 Apply Gradient Fills and Group

and Align Graphics 520 Skill 7 Convert Text to SmartArt Graphics

and Add Shapes 522 Skill 8 Modify SmartArt Layouts, Colors, and Styles 524 Skill 9 Insert Video Files 526

Skill 10 Apply Video Styles and Adjust Videos 528

More Skil ls More Skills 11 Compress Pictures 530

Table of Contents vii

More Skills 12 Save Groups as Picture Files 530 More Skills 13 Change Object Order 530 More Skills 14 Design Presentations Using

Appropriate Graphics 530

C h a p t e r 4 P r e s e n t D a t a U s i n g T a b l e s , C h a r t s , a n d A n i m a t i o n 5 4 0

Skill 1 Insert Tables 544 Skill 2 Modify Table Layouts 546 Skill 3 Apply Table Styles 548 Skill 4 Insert Column Charts 550 Skill 5 Edit and Format Charts 552 Skill 6 Insert Pie Charts 554 Skill 7 Apply Animation Entrance

and Emphasis Effects 556 Skill 8 Modify Animation Timing

and Use Animation Painter 558 Skill 9 Remove Animation and Modify Duration 560

Skill 10 Navigate Slide Shows 562

More Ski l ls More Skills 11 Prepare Presentations to be Viewed

Using Office PowerPoint Viewer 564 More Skills 12 Insert Hyperlinks in a Presentation 564 More Skills 13 Create Photo Albums 564 More Skills 14 Design Presentations with

Appropriate Animation 564

I n t e g r a t e d Pro jec ts C h a p t e r 1 I n t e g r a t i n g W o r d , E x c e l , A c c e s s ,

a n d P o w e r P o i n t 5 7 4 Skill 1 Move Text between Word Documents 578 Skill 2 Apply Heading Styles in Word 580 Skill 3 Create a PowerPoint Presentation

from a Word Document 582 Skill 4 Insert and Modify a Shape in PowerPoint 584 Skill 5 Import a Word Table into

an Excel Workbook 586 Skill 6 Insert a Shape from PowerPoint into Word

and Excel 588 Skill 7 Create and Work with an Excel Table 590

viii Table of Contents

Skill 8 Link Data between Office Applications Using O L E

Skill 9 Create Envelopes Using Data from Access Skill 10 Create Name Tags Using Data in Excel

More Ski l ls More Skills 11 Insert Subtotals in Excel and

Link Data to a Word Document More Skills 12 Insert Slides from Another

Presentation More Skills 13 Move and Copy Excel Worksheets

and Consolidate Data More Skills 14 Compare Shared Excel Workbooks

C h a p t e r 2

Skill 1 Skill 2 Skill 3 Skill 4

Skill 5

Skill 6 Skill 7

Skill 8 Skill 9

M o r e I n t e g r a t e d P r o j e c t s f o r W o r d , E x c e l , A c c e s s , a n d P o w e r P o i n t Create an Access Append Query Export Data from Access into Excel Create an Excel PivotTable Report Create External References between Excel Workbooks Insert a SmartArt Organization Chart into PowerPoint Insert an Excel PivotTable into PowerPoint Insert a PowerPoint Outline in Word and Create a Cover Page and Table of Contents Link and Embed Data from Excel into Word Export Data from Access to an R T F File and Insert the File into Word Insert Objects from PowerPoint into Word Skill 10

kills More Skills 11 Create an Excel PivotChart

and Link the PivotChart to Word More Skills 12 Create a Hyperlink between

PowerPoint, Word, and Excel Files More Skills 13 Insert a Total Row in an Excel Table

and Link the Table to PowerPoint More Skills 14 Compare Word Documents

Glossary

592 594 596

598

598

598 598

6 1 0 614 616 618

620

622 624

626 628

630 632

634

634

634 634

646

Index 654

About the Authors Kris Townsend is an Information Systems instructor at Spokane Falls Community College in Spokane, Washington. Kris earned a bachelor’s degree in both Education and Business, and a master’s degree in Education. He has also worked as a public school teacher and as a systems analyst. Kris enjoys working with wood, snowboarding, and camping. He commutes to work by bike and enjoys long road rides in the Palouse country south of Spokane.

1

Robert L. Ferrett recently retired as the Director of the Center for Instructional Computing at Eastern Michigan University, where he provided computer training and support to faculty. He has authored or co-authored more than 70 books on Access, PowerPoint, Excel, Publisher, WordPerfect, Windows, and Word. He has been designing, developing, and delivering computer workshops for more than two decades.

Catherine Hain is an instructor at Central New Mexico Community College in Albuquerque, New Mexico. She teaches computer applications classes in the Business and Information Technology School, both in the classroom and through the distance learning office. Catherine holds a bachelor’s degree in Management and Marketing and a master’s degree in Business Administration.

f t Alicia Vargas is an Associate Professor of Business Information Technology at Pasadena City College in California. She holds a bachelor’s and a master’s degree in Business Education from California State University, Los Angeles and has authored numerous textbooks and training materials on Microsoft Word, Microsoft Excel, and Microsoft PowerPoint.

A Special Thank You Pearson Prentice Hall gratefully acknowledges the contribution made by Shelley Gaskin to the first edition publication of this series—Skills for Success with Office 2007. The series has truly benefited from her dedication toward developing a textbook that aims to help students and instructors.We thank her for her continued support of this series.

About the Authors ix

Contributors We’d like to thank the following people for their work on Skills for Success:

Instructor Resource Authors Erich Adickes Parkland College Sharon Behrens Northeast Wisconsin Technical College Julie Boyles Portland Community College Barbara Edington St. Francis College Ranida Harris Indiana University Southeast Beth Hendrick Lake Sumter Community College Susan Holland Southeast Community College—Nebraska Andrea Leinbach Harrisburg Area Community College Yvonne Leonard Coastal Carolina Community College

Technical Editors Lisa Bucki Kelly Carling Hilda W i r t h Federico Jacksonville University Tom Lightner Missouri State University Elizabeth Lockley Joyce Nielsen

Reviewers Darrell Abbey Cascadia Community College Bridget I . Archer Oakton Community College Laura Aagard Sierra College John Alcorcha MTI College Barry Andrews Miami Dade College Natalie Andrews Miami Dade College Wilma Andrews Virginia Commonwealth University School

of Business Bridget Archer Oakton Community College Tahir Aziz J. Sargeant Reynolds Greg Balinger Miami Dade College Terry Bass University of Massachusetts, Lowell Lisa Beach Santa Rosa Junior College Rocky Belcher Sinclair Community College Nannette Biby Miami Dade College David Billings Guilford Technical Community College Brenda K. Br i t t Fayetteville Technical Community College Alisa Brown Pulaski Technical College Eric Cameron Passaic Community College

x Contributors

Trina Maurer Anthony Nowakowski Ernest Gines Stacey Gee Hollins John Purcell Ann Rowlette Amanda Shelton Steve St. John Joyce Thompson Karen Wisniewski

Georgia Virtual Technical College Buffalo State College Tarrant County College—Southeast St. Louis Community College—Meramec Castleton State College Liberty University J. Sargeant Reynolds Tulsa Community College Lehigh Carbon Community College County College of Morris

Janet Pickard Linda Pogue Steve Rubin Eric Sabbah Jan Snyder Mara Zebest

Chattanooga State Tech Community College Northwest Arkansas Community College California State University—Monterey Bay

Gene Carbonaro Trey Cherry Kim Childs Pualine Chohonis Lennie Coper Tara Cipriano Paulette Comet

Gail W . Cope Susana Contreras de Finch Chris Corbin Janis Cox Tomi Crawford Martin Cronlund Jennifer Day Ralph DeArazoza Carol Decker Loorna DeDuluc Caroline Delcourt

Long Beach City College Edgecombe Community College Bethany University Miami Dade College Miami Dade College Gateway Technical College Community College of Baltimore

Coun ty—Ca to nsville Sinclair Community College College of Southern Nevada Miami Dade College Tri-County Technical College Miami Dade College Anne Arundel Community College Sinclair Community College Miami Dade College Montgomery College Miami Dade College Black Hawk College

Contributors continued

Michael Discello Kevin Duggan Barbara Edington Donna Ehrhart Hilda Wirth Federico Tushnelda Fernandez Arlene Flerchinger Hedy Fossenkemper Kent Foster Penny Foster-Shiver Arlene Franklin George Gabb Barbara Garrell Deb Geoghan Jessica Gilmore Victor Giol Melinda Glander Linda Glassburn Deb Gross Rachelle Hall Marie Hartlein Diane Hartman Betsy Headrick Patrick Healy

Lindsay Henning Kermelle Hensley Diana Hill Rachel Hinton Mary Carole Hollingsworth Stacey Gee Hollins Bill Holmes Steve Holtz Margaret M. Hvatum Joan Ivey Dr. Dianna D. Johnson Kay Johnston Warren T. Jones, Sr. Sally Kaskocsak Renuka Kumar Kathy McKee Hazel Kates Gerald Kearns

Pittsburgh Technical Institute Midlands Technical Community College St. Francis College Genesee Community College Jacksonville University Miami Dade College Chattanooga State Tech Community College Paradise Valley Community College Withrop University Anne Arundel Community College Bucks County Community College Miami Dade College Delaware County Community College Bucks County Community College Highline Community College Miami Dade College Northmetro Technical College Cuyahoga Community College, West Ohio State University Glendale Community College Montgomery County Community College Utah Valley State College Chattanooga State Northern Virginia Community

College—Woodbridge Yavapai College Columbus Technical College Chesapeake College Broome Community College GA Perimeter St. Louis Community College—Meramec Chandler-Gilbert Community College University of Minnesota Duluth St. Louis Community College Lanier Technical College North Metro Technical College Columbia Basin College University of Alabama at Birmingham Sinclair Community College Community College of Baltimore County North Metro Technical College Miami Dade College Forsyth Technical Community College

Charles Kellermann

John Kidd Chris Kinnard Kelli Kleindorfer Kurt Kominek Dianne Kotokoff Cynthia Krebs Jean Lacoste Gene Laugh rey David LeBron Kaiyang Liang Linda Lindaman Felix Lopez Nicki Maines Cindy Manning Patri Mays Norma McKenzie Lee McKinley Sandy McCormack Eric Meyer Kathryn Miller

Gloria A. Morgan Kathy Morris Linda Moulton Ryan Murphy Stephanie Murre Wolf Jackie Myers Dell Najera

Scott Nason Paula Neal Bethanne Newman Eloise Newsome

Karen Nunan Ellen Orr Carol Ottaway Denise Passero Americus Pavese James Gordon Patterson Cindra Phillips

Northern Virginia Community College—Woodbridge

Tarrant County Community College Miami Dade College American Institute of Business NE State Tech Community College Lanier Technical College Utah Valley University Virginia Tech Northern Oklahoma College Miami Dade College Miami Dade College Black Hawk College Miami Dade College Mesa Community College Big Sandy Community and Technical College Paradise Valley Community College El Paso Community College GA Perimeter Monroe Community College Miami Dade College Big Sandy Community and Technical College,

Pike Ville Campus Monroe Community College University of Alabama, Tuscaloosa Montgomery County Community College Sinclair Community College Moraine Park Technical College Sinclair Community College El Paso Community College, Valle Verde

Campus Rowan Cabarrus Community College Sinclair Community College Paradise Valley Community College Northern Virginia Community

College—Woodbridge Northeast State Technical Community College Seminole Community College Chemeketa Community College Fulton-Montgomery Community College Community College of Baltimore County Paradise Valley Community College Clark State CC

Contributors

Contributors continued

Janet Pickard Chattanooga State Tech Community College Diane Stark Phoenix College Floyd Pittman Miami Dade College Neil Stenlund Northern Virginia Community College Melissa Prinzing Sierra College Linda Stoudemayer Lamar Institute of Technology Pat Rahmlow Montgomery County Community College Pamela Stovall Forsyth Technical Community College Mary Rasley Lehigh Carbon Community College Linda Switzer Highline Community College Scott Rosen Santa Rosa Junior College Margaret Taylor College of Southern Nevada Ann Rowlette Liberty University Martha Taylor Sinclair Community College Kamaljeet Sanghera George Mason University Michael M. Taylor Seattle Central Community College June Scott County College of Morris Roseann Thomas Fayetteville Tech Community College Janet Sebesy Cuyahoga Community College Ingrid Thompson-Sellers GA Perimeter Jennifer Sedelmeyer Broome Community College Daniel Thomson Keiser University Kelly SellAnne Arundel Community College Astrid Hoy Todd Guilford Technical Community College Teresa Sept College of Southern Idaho Barb Tollinger Sinclair Community College Pat Serrano Scottsdale Community College Cathy Urbanski Chandler Gilbert Community College Amanda Shelton J. Sargeant Reynolds Sue Van Boven Paradise Valley Community College Gary Sibbits St. Louis Community College—Meramec Philip Vavalides Guildford Technical Community College Janet Siert Ellsworth Community College Pete Vetere Montgomery County Community College— Robert Sindt Johnson County Community College West Campus Karen Smith Technical College of the Lowcountry Asteria Villegas Monroe College Robert Smolenski Delaware County Community College Michael Walton Miami Dade College Robert Sindt Johnson County Community College Teri Weston Harford Community College Gary R. Smith Paradise Valley Community College Julie Wheeler Sinclair Community College Patricia Snyder Midlands Technical College Debbie Wood Western Piedmont Community College Pamela Sorensen Santa Rosa Junior College Thomas Yip Passaic Community College Eric Stadnik Santa Rosa Junior College Lindy Young Sierra Community College Mark Stanchfield Rochester Community and Technical College Matt Zullo Wake Technical Community College

xii Contributors

I n s t r u c t o r s – Y o u a s k e d for it s o h e r e it is!

A M i c r o s o f t ® O f f i c e t e x t b o o k t h a t r e c o g n i z e s h o w s t u d e n t s l e a r n t o d a y –

Skills for Success with Microsoft

1 Office 2010 Volume 1

10 X 8.5 F o r m a t – Easy for students to read and type at the same time by simply propping the book up on the desk in front of their monitor

Clear ly Out l ined Sk i l l s – Each skill is presented in a single two-page spread so that students can easily follow along

Numbered S t e p s and Bul le ted Tex t – Students don’t read long paragraphs or text, but they will read information presented concisely

Easy-to-Find S t u d e n t Da ta Fi les – Visual key shows students how to locate and interact with their data files

S t a r t H e r e – Students know exactly where to start and what their starting file will look like

C H A P T E R

G e t t i n g S t a r t e d w i t h W i n d o w s 7 » YOU BK WINDOW 7 ro «CRK M I »F-JF IOM?«L« LOF RUINR-V.*™ PFLNJMN MO»»T*N>WN

MDAU mi mm • J- : >O-L

» IR WIND H I • >\XI OIJJAIZ* TOUR *»RK BV CNUR-J FILCI ir\i PUNNJ THOW tU« WIS FOLDCRI IHJIYAU

Your ilartlng » c r e « n will look Ilk* this: S K I L L !

chapter, you will be

S k i l l s L is t – A visual snapshot of what skills they will complete in the chapter

O u t c o m e – Shows students up front what their completed project will look like

You will tdvo your filoi a t :

T J H N M I M H7_S«II| ‘ ‘

S e q u e n t i a l P a g i n a t i o n – Saves you and your students time in locating topics and assignments I

VISUAL WALK-THROUGH XIII

Skills for Success l ock – Tells how much time students

need to complete the chapter

Introduct ion

• KM US TUNTNW *IR*I fie, 01 FGWRN INTO 4 «IR J .: -I—. IT…. I AIULT :;I N..I..: .:

• MIMIJ-»TT*IIHDR»«U««IJI;UIF.:M*NJFOU« |*:R-P<TKF* T > ffirt IN NUJX ITXFFL R»»I« IN RI«J

t Written for T o d a y ‘ s S t u d e n t s – skills are taught with numbered steps and bulleted text so students are less likely to skip valuable information T w o – P a g e S p r e a d s – Each skill is

presented on a two-page spread to help students keep up their momentum

* TITTR.TI bim irii mug], TU L>«

_ J

D a t a Files Are a S n a p – Students can now find their files easier than ever before with this visual map

C o l o r e d Text – Clearly shows what a student types

Hands-On – Students start actually working on their skills from Step 1

D o n e ! – Students always know when they’ve completed a skill

XIV VISUAL WALK-THROUGH

Skills for S u c c e s s

UorsSkJh © U M l d t o m i o C k g c n n f M

End-o f -Chapte r M a t e r i a l – Several levels of assessment so you can assign the material that best fits your students’ needs

M o r e S k i l l s – Additional skills included online

K e y T e r m s O n l i n e H e l p Sk i l ls

Midi .. – .! -.. I – :T.

O n l i n e P r o j e c t – Students practice using Microsoft Help online to help prepare them for using the applications on their own

H > u » i « i i HI

•.m • m •

Visual Walk-Through xv

Skills for S u c c e s s

Al l V i d e o s

a n d I n s t r u c t o r m a t e r i a l s

a v a i l a b l e o n t h e I R C D

Instructor Mater ia ls

I n s t r u c t o r ‘ s M a n u a l – Teaching tips and additional resources for each chapter

A s s i g n m e n t S h e e t s – Lists all the assignments for the chapter, you just add in the course information, due dates and points. Providing these to students ensures they will know what is due and when

S c r i p t e d L e c t u r e s – Classroom lectures prepared for you

A n n o t a t e d S o l u t i o n F i l e s – Coupled with the scoring rubrics, these create a grading and scoring system that makes grading so much easier for you

P o w e r P o i n t L e c t u r e s – PowerPoint presentations for each chapter

P r e p a r e d E x a m s – Exams for each chapter and for each application

S c o r i n g R u b r i c s – Can be used either by students to check their work or by you as a quick check-off for the items that need to be corrected

S y l l a b u s T e m p l a t e s – for 8-week, 12-week, and 16-week courses

T e s t B a n k – Includes a variety of test questions for each chapter

C o m p a n i o n W e b S i t e – Online content such as the More Skills Projects, Online Study Guide, Glossary, and Student Data Files are all at www.pearsonhighered.com/skills

xvi Visual Walk-Throughhttp://www.pearsonhighered.com/skills

with M ic roso f t

Office 2010 V O L U M E 1

C H A P T E R J Common Features of Office 2010 • The programs in Microsoft Office 2010—Word, Excel, PowerPoint, and Access—share common

tools that you use in a consistent, easy-to-learn manner.

• Common tasks include opening and saving files, entering and formatting text, and printing your work.

Your starting screen will look like this: SKILLS SKILLS 1 – 1 0 TRAINING Umt Insert Pjgt 1

C M M mailt – 1 1 – * 41 IT

«3f»or>

AaBtccJK AaBbCcIK A A B B G .-YABBCC

‘ Items’ “Mo:ca; . rtfacmgl H*jding2 ChtDQt

Past 1 ol I Wmdi 0

A t t h e e n d o f t h i s chapter , y o u w i l l be a b l e t o :

Skill 1 Start Word and Navigate the Word Window Skill 2 Start Excel and PowerPoint and Work with

Multiple Windows Skill 3 Save Files in New Folders Skill 4 Print and Save Documents Skill 5 Open Student Data Files and Save Copies

Using Save As Skill 6 Type and Edit Text Skill 7 Cut, Copy, and Paste Text Skill 8 Format Text and Paragraphs Skill 9 Use the Ribbon Skill 10 Use Shortcut Menus and Dialog Boxes

MORE SKILLS

More Skills 11 Capture Screens with the Snipping Tool More Skills 12 Use Microsoft Office Help More Skills 13 Organize Files More Skills 14 Save Documents to Windows Live

2 C O M M O N FEATURES OF OFFICE 2 0 1 0 | C O M M O N FEATURES C H A P T E R 1

Outcome Using the skills listed to the left will enable you to create documents similar to this:

Visit Aspen Falls! A s p e n F a l l s o v e r l o o k s t h e P a c i f i c O c e a n

a n d is s u r r o u n d e d b y m a n y v i n e y a r d s a n d

w i n e r i e s . O c e a n r e c r e a t i o n is a c c e s s e d

p r i m a r i l y a t D u r a n g o C o u n t y P a r k . T h e

A s p e n L a k e R e c r e a t i o n A r e a p r o v i d e s y e a r

r o u n d f r e s h w a t e r r e c r e a t i o n a n d is t h e

c i t y ‘ s l a r g e s t p a r k .

Local Attractions • W i n e C o u n t r y

o W i n e Tas t ing Tou rs

o Winer ies

• W o r d s w o r t h Fel lowship Museum of A r t

• Du rango C o u n t y M u s e u m of H is to ry

• Conven t ion Center

• A r t Galleries

• Gl ider T o u r s

Aspen Fallc Annual Events • Annua l Starving Artists Sidewalk Sale

• A n n u a l W i n e Festival

• C inco de Mayo

• Vintage Car S h o w

• Her i tage D a y Parade

• Harvest Days

• A m a t e u r Bike Races

• Farmer ‘s Market

• Aspen Lake Nature Cruises

• Aspen Falls T r ia th lon

• Tas te of Aspen Falls

• W i n t e r Blues Festival

Contact Y o u r N a m e for more informat ion.

Common Features of Office 2010

You will save your files as: Lastname_Firstname_cfO 1 _Visit 1 Lastname_Firstname_cfO l_Visit2 Lastname_Firstname_cf01_Visit3

Common Features Chapter 1 | Common Features of Office 2010 3

In t h i s c h a p t e r , y o u w i l l c r e a t e d o c u m e n t s f o r t h e A s p e n F a l l s C i t y

H a l l , w h i c h p r o v i d e s e s s e n t i a l s e r v i c e s f o r t h e c i t i z e n s a n d v i s i t o r s o f

A s p e n F a l l s , C a l i f o r n i a .

C o m m o n Features of Of f ice 2 0 1 0 • Microsoft Office is the most common software used to create and share

personal and business documents.

• Microsoft Office is a suite o f several programs—Word, PowerPoint, Excel, Access, and others—that each have a special purpose.

• Because of the consistent design and layout o f Microsoft Office, when you learn to use one Microsoft Office program, you can use most o f those skil ls when working wi th the other Microsoft Office programs.

• T h e files you create w i t h Microsoft Office need to be named and saved in locations where they can be easily found when you need them.

C o m m o n F e a t u r e s o f O f f i c e 2 0 1 0 | C o m m o n F e a t u r e s C h a p t e r 1

Time to complete all 10 skills – 50 to 90 minutes

Find your student data files here:

Student data files needed for this chapter:

« cf01_Visit

• cf01_Visit_Events

cfOl Visit River

C O M M O N FEATURES C H A P T E R 1 | C O M M O N FEATURES OF OFFICE 2 0 1 0 5

• The Word 2010 program can be launched by clicking the Start button, and then locating and clicking the Microsoft Word 2010 command.

• When you start Word, a new blank document displays in which you can type text.

1. In the lower left corner of the desktop, click the Start button © .

2 . In the lower left corner of the Start menu, click the All Programs command, and then compare your screen with Figure 1 . –

The Microsoft Office folder is located in the All Programs folder. If you have several programs installed on your computer, you may need to scroll to see the Microsoft Office folder.

3 . Click the Microsoft Office folder, and then compare your screen with Figure 2. –

Below the Microsoft Office folder, commands that open various Office 2010 programs display.

4 . From the Start menu, under the Microsoft Office folder, click Microsoft Word 2010, and then wait a few moments for the Microsoft Word window to display.

5 . If necessary, in the upper right corner of the Microsoft Word window, click the Maximize button B| .

• C o n t i n u e t o t h e n e x t p a g e t o c o m p l e t e t h e s

6 Common Features of Office 2010 | Common Features Chapter 1

OotxMvtntx

Ptttuin All Programs folder list

(your list will be different)

Microsoft Office folder

Start button Figure 1

Adobe Acrobat 70 Professional Q Adcbe Designer 7.0 C Dtftuft Program; 9. DesHoe Gadget Gallery tr Internet Eiplorer Cj Window; Anytime Upgrade | | Window! DVD 1 M B . i Window, Fu ind Son

Window, Media Center Q Window! Media Pla/cr ‘ : Window! Update — XPSVI | Accn

Gamei

MOMSR Cflic SharePoi Startup

Microsoft Office folder

Office 2 0 1 0 programs (your

list may be different)

«•# Window! f a> and Sun • » Window, Media Center B Window! Media Player

Window! Update •4 XPS Viewer

l l l l l l l l l l Game!

Maintenance

Microsoft Office Aj Microsoft Access 2 0 1 0

• M.crcscfl tjcel 2 0 1 0 J3 • ‘ . – WoPath Dowgne. 2 0 1 0 X i r.l;rcsofl Inf cPaal FtCti M 0

N Microsoft OneNcle 2 0 1 0 0 MKicMfl Outlook 2 0 1 0

i_ Mjcroioft PowerPoint 2 3 1 0 _tj Microsoft Publnher 2 0 1 0 1 Microsoft SharePomt Workspace 21 4 lAcrcsoft Wort 2 0 1 0

Mcrosft Olf.ce 2 0 1 0 Tool!

M lhttp://Olf.ce

SKILL 1: Start Word and Navigate the Word Window

^ — — — i i !ni(rt fsgcUrrcut RefcuoM! M*!ingl P*.,f.> \

– CWtmlBon,. • u • A” A ‘ A.- ;=•!=•••> 51 “I V • A • c

AaBbCcOc AaBbCcCX AaBbCi A a B b C c r tioimil ‘ I no Sp»cl… Htadlng I Hf a&ng ? Cnarige

Ribbon tab E –

6 .

St)M» • -< * « ‘ « « •

J –

names h Home tab

– *

fewer! F>g*l»>©ul Rfffmnol ru . i – 3 : vuw f

C . r . » m ( H , . » , – » – A” A – A.- * • E – 1= ‘ * * )l U A a B b C c O < A»BbCcD( AaBbC. A . l B I . C l . ^A. t mi a • * • x. x ‘

•normal I Mo Saxi-. Mraamg 1 ; Hsasing: – Chlnga

* J f ir.3 –

Rsplacf

SlyH.”- < S « » a ‘

.7 f jar. j

Youi-Namejfi •

Group names Paragraph mark and insertion point

Quick Access Toolbar

New blank Word document

Figure 3 Heading 1 thumbnail

Styles group Show/Hide button selected Insertion point and paragraph mark

Heading 1 formatting applied Home tab is active

7 .

8 .

9 .

On the Ribbon’s Home tab, in the Paragraph group, click the Show/Hide button H until it displays in gold indicating that it is active. Compare your screen with Figure 3 .

Above the blank Word document, the Quick Access Toolbar and Ribbon display. At the top of the Ribbon, a row of tab names display. Each Ribbon tab has buttons that you click to perform actions. The buttons are organized into groups that display their names along the bottom of the Ribbon.

In the document, the insertion point— a vertical line that indicates where text will be inserted when you start typing—flashes near the top left corner.

The Show/Hide button is a toggle button— a button used to turn a feature both on and off. The paragraph mark (f) indicates the end of a paragraph and will not print.

In the document, type your first and last names. As you type, notice that the insertion point and paragraph mark move to the right.

On the Home tab, in the Styles group, point to—but do not click—the Heading 1 thumbnail to show the Live Preview—a feature that displays the result of a formatting change if you select it.

Click the Heading 1 thumbnail to apply the formatting change as shown in Figure 4. If the Word Navigation Pane displays on the left side of the Word window, click its Close [*] button.

You have completed Skill 1 of 10

Figure 4 6 J 6 P M

C Z 3 / 2 3 1 2

Common Features Chapter 1 | Common Features of Office 2010 7

• When you open more than one Office program, each program displays in its own window.

• When you want to work with a program in a different window, you need to make it the active window.

1 . Click the Start button © , and then compare your screen with F i g u r e 1.

Your computer may be configured in such a way that you can open Office programs without opening the All Programs folder. The Office 2010 program commands may display as shortcuts in the Start menu’s pinned programs area or the recently used programs area. Your computer’s taskbar or desktop may also display icons that start each program.

2 . From the Start menu, locate and then click Microsoft Excel 2010. Depending on your computer, you may need to double-click—not single click—to launch Excel. Compare your screen with F i g u r e 2 . If necessary, click the Maximize – button mm\<

A new blank worksheet displays in a new window. The first cell—the box formed by the intersection of a row and column—is active as indicated by the thick, black border surrounding the cell. When you type in Excel, the text is entered into the active cell.

The Quick Access Toolbar displays above the spreadsheet. The Excel Ribbon has its own tabs and groups that you use to work with an Excel spreadsheet. Many of these tabs, groups, and buttons are similar to those found in Word.

Categories
coursework help help me write my essay professional dissertation writers professional essay writers

if4- lewis structure

What is the Lewis structure for IF4-?
3,187 results
Chemistry
What is the Lewis structure for IF4-?

asked by Emma on March 10, 2008
chemistry
Lewis dot structure of IF4+

asked by Mely on November 6, 2010
Chemistry
Identify the true statement about Lewis structures. Select all the correct answers. 1. Hydrogen is usually surrounded by 4 electrons in a valid Lewis structure. 2. A single bond in a Lewis structure represents 2 electrons. 3. A double bond in a Lewis

asked by will.i.am on February 26, 2013
Chemistry
For a lab experiment we have to draw the lewis structures of hydrides. 1) Carbon It asks for the formula of hydride. Total # of valence electrons and the lewis structure. Total electrons would be four. I am not sure what the formula would be or how to find

asked by Hannah on November 16, 2011
Chem 1
Why is this phrase, “Lewis Structure” a misnomer? I’ve googled it… and I can’t seem to find an answer. Any suggestions as to where I can read some info on that? Lewis implies ionic bond, structure implies fixed covalent bonds. Screw you, that’s

asked by Rossi on October 25, 2006

Chemistry – oxidation numbers
How do you use a Lewis Structure to find the oxidation state of an element. I have this question using the oxidation rule i got +2, however how do i use it with Lewis structure. QUESTION Use the Lewis structure of a thiosulfate ion to find the oxidation

asked by Farah on May 1, 2011
Chemistry..
For the lewis structure of BCl3, does it have a total of 24 valence electrons? Also does it have a total of 4 bonds? If possible can you draw the lewis structure?

asked by Anonymous on November 23, 2012
CHEM
the number of nonbonding electrons exceeds the number of bonding electrons in the lewis structure of which of the following molecules? I am having a problem with the Lewis structures. HCN NH3 H2O please explain the structure thank you so much

asked by layla on February 25, 2014
chemsitry
What is the formal charge on each of the atoms in the Lewis structure of the PO4 (-3) charge? Draw another possible Lewis structure of the phosphate ion below. Formal charge on P is ? -how do I do this problem.

asked by Sarah on November 13, 2010
chemistry
Which of the following ions possess a dipole moment? (a) ClF2+ has a dipole moment has no dipole moment cannot be determined (b) ClF2− has a dipole moment has no dipole moment cannot be determined (c) IF4+ has a dipole moment has no dipole moment cannot

asked by anonymous on July 12, 2017
chemistry
Draw the Lewis structure of NO2- Assign formal charges to each atom in the O3 molecule shown below. Be sure to click the +/- button below (it will turn yellow when activated) before clicking on the molecule. .. .. .. :O–O==O .. .. Based on formal charges,

asked by mandy on November 14, 2008
CHEMISTRY
What is the Lewis dot structure for the HYDRIDE ion? A)H:- B)H+ C)H’ D)H3O+ E)none It’s hard for me to read the dots but I THINK answer a) looks like this? H:- If so that is the Lewis dot structure for the hydride ion

asked by CHEMgurl on April 21, 2007
chemistry(check my answer)
how do resonance structure related to its real structure? resonance structure is just another way to write the lewis dot with different formal charges and bond order

asked by phys on April 8, 2010
Chemisty Please Help
The instructions are, Write Lewis structures that obey the octet rule for the following species. (Assign atomic charges where appropriate.) 1) XeO4 2) CIO^-4 3) PO4^-3 Would I just draw them in a different way or just the regular Lewis Structure?

asked by Mary on July 3, 2013
Chemistry
Give the formal charge on the sulfur atom in a Lewis structure for the sulfate ion in which every atom satisfies the octet rule. Based off my lewis structure, I think the formal charge of the the sulfur atom would be +2. Is that correct?

asked by Anonymous on May 2, 2017

Chemistry
To draw the lewis dot structure of H3COH3, Do I need to rearrange the formula as CH3OCH3? If not, On paper I have O H H C O C H H H I am not sure if this is the right structure.

asked by My name is Earl on April 24, 2016
chemistry
what is the lewis dot structure for SO4 -2 and the ideal bonds, mollecular structure and hybrid orbitals?

asked by Raj on January 15, 2009
HELP!! Chemistry
Draw a Lewis structure for SO(subscript 2) in which all atoms obey the octet rule. Show formal charges. Draw a Lewis structure for SO(subscript 2) in which all the atoms have a formal charge of zero. Explicitly showing zero charges is optional.

asked by anonymous on April 8, 2013
Chemistry
Use the MO model to predict the structure of ketene (H2CCO). Draw a Lewis structure of the molecule that shows the positions of the orbitals and the atoms in three-dimensional perspective.

asked by Amy on September 12, 2012
Chemistry
Use the MO model to predict the structure of ketene (H2CCO). Draw a Lewis structure of the molecule that shows the positions of the orbitals and the atoms in three-dimensional perspective.

asked by Amy on September 12, 2012
CHEMISTRY
Given assumed valencies: H=1, N=3, & C=4 i am now required to draw the structural formulae of HYDROGEN CYANIDE and CYANOGEN. H:C:::N is the Lewis electron dot structure. If you want to use “sticks” as a bond instead of two electrons, one stick stands for

asked by MARK on February 7, 2007
Chem
1) Draw the Lewis structure for CH3NCO, a neutral molecule. 2) Draw the best Lewis structure for NCCH2COCH2CHO, a neutral molecule.

asked by Glow on September 7, 2009
chem
U have to show the partial charges and bond dipoles on my ;lewis structure of CH3Cl For the partial charges would I just have a negetive sign as the superscript of Cl and a positive sign and the superscript of C ? What exactly must I do to show bond

asked by Lena on July 8, 2009
Chemistry
How would I make the VSEPR for potassium iodide (KI) I believe I made the right Lewis Structure, but am confused on what geometry a VSEPR structure would be. Thanks!

asked by Abby on November 30, 2011
science
Draw the Lewis structure of [NH2]– Draw the Lewis structure of [(CH3)3O]+ Label(or unlabel) the sp-hybridized atoms, sp2-hybridized atoms and sp3-hybridized atoms. Basically I need help determining which of those atoms are the sp, sp2, sp3 hybridized

asked by Anabelle on September 7, 2009

ap chem
There are several oxides of nitrogen; among the most common are N2O, NO, and NO2. 1.Write the Lewis structures for each of these molecules. In each case the oxygens are terminal atoms. 2. Which of these molecules “violate” the octet rule? 3. Draw resonance

asked by Justyna on January 9, 2007
ap chem
The allene molecule has the following Lewis structure: H2C=C=CH2. Are all four hydrogen atoms in the same plane? The allene molecule has the following Lewis structure: H2C=C=CH2. Are all four hydrogen atoms in the same plane? If not, what is the spatial

asked by mary on December 28, 2012
chemistry
state noble gas whose electron configuration is attained in a lewis structure for hydrogen cyanide and noble gas attained in lewis structure for cyanogen? I have answered this several times but at times it really wasn’t an answer. I am not familiar with

asked by Pedro on March 7, 2007
chemistry
Hi, I am having troubles with Lewis structure and VSEPR theory of (ClPO3)2-.Do I use 2 bonds for each O and one for Cl, so its tetrahedral, or do I use 2 bonds for one O and one bond for the other two Os(making dative bonds)+ one for Cl and one pair of

asked by michael on July 30, 2008
Chem
Lewis structure of [(CH3)3O]+. Be sure to show all atoms, bonds, lone pairs, and formal charges. Convert CH3CH(Cl)CH(OH)CH3 into a skeletal structure. If you could explain it, it would help. Or somehow do some of it here and explain. Im having a lot of

asked by Amy on September 11, 2009
Chemistry pretty urgent!!!!!!!
Chemical bonding question! The partial Lewis structure that follows (Figure 1) is for a hydrocarbon molecule. In the full Lewis structure, each carbon atom satisfies the octet rule, and there are no unshared electron pairs in the molecule. The

asked by G-Dogg on November 4, 2014
chem
What is the lewis structure for(HN3)

asked by kary on November 14, 2010
chemistry
How do I draw Lewis Structure for BN and CN-

asked by San on August 18, 2011
chemistry
what is the lewis structure for N-bromosuccinimide?

asked by Mai on March 29, 2014
chemistry
lewis structure of HOCH2S-

asked by aly on March 13, 2013

Chemistry
how do you do lewis structure? I cannot seem to understand exactly what to do.

asked by Kay on November 10, 2009
chemistry
what is the lewis dot structure for BN

asked by shay on October 2, 2012
Chemistry
what does the Lewis Dot Structure of Sr(CN)2 look like?

asked by Anonymous on November 16, 2014
Chemistry
what is the lewis structure for CH3?

asked by Anonymous on November 8, 2009
chemistry
THe thiocyanate ion acts as a Lewis base, donating a pair of electrons to the Fe ^ 3+ ion. Both sulfur and nitrogen atoms have lone pair electrons that can potentially be donated. Therefore, ther are two different structures (linkage isomers) that can be

asked by Judy on June 29, 2010
chemistry
What is the lewis dot structure of IF2-?

asked by Mely on November 6, 2010
chemistry
What is the lewis dot structure for IBr4-?

asked by Mely on November 6, 2010
Chemistry 121
What is the lewis dot structure of C2H5F?

asked by Claire on October 21, 2011
11th grade Chemistry
How to draw a Lewis dot structure….

asked by Shay on October 27, 2010
11th grade Chemistry
How to draw a Lewis dot structure….

asked by Shay on October 27, 2010

Chemistry
What’s the lewis dot structure for CH2Cl2 ??

asked by billnyetho on December 3, 2012
Chemistry
What is the lewis dot structure for copper?

asked by Valerie on February 21, 2013
chemistry
what is the chemical name and lewis structure of NO3 -2

asked by Amanda on October 11, 2012
Chemistry
What is the Lewis structure for salicylic acid ?

asked by Jake on November 23, 2015
chem
how do you draw the lewis structure for PBr3?

asked by madison on September 27, 2007
chem
how do I write “Uv light” in lewis structure?

asked by Kathy R on January 31, 2011
chemistry
what is the lewis dot structure for CH3OH

asked by kelesha on February 2, 2011
Chemistry Lewis Structure
What is the lewis structure for In+? I have tried everything and the answer seems wrong? Please help me

asked by Toni Jones on April 19, 2011
Chemistry
What is the Lewis structure of the Pb2+ion?

asked by Andrinna on November 5, 2011
Chemistry
What is the lewis structure for Propanoic Acid?

asked by Eddie on December 4, 2010

Chemistry
How do you make CIF2 into a Lewis Structure

asked by Lauren on December 5, 2007
organic chemistry
what is the lewis dot structure for H2NO?

asked by anne divo on September 4, 2008
chemistry
what is the lewis-dot structure for SiCl2Br2?

asked by chaunce on November 14, 2008
chemistry
what is the hybridization at O with the lewis structure of 2-propanone?

asked by matt on March 13, 2008
chemistry
Lewis sit structure of CH3OH

asked by sarfaraj on October 9, 2016
Chemistry
Draw the Lewis structure for SiCl2Br2.

asked by Gina Mitcell on November 16, 2009
Chemistry
how do you draw a Lewis structure for lithium chlorine

asked by Anonymous on July 22, 2013
cfemistry
what is the lewis structure of c3h502 and the formal charge?

asked by gigi on August 7, 2012
chemistry lewis structure
please help me i don’t know how to do this! Draw the lewis structure for: SiO3 -2

asked by sari on November 4, 2011
chemistry lewis structure
help me please! dram the lewis structure of CNO – explain me please! thanks

asked by sari on November 4, 2011

Chemistry
How can I draw a lewis dot structure of XeF2O?

asked by Joseoh on October 30, 2016
Chemistry
What is the Lewis dot structure for LiH? Is it simply Li – H?

asked by James on April 2, 2009
Chemistry
I am having figuring out the Lewis Dot Structure of ICl2-? Can anyone help???

asked by Kara on July 17, 2010
chemistry
What is the lewis dot structure for Fluoride, F1- and Mg2???

asked by lucy on October 20, 2007
Chemistry
If you were to have a lewis dot structure, such as, C2H5OH, where is the O placed? Between a carbon and an H.

asked by Chemwiz on January 22, 2007
Chemistry
How do you draw a lewis dot structure of s3o

asked by Chem on February 22, 2012
Science
How do u make this in a lewis dot structure? C2H3Cl3

asked by Joyce on March 7, 2011
Chemistry
Lewis Structure of Freon (CCI2F2)? And what is shape?

asked by Brock on March 24, 2012
Chemistry – Lewis Structures (check + help)
I am asked to draw lewis strcutures of the following molecules and ions SF6, BrF5, XeF4, PF5 and IF4-. I have to follow a specific format to draw them, below is an example of SF6, where am i going wrong in the table, since i am not getting six bonds, nor

asked by Farah on February 13, 2011
Organic chem
Classify each as a lewis acid or lewis base… A)H20 B)O2- C)Cu2+ D)SO3 E)AlCl3 Lewis acids are electron pair acceptors. Lewis bases are electron pair donors. Look at H2O, for example. .. H:O: .. H This molecule has no “holes” to accept an electron. Would

asked by Adam on October 15, 2010

Chemistry
Explain why it is necessary to form a double bond in the Lewis structure.

asked by Caitlin on October 7, 2011
Chemistry
How do I know the order of placing dots on the lewis structure? Please give an example.

asked by Rucha on November 16, 2015
Chemistry
What is the Lewis dot structure for LiF? Is it Li – F with 2 dots on each side of F?

asked by James on April 2, 2009
Science
Draw the Lewis structure for N2H2, a neutral molecule.

asked by Casey on September 7, 2009
Chemistry
From the lewis structure of AlCl4- where should I place the formal charge? next to Al or Cl?

asked by Sarah on December 5, 2010
chemistry
how do u set up the lewis structure for H30+? i know the available electrons is 3 but it has a +1 so it makes ir 2??

asked by madison on October 23, 2007
chemistry
C4 H10 O or diethyl ether or with a formula of CH3CH2OCH2CH3 its stick structure is H H H H ! ! ! ! .. H-C-C-C-C- O-H ! ! ! ! .. H H H H I used the this ! sign as a sign for bond. pls help me to determine the geometry for each central atom in this

asked by chemdummy on October 5, 2012
chemistry, polar or nonpolar
Why is NO3 nonpolar but CIF3 is polar? I looked at the lewis structures, they look similar, but why is one opposite. also, when something is polar or non polar, my teacher said I should see which atom is more electronegativity is higher and draw arrows

asked by Anonymous on January 25, 2009
chemistry
In the reaction between CV+ and –OH, one species is acting as the Lewis base, the other as the Lewis acid. (Note: A Lewis acid is not necessarily a proton donor. It is, however, always an electron pair acceptor). Which reagent is the Lewis acid? A. CV+

asked by Sara on July 13, 2010
Chemistry
I need some help to draw a Lewis structure for hydrogen cyanide + what is the noble gas?

asked by Dave B on December 18, 2009

11th grade
How do you draw the Lewis Structure for SO4,SF6,NH3 and H2S

asked by Shannon on December 15, 2009
chemistry
hpw would i draw a lewis structure for a molecule with 3.5 bonds for example NO2???

asked by lyne on April 20, 2009
chemistry
Draw the lewis structure for: SiO3 -2 CNO- TeO4 -2 F2PPCl2 thanks!

asked by patricio on November 4, 2011
CHEMISTRY
DRAW LEWIS, KEKULE AND SKELETAL STRUCTURE OF: (CH3)2NCH2CH3

asked by JEFF on January 25, 2012
CHEM
draw the lewis structure of CP. include ions pairs and charges.

asked by RQ on September 17, 2014
chemistry (helppp me)
what is the bond order for BeF2? according to the lewis structure? ….according to MO diagrams its 0. 16 valence e-

asked by Anonymous on October 29, 2015
Chemistry
Need help identifying organic functional groups of Mifepristone’s lewis structure.

asked by Tiffany on July 20, 2013
chemistry
the lewis structure for each of the following species except __ contains a triple bond? N3- O2 2+ N2 NO+ HCCH

asked by Anonymous on July 11, 2010
Chemistry
What are the pros and cons of using the lewis structure? What I have so far is that it shows the shape of the compound.

asked by Anonymous on July 6, 2015
chemistry
How do I draw the lewis structure for [PF5Cl]- i’m getting confused on this one!! Please explain answer Thanks =))

asked by Stacy on December 1, 2010

chemistry
Write a Lewis structure of OSF4 in which the formal charges of all atoms are zero

asked by mandy on November 14, 2008
Chemistry
Can someone help draw/explain the Lewis Dot Structure for OPBr3. I’ve tried different things, but none of them seem to work.

asked by M on November 19, 2012
Chemistry
I am having issues drawing the lewis structure for this…can anyone explain? CHCCHsubscript2CH0

asked by George on September 9, 2013
Chemistry
what is the lewis structure with lowest formal charges and label the charge of each atom in NO

asked by Missy on September 20, 2010
Chemistry URGENT
Please show how N and O are combined to make NO^+2 in Lewis dot structure. I’m having a hard time. Thanks

asked by Lisa on February 19, 2014

Categories
business plan writing services dissertation proposal help pay for essay professional essay writers write my assignment

choose the statement that best describes one of the themes explored in the novel so far

The giver Choose the statement that best describes one of the themes explored in the novel so far?
17,095 results
The giver
The giver Choose the statement that best describes one of the themes explored in the novel so far? A. Memories are important to life B. War should be avoided at all costs C. Friends and family are precious D. Teenagers are curious by nature Is it a?

asked by English on May 19, 2015
English

  1. Are there any themes that run through more than one of the memoirs in this unit? If so, what are they? List at least two themes that appear in more than one of the memoirs you read, and explain the similarities you noticed in how the author explored

asked by My name on September 14, 2015
L.A. The Giver!
Which of the following passages from the novel support the idea that the Giver is a heroic character? A. I do know that I sat here numb with horror. Wretched with helpessness. B. “Be quiet Jonas,” The Giver commanded in a strange voice. “Watch/” C. The

asked by ASAP!!! HEEEEEEELP on May 6, 2016
The Giver
Which statement provides the best summary of chapter 15? A. Jonas finds the giver in pain and offers to help. B. Jonas experiences tiny pinpricks of snow that touch his body and melt on his tounge. C. The Giver explains to Jonas why the pain and the

asked by Anonymous on May 22, 2015
L A/The Giver
The Giver and Jonas come up with a plan that would allow Jonas to escape. What does the Giver’s refusal to accompany Jonas tell you about the Giver’s character? 1: While the Giver does not like the rules of his community, he feels he must stay to help the

asked by Marylyn on May 20, 2015

english
write a short story based on the themes shakesphere explored in macbeth.do i have to write the themes of macbeth and explain them or the assignment is something else.i think i have to explain the themes

asked by paul jones on November 2, 2008
LA
What are some Themes in Chapter 15-17 The Giver?

asked by angela on May 5, 2017
English
The book for this is The Giver. Please check my answers. Which of the following passages from the novel support the idea that the Giver is a heroic character? A. I do know that I sat here numb with horror. Wretched with helplessness. B. “Be quiet Jonas,”

asked by Twenty One Pilots fan on May 9, 2016
English – Essay Writing
I’ve just read the book ‘To Kill a Mockingbird and I have to write an essay on the question “Explain how the themes of prejudice and tolerance are explored in the novel” I’ve started on my essay, but it’s been a long time since I’ve written one. I’ve made

asked by TP on March 25, 2008
english answer check please, 4 questions

  1. To plan your time for a research project, it is best to (1 point) divide the time spent on each step evenly. keep your deadlines flexible. start at the beginning and plan from there.* work backward. 2. Which of the following is not a guideline for

asked by Anonymous on March 15, 2017
English Analysis
Reading The Stranger by the lovely Albert Camus. Just need help understanding this question: -After I listed some themes I explored, my teacher asks: “Given the themes you listed, are any conventions questioned based on the treatment of a given theme?

asked by Albert on October 9, 2012
English
Archetypes frequently appear in literature with – a- contradictory themes b- general themes c- universal themes d- specific themes my answer is D

asked by Steve on August 3, 2015
L.A
which of the following words best describes the cultural context of there community in the novel. the giver

asked by mac and may on May 13, 2016
themes
this is another question for “lord of the flies” i need theme statements for themes. i came up with this for one of them. theme statement: responsibility is necessary for survival. i’m having a hard time coming up with others however i did come up with

asked by Anonymous on September 5, 2006
language arts
The giver Choose the statement that best explains the meaning of the following passage: But now, with twelve coming so soon, and the volunteer hours ending, it didn’t seem to meter. The freedom to choose where to spend those hours always seemed a wonderful

asked by lisa on May 5, 2016

Language arts
The giver Choose the statement that best explains the meaning of the following passage: But now, with twelve coming so soon, and the volunteer hours ending, it didn’t seem to meter. The freedom to choose where to spend those hours always seemed a wonderful

asked by Help on May 15, 2015
Archetypes
Archetypes frequently appear in literature with Contradictory themes General themes Universal themes(My answer) Specific themes Can someone check to see if my answer is correct? Thanks.

asked by AlexanderDennis on September 2, 2014
english
In the book Giver — the committee of elders consulted the giver for what?

asked by steve on April 22, 2014
sociology
Existential psychology has four basic themes. Define the themes. How are those themes different from humanistic theory themes of positive psychology and suffering of existentialism?

asked by adam on December 18, 2015
Human Behavior
Existential psychology has four basic themes. Define the themes. How are those themes different from humanistic theory themes of positive psychology and suffering of existentialism?

asked by james on December 20, 2015
LA
In the Giver, why was the Giver bitter about the COuncil of Elders

asked by Reina A. on November 29, 2010
English
We are supposed to give a presentation of a certain author, we are supposed to talk about customary themes; but even though I have look it up I can’t understand what it is, can you guys tell me? Thanks in Advance (Broken Link Removed) This site has a good

asked by Claudia on April 23, 2007
English
Choose a film, as most of you already did, and focus on one theme that resides throughout the film. If you feel ambitious, then you can choose several themes to discuss in your paper; however, make sure you connect the themes to each other (if I signed off

asked by Yasmine on October 25, 2015
Biology 100
Choose one theory spontaneous generation theory or cell theory. Select one statement that corresponds to the theory you want to refute or suppot. I choose cell theory and the one statement that I choose is all living things are made up of cells. Provide

asked by Rayna on November 10, 2009
science
A student makes the following statement: Chocolate- covered donuts are 10 times better than plain, glazed donuts. Which of the following correctly describes the student’s statement? a-The student’s statement is a quantitative observation. b-The

asked by Anonymous on September 14, 2013

English writing
Please ASAP can someone give me an introductory paragraph on the Truman show and the giver with the title and author and the thesis statement ? Please just an idea I need help

asked by Jessica on December 13, 2012
English
Read the statement below and choose the word which best describes the writer’s tone. I cannot stand the noisy, destructive woodpeckers anymore! This weekend, we will put down a repellant. defeated angry unhappy disgusted B?

asked by Bri on November 18, 2017
English
Read the statement below and choose the word which best describes the writer’s tone. Please do eat the last piece of pizza. I haven’t had any yet, but you should definitely have a third piece. sincere gloomy sarcastic humorous A?

asked by Bri on November 17, 2017
Literature
Can someone tell me if my statement below is correct? I have to write a paper on The Lottery comparing and constrasting the theme and style. I am not sure if my themes and styles are correct or if I have them mixed up. I have trouble with picking out the

asked by Tim on June 22, 2009
Language arts
List some important ideas that the Giver includes. Why did you choose those ideas? I have no idea what this question means. Thank you for your help

asked by Shawn on May 16, 2018
Math
1: Classify the quadrilateral using the name that best describes it I tried posting it but it didn’t work 2: which statement is a true statement 3: which statement is a true statement 4: Which property is not a characteristic of a polygon 5: Which figure

asked by Please Help on January 19, 2018
L A
The Giver At the beginning of the novel, Jonas describes himself as apprehensive. Why is he apprehensive? 1:An unknown plane is flying overhead 2:The Ceremony of Twelves is coming soon. 3: A loudspeaker orders everyone inside. I pick # 1…is this correct?

asked by Marylyn on May 18, 2015
L.A Ms. Sue? or anybody?

  1. Which of the following aspects of the setting is evidence that the giver is an example of science fiction A. Jonas rides a bike to school every day B. jonas’s father works in a daycare center C. a loudspeaker makes announcements to the community. D.

asked by anonymous on May 11, 2015
English
ead the statement, and choose the word that best describes the writer’s tone. Please do eat the last piece of pizza. I haven’t had any yet, but you should definitely have a third piece. sarcastic sincere humorous gloomy Would this be sincere?

asked by Caitlyn on November 9, 2018
english
what are motifs? Motifs are like repeated images or themes that run through a story. http://www.answers.com/motif In order to get a good idea about them, here are some analyses of motifs and themes in a couple of well known works:

asked by kanisha on December 10, 2006

language arts
1: list some important ideas that the giver includes. why did you choose those ideas? 2: tell how using a reading role helped you understand the book. support your response with at least 2 pieces of evidence from the novel

asked by yeet on May 1, 2018
L.A help please
Read the following passage from the novel. A sergeant yelled at Johnny as he started to limp past them, but when he explained in a piteous whine that his foot had been squashed by a blow from a soldier’s musket and all he wanted was to get home to his

asked by Princess Princess on December 18, 2014
Engish Literature
Chapter Seven explores the role of symbols in conveying literary themes. Themes are abundant in literaryworks (though they are at some times more obvious than at others). Select one short story from the reading assignments (from either Week One or Week

asked by Anonymous on January 23, 2013
English 12
In your understanding is this thesis statement clear enough? What other improvements would you make? The topic is “Theme of Overcoming struggle in the course text” Many themes are presented in: Hamlet, Death of a Salesmen, Life of Pi, the Road, and the

asked by Andy on January 23, 2011
social studies
how were the explorations of francisco pizarro and hernando cortes similar? how were they differnt discribe the lands the french explored in the new world you ahve read about countries that explored and claimed lands in the americans what changes occurred

asked by garrick on November 23, 2009
American History
During the 1820 and 1830 a distinct American culture began to emerge. What philosophies, artists and artists works contributed to this culture? What were the unique American themes explored within these works? Help I don’t know where t begin to answer this

asked by Brenda on May 2, 2013
English
In the novel The Lord of the Flies, how do the many themes connect? So far the themes I have discovered have to do with society being built on ethics, fear or fear of the unknown, the loss of innocence, the capability of evil in human nature, and the

asked by Kailyn on October 1, 2012
political theory
I don’t have an assignment due, but I’m having trouble understanding the themes that are in the Persian Letters by Montesquieu. Has anyone read them? I’m in college. I’m having trouble understanding the Harem sequence, and these themes: lack of self

asked by bayley on March 3, 2015
grammar check
which is a compound subject? 1) my sister and i saw a dinosaur at the museum. 2) marco polo lived in italy and explored places in china.i choose number 1. identif the complete predicate. thomas edison invented the light bulb, among other things. d)invented

asked by alley on June 14, 2009
Geography

  1. The statement, “Paraguay is one of two landlocked South American nations” describes what type of region? a.cultural b.economic c.physical d.political 2. The statement, “Farmers in this area benefit from a long growing season” describes what type of

asked by Courtney on September 9, 2010

Grammar and Composition
here’s an assignment that i have to do: Phone Book Character Select a name from the phonebook that makes an impression on you. Examples: Angelic J. Pureheart What kind of impressions might the name Angelic J. Pureheart give you? Would she be a member of

asked by y912f on November 3, 2009
english 2
i need to write an essay on TO KILL MOCKINGBIRD, and the topic is; “Discuss three themes of the novel. in addition to the more obvious themes of prejudice and injustice that the author develops, other possible themes include: growing up, superstition,

asked by km on April 19, 2011
check geo
What are the most abundant resources in this region? A)soil and coal B)minerals and soil C)water and soil D)minerals and water my choose is b most europeans who came to africa south of sahara between 1400s and 1700s? A)avoided the african interior

asked by henry on September 10, 2009
Thesis statement
How do I write a thesis statement about why I choose Medical Billing and Coding as a career. I have read what a thesis statement is, but my writing is terrible and I just can’t get the understanding of what to include in my thesis statement

asked by Fannie on February 18, 2010
Enlish lit
How do the styles and themes of “Theme for English B” and “Ballad of Birmingham” compare? I read both, but I don’t understand how that could compare in themes of styles. They have both different themes and styles!

asked by AnonJ on May 23, 2014
English
How do the styles and themes of “Theme for English B” and “Ballad of Birmingham” compare? I read both, but I don’t understand how that could compare in themes of styles. They have both different themes and styles! x2

asked by Janon on May 23, 2014
Math
For each of the following questions, choose the correct answer. Which statement best describes inductive reasoning? A- It uses previously proven or accepted properties to reach a conclusion. B- It uses observation of patterns and past events to reach a

asked by Skye on October 5, 2014
English
Which verb tense is used in “has explored” in the following sentence? I am pretty sure he has explored that option. past perfect future present perfect present Would this be present?

asked by Caitlyn on December 10, 2018
Lit
I have to write a short story based on the themes Shakespeare explored in Macbeth. I have what I want to write about but I need help turning it into a short story. I don’t need any links about short stories please, I know how to look up how to write short

asked by Anonymous on August 19, 2008
English
I am writing two paragraphs about two themes but I can’t think of two conclusion sentences. The themes are friendship and sacrifice. Help please? Thanks

asked by Emma on September 16, 2012

Language Arts

  1. One would expect people living in utopian society to be A. wealthy B. difficult C. idealistic D. impossible* 2. Which statement best describes a utopian community? A. People band together to share resources and duties equally.* B. Resources are

asked by Dude that smells on May 3, 2017
English
I am writing my essays and I wrote them but i not know how to start the beginnings of them. this on movie smoke signals. i am writing on themes, but i cant start intro like “in the film .. because someone else be doing that for movie review, so i not know

asked by Mohammad on September 19, 2012
Language arts

  1. One would expect people living in a utopian society to be A. wealthy B. difficult C. idealistic D. impossible 2. Which statement best describes a utopian community? A. People band together to share resources and duties equally. B. Resources are

asked by Check Please on May 4, 2017
sociology
How do these themes about male roles appear in the television and movies watch? What messages do these themes provide for men and women about masculinity and femininity?

asked by paula on July 27, 2009
sociology
How do the themes about male roles appear in the television and movies that we watch? What messages do these themes provide for men and women about masculinity and femininity?

asked by paula on July 27, 2009
sociology
How do these themes about male roles appear in the television and movies watch? What messages do these themes provide for men and women about masculinity and femininity?

asked by joe on July 21, 2009
sociology
How do these themes about male roles appear in the television and movies watch? What messages do these themes provide for men and women about masculinity and femininity?

asked by tiffany on July 21, 2009
English
1.) Choose the term that best describes the underlined phrase Gripping the rail,*** “Lindsey stepped onto the ice”. *** A.) independent clause B.) adjective clause C.) adverb clause D.) noun clause A 2.) Choose the term that best describes the underlined

asked by Answer check on January 13, 2016
History
Examine the three themes of the renaissance (humanism. the critical spirit and empiricism). In what ways are these themes reflected in the development of american society between 1660 and 1750?

asked by Megan on September 23, 2012
S.S
1.Witch statement BEST describes yokohama? 2.Which describes a difference between life in Japan and life in the United States? 3.Which innovation would BEST address a challenge facing modern Japan?

asked by Mclovin on March 24, 2015

Grammar and Composition
‘here’s an assignment that i have to do: Phone Book Character Select a name from the phonebook that makes an impression on you. Examples: Angelic J. Pureheart What kind of impressions might the name Angelic J. Pureheart give you? Would she be a member of

asked by y912f on November 3, 2009
Language Arts
Five themes of geography as they relate to A Light in the Forest. I haven’t read this book, but you might check on the themes section in here: http://www.sparknotes.com/lit/lightforest/ =)

asked by Ryan on January 15, 2007
English
Read the statement below and choose the word which best describes the writer’s tone. Elie Wiesel was born in Sighet, a Romanian town located in the Carpathian Mountains. He was the third of four children and the only son born to his parents. disbelieving

asked by Bri on November 17, 2017
Science
which of the following describes scientific inquiry?(1 point) A.a statement that describes what scientists expect to happen in experiment. B.facts,figtures,and other evidence gathered through observation. (C).the diverse ways in which scientists study the

asked by chris on August 27, 2014
Science
which of the following describes scientific inquiry?(1 point) A.a statement that describes what scientists expect to happen in experiment. B.facts,figtures,and other evidence gathered through observation. (C).the diverse ways in which scientists study the

asked by chris on August 27, 2014
math
Choose the one alternative that best completes the statement or answers the question. Find the probability. The table describes the smoking habits of a group of asthma sufferers. |Non|Light|Heavy|Total Men| 311| 82 | 74 |467 Women| 329| 68 | 60 |457 Total|

asked by Sarah on September 2, 2010
MGT asap
Select one of the following statements from p.221 of Supervision: Key Link to Productivity (8th ed.). Do you agree or disagree with the statement? Explain your reasons. 1. “The supervisor’s primary objective should be to avoid making mistakes in

asked by troyer0269 on November 13, 2008
English
I need help with this question. I just don’t understand what it’s asking me. Could someone tell me how I should start it, please? Thank you! Writers often communicate their themes by building clues into the story. Choose one story from Collection 4 and

asked by Olivia on January 18, 2012
Psychology

  1. Behavioral therapy began with ___. (1 point) Ivan Pavlov B.F. Skinner John Watson* Erik Erikson Read the statement. Choose the correct answer. 2. Watson is most (in)famous for performing experiments on __. (1 point) A baby* a

asked by Anonymous on May 23, 2018
Grammar Please hurry please
Identify the words that correctly complete the following sentence. If none of the choices are correct, choose “none of the above.” In a sentence with a compound verb, each verb (Points : 1) may have a different subject must have the same subject may not

asked by Jenny on August 27, 2013

critical thinking
Categorize each fallacy statement by copying fallacy type from the list below into the Fallacy Type ext box adjacent the fallacy statement. Provide an explanation as to why you think it is that fallacy type in the Why it is this fallacy type text box

asked by ava on February 6, 2010
literary
Which is the least common way for modern writers to convey their themes? a. through explicit statement b. through development of a central conflict c. through the values and motivations of the characters d. through the thoughts of the characters

asked by Jon on October 31, 2012
Song of Myself+English
Has anyone read Song of Myself by Walt Whitman?? I can’t find any themes for it. So hard to understand. Would slavery be a theme? I need atleast 4 themes associated with Song of Myself.

asked by Chopsticks on February 19, 2009
Social Studies
Which statement best summarizes direct democracy? A)Voters have the right to propose and respond to laws through the voting process. B)Voters have the right to choose whether to vote. C)Voters have the right to choose for whom to vote. D)Voters have the

asked by Mike on December 10, 2015
English
I don’t know what rhetorical devices these themes fall under. I know all these are themes but the themes are harder to figure out . 1. The value of dreams can be both a positive and be both a positive and negative influence. 2. It is important for men and

asked by Notafanofschool on March 8, 2015
english
cud anyone describe in brief or tell a site that describe the theme of “abroad at a ship’s helm” and “the moon is distant from the sea” please. im not sure if i understood the themes of both the poems. after understanding it i might be able to tell if both

asked by bindiya farswani on December 2, 2009
CRt 205
CRT-205 Week 5 Fallacy Matrix Categorizing Fallacies • Categorize each fallacy statement by copying fallacy type from the list below into the Fallacy Type text box adjacent the fallacy statement. • Provide an explanation as to why you think it is that

asked by angelee on December 5, 2009
geography
What are the 5 themes of geography for los angeles, california? do you have any sites to suggest to find the 5 themes of geography

asked by thalia on May 31, 2014
Core World History
I Choose two themes that would be appropriate for thematic time lines of important events from prehistory to A.D. 1600. The rise and fall of empires all over the world, and scientific discoveries and inventions, what are 5 events for each them that I’ve

asked by Lenae on October 7, 2016
Good Thesis Statement?
Is this a good thesis statement? John Keats’ odes and letters advance the Romantic literary movement through use of three common themes: living life to the fullest, overcoming hardships, and placing passion over reason.

asked by Norah on February 24, 2011

english
what themes do old man the sea and macbeth have in commmon? tragedy? You can look each one up at www.sparknotes.com/lit and read the “themes, symbols … ” section in each and see what you find. Let us know if you have questions once you have looked up and

asked by james on June 19, 2007
English
what is a good thesis statement that I can form out of this prompt for A Raisin In The Sun choose one of the following characters. identify and analyze the character’s primary internal conflict and external conflict and how each is resolved . I choose

asked by Notafanofschool on March 11, 2015
algebra 3
what statement best describes the function f(x)=2x^3+2x^2-x?

asked by kevin on May 6, 2010
SOCIAL STDIES HELP!

  1. Which of the following best describes the economy of the 1920s in the United States? (1 point) It was a period of economic hardship. It was a wartime economy. It was a boom time, or a period of great economic growth.**** It was a period that did not see

asked by XenaGonzalez on April 23, 2015
American government check my answer
Statement 1 – Illegal immigrants who have resided in the United States for years should qualify for alternative paths to citizenship. Statement 2 – Diversity in backgrounds and experience creates a society that teaches tolerance and respect. Statement

asked by Anon on May 18, 2017
math
Lara wrote the statements shown in the chart. Statement One: If two lines intersect, then they intersect at exactly one point Statement Two: In a right triangle, the square of the length of the hypotenuse is equal to the sum of the squares of the length of

asked by Please Help Me on September 29, 2011
geometry
Lara wrote the statements shown in the chart. Statement One: If two lines intersect, then they intersect at exactly one point Statement Two: In a right triangle, the square of the length of the hypotenuse is equal to the sum of the squares of the length of

asked by Sam on September 25, 2011
History
Which statement is true about Portuguese exploration? A) The exploration ended after the death of Prince Henry in 1480. B) The Portuguese were attacked and defeated by Muslim traders on the East African coast. C) The Portuguese explored the

asked by mic on December 27, 2016
Georgia’s Government
Which statement BEST describes why constitutions are needed?

asked by Soccer Mom on February 5, 2019
Science
Which statement best describes the composition of magma?

asked by James on February 17, 2014

Social Issues
Which statement best describes the militia theory?

asked by Dakota on February 18, 2016
english
which statement describes a type of plagiarism.

asked by Britteny on January 5, 2012
geometry
Which statement best describes deductive reasoning?

asked by jarrod on October 13, 2015
social studies
Which statement best describes the Louisiana Purchase?

asked by Sam on February 14, 2019
Math
check my work 22 km=m A=2.2 13 oz =_g A= Choose the most reasonable measure of weight. A calculator A=0.5 kg Complete the following statement. 540 s = __ min A= 9min Complete the following statement. 12 ft = __ in. A=144 in.

asked by Terry B on April 6, 2008

Categories
cheap essay writing service coursework help dissertation writing services order essay online professional essay writers someone to write my essay

in which of the following situations is a sound wave most likely to travel through air

  1. In which of the following situations is a sound wave most likely to travel through air?

A) An alarm clock rings in a vacuum.
B) A giant star explodes.
C) A grasshopper eats a leaf.
D) An astronaut uses tools in space.

  1. Which of the following factors determines the loudness of a sound?

A) Frequency of the sound.
B) Amplitude of the sound.
C) The temperature of the medium.
D) The density of the medium.

  1. Which of the following affects the speed of sound?

A) The amplitude of the wave.
B) The frequency of the wave.
C) The phase of the medium.
D) The wavelength.

  1. A blind person walks through the neighborhood making loud clicking noises with his tongue. He doesn’t use a walking stick nor does he have a seeing-eye-dog. However, he avoids ever obstacle and is able to navigate his way around the neighborhood safely. What can be inferred from the given information?

A) He is detecting the reflection of sound waves.
B) He is detecting the refraction of sound waves.
C) He is detecting the absorption of sound waves.
D) He is detecting the diffraction of sound waves.

Please help quickly!! Thanks!

0 0 2,815
asked by Jasmine
Dec 9, 2013
1.C
2.B
3.C
4.A

21 0
posted by Princess Anna
Dec 9, 2013
K, Thanks Anna. That’s what I thought. 😀

5 1
posted by Jasmine
Dec 9, 2013
Your welcome 🙂

2 0
posted by Princess Anna
Dec 9, 2013
1 cant c. cause a grasshopper eat really quiet…

0 3
posted by Ur_Mom
Oct 31, 2014

I got 100./. yay

1 0
posted by ms. cat
Nov 11, 2014
Thanks i got 100

1 0
posted by Tierra
Apr 2, 2015
OMG TY SO MUCH I LOVE UUU I GAWT 100 %

1 0
posted by jam
May 16, 2015
NOW I CAN GO TO COLLEGE

1 1
posted by jam
May 16, 2015
tanks guys

1 0
posted by TiffenyLPS
Oct 21, 2015

Lol ya’ll are funny. 😀

1 0
posted by Mariana
Nov 12, 2015
I am going to see what answers get me 100%….

1 0
posted by Yuck
Mar 27, 2016
5 is A

11 0
posted by Olive
Mar 30, 2016
IS 1 ACTUALLY C?

3 0
posted by YAY
Apr 11, 2016
I got 100% thx ppl

1 0
posted by King Tyler
Apr 25, 2016

1.C
2.B
3.C
4.A
5.A

31 0
posted by LaShyla
Apr 27, 2016
lashyla is correct

2 0
posted by hhh
Apr 27, 2016
lashyla is right

0 0
posted by The_Meta13
May 16, 2016
1.c
2.b
3.c
4.a
5.a
These are the answers I took the test and I got 100%.

8 0
posted by raina the helper
Oct 6, 2016
Thank you, I got 100% on the quiz!

2 0
posted by Jane Barlow.
Nov 2, 2016

thanks I got 100%

2 0
posted by Corbin
Apr 11, 2017
c
b
c
a
a

4 0
posted by boo
Apr 26, 2017
ty guys

2 0
posted by a pimp named slick back
May 15, 2017
In which of the following situation is light most likely to be refracted

0 0
posted by Cassandra
Sep 15, 2017
greggggg

0 0
posted by Anonymous
Sep 20, 2017

I think c am i right?

0 0
posted by qdaewrf
Nov 2, 2017
-_-

0 0
posted by qdaewrf
Nov 2, 2017
THX 100%

0 0
posted by GameZone
Nov 13, 2017
TYSM!

0 0
posted by Welp
Dec 1, 2017
DONT CHEAT

0 1
posted by Andreas
Mar 14, 2018

the answers are correct. And Andreas, that’s not going to stop anyone from cheating. I commend you for your efforts, though. Nice try.

0 0
posted by Tisky
Mar 22, 2018
Andrea your cheating cause your on here. Think about it Ñina.

And Boo is right

C
B
C
A
A

Thank you Hunny~!

3 0
posted by \/(._.)\/
Mar 28, 2018
C
B
C
A
A

2 0
posted by N
Apr 29, 2018
C because every thing else cant make noise because they are deprived ofbair so even though “They eat real quiet” they still make a noise.

0 0
posted by Norot
May 1, 2018
The answers are
c
b
c
a
a’

LIKE BAM

3 0
posted by Lexxy
May 3, 2018

c
b
c
a
a

3 0
posted by PearsonConnexus
May 4, 2018
1.C
2.B
3.C
4.A
5.A

2 1
posted by Emo Aunt
May 9, 2018
The answers are
C
B
C
A
A
I just took the test and I got 100%

3 0
posted by Thank you
May 9, 2018
@BOO is correct! Thanks love! 🙂

0 0
posted by hearteyes
May 10, 2018
Lexxy? Lexey?!

0 0
posted by Cereal…. is life. -Life Cereal
May 15, 2018

boo is correct 🙂

0 0
posted by Anonymous
May 21, 2018
Unit 4 Lesson 2
C
B
C
A
A
100%

3 0
posted by DifieJaucy
Nov 6, 2018
thxs hunnies

0 0
posted by ?
Nov 27, 2018
YAAAAAASSSSSSS! Thx guys!

0 0
posted by MadderHatter
Feb 11, 2019

  1. C
  2. B
  3. C
  4. A
  5. A 0 0
    posted by Hal
    Mar 18, 2019

THANK YOU

0 0
posted by anonymous
Apr 1, 2019
thank u so much LaShyla that helped alot much thanks

1 0
posted by DJ Marshmello
Apr 2, 2019
for connections unit 4 lesson 2
Sound

1.C
2.B
3.C
4.A
5.A

0 0
posted by Netflix
Apr 9, 2019

Categories
dissertation proposal help essays for sale professional dissertation writers professional essay writers write my assignment

which line models the data points better and why

  1. Which line models the data points better and why?

blue, because the data points are all close to the line

red, because it goes through one of the points

i think that is A

0 1 3,773
asked by batman
Mar 22, 2013
I agree.

1 0
👩‍🏫
Ms. Sue
Mar 22, 2013
thx

0 0
posted by batman
Mar 22, 2013
yw

0 0
👩‍🏫
Ms. Sue
Mar 22, 2013
These are the right answer I promise.

1.B
2.C
3.B
4.C
5.C
6.A

  1. The trend of the scatter plot is increasing, because the scatter plot is going higher. 63 3
    posted by Roman
    Mar 9, 2017

Roman is right! 100%

4 0
posted by 1
Mar 13, 2017
Roman is right. trust roman answers if your doing lesson 8 modeling data with lines

3 1
posted by CCA
Mar 23, 2017
Roman is so right i got a 6 out of 6

3 1
posted by jackie
Mar 29, 2017
number 7 is incorrect it would be A ( the population is decreasing over time)

3 3
posted by linda
Mar 31, 2017
roman is correct for 7th grade connexus i got %100

1 1
posted by marx
Mar 31, 2017

Thanks so much

0 1
posted by Jessica
Apr 26, 2017
Thank you so much, Roman!

0 0
posted by Bonnie Key
May 22, 2017
Updated Answers there has recently been an additional question so here are the answers now.
1)B
2)C
3)B
4)C
5)C
6)A
7)A
8)The trend of the scatter plot is increasing, because the scatter plot is going higher.
100% garunteed

16 1
posted by ::::
Feb 6, 2018
As of 2018, there are only 7 questions and all of Roman’s answers are correct including #7. Thank you!

0 1
posted by fellow peer
Feb 15, 2018
@Roman is correct. Just make sure to write the description for the last question on your own. & use your own words.

3 0
posted by LittleNoot
Feb 16, 2018

thank you roman

0 0
posted by Taylor
Feb 16, 2018
roman is right math check answers is wrong

0 0
posted by Anonymous
Feb 19, 2018
:::: Is correct just took the quiz for the 8 questions!

2 0
posted by VKOOKIE IS REAL
Mar 5, 2018
Hes right bc i had 8 questions

0 0
posted by ::: is right for meee !!! Connexus
Mar 23, 2018
Roman is correct. For me, I only had 7 questions.
1) B
2) C
3) B
4) C
5) C
6) A
7) The trend is a positive trend. You know this because the line goes up from left to right. (That’s what my answer was and my teacher gave me all points of credit)

4 0
posted by Anonymous
Apr 12, 2018

I only have 5 questions

0 0
posted by Susanna
Apr 24, 2018
Same Susanna

0 0
posted by Smfh
May 3, 2018
I have 6 questions, one of them is a writing one

0 0
posted by PearsonConnexus
May 10, 2018
@:::: is correct I got a 100%!! thx

0 0
posted by Shay
Feb 25, 2019

  1. B
  2. C
  3. B
  4. C
  5. C
  6. A
  7. Trend is positive..scatter plot going higher left to right. 1 0
    posted by Hal
    Mar 2, 2019

As of 3/7/2019 ::: is correct for 8th grade Lesson 8: Modeling Data with Lines. They may change up the answers (because they suck and only do it with math) so don’t be mad at me when that time comes. Goodluck guys.

3 1
posted by KpopIsAwful
Mar 7, 2019
AS OF 3/26/19 THE ANSWERS ARE:
B C B C C A AND I AM STILL WAITING FOR THE 7TH TO BE GRADED. FOR CONNEXUS STUDENTS. BE HAPPY!

0 0
posted by Ruthie
Mar 26, 2019
Roman is indeed 100% correct!

0 0
posted by $mirmofficee
Apr 3, 2019

Categories
cheap dissertation writing services cheap essay writing service essays online professional essay writers write my assignment

nach3co2

chemistry

Calculate the pH of a 0.800 M NaCH3CO2 solution. Ka for acetic acid, CH3CO2H, is

  1. 👍 0
  2. 👎 0
  3. 👁 309

asked by noelJan 16, 2011

Categories
Assignment Help coursework help order essay online professional dissertation writers professional essay writers

what is the maximum value of p = 24x + 30y, given the constraints on x and y listed below?

graph the system of constraints find the values of x and y that maximize the objective function x y
108,871 results
Algebra 2

  1. By graphing the system of constraints, find the values of x and y that maximize the objective function. 2

asked by Fading on November 8, 2016
Algebra
graph the system of constraints find the values of x and y that maximize the objective function x+y_0

asked by Lirio on October 17, 2016
algebra 2
Graph the system of constraints and find the value of x and y that maximize the objective function. Constraints {x >= 0 y >= 0 y

asked by Kandy on October 7, 2014
math
An objective function and a system of linear inequalities representing constraints are given. Graph the system of inequalities representing the constraints. Find the value of the objective function at each corner of the graphed region. Use these values to

asked by ReRe on February 22, 2010
Objective functon
An objective function and a system of linear inequalities representing constraints are given. Graph the system of inequalities representing the constraints. Find the value of the objective function at each corner of the graphed region. Use these values to

asked by Soly on November 17, 2007

Math
By graphing the system of constraints, find the values of x and y that maximize the objective function. 2x+y0 maximum for p=x+2y

asked by Jewell on October 16, 2017
PLEASE HELP… ALGEBRA…. LINEAR PROGRAMMING
HELP ME WITH THESE 2 PROBLEMS PLEASE….. 1. Objective Quantity: C= 5x+4y Constraints: x < -2 x > -4 y > 1 y < 6 All of the signs have lines under them. 2. Objective Quantity: C= 6x + 2y Constraints: x > 0 x < 5 y > 0 4x-y > 1 Again, all of the signs have

asked by Anonymous on October 11, 2006
College Algebra
Maximize the objective function C = 4x + 5y with the constraints x + y 5, x + 2y 6, x 0, y 0. Your constraints don’t make sense. They need to be equations. Are you leaving out “=” signs? If x=0 and y=0, there no variables and you can’t maximize C

asked by Cheryl on July 26, 2007
Math
Your computer-supply store sells two types of inkjet printers. The first, type A, costs $237 and you make a $22 profit on each one. The second, type B, costs $122 and you make a $19 profit on each one. You can order no more than 120 printers this month,

asked by Greg Martin on September 17, 2012
algebra
Find the minimum and maximum values of the objective function subject to the given constraints? Objective Function: C=4x+5y Constraints: x>=0, y>=0, x+y

asked by emily on April 4, 2010
Algebra 2
Name the vertices and then find the values of x and y that minimize the objective function. x >= 2 y >= 0 3x + 2y >= 12 Minimum for C = x + 5y Help with system of constraints please! I’m terrible at this…

asked by Reese on November 19, 2015
algebra 2
by graphing the system of constraints find the values of x and y that minimizes the objective function x+2y>8 x>2 y>0 >=greater than or equal to my answer was 0,10 am i right?

asked by the world forgot on September 29, 2017
Math
Find the minimum value of C = 4x – 3y using the following constraints. constraints to get the vertices. Plug the vertices into the objective function. Remember graph the

asked by pandagang on April 26, 2016
Alg. 2
Maximize the objective function M=6x+3y under the constraints {x ¡Ý 0 y ¡Ü 5 y ¡Ü -x + 10 y ¡Ý.5x – 4}

asked by Larry on July 7, 2008
Algebra (Please check)
PLEASE CHECK MY ANSWERS (: I just want to make sure I am doing this correctly ______________________ Graph the system of constraints and find the value of x and y that maximize the objective function. Constraints: x ≥ 0 y ≥ 0 y ≤ (1)/(5)

asked by Greg on September 17, 2012

algebra2
Find the values of x and y that maximize the objective function P=3x + 2y for the graph. What is the maximum value. step by step please

asked by bowershe on December 10, 2013
Deadline Approaching: Please Help
SIMPLEX METHOD – Table: Nutrient Peanuts Raisins M&Ms Pretzels Calories 855 435 1024 162 Protein 34.57 4.67 9.01 3.87 Fat 72.50 0.67 43.95 1.49 Carbs 31.40 114.74 148.12 33.68 Suppose that you want to make at most 10 cups of trail mix, using all the

asked by Jay on June 6, 2011
math help needed
the bookholder company maunfactures two types of bookcases out of oak and walnut. model 01 requires 5 board feet of oak and 2 board feet of walnut. model 02 requires 4 board feet of oak and 3 board feet of walnut. a profit of $75 is made on each model 01

asked by michael on June 6, 2007
Algebra
If some one can get me started, I should be able to graph this. MONTGOMERY COUNTY COMMUNITY COLLEGE MAT106 SUMMER, 2007 ASSIGNMENT #1 NAME______________________________ The Wellbuilt Company produces two types of wood chippers, Deluxe and Economy. The

asked by Jason on May 30, 2007
Algebra Assignment
An apple pie uses 4 cups of apples and 3 cups of flour. An apple cobbler uses 2 cups of apples and 3 cups of flour. You have 16 cups of apples and 15 cups of flour. When you sell these at the Farmer’s Market you make $3.00 profit per apple pie and $2.00

asked by Sam on December 11, 2017
Math
What point maximizes the objective function P = 4x + 3y for the constraints below. What is the maximum value? Constraints: x>=0 y>=0 y=y

asked by Aaron on October 13, 2016
math
An ad campaign for a new snack chip will be conducted in a limited geographical area and can use TV time, radio time, and newspaper ads. Information about each medium is shown below. Medium CostPerAd # Reached Exposure Quality TV 500 10000 30 Radio 200

asked by Chycaria on June 1, 2009
Algebra (Need help desperately)
I really don’t understand these.. can someone show me the correct way of doing them? (if it helps I will pay over paypal for detailed help or will pay in my services (I am a graphic designer, video editor, and web designer)

asked by Alex Lark on September 17, 2012
Math
The Wellbuilt Company produces two types of wood chippers, Deluxe and Economy. The Deluxe model requires 3 hours to assemble and ½ hour to paint, and the Economy model requires 2 hours to assemble and 1 hour to paint. The maximum number of assembly hours

asked by Mike on February 25, 2008
math
The Wellbuilt Company produces two types of wood chippers, Deluxe and Economy. The Deluxe model requires 3 hours to assemble and ½ hour to paint, and the Economy model requires 2 hours to assemble and 1 hour to paint. The maximum number of assembly hours

asked by Mike on February 25, 2008

Math – Linear Inequalities
The Wellbuilt Company produces two types of wood chippers, Deluxe and Economy. The Deluxe model requires 3 hours to assemble and ½ hour to paint, and the Economy model requires 2 hours to assemble and 1 hour to paint. The maximum number of assembly hours

asked by Tushar on February 25, 2008
Maths
The Wellbuilt Company produces two types of wood chippers, Deluxe and Economy. The Deluxe model requires 3 hours to assemble and ½ hour to paint, and the Economy model requires 2 hours to assemble and 1 hour to paint. The maximum number of assembly hours

asked by Tushar on February 25, 2008
acc math 2 high school
I need help finding constraints to put this on the graph. the objective function is c=16x+25y. Problem: Your club plans to raisse money by selling two sizes of fruit baskets. The plan is to buy small baskets for $10 and sell them for $16, and to buy large

asked by preston jones on August 8, 2009
Math
Given the following LP model (represented abstractly with decision variables X and Y), find the optimal solution using the ‘graphing’ approach. Minimize 5X + 2Y Subject to: 4X + 2Y >= 80 3X + 4Y = 45 2X – Y >= 0 And non-negativity, of course. Your

asked by Rick on September 22, 2011
Math
The Bookholder Company manufactures two types of bookcases out of oal and walnut. Model 01 requires 5 board feet of oak and 2 board feet of walnut. Model 02 requires 4 board feet of oak and 3 board feet of walnut. A profit of $75 is made on each Model 01

asked by Marie on March 19, 2007
Math
Find the maximum value of the objective function z = 19x + 7y, subject to the following constraints. (See Example 2.) 3x + 2y ≤ 18 6x + 2y ≤ 30   x ≥ 0, y ≥ 0

asked by Sam on February 28, 2018
Algebra
Find the maximum value of the objective function z=24x+7y subject to the following constraints : 0¡Üx¡Ü10, 0¡Üy¡Ü5,3x+2y¡Ý6.

asked by Anonymous on March 19, 2010
algebra
Find the maximum value of the objective function z=24x+7y subject to the following constraints: 1. 0¡Üx¡Ü10, 0¡Üy¡Ü5. 3x + 2y ¡Ý 6

asked by Joe on March 9, 2011
Algebra 2
What point in the feasible region maximizes the objective function ? (3 points) Constraints {x>0 {y>0 {-x+3>y {y

asked by Alexia tucker on November 6, 2017
Math
MathMate – I’m still confused, please see below. Thanks!! SIMPLEX METHOD – Table: Nutrient Peanuts Raisins M&Ms Pretzels Calories 855 435 1024 162 Protein 34.57 4.67 9.01 3.87 Fat 72.50 0.67 43.95 1.49 Carbs 31.40 114.74 148.12 33.68 Suppose that you want

asked by Jay on June 6, 2011

Math
SIMPLEX METHOD – Table: Nutrient Peanuts Raisins M&Ms Pretzels Calories 855 435 1024 162 Protein 34.57 4.67 9.01 3.87 Fat 72.50 0.67 43.95 1.49 Carbs 31.40 114.74 148.12 33.68 Suppose that you want to make at most 10 cups of trail mix, using all the

asked by Jay on June 4, 2011
linear programming
Maximize z = 16x + 8y subject to: 2x + y ≤ 30 x + 2y ≤ 24 x ≥ 0 y ≥ 0 Graph the feasibility region. Identify all applicable corner points of the feasibility region. Find the point(s) (x,y) that maximizes the objective function z = 16x + 8y.

asked by nmh on July 8, 2011
math
Maximize z = 16x + 8y subject to: 2x + y ≤ 30 x + 2y ≤ 24 x ≥ 0 y ≥ 0 Graph the feasibility region. Identify all applicable corner points of the feasibility region. Find the point(s) (x,y) that maximizes the objective function z = 16x + 8y.

asked by ANONIMOUS on July 18, 2011
MATH

  1. Maximize z = 16x + 8y subject to: 2x + y ≤ 30 x + 2y ≤ 24 x ≥ 0 y ≥ 0 Graph the feasibility region. Identify all applicable corner points of the feasibility region. Find the point(s) (x,y) that maximizes the objective function z = 16x + 8y.

asked by ANONIMOUS on July 12, 2011
math
With regards to question J: The variables x and y are connected by the equation y = x2 – x – 5. Some corresponding values of x and y are given in the table below. x -4 -3 -2 -1 0 1 2 3 4 5 y 15 7 a -3 -5 b -3 1 7 15 (a) Calculate the values of a and b (b)

asked by jun on January 24, 2011
Math/Management
MeanBeats is a company that manufactures and sells electronic musical equipment. Their headphone product line consists of two products, Reverbia and Bscape. MeanBeats sells the headphones to retailers at $600 and $300 per pack for Reverbia and Bscape,

asked by Carla on October 17, 2012
Alegra 2
Explain the use of the objective quantity in linear programming.Give an example of an objective quantity that you would minimize and an example of one that you would maximize

asked by Linda on November 3, 2009
algebra
What point in the feasible region maximizes the objective function? Step by step please x¡Ý0 y¡Ý0 Constraints -x+3¡Ýy y¡Ü1/3x+1 objective function C=5x-4y

asked by bowershe on December 10, 2013
Algebra 2 -Linear Programming
Find the values of x and y that maximize or minimize the objective function. x+y < or equal to 8 2x+y < or equal to 10 x> or equal to 0, y > or equal to 0 A. (0,5) Maximum value is 100 B.(1,7) Maximum value is 220 C.(2,6) Maximum value is 280 D. (5,0)

asked by LaH on October 26, 2011
science
Maximize value Z = 15x + 10y subject to the constraints 3x + 2y ¡Ü ¡Ü 12, 2x + 3y ¡Ü ¡Ü 15, x ¡Ý ¡Ý 0, y ¡Ý ¡Ý 0 is

asked by chirag on September 18, 2016

algebra
what point in the feasible region maximizes the objective function? x>0 y>0 constraints -x+3>y y

asked by bowershe on December 10, 2013
math
Maximize P = 4x + 20y subject to these constraints: 2x + 15y ≤ 700 5x + 10y ≤ 1150 5x + 5y ≤ 1000 4x + 15y ≤ 980 x ≥ 0, y ≥ 0 Maximum value for P = ?. This value of P occurs when x = ? and y = ? If u1, u2, u3, and u4 represent the slack

asked by John on September 20, 2010
math
Maximize P = 4x + 20y subject to these constraints: 2x + 15y ≤ 700 5x + 10y ≤ 1150 5x + 5y ≤ 1000 4x + 15y ≤ 980 x ≥ 0, y ≥ 0 Maximum value for P = ?. This value of P occurs when x = ? and y = ? If u1, u2, u3, and u4 represent the slack

asked by Anonymous on September 20, 2010
Calculus – Functions?

1. A cubic polynomial function f is defined by f(x) = 4x^3 +ax^2 + bx + k where a, b and k are constants. The function f has a local minimum at x = -1, and the graph of f has a point of inflection at x= -2 a.) Find the values of a and b #2. Let h be a

asked by Amy on February 21, 2011
College Algebra
a paper manufacturing company recycles paper, cans and other sheet metal. the profit on the paper is $500 and the profit on the cans is $350 per pound A) write the objective function that models the daily profit B) the manufacture is bound by the following

asked by meri on March 6, 2015
College Algebra
a paper manufacturing company recycles paper, cans and other sheet metal. the profit on the paper is $500 and the profit on the cans is $350 per pound A) write the objective function that models the daily profit B) the manufacture is bound by the following

asked by meri on March 6, 2015
material engineering
thanks. OK, for the design requirements: is the objective: to minimize the mass of cans? are the constraints: thickness of can is specified, and the can should not fail(strong), or what?

asked by hym on March 7, 2011
Math
Maximize P = 16x + 80y subject to these constraints: 2x + 20y ≤ 430 4x + 70y ≤ 1400 8x + 30y ≤ 980 10x + 10y ≤ 1000 4x + 30y ≤ 700 x ≥ 0, y ≥ 0 Maximum value for P = ?. This value of P occurs when x = ? and y = ? If u1, u2, u3, u4, and u5

asked by John on September 20, 2010
Linear Programming
Maximize P = 16x + 80y subject to these constraints: 2x + 20y ≤ 430 4x + 70y ≤ 1400 8x + 30y ≤ 980 10x + 10y ≤ 1000 4x + 30y ≤ 700 x ≥ 0, y ≥ 0 Maximum value for P = ?. This value of P occurs when x = ? and y = ? If u1, u2, u3, u4, and u5

asked by JP on September 20, 2010
Algebra
The Reptile Farm has 400 square feet in which to house a collection of new lizards and frogs. A lizard requires 2 square feet of living space and costs $6 per month to feed. A frog also requires 2 square feet for living space but costs only $1 per month to

asked by Anonymous on August 2, 2018

Calc-slopes & concavity

  1. Let f(x)=x^3-3x+2 a.) Find the equation of the line tangent to the graph of y=f(x) at x=2 b.) For what values of x is the function increasing? c.) For what values of x is the graph concave down?

asked by Andy on January 23, 2011
Algebra 1 (Reiny or Kuai)

  1. Which x-values should I choose to graph these equations (y = x; y = -x + 6) so that they intersect? 2. The school band sells carnations on Valentine’s Day for $2 each. They buy the carnations from a florist for $0.50 each, plus a $16 delivery charge. a.

asked by Please, help me! on December 9, 2013
Intermediate Algebra
Find the maximum value of the objective function and the values of x and y for which it occurs. F = 5x + 2y x + 2y (greater than or equal to) 6 2x + y (greater than or equal to) 6 Both x and y are greater than or equal to 0. I don’t understand how to do

asked by Lauren on January 12, 2009
Math
A television manufacturer makes console and wide-screen televisions. The profit per unit is $125 for the console televisions and $200 for the wide-screen televisions. Write the objective function that describes the total monthly profit. Write a system of

asked by Bob on June 12, 2010
Business, Linear Programming
This post may be a little lengthy, so please bare with me if you can help. The problem is: A cruise liner has 4 classes of accommodations. Following are the # of reservations made, # of reservations available, and cost per room for each class: Super

asked by Matt on April 15, 2007
character education
What is the purpose of critically analyzing opinions? to reject anything that does not agree with your opinion to adopt any experts opinion is valid for you to compare the opinion to the framework of your values B facts : _ :: opinions : _

asked by Bri on November 8, 2017
Algebra 1 (Reiny or Kuai)

  1. The school band sells carnations on Valentine’s Day for $2 each. They buy the carnations from a florist for $0.50 each, plus a $16 delivery charge. a. Write a system of equations to describe the situation. A: y = 2x; y = 0.50x + 16. b. Graph the system.

asked by Please, help me! on December 9, 2013
algebra
what point in the feasible region maximizes the objective function x>0 y>0 constraints -x+3+y y,1/3x+1 Object function C+5x_4y

asked by bowershe on December 10, 2013
extreme value of absolute…..
find the extreme values of the function on the interval and where they occur. f(x) = |x-1|-|x-5|, -2

asked by Jen on October 28, 2006
MATH HELP

  1. Consider the following. f(x)=8x-10 g(x)=x^2-4x+10 (a) Find the points of intersection of the graphs. ANSWER:(2,6) are the smaller values and (10,70) are the larder values (b) Compute the area of the region below the graph of f and above the graph or g.

asked by Jason on July 20, 2010

Calculus
f(x)=xe^(-2x) with domain 0< or equal to x< or equal to 10 find all values of x for which the graph of f is increasing and all values of x for which the graph is decreasing give the x and y coordinates if all absolute max and min points

asked by John on November 30, 2010
calculus
Consider the graph of the cosine function shown below. y=4 cos (2 x) a. Find the period and amplitude of the cosine function. b. At what values of θ for 0 ≤ θ ≤ 2π do the maximum value(s), minimum value(s), and zeros occur? so i don’t know how to

asked by sandy on February 4, 2019
materials engineering
for: prismatic non-circular section channel which used for window frames and for ducting for electrical wiring..I need to know : 1-function 2-objective 3-constraints how can we select the materials for this design, and why? what suitable processes for

asked by hym on March 17, 2011
materials engineering
for: prismatic non-circular section channel which used for window frames and for ducting for electrical wiring..I need to know : 1-function 2-objective 3-constraints how can we select the materials for this design, and why? what suitable processes for

asked by hym on March 18, 2011
math.please help!
minimize z= 5x + 9y subject to 6x + y >= 18 2x + 3y >= 30 x= 0 find the corner points, ans subject the objective function to the corner points, finding the minimum value of z giving the constraints. i know the first and second points but i couldn’t figure

asked by sha on July 19, 2010
precalculus
analyzethe graph of the function Find the x- and y-intercepts. (b) Determine the end behavior: find the power function that the graph of f resembles for large values of |x|. (c) Find the maximum number of turning points. (d) Graph the function Please show

asked by kawn on November 11, 2011
Calculus
If you can helpme on this problem you are GOD. If f(x) = ax^2 + bx + c, what can you say about the values of a, b, and c if: (A) (1,1) is on the graph of f(x)? (B) (1,1) is the vertex of the graph of f(x)?Hint: The axis of symmetry is x = -b/(2a).The

asked by George on September 2, 2008
Math
Solve this linear programming problem using the simplex method: Maximize P = 21x + 12y + 24z subject to these constraints: 3x + 2y + 3z ≤ 864 15x + 6z ≤ 1296 9x + 8y + 18z ≤ 4608 x ≥ 0, y ≥ 0, z ≥ 0 Maximum value for P = ?. This value of P

asked by John on September 20, 2010
Algebra 2
Problem Solving – A manufacturer of cell phones makes a profit of $25 on a deluxe model and $30 on a standard model. The company wishes to produce at least 80 deluxe models and at least 100 standard models per day. To maintain high quality, the daily

asked by LeLe on December 13, 2009
math
A certain diet requires no more than 60 units of carbohydrates, at least 45 units of protein, and at least 30 units of fat each day. Each ounce of Supplement A provides 5 units of carbs, 3 units of protein, and 4 units of fat. Each ounce of Supplement B

asked by Autumn on September 25, 2006

math pre calculus
find the following for the function f(x)=(x+5)^2(x-2)^2 a.find the x and y intercepts, b.find the power function that the graph ressembles for large values of x c.determine the maximum number of turning points on the graph of f d.determine the behavior of

asked by laila on March 26, 2013
algebra
Evaluate the logarithmic equation for three values of x that are greater than -1, three values of x that are between -2 and -1, and at x = -1. Show your work. Use the resulting ordered pairs to plot the graph; submit the graph via the Dropbox. State the

asked by Marlee on September 8, 2010
Intermediate Algebra
Evaluate the logarithmic equation for three values of x that are greater than -1, three values of x that are between -2 and -1, and at x = -1. Show your work. Use the resulting ordered pairs to plot the graph; submit the graph via the Dropbox. State the

asked by Marnae on September 5, 2010
algebra
Evaluate the logarithmic equation for three values of x that are greater than 1, three values of x that are between 0 and 1, and at x=1. Show your work. Use the resulting ordered pairs to plot the graph; submit the graph via the Dropbox. State the equation

asked by Anonymous on September 3, 2010
intermediate algebra
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Show your work. Use the resulting ordered pairs to plot the graph; submit the graph via the Dropbox. State the equation of the line asymptotic to the

asked by Anonymous on September 3, 2010
trig/precalc
a car’s flywheel has a timing mark on it’s outer edge. the height of the timing mark on the rotating flywheel is given by y=3.55sin[x – (pi/4)]. graph one full cycle of this function. I was not taught how to graph a function like this, only the simple y=

asked by tabby on April 10, 2012
university of minnesota
Find the maximum and minimum values of the given objective function on the indicated feasible region. M = 150 − x − y

asked by fatima on November 17, 2014
math
Find the maximum and minimum values of the given objective function on the indicated feasible region. M = 150 − x − y

asked by fatima on November 17, 2014
algebra
Coulld someone take the time and check my answers please. 11) without graphing is the system independent, dependent, or inconsistent? y=-x+5 -3x-3y=-15 (my answer; dependent) 12) your club is baking vanilla and chocolate cakes for a bake sale. they need at

asked by Lee on January 3, 2013
isds
When specifying linear constraints, the modeler must take into account the unit specification of the decision variables so that the units represented by the left side of the constraints are consistent with the units represented by the right side of the

asked by mca on October 11, 2015

Calculus Please Help
I think I have the right answer, but I am not 100% sure how to do the values at (1,-1) and the one below at (0,-1, 1). Please explain how I need to approach how to do these. Thank You! Calculate the partial derivative @f/@x, @f/@y and @f/@x | (1,-1), and

asked by Jennifer on November 13, 2014
English
Chose the answer that identifies the three cases of pronouns. nominative, possessive, objective

asked by Ana on March 30, 2016
Calculus

  1. Given the function f defined by f(x) = x^3-x^2-4X+4 a. Find the zeros of f b. Write an equation of the line tangent to the graph of f at x = -1 c. The point (a, b) is on the graph of f and the line tangent to the graph at (a, b) passes through the point

asked by Anonymous on January 16, 2012
Math – Simple rational functions (check)
Consider the function f(x) = x/(x-1) Are there any turning points? Explain how this could help you graph f(x) for large values of x? Ans: turning points is another word for checking the concavity, and therefore i find the second derivative and equate it to

asked by Anonymous on October 29, 2010
math
The function f(x)= ax^3 – bx +c passes through the origin, f(-1)=4/3 and it has an extreme point at x=1 (i) Find the values of a, b and c. (ii) Sketch the graph (iii) Find the area bounded by the graph of f(x) and the x-axis between the lines x=-1 and x=1

asked by gibbs on April 25, 2013
Math(Please check. Thank You)
1) solve:e^x(x^2-4)=0 e^x=0 and then (x+2)(x-2) so x=2, -2 2) differentiate: y=ln(6x^2 – 3x + 1) 1/(6x^2 – 3x + 1) * 12x-3 3) differentiate: y=e^-3x+2 -3 * e^-3x+2 4) evaluate: 2^4-x=8 2^4-x = 2^3 4-x = 3 -x=-1 so x=1 5) differentiate: x^3 + y^3 -6 =0 3x^2

asked by Hannah on April 30, 2011
Calculus
The function g is defined for x>0 with g(1)=2, g'(x)=sin(x+1/x), and g”(x)=(1-1/x^2)cos(x+1/x). A. Find all values of x in the interval 0.12

asked by Sarah on May 7, 2015
Algebra (Please help!)
The graph below plots the values of y for different values of x: plot the ordered pairs 1, 1 and 2, 4 and 3, 7 and 4, 9 and 5, 12 and 6, 16 Which correlation coefficient best matches the data plotted on the graph? A. −0.5 B. 0 C. 0.25 D. 0.90 Is it D.

asked by Lidiah on April 17, 2017
calculus
Help! I have a test tommorow! I don’t understand (b), (c), (e), and (g). The answers are listed following the each question. Here’s a discription of the graph: There is a graph of a function f consists of a semi circle (-3 to 1 faced downward on the

asked by Anonymous on October 26, 2007
math help pls pls pls
The graph below plots the values of y for different values of x: Plot the ordered pairs 1, 3 and 2, 4 and 3, 9 and 4, 7 and 5, 2 and 6,18 Which correlation coefficient best matches the data plotted on the graph? 0.5 0.8 0.9 1.0 pls help me

asked by Oscar on March 19, 2016

Calculous
the figure shows the graph of F’, the derivative of a function f. the domain of the function f is the set of all X such that -3< or equal to x

asked by Yoona on November 21, 2011
AP CALC. AB
Let h be a function defined for all x≠0 such that h(4)=-3 and the derivative h is given by h'(x)=(x^2-2)/(x) for all x≠0 a). Find all values of x for which the graph of h has a horizontal tangent, and determine whether h has a local maximum, a local

asked by Darcy on December 2, 2014
Calculus
a)The curve with equation: 2y^3 + y^2 – y^5 = x^4 – 2x^3 + x^2 has been linked to a bouncing wagon. Use a computer algebra system to graph this curve and discover why. b)At how many points does this curve have horizontal tangent lines? Find the

asked by Chelsea on October 31, 2010
College alg
Analyze the graph of the following function as follows: (a) Find the x- and y-intercepts. (b) Determine the end behavior: find the power function that the graph of f resembles for large values of |x|. (c) Find the maximum number of turning points.

asked by sunny on January 4, 2012
algebra
The point of intersection of the graphs of the equations of the system Ax – 4y = 9 4x + By = –1 is (–1, –3). Explain how to find the values of A and B, then find these values.

asked by Algebra PLEASE HELP!! on March 18, 2012

Categories
Assignment Help business plan writing services coursework help dissertation proposal help professional essay writers

(a) how much negative charge is on each oxygen of the carbonate ion?

Consider the resonance structures for the carbonate ion. O–C-O(-) l O(-) (-)O-C–O l O(-) (-)O-C-O(-) l l O How much negative charge is on each oxygen of the carbonate ion?
4,397 results
Organic Chemistry
Consider the resonance structures for the carbonate ion. O–C-O(-) l O(-) (-)O-C–O l O(-) (-)O-C-O(-) l l O How much negative charge is on each oxygen of the carbonate ion? A)0, B) -.33, C)-.50, D) -.67, E)-1.00, F)-1.33, G)-1.50, H)-1.67, I)-2.00 What is

asked by Jess on September 15, 2014
Chemistry
Consider the resonance structures for the carbonate ion. O–C-O(-) l O(-) (-)O-C–O l O(-) (-)O-C-O(-) l l O How much negative charge is on each oxygen of the carbonate ion? A)0, B) -.33, C)-.50, D) -.67, E)-1.00, F)-1.33, G)-1.50, H)-1.67, I)-2.00 What is

asked by arcos15 on July 2, 2012
Chem
for the dimethylthiocarbamate ion [OSCN(CH3)2]-. Add bonds and electron lone pairs in order to give the important resonance structures of this ion, including any formal charges where necessary. Select the resonance structure likely to provide the best

asked by Saki on September 5, 2016
Chemistry
Which statement about resonance structures is TRUE: 1) There can never be more than two resonance structures for any molecule. 2) Only ionic compounds use resonance structures 3) The real structure of a molecule is an average or hybrid of the resonance

asked by Michelle on July 19, 2013
Chemistry
Draw the Lewis structures for BrO3- and ClO4- and indicate their correct number of additional resonance structures. I’m a little confused about this. For example, I’ve got the correct original form of BrO3- down. Where all 3 O atoms are single bonded to

asked by Raj on September 28, 2008

SCIENCE

  1. WHAT IS resonance 2. whAT to frequncy of a sound when a car approaches How is resonance used? One kind of resonance is chemical resonance in which several structures can be drawn to represent a compound an the “real” structure is a hybrid of all of the

asked by TAYLOR on December 13, 2006
organic chemistry
I need help understanding how to differentiate between isomers and resonance structures in skeletal structures. Specifically, here is an image to a problem with the answers: i.imgur. com /mz3URSa.jpg (remove spaces) The left most structure is the reference

asked by Bill on October 19, 2013
Organic chemistry
Write contributing (important) resonance structures for each of the following compounds and predict their relative C=O vibrational frequencies based on the importance of the contributing resonance structures. List in them order from highest to lowest

asked by Jane on February 17, 2009
Resonance structures
I won’t try to draw one here but take for example, CH3CH2COO-. This has two resonance structures but they look the same to me. The CH2-C single bond can rotate and it looks like you can just flip the COO- section and it looks like the same structure. Maybe

asked by Sheryl on September 30, 2006
chemistry
Draw the dominant Lewis structure for NO2+. Note, that this ion is isoelectronic with CO2. How many double bonds does this resonance structures have?

asked by john on November 4, 2014
chem
draw the lewis structure for NO2- including any valid resonance structures. which of the following statements are true? a. the nitrite ion contains 2 N-O bonds that are equivalent to 1 1/2 bonds. b. the nitrite ion contains 2 N=O double bonds c. the

asked by natash on May 1, 2008
AP Chem
use simple structure and bonding models to account for each of the following: A. the bond length between the two carbon atoms is shorter in C2h4 then in c2h6. B.the bond lengths in SO3 are all identical and are shorter than a sufur oxygen single bond. C.

asked by Justyna on January 9, 2007
AP Chemistry
I don’t understand this question and answer can someone help me? In order to exhibit delocalized pi bonding, a molecule must have . At least resonance 2 resonance structures.

asked by Ana on October 19, 2010
chemistry
Among the resonance structures of SCN-, is it true that the more widely-used structure is considered the “real” structure? Two resonance structures of SCN- are S=C=N and S-C≡N.

asked by Anonymous on April 23, 2008
chemistry
The hydrogen carbonate ion is formed when an H+ ion combines with the polyatomic ion CO32-. What is the net charge on the hydrogen carbonate ion? A. 2- B. 1- C. 1+ D. 2+ A

asked by Keri on November 9, 2012

chemistry
A carbonate ion, CO32−, can participate in an acid-base reaction. How should the carbonate ion be classified?

asked by Morgan on October 13, 2014
8th grade physical science
what is the charge on carbonate ion? Compared to the number of protons, how many electrons does the carbonate ion have?

asked by Taylor on November 17, 2008
Chemistry
Can someone explain hybrid structures and resonance structures.

asked by Chris on March 2, 2010
Chemistry
Draw Lewis dot structures, including appropriate resonance forms, and assign formal charges to each of those structures, for the molecule urea, with chemical formula NH2CONH2. You should find at least 3 such structures, some of which will have formal

asked by Emma on October 25, 2009
Chemistry
I have a homework question that says: “Three resonance structures of the following anion are possible. One is given below, but it is incomplete. Complete the given structure by adding non-bonding electrons and formal charges. Draw the two remaining

asked by Anne on September 8, 2016
Chemistry
A student draws four resonance structures for nitromethane (CH3NO2). How many lewis structures should have been drawn to represent nitromethane?

asked by Amy on December 5, 2010
chemistry
predict how many sodium ions would combine with: (a) a chlorine ion. (b) a carbonate ion. (c) a phosphate ion.

asked by Hana on March 24, 2008
Chemistry
Select the true statements regarding the resonance structures of formate. HCO2 Check all that apply: Each oxygen atom has a double bond 50% of the time. The actual structure of formate is an average of the two resonance forms. Each carbon-oyxgen bond is

asked by Anonymous on November 11, 2012
chemistry
How many resonance structures does N3- have? A. 2 B. 3 C. 4 D. No resonance C. 4

asked by Anonymous on December 12, 2012
Chemistry
Choose the true statements regarding the charge-minimized Lewis structure(s) of the BrO2- ion. (selet all that apply) a. There is only one charge-minimized structure for this ion. b. There are two charge-minimized resonance structures for this ion. c. The

asked by Lindsay on October 5, 2008

Resonance structures
Is there a good article on how to draw resonance structures? Sheryl Sheryl, These are so hard to do on these boards. In fact, I think it is impossible to draw them on these boards. This site may help some.

asked by Sheryl on September 24, 2006
Chemistry
Suppose that you wanted to be sure that a metal ion, any metal ion, would dissolve in water. What salt of themetal ion compound would you choose? 1. the carbonate (CO2−3 ) salt of the metal ion 2. the hydroxide (OH−) salt of the metal ion 3. the

asked by May on October 4, 2010
Chemistry
What is the proper chemical formula for the perchlorate ion. Enter the formula by writing the formula followed by a comma and then any charge on the ion. For example: the carbonate ion, CO32- would be entered as CO3,2- (note the comma). Enter singly

asked by girl1991 on April 12, 2008
chemistry
Suppose that you wanted to be sure that a metal ion, any metal ion, would dissolve in water. What salt of the metal ion compound would you choose? 1. the hydroxide (OH−) salt of the metal ion 2. the carbonate (CO2− 3 ) salt of the metal ion 3. the

asked by cheri on September 19, 2012
Chemistry
I don’t understand this question and answer can someone help me? In order to exhibit delocalized pi bonding, a molecule must have . At least resonance 2 resonance structures. & In comparing the same two atoms bonded together, the greater the bond order,

asked by Ana on October 20, 2010
chemistry
what are two resonance structures for SPN

asked by Anonymous on October 19, 2010
chemistry
resonance structures of ch3nco

asked by chamo on April 3, 2011
chemistry
The net ionic equations for the following 1. Dissolution of silver oxalate with nitric acid 2. Complexation of the iron(III) by the thiocyanate ion 3. Precipitation of the carbonate ion with barium ion 4. precipitation of the oxalate ion with barium ion 5.

asked by Jake on November 30, 2010
Chemistry
What are all the resonance Structures of Carbon Tetraoxide?

asked by Vinny on November 9, 2010
DrBob222-Questions
Can you please check these for me. Thank you very much in return:-) For Al2(SO4)3 you gave me Aluminum ion and Sulfate ion. These are the rest: CaCl2 = Calcium ion and Chlorite ion Na2O = Sodium ion and Oxygen ion AgCl = silver ion and chlorine ion Na3PO4

asked by Sara on April 20, 2010

chem
how many resonance structures can be drawn for sulfur trioxide, SO_3?

asked by edna on November 27, 2007
chemistry
do the resonance structures only apply for oxygen and double bonds?

asked by alex on November 11, 2007
chem
how many resonance structures can be drawn for sulfur trioxide, SO_3?

asked by edna on November 27, 2007
Chem Urgency
Is it possible to determine resonance structures…..or no? I understand what it is but I am not sure how the drawings come about or even how to recognize them.

asked by Sami on November 26, 2007
chemistry
How could you make the reaction Cu(NO3)2 + NaCO3 — CuCo3+NaNO3 balanced? You have the formula for sodium carbonate wrong> Na2CO3 The carbonate ion is -2 valence, and Na is +1. Now it will balance.

asked by Carter on November 5, 2006
chemistry
Solid sodium carbonate is slowly added to 50.0 mL of a 0.0310 M calcium acetate solution. The concentration of carbonate ion required to just initiate precipitation is

asked by Anonymous on August 14, 2013
Chemistry
In terms of aromatic compounds, how do I determine which pairs of structures are correct representations of resonance forms? For example in these structures: img33.imageshack.us/img33/2756/70725074.jpg I know there has to be a single bond, double bond,

asked by Hatala on July 14, 2009
physic
an object of mass 1.5 kg on a spring of force constant 600N/m loses 3% of its energy in each cycle.THE SYSTEM IS DRIVEn by a sinosuidal force with maximim value of F0=0.5N.(a) What is Q for this system?.(b) What is the resonance (angluar)frequency? (c) If

asked by jjena on November 14, 2011
Physic Help please
an object of mass 1.5 kg on a spring of force constant 600N/m loses 3% of its energy in each cycle.THE SYSTEM IS DRIVEn by a sinosuidal force with maximim value of F0=0.5N.(a) What is Q for this system?.(b) What is the resonance (angluar)frequency? (c) If

asked by jjena on November 15, 2011
Physic Help please
an object of mass 1.5 kg on a spring of force constant 600N/m loses 3% of its energy in each cycle.THE SYSTEM IS DRIVEn by a sinosuidal force with maximim value of F0=0.5N.(a) What is Q for this system?.(b) What is the resonance (angluar)frequency? (c) If

asked by jjena on November 14, 2011

Chem
Suppose that a stable element with atomic number 119, symbol Wr, has been discovered. (d) What would be the most likely charge of the Wr ion in stable ionic compounds? (e) Write a balanced equation that would represent the reaction of Wr with water. (f)

asked by Dave on October 21, 2012
chemistry
write the lewis structure for dinitrogen oxide. include the 2 resonance structures and formal charges where appropriate.

asked by Missy on September 20, 2010
Chemistry
What is the silver ion concentration in a solution prepared by mixing 345 mL of 0.352 M silver nitrate with 443 mL of 0.511 M sodium carbonate? The Ksp of silver carbonate is 8.1 × 10-12

asked by CP on March 11, 2013
Chemistry
Please help with this! Draw Lewis structures of all of the important resonance states for the following molecules or ions. Be sure to indicate all formal charges and all unshared electron pairs. H3CCO+ C2H4Br+ C7H7+ (This is a ring with one H on each C)

asked by Jawad on September 1, 2005
CHEMISTRY
would you tell me how many resonance structures H2SO4 has? i am really confused, i drew them and i got alot. also CH3COOCH3. by the way what is CH3COOCH3? i couldn’t find it on wikipedia.

asked by sharon on May 28, 2010
chem
If 0.752 g of pure sodium carbonate was dissolved in water and the solution titrated with 25.90 mL of hydrochloric acid to a methyl orange end point, calculate the molarity of the hydrochloric acid solution. (Hint: This process takes the carbonate ion to

asked by Beth on April 3, 2011
Chemistry
Which of the following nitrogen oxide molecules and related ions is/are diamagnetic and has/have more than two charge-minimized resonance structures? 1. NO 2. NO2 3. N2O4 4. NO2-

asked by Dave on October 25, 2009
Ion Charge & Formulas of Ionic Compounds
Can you please take a look at my questions. Thank you very much. 1.classify the law of definite proportions. In specific proportions, A type of compound always contains the same elements. Is this good? Any other info would be greatly appreciated. 2.how do

asked by Sara on April 20, 2010
Chem 1
Given the bond energy data below, which is the best prediction for the bond energy of the bond between the nitrogen and the oxygen atom in N2O? bond energy (kJ/mol) N-O single bond 201 N-O double bond 607 Indicate if it will be the single bond, double bond

asked by Rossina on November 16, 2006
chemistry
What is the molar solubility of silver carbonate Ag2CO3 at 25 C if it is dissolved in a 0.15M solution of silver nitrate, AgNO3? Solubility constant: silver carbonate = 8.1 *10^(-12) Answer: 3.6 *10^(-10) So… not sure exactly what to do here. AgCO3 +

asked by molar solubility on July 30, 2011

chemistry
Draw one of the Lewis structure of the N2O5. In each case one oxygen bridges the nitrogens (N-O-N single bond) and 2 other oxygens are bonded to each N. How many equivalent resonance structures are there that satisfy the octet rule and where O makes at

asked by K on November 6, 2014
chemistry
Draw one of the Lewis structure of the N2O5. In each case one oxygen bridges the nitrogens (N-O-N single bond) and 2 other oxygens are bonded to each N. How many equivalent resonance structures are there that satisfy the octet rule and where O makes at

asked by john on November 4, 2014
physics
Resonance of sound waves can be produced within an aluminum rod by holding the rod at its midpoint and stroking it with an alcohol-saturated paper towel. In this resonance mode, the middle of the rod is a node while the ends are antinodes; no other nodes

asked by Erica–help! on December 6, 2010
Chemistry
Write the HA reaction for each acid below. Account for the following activity order by drawing the important resonance contributing structures (those having only one negative (-) formal charge) for A-. HA + H2O H3O+ + A- stronger HClO4>HClO3>HClO weaker

asked by Ochem Student on September 2, 2018
Chemistry
What is the formula for the ions in the compounds BaSO4 and Li2CO3 BaSO4 has barium ions (Ba2+, Sulfate ions SO42-, and Lithium carbonate has lithium ions Li1+, and carbonate ions CO32- Ba ions (might be written as Ba^2+) and sulfate (might be written as

asked by Bryan on November 16, 2006
Chemistry
Draw the resonance structures for SeS2 and SiS2. There are 2 for SeS2 and 3 for SiS2. I really need help with this. If it can be explain with words, since pictures would be hard. Thanks!

asked by Alexis on December 1, 2010
physics
if the shortest lenggth of the tube for resonance is 0.1m and next resonance length is 0.35m what is the frequency of the vibration

asked by kelvin on May 30, 2013
electronics
Which of the following statements is true with reference to an L-C resonant circuit? (1) The impedance of a parallel L-C circuit is low at resonance and higher at frequencies above and below resonance. The impedance of a series circuit is high at resonance

asked by Anonymous on July 10, 2017
chemistry
write the formula for and indicate the charge on each of the following ions: a) sodium ion b) aluminum ion c) chloride ion d) nitride ion e e)iron (II) ion f) iron (III) ion

asked by john on February 28, 2008
Chemistry
What is the only positive ion found in H2SO4(aq)? a. ammonium ion b. hydronium ion c. hydroxide ion d. sulfate ion The answer’s b, but I don’t understand why.

asked by danny123 on November 20, 2010

Chemistry
Draw the Lewis Structure of CH3NCS including all resonance forms. Assign formal charges. Do not include resonance arrows.

asked by Raeann on December 11, 2016
Science
Compared to the number of protons how many electrons does the carbonate ion have

asked by Blah on November 9, 2010
Chemistry
0.10 M solution of a weak monoprotic acid has a hydronium-ion concentration of 5.0 * 10^-4 M. What is the equilibrium constant, Ka, for this acid? a. 5.0 *10^-2 b. 5.0 * 10^-3 c. 2.5 * 10^-4 d. 2.5 * 10^-5 e. 2.5 * 10^-6 2. (Points: 1) What is the

asked by wite2khin on May 13, 2010
chemistry
THe thiocyanate ion acts as a Lewis base, donating a pair of electrons to the Fe ^ 3+ ion. Both sulfur and nitrogen atoms have lone pair electrons that can potentially be donated. Therefore, ther are two different structures (linkage isomers) that can be

asked by Judy on June 29, 2010
chemistry
To create a 0.1 M carbonate buffer pH = 10.2. You choose to use a combination of HCO3- / CO32-. This buffer system has pKa = 9.9. a) Calculate how much you need to weigh in each of the sodium salts, NaHCO3 and Na2CO3, to create 1.0 L carbonate (with

asked by Maria on September 9, 2016
chemistry help !!!!!!!!!!!!!!!!
a)A N6+ ion in its ground state absorbs an X-ray photon of energy 2.0000 keV. Explain what happens to the ion and why. b)Explain why the nitrogen ion N6+ is a hydrogen-like ion. Assuming the ion is for the major stable isotope 14N, state which sub-atomic

asked by john on March 10, 2013
chemistry
Which of these ions may be precipitated as sulfides? Assume neutral aqueous solution, pH=7. Silver (I) ion Sodium ion Calcium ion Lead (II) ion Manganese (II) ion Ammonium ion I think the silver I ion, lead II ion, and manganese ion may be precipitated as

asked by Sarah on February 27, 2008
Chem
Which of these ions may be precipitated as sulfides? Assume neutral aqueous solution, pH=7. Silver (I) ion Sodium ion Calcium ion Lead (II) ion Manganese (II) ion Ammonium ion I think the silver I ion, lead II ion, and manganese ion may be precipitated as

asked by Sarah on February 27, 2008
Chemistry 102
The Ksp for cerium iodate, Ce(IO3)3 is 3.2 e-10. What is the molar solubility of Ce ion in pure water? = .0019 M B) A 0.031 M sodium iodate is added as a common ion. What is the concentration of Ce ion with the common ion present? C) What is the ratio of

asked by Nick on April 21, 2010
chemistry
When copper is dissolved in nitric acid, a brown gas (NO2) is evolved, either by direct production of NO2 or by production of NO which is oxidized to NO2 by O2. Provide a Lewis drawing and resonance structures for the nitrate anion.

asked by Vishnu on October 4, 2008

CHEMISTRY
Provide the name of the oxyanion of the acid HNO2(aq) I ENTERED Carbonate ion BUT ITS WRONG

asked by MELISSA on June 24, 2016
chemistry
What is the carbonate-ion, CO3-2, concentration in a 0.037 M carbonic acid solution? a. 1.2 ´ 10-4 b. 4.2 ´ 10-7 c. 7.6 ´ 10-8 d. 4.8 ´ 10-11 e. 5.2 ´ 10-19

asked by iby on May 14, 2010
Chemistry
I did a back titration with an unknown carbonate and using the average % carbonate (by mass) which I found to be 27.40% and appropriate calculation decided where the unknown is an alkali metal carbonate or an alkaline earth metal carbonate. I have no idea

asked by Laura on March 5, 2012
Chemistry
Suppose that a stable element with atomic number 119, symbol Wr, has been discovered. (a) Write the ground-state electron configuration for Wr, showing only the valence-shell electrons. (b) Would Wr be a metal or a nonmetal? Explain in terms of electron

asked by Lily on October 20, 2012
Chemistry
One mole of each of the following compounds is added to water in separate flasks to make 1.0 L of solution. Which solution has the largest total ion concentration? a. aluminum hydroxide b. silver chloride c. sodium chloride d. calcium carbonate e.

asked by Sam on May 9, 2011
chemistry 2
Which property of group 2 elements ( magnesium to barium) and their compounds increases with an increasing proton (atomic) number? A)the magnitude of the enthalpy change of hydration of the metal ion B)the pH of the aqueous chloride C)the solubility of the

asked by areebah on August 31, 2017
chemistry 2
Which property of group 2 elements ( magnesium to barium) and their compounds increases with an increasing proton (atomic) number? A)the magnitude of the enthalpy change of hydration of the metal ion B)the pH of the aqueous chloride C)the solubility of the

asked by areebah on August 31, 2017
Chemistry
The compound butane, has two structures. They have the same molecular formula but different arrangements of bonds in their structures. As a result, they can have different chemical and physical properties. Draw the lewis structures of all the isomers of

asked by Hannah on November 16, 2011
Chemistry
Often, acetal formation is carried out directly with the help of a carbonyl and a diol under acidic conditions. a) Show two acid-base reactions that could occur in the presence of a strong acid such as p-toluenesulfonic acid. b)Draw the two resonance

asked by Lindz on November 5, 2006
CHEM
If NO3- has 3 resonance structures, but only one has to be written, where does the extra electron, making there then be 24 electrons, go if you cannot put brackets around the structure you are drawing? Do you put -1 on both of the singly bonded

asked by K on November 26, 2007

Chemistry
Would the following structures be polar or nonpolar? (Not applicable if the structure is an ion. Pick “ionic” in that case). SO2 N2O N3−

asked by Johannie on April 10, 2010
Science
What is a polyatomic ion? A polyatomic ion is an ion composed of more than one kind of atom. For example, the hydrogen carbonate ion, HCO3^- (also called bicarbonate), ammonium ion (NH4^+), oxalate ion (C2O4^-2), phosphate ion (PO4^-3), sulfate ion

asked by Jeff on January 7, 2007
Chemistry
How many resonance structures do these following acids have? H2CO3-carbonic acid H3PO4-phosphoric acid H2SO4-sulfuric acid HNO3-nitric acid CH3COOH- acetic acid CH2ClCOOH- chloroacetic acid CHCl2COOH- dichloroacetic acid CCl3COOH- trichloroacetic acid

asked by Joseph on November 4, 2014
Chemistry
You are provided with water and laboratory apparatus. Describe how you would fully separate solid lead2 carbonate from a mixture oflead2 carbonate, iron fillings and sodium carbonate

asked by Tedy on August 22, 2018
Physics
How does using the concept of resonance determine the speed of sound an in experiment? In other words, I’m wondering how the concept of resonance works

asked by Emma on November 25, 2015
Physics
How does using the concept of resonance determine the speed of sound an in experiment? In other words, I’m wondering how the concept of resonance works

asked by Emma on November 25, 2015
Physics, finding harmonics
A tuning fork with a frequency of 440 Hz is held above a resonance tube that is partially filled with water. Assuming that the speed of sound in air is 342 m/s, for what three smallest heights of the air column will resonance occur? Where will the nodes

asked by Robbie on February 9, 2009
Organic chemistry
is it harder to obtain the magnetic resonance signal of a C-13 nucleus than an H-1 resonance signal at the same sample

asked by jeff on September 1, 2009
Chemistry equation
Write a correctly balanced series of chemical equations to describe the stepwise protonation of carbonate ion. Na2CO3 with HCl

asked by Jaden on April 9, 2013
ap chem
There are several oxides of nitrogen; among the most common are N2O, NO, and NO2. 1.Write the Lewis structures for each of these molecules. In each case the oxygens are terminal atoms. 2. Which of these molecules “violate” the octet rule? 3. Draw resonance

asked by Justyna on January 9, 2007

Chemistry
6 separate questions. I have figured out the other 20 questions I am stuck. Please help Thanks The correct name for the ionic compound Al2Se3 is? The correct name for the ionic compound Fe2Se3 is? the Roman numerall III in the name Iron(III)oxice indicates

asked by Lisa on February 9, 2014
Chemistry
A tablet containing calcium carbonate and fillers with a mass of 1.631 g was dissolved in HCl. After the fillers were filtered out, the HCl was neutralized by adding sodium carbonate. The resulting precipitate was pure calcium carbonate (with the fillers

asked by Sam on March 13, 2017
chemistry(check my answer)
how do resonance structure related to its real structure? resonance structure is just another way to write the lewis dot with different formal charges and bond order

asked by phys on April 8, 2010
Chemistry
Plan how you would make 100mL of a buffer solution with a pH of 10.80 to be made using only sodium carbonate, sodium hydrogen carbonate and water. You should specify the amount of sodium carbonate and sodium hydrogen carbonate that you would use.

asked by Parveen on August 12, 2012
chemistry
a student accidentally mixed sodium carbonate an calcium carbonate. state how he would obtain pure sodium carbonate from the mixture

asked by james on April 8, 2018

Categories
essay writing services how to write an admission essay professional essay writers

hub.totalsem

Mike Meyers’

CompTIA Network+® Guide to Managing and

Troubleshooting Networks

Third Edition

(Exam N10-005)

This page intentionally left blank

Mike Meyers’

CompTIA Network+® Guide to Managing and

Troubleshooting Networks

Third Edition

(Exam N10-005)

Mike Meyers

New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

New Delhi San Juan Seoul Singapore Sydney Toronto

BaseTech

Copyright © 2012 by the McGraw-Hill Companies. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.

ISBN: 978-0-07-179981-2

MHID: 0-07-179981-8

The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-178911-0, MHID: 0-07-178911-1.

All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefi t of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps.

McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com.

McGraw-Hill is an independent entity from CompTIA®. This publication and digital content may be used in assisting students to prepare for the CompTIA Network+ exam. Neither CompTIA nor McGraw-Hill warrants that use of this publication and digital content will ensure passing any exam. CompTIA and CompTIA Network+ are trademarks or registered trademarks of CompTIA in the United States and/or other countries. All other trademarks are trademarks of their respective owners.

Fluke images printed with permission of Fluke Corporation, ©Fluke Corp. Intel image printed with permission of Intel Corporation, ©Intel Corp. TRENDnet images printed with permission of Trendnet Media, ©TRENDnet. Equalizer E650GX image printed by permission of Coyote Point Systems, ©Coyote Point Systems, Inc. www.coyotepoint.com. NetGear image printed with permission of NetGear, ©NETGEAR, Inc. Hewlett-Packard images printed with permission of HP, ©Hewlett-Packard CLEAR image printed with permission of CLEAR, ©CLEAR

TERMS OF USE

This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGrawHill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms.

THE WORK IS PROVIDED “AS IS.” McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/ or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise.

E-book conversion by codeMantra

Version 2.0www.coyotepoint.com

About the Author■■ Michael Meyers is the industry’s leading authority on CompTIA Network+ certifica- tion. He is the president and founder of Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations throughout the world, and a member of CompTIA.

Mike has written numerous popular textbooks, including the best-selling Mike Meyers’ CompTIA A+® Guide to Managing & Troubleshooting PCs, Mike Meyers’ CompTIA A+® Guide to Essentials, and Mike Meyers’ CompTIA A+® Guide to Operating Systems.

About the Contributor Scott Jernigan wields a mighty red pen as Editor in Chief for Total Seminars. With a Master of Arts degree in Medieval History, Scott feels as much at home in the musty archives of London as he does in the warm CRT glow of Total Seminars’ Houston head- quarters. After fleeing a purely academic life, he dove headfirst into IT, working as an instructor, editor, and writer.

Scott has written, edited, and contributed to dozens of books on computer liter- acy, hardware, operating systems, networking, and certification, including Computer Literacy—Your Ticket to IC3 Certification, and co-authoring with Mike Meyers the All-in- One CompTIA Strata® IT Fundamentals Exam Guide.

Scott has taught computer classes all over the United States, including stints at the United Nations in New York and the FBI Academy in Quantico. Practicing what he preaches, Scott is a CompTIA A+ and CompTIA Network+ certified technician, a Microsoft Certified Professional, a Microsoft Office User Specialist, and Certiport Inter- net and Computing Core Certified.

About the Technical Editor Jonathan S. Weissman earned his master’s degree in Computer and Information Science from Brooklyn College (CUNY), and holds nineteen industry certifications, including Cisco CCNA, CompTIA Security+, CompTIA i-Net+, CompTIA Network+, CompTIA A+, CompTIA Linux+, Novell CNE, Novell CNA, Microsoft Office Master, Microsoft MCAS Word, Microsoft MCAS PowerPoint, Microsoft MCAS Excel, Microsoft MCAS Access, Microsoft MCAS Outlook, and Microsoft MCAS Vista.

Jonathan is a tenured Assistant Professor of Computing Sciences at Finger Lakes Community College, in Canandaigua, NY, and also teaches graduate and under- graduate computer science courses at nearby Rochester Institute of Technology. In addi- tion, Jonathan does computer, network, and security consulting for area businesses and individuals.

Between FLCC and RIT, Jonathan has taught nearly two dozen different computer science courses, including networking, security, administration, forensics, program- ming, operating systems, hardware, and software.

Students evaluating his teaching emphasize that he simplifies their understanding of difficult topics, while at the same time makes the class interesting and entertaining.

Jonathan completely designed and configured FLCC’s newest Networking & Secu- rity Lab. Serving as IT Program Coordinator, he rewrote FLCC’s Information Technol- ogy course requirements for the degree, keeping it current with the changes in industry over the years.

This textbook is just one of the many that Jonathan has edited for thoroughness and accuracy.

BaseTech

This page intentionally left blank

vii

Acknowledgments■■ I’d like to acknowledge the many people who contributed their talents to make this book possible:

To Tim Green, my acquisitions editor at McGraw-Hill: Didn’t think I’d get the book out this quickly, did you? Thanks for your superb support and encouragement, as always.

To my in-house Editor-in-Chief, Scott Jernigan: Didn’t think we’d get the book out that fast, did you? How many 85s do you have now? Pelape still smokes them all in DPS.

To Jonathan Weissman, technical editor: Holy crap, you kicked my butt. Thanks for making my book dramatically better than it has ever been.

To LeeAnn Pickrell, copy editor: u made me write good, thx. To Michael Smyer, Total Seminars’ resident tech guru and photogra-

pher: Glad to see you staying focused. And your photos rocked as always! To Ford Pierson, graphics maven and editor: Superb conceptual art?

Check! Great editing? Check! Beating the boss in Unreal Tournament over and over again? Check, unfortunately.

To Aaron Verber, editor extraordinaire: Your quiet toils in the dark cor- ner of the office have once again paid outstanding dividends!

To Dudley Lehmer, my partner at Total Seminars: As always, thanks for keeping the ship afloat while I got to play on this book!

To Stephanie Evans, acquisitions coordinator at McGraw-Hill: You are my favorite South African ambassador since the Springboks. Thanks for keeping track of everything and (gently) smacking Scott when he forgot things.

To Molly Sharp and Jody McKenzie, project editors: It was a joy to work with you, Molly, and again with you, Jody. I couldn’t have asked for a better team! (Didn’t think I could resist making the pun, did you?)

To Andrea Fox, proofreader: You did a super job, thank you To Tom and Molly Sharp, compositors: The layout was excellent,

thanks!

To Staci Lynne ■■ Davis, vegan chef and

punk rocker: Thanks for showing me your world

and, in the process, expanding mine.

BaseTech

Key Terms, identified in red, point out important vocabulary and definitions that you need to know.

Tech Tip sidebars provide inside information from experienced IT professionals.

Cross Check questions develop reasoning skills: ask, compare, contrast, and explain.

Engaging and Motivational— Using a conversational style and proven instructional approach, the author explains technical concepts in a clear, interesting way using real-world examples.

Makes Learning Fun!— Rich, colorful text and enhanced illustrations bring technical subjects to life.

10BaseT also introduced the networking world to the RJ-45 connector (Figure 4.9). Each pin on the RJ-45 connects to a single wire inside the cable; this enables de- vices to put voltage on the indi- vidual wires within the cable. The pins on the RJ-45 are numbered from 1 to 8, as shown in Figure 4.10.

The 10BaseT standard designates some of these numbered wires for specific purposes. As mentioned earlier, although the cable has four pairs, 10BaseT uses only two of the pairs. 10BaseT devices use pins 1 and 2 to send data, and pins 3 and 6 to receive data. Even though one pair of wires sends data and another receives data, a 10BaseT device cannot send and receive simul- taneously. The rules of CSMA/CD still apply: only one device can use the segment contained in the hub without causing a collision. Later versions of Ethernet will change this rule.

An RJ-45 connector is usually called a crimp, and the act (some folks call it an art) of installing a crimp onto the end of a piece of UTP cable is called crimping. The tool used to secure a crimp onto the end of a cable is a crimper. Each wire inside a UTP cable must connect to the proper pin inside the crimp. Manufacturers color-code each wire within a piece of four-pair UTP to assist in properly matching the ends. Each pair of wires consists of a solid- colored wire and a striped wire: blue/blue-white, orange/orange-white, brown/brown-white, and green/green-white (Figure 4.11).

The Telecommunications Industry Association/Electronics Industries Alliance (TIA/EIA) defines the industry standard for correct crimping of four-pair UTP for 10BaseT networks. Two standards currently exist: TIA/ EIA 568A and TIA/EIA 568B. Figure 4.12 shows the TIA/EIA 568A and TIA/ EIA 568B color-code standards. Note that the wire pairs used by 10BaseT (1 and 2; 3 and 6) come from the same color pairs (green/green-white and orange/orange-white). Following an established color-code scheme, such as TIA/EIA 568A, ensures that the wires match up correctly at each end of the cable.

66 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

Cross Check Check Your CATs!

You’ve already seen CAT levels in Chapter 3, “Cabling and Topology,” so check your memory and review the different speeds of the various CAT levels. Could 10BaseT use CAT 2? Could it use CAT 6? What types of devices can use CAT 1?

• Figure 4.9 Two views of an RJ-45 connector

• Figure 4.10 The pins on an RJ-45 connector are numbered 1 through 8.

• Figure 4.11 Color-coded pairs

The real name for RJ-45 is “8 Position 8 Contact (8P8C) modular plug.” The name RJ-45 is so dominant, however, that nobody but the nerdiest of nerds calls it by its real name. Stick to RJ-45.

AbouT ThIs book

Proven Learning Method Keeps You on Track Mike Meyers’ CompTIA Network+® Guide to Managing and Troubleshooting Networks is structured to give you comprehensive knowledge of computer skills and technologies. The textbook’s active learning methodology guides you beyond mere recall and—through thought-provoking activities, labs, and sidebars—helps you develop critical-thinking, diagnostic, and communication skills.

Information technology (IT) offers many career paths, leading to occupations in such fields as PC repair, network administration, telecommunications, Web development, graphic design, and desktop support. To become competent in any IT field, however, you need

certain basic computer skills. Mike Meyers’ CompTIA Network+® Guide to Managing and Troubleshooting Networks builds a foundation for success in the IT field by introducing you to fundamental technology concepts and giving you essential computer skills.

Important Technology skills ■

10BaseT also introduced the networking world to the RJ-45 connector (Figure 4.9). Each pin on the RJ-45 connects to a single wire inside the cable; this enables de- vices to put voltage on the indi- vidual wires within the cable. The pins on the RJ-45 are numbered from 1 to 8, as shown in Figure 4.10.

The 10BaseT standard designates some of these numbered wires for specific purposes. As mentioned earlier, although the cable has four pairs, 10BaseT uses only two of the pairs. 10BaseT devices use pins 1 and 2 to send data, and pins 3 and 6 to receive data. Even though one pair of wires sends data and another receives data, a 10BaseT device cannot send and receive simul- taneously. The rules of CSMA/CD still apply: only one device can use the segment contained in the hub without causing a collision. Later versions of Ethernet will change this rule.

An RJ-45 connector is usually called a crimp, and the act (some folks call it an art) of installing a crimp onto the end of a piece of UTP cable is called crimping. The tool used to secure a crimp onto the end of a cable is a crimper. Each wire inside a UTP cable must connect to the proper pin inside the crimp. Manufacturers color-code each wire within a piece of four-pair UTP to assist in properly matching the ends. Each pair of wires consists of a solid- colored wire and a striped wire: blue/blue-white, orange/orange-white, brown/brown-white, and green/green-white (Figure 4.11).

The Telecommunications Industry Association/Electronics Industries Alliance (TIA/EIA) defines the industry standard for correct crimping of four-pair UTP for 10BaseT networks. Two standards currently exist: TIA/ EIA 568A and TIA/EIA 568B. Figure 4.12 shows the TIA/EIA 568A and TIA/ EIA 568B color-code standards. Note that the wire pairs used by 10BaseT (1 and 2; 3 and 6) come from the same color pairs (green/green-white and orange/orange-white). Following an established color-code scheme, such as TIA/EIA 568A, ensures that the wires match up correctly at each end of the cable.

66 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

Cross Check Check Your CATs!

You’ve already seen CAT levels in Chapter 3, “Cabling and Topology,” so check your memory and review the different speeds of the various CAT levels. Could 10BaseT use CAT 2? Could it use CAT 6? What types of devices can use CAT 1?

• Figure 4.9 Two views of an RJ-45 connector

• Figure 4.10 The pins on an RJ-45 connector are numbered 1 through 8.

• Figure 4.11 Color-coded pairs

The real name for RJ-45 is “8 Position 8 Contact (8P8C) modular plug.” The name RJ-45 is so dominant, however, that nobody but the nerdiest of nerds calls it by its real name. Stick to RJ-45.

10BaseT also introduced the networking world to the RJ-45 connector (Figure 4.9). Each pin on the RJ-45 connects to a single wire inside the cable; this enables de- vices to put voltage on the indi- vidual wires within the cable. The pins on the RJ-45 are numbered from 1 to 8, as shown in Figure 4.10.

The 10BaseT standard designates some of these numbered wires for specific purposes. As mentioned earlier, although the cable has four pairs, 10BaseT uses only two of the pairs. 10BaseT devices use pins 1 and 2 to send data, and pins 3 and 6 to receive data. Even though one pair of wires sends data and another receives data, a 10BaseT device cannot send and receive simul- taneously. The rules of CSMA/CD still apply: only one device can use the segment contained in the hub without causing a collision. Later versions of Ethernet will change this rule.

An RJ-45 connector is usually called a crimp, and the act (some folks call it an art) of installing a crimp onto the end of a piece of UTP cable is called crimping. The tool used to secure a crimp onto the end of a cable is a crimper. Each wire inside a UTP cable must connect to the proper pin inside the crimp. Manufacturers color-code each wire within a piece of four-pair UTP to assist in properly matching the ends. Each pair of wires consists of a solid- colored wire and a striped wire: blue/blue-white, orange/orange-white, brown/brown-white, and green/green-white (Figure 4.11).

The Telecommunications Industry Association/Electronics Industries Alliance (TIA/EIA) defines the industry standard for correct crimping of four-pair UTP for 10BaseT networks. Two standards currently exist: TIA/ EIA 568A and TIA/EIA 568B. Figure 4.12 shows the TIA/EIA 568A and TIA/ EIA 568B color-code standards. Note that the wire pairs used by 10BaseT (1 and 2; 3 and 6) come from the same color pairs (green/green-white and orange/orange-white). Following an established color-code scheme, such as TIA/EIA 568A, ensures that the wires match up correctly at each end of the cable.

66 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

Cross Check Check Your CATs!

You’ve already seen CAT levels in Chapter 3, “Cabling and Topology,” so check your memory and review the different speeds of the various CAT levels. Could 10BaseT use CAT 2? Could it use CAT 6? What types of devices can use CAT 1?

• Figure 4.9 Two views of an RJ-45 connector

• Figure 4.10 The pins on an RJ-45 connector are numbered 1 through 8.

• Figure 4.11 Color-coded pairs

The real name for RJ-45 is “8 Position 8 Contact (8P8C) modular plug.” The name RJ-45 is so dominant, however, that nobody but the nerdiest of nerds calls it by its real name. Stick to RJ-45.

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / fm blind folio ix

consider that type of NIC. The spe- cific process by which a NIC uses electricity to send and receive data is exceedingly complicated, but luck- ily for you, not necessary to under- stand. Instead, just think of a charge on the wire as a one, and no charge as a zero. A chunk of data moving in pulses across a wire might look something like Figure 2.13.

If you put an oscilloscope on the wire to measure voltage, you’d see something like Figure 2.14. An oscilloscope is a powerful micro- scope that enables you to see elec- trical pulses.

Now, remembering that the pulses represent bi- nary data, visualize instead a string of ones and zeroes moving across the wire (Figure 2.15).

Once you understand how data moves along the wire, the next question becomes this: how does the net- work get the right data to the right system? All networks transmit data by breaking whatever is moving across the physical layer (files, print jobs, Web pages, and so forth) into discrete chunks called frames. A frame is basically a container for a chunk of data moving across a network. The NIC creates and sends, as well as receives and reads, these frames.

I like to visualize an imaginary table inside every NIC that acts as a frame creation and reading station. I see frames as those pneumatic canis- ters you see when you go to a drive-in teller at a bank. A little guy inside the network card—named Nick, naturally!—builds these pneumatic canisters (the frames) on the table, and then shoots them out on the wire to the hub (Figure 2.16).

Chapter 2: Building a Network with the OSI Model 15

Try This! What’s Your MAC Address?

You can readily determine your MAC address on a Windows computer from the command line. This works in all modern versions of Windows.

1. In Windows 2000/XP, click Start | Run. Enter the command CMD and press the ENTER key to get to a command prompt.

2. In Windows Vista, click Start, enter CMD in the Start Search text box, and press the ENTER key to get to a command prompt.

3. At the command prompt, type the command IPCONFIG /ALL and press the ENTER key.

• Figure 2.13 Data moving along a wire

• Figure 2.14 Oscilloscope of data

• Figure 2.15 Data as ones and zeroes

• Figure 2.16 Inside the NIC

A number of different frame types are used in different net- works. All NICs on the same net- work must use the same frame type or they will not be able to communicate with other NICs.

Each chapter includes Learning Objectives ■ that set measurable goals for chapter-by-chapter progress

Illustrations ■ that give you a clear picture of the technologies

Tutorials ■ that teach you to perform essential tasks and procedures hands-on

Try This!, Cross Check ■ , and Tech Tip sidebars that encourage you to practice and apply concepts in real-world settings

Notes, Tips ■ , and Warnings that guide you through difficult areas

Chapter Summaries ■ and Key Terms Lists that provide you with an easy way to review important concepts and vocabulary

Challenging End-of-Chapter Tests ■ that include vocabulary-building exercises, multiple-choice questions, essay questions, and on-the-job lab projects

This pedagogically rich book is designed to make learning easy and enjoyable and to help you develop the skills and critical-thinking abilities that will enable you to adapt to different job situations and troubleshoot problems.

Mike Meyers’ proven ability to explain concepts in a clear, direct, even humorous way makes this book interesting, motivational, and fun.

Effective Learning Tools ■

Proven Learning Method Keeps You on Track Mike Meyers’ CompTIA Network+® Guide to Managing and Troubleshooting Networks is structured to give you comprehensive knowledge of computer skills and technologies. The textbook’s active learning methodology guides you beyond mere recall and—through thought-provoking activities, labs, and sidebars—helps you develop critical-thinking, diagnostic, and communication skills.

Try This! exercises apply core skills in a new setting.

Chapter Review sections provide concept summaries, key terms lists, and lots of questions and projects.

Key Terms Lists presents the important terms identified in the chapter.

Offers Practical Experience— Tutorials and lab assignments develop essential hands-on skills and put concepts in real-world contexts.

Robust Learning Tools— Summaries, key terms lists, quizzes, essay questions, and lab projects help you practice skills and measure progress.

Notes,Tips, and Warnings create a road map for success.

consider that type of NIC. The spe- cific process by which a NIC uses electricity to send and receive data is exceedingly complicated, but luck- ily for you, not necessary to under- stand. Instead, just think of a charge on the wire as a one, and no charge as a zero. A chunk of data moving in pulses across a wire might look something like Figure 2.13.

If you put an oscilloscope on the wire to measure voltage, you’d see something like Figure 2.14. An oscilloscope is a powerful micro- scope that enables you to see elec- trical pulses.

Now, remembering that the pulses represent bi- nary data, visualize instead a string of ones and zeroes moving across the wire (Figure 2.15).

Once you understand how data moves along the wire, the next question becomes this: how does the net- work get the right data to the right system? All networks transmit data by breaking whatever is moving across the physical layer (files, print jobs, Web pages, and so forth) into discrete chunks called frames. A frame is basically a container for a chunk of data moving across a network. The NIC creates and sends, as well as receives and reads, these frames.

I like to visualize an imaginary table inside every NIC that acts as a frame creation and reading station. I see frames as those pneumatic canis- ters you see when you go to a drive-in teller at a bank. A little guy inside the network card—named Nick, naturally!—builds these pneumatic canisters (the frames) on the table, and then shoots them out on the wire to the hub (Figure 2.16).

Chapter 2: Building a Network with the OSI Model 15

Try This! What’s Your MAC Address?

You can readily determine your MAC address on a Windows computer from the command line. This works in all modern versions of Windows.

1. In Windows 2000/XP, click Start | Run. Enter the command CMD and press the ENTER key to get to a command prompt.

2. In Windows Vista, click Start, enter CMD in the Start Search text box, and press the ENTER key to get to a command prompt.

3. At the command prompt, type the command IPCONFIG /ALL and press the ENTER key.

• Figure 2.13 Data moving along a wire

• Figure 2.14 Oscilloscope of data

• Figure 2.15 Data as ones and zeroes

• Figure 2.16 Inside the NIC

A number of different frame types are used in different net- works. All NICs on the same net- work must use the same frame type or they will not be able to communicate with other NICs.

consider that type of NIC. The spe- cific process by which a NIC uses electricity to send and receive data is exceedingly complicated, but luck- ily for you, not necessary to under- stand. Instead, just think of a charge on the wire as a one, and no charge as a zero. A chunk of data moving in pulses across a wire might look something like Figure 2.13.

If you put an oscilloscope on the wire to measure voltage, you’d see something like Figure 2.14. An oscilloscope is a powerful micro- scope that enables you to see elec- trical pulses.

Now, remembering that the pulses represent bi- nary data, visualize instead a string of ones and zeroes moving across the wire (Figure 2.15).

Once you understand how data moves along the wire, the next question becomes this: how does the net- work get the right data to the right system? All networks transmit data by breaking whatever is moving across the physical layer (files, print jobs, Web pages, and so forth) into discrete chunks called frames. A frame is basically a container for a chunk of data moving across a network. The NIC creates and sends, as well as receives and reads, these frames.

I like to visualize an imaginary table inside every NIC that acts as a frame creation and reading station. I see frames as those pneumatic canis- ters you see when you go to a drive-in teller at a bank. A little guy inside the network card—named Nick, naturally!—builds these pneumatic canisters (the frames) on the table, and then shoots them out on the wire to the hub (Figure 2.16).

Chapter 2: Building a Network with the OSI Model 15

Try This! What’s Your MAC Address?

You can readily determine your MAC address on a Windows computer from the command line. This works in all modern versions of Windows.

1. In Windows 2000/XP, click Start | Run. Enter the command CMD and press the ENTER key to get to a command prompt.

2. In Windows Vista, click Start, enter CMD in the Start Search text box, and press the ENTER key to get to a command prompt.

3. At the command prompt, type the command IPCONFIG /ALL and press the ENTER key.

• Figure 2.13 Data moving along a wire

• Figure 2.14 Oscilloscope of data

• Figure 2.15 Data as ones and zeroes

• Figure 2.16 Inside the NIC

A number of different frame types are used in different net- works. All NICs on the same net- work must use the same frame type or they will not be able to communicate with other NICs.

BaseTech

x

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

Contents at a Glance

CoNTENTs AT A GLANCE

Chapter 1 ■ CompTIA Network+ in a Nutshell 1

Chapter 2 ■ Network Models 8

Chapter 3 ■ Cabling and Topology 44

Chapter 4 ■ Ethernet Basics 66

Chapter 5 ■ Modern Ethernet 90

Chapter 6 ■ Installing a Physical Network 106

Chapter 7 ■ TCP/IP Basics 144

Chapter 8 ■ The Wonderful World of Routing 182

Chapter 9 ■ TCP/IP Applications 224

Chapter 10 ■ Network Naming 258

Chapter 11 ■ Securing TCP/IP 294

Chapter 12 ■ Advanced Networking Devices 330

Chapter 13 ■ IPv6 356

Chapter 14 ■ Remote Connectivity 380

Chapter 15 ■ Wireless Networking 424

BaseTech

xi Contents at a Glance

Chapter 16 ■ Protecting Your Network 458

Chapter 17 ■ Virtualization 484

Chapter 18 ■ Network Management 504

Chapter 19 ■ Building a SOHO Network 534

Chapter 20 ■ Network Troubleshooting 554

Appendix A ■ Objectives Map: CompTIA Network+ 580

Appendix b ■ About the Download 592

■ Glossary 596

■ Index 632

xii

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

Contents

About the Author . . . . . . . . . . . . . . . . . . v Acknowledgments . . . . . . . . . . . . . . . . . .vii Preface. . . . . . . . . . . . . . . . . . . . . . . . xvii CompTIA Approved Quality Curriculum. . . . xix Instructor and Student Website. . . . . . . . . . xxv

Chapter 1 ■■CompTIA Network+ in a Nutshell 1 Who Needs CompTIA Network+?

I Just Want to Learn about Networks! . . . . . 1 What Is CompTIA Network+ Certification? . . . 1

What Is CompTIA? . . . . . . . . . . . . . . . 2 The Current CompTIA Network+

Certification Exam Release. . . . . . . . . . 2 How Do I Become CompTIA

Network+ Certified? . . . . . . . . . . . . . 2 What Is the Exam Like? . . . . . . . . . . . . . . . 3

How Do I Take the Test?. . . . . . . . . . . . . 4 How Much Does the Test Cost? . . . . . . . . . 4

How to Pass the CompTIA Network+ Exam . . . 5 Obligate Yourself . . . . . . . . . . . . . . . . 5 Set Aside the Right Amount of Study Time . . 5 Study for the Test . . . . . . . . . . . . . . . . 6

Chapter 2 ■■Network Models 8 Historical/Conceptual . . . . . . . . . . . . . . . 10 Working with Models . . . . . . . . . . . . . . . . 10

Biography of a Model . . . . . . . . . . . . . . 10 Network Models . . . . . . . . . . . . . . . . . 11

The OSI Seven-Layer Model in Action. . . . . . . 11 Welcome to MHTechEd!. . . . . . . . . . . . . 12

Test Specific. . . . . . . . . . . . . . . . . . . . . . 13 Let’s Get Physical—Network Hardware

and Layers 1–2 . . . . . . . . . . . . . . . . . . 13 The NIC . . . . . . . . . . . . . . . . . . . . . 15 The Two Aspects of NICs . . . . . . . . . . . . 21

Beyond the Single Wire—Network Software and Layers 3–7 . . . . . . . . . . . . . . . . . . 22

IP—Playing on Layer 3, the Network Layer . . . 24 Packets Within Frames . . . . . . . . . . . . . 25 Assembly and Disassembly—Layer 4,

the Transport Layer . . . . . . . . . . . . . 27

Talking on a Network—Layer 5, the Session Layer . . . . . . . . . . . . . . . 28

Standardized Formats, or Why Layer 6, Presentation, Has No Friends . . . . . . . . 30

Network Applications—Layer 7, the Application Layer . . . . . . . . . . . . . . 31

The TCP/IP Model. . . . . . . . . . . . . . . . . . 32 The Link Layer . . . . . . . . . . . . . . . . . 33 The Internet Layer. . . . . . . . . . . . . . . . 34 The Transport Layer . . . . . . . . . . . . . . . 34 The Application Layer . . . . . . . . . . . . . . 36 Frames, Packets, and Segments, Oh My! . . . . 37 The Tech’s Troubleshooting Tool . . . . . . . . . 38

Chapter 2 Review . . . . . . . . . . . . . . . . . . 39

Chapter 3 ■■Cabling and Topology 44 Test Specific. . . . . . . . . . . . . . . . . . . . . . 45 Topology . . . . . . . . . . . . . . . . . . . . . . . 45

Bus and Ring . . . . . . . . . . . . . . . . . . 45 Star . . . . . . . . . . . . . . . . . . . . . . . 46 Hybrids . . . . . . . . . . . . . . . . . . . . . 47 Mesh and Point-to-Multipoint . . . . . . . . . 47 Point-to-Point . . . . . . . . . . . . . . . . . . 50 Parameters of a Topology . . . . . . . . . . . . 50

Cabling . . . . . . . . . . . . . . . . . . . . . . . . 50 Coaxial Cable . . . . . . . . . . . . . . . . . . 50 Twisted Pair . . . . . . . . . . . . . . . . . . . 53 Fiber-Optic . . . . . . . . . . . . . . . . . . . 55 Other Cables . . . . . . . . . . . . . . . . . . . 56 Fire Ratings . . . . . . . . . . . . . . . . . . . 58

Networking Industry Standards—IEEE . . . . . . 58 Chapter 3 Review . . . . . . . . . . . . . . . . . . 60

Chapter 4 ■■Ethernet Basics 66 Historical/Conceptual . . . . . . . . . . . . . . . 67 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . 67

Topology . . . . . . . . . . . . . . . . . . . . . 67 Test Specific. . . . . . . . . . . . . . . . . . . . . . 68 Organizing the Data: Ethernet Frames . . . . . . 68

CSMA/CD . . . . . . . . . . . . . . . . . . . 71

CoNTENTs

BaseTech

xiii Contents

Early Ethernet Networks . . . . . . . . . . . . . . 73 10BaseT . . . . . . . . . . . . . . . . . . . . . 73 10BaseFL . . . . . . . . . . . . . . . . . . . . 76

Extending and Enhancing Ethernet Networks . . 78 Connecting Ethernet Segments . . . . . . . . . 78 Switched Ethernet . . . . . . . . . . . . . . . . 80 Troubleshooting Hubs and Switches . . . . . . 84

Chapter 4 Review . . . . . . . . . . . . . . . . . . 85

Chapter 5 ■■Modern Ethernet 90 Test Specific. . . . . . . . . . . . . . . . . . . . . . 91 100-Megabit Ethernet . . . . . . . . . . . . . . . . 91

100BaseT . . . . . . . . . . . . . . . . . . . . 91 100BaseFX . . . . . . . . . . . . . . . . . . . 93

Gigabit Ethernet . . . . . . . . . . . . . . . . . . . 94 1000BaseCX . . . . . . . . . . . . . . . . . . . 95 1000BaseSX . . . . . . . . . . . . . . . . . . . 95 1000BaseLX . . . . . . . . . . . . . . . . . . . 95 New Fiber Connectors. . . . . . . . . . . . . . 95 Implementing Multiple Types of Gigabit

Ethernet . . . . . . . . . . . . . . . . . . . 96 10 Gigabit Ethernet . . . . . . . . . . . . . . . . . 97

Fiber-based 10 GbE . . . . . . . . . . . . . . . 97 Copper-based 10 GbE . . . . . . . . . . . . . . 98 10 GbE Physical Connections . . . . . . . . . . 99 Backbones . . . . . . . . . . . . . . . . . . . . 99 Know Your Ethernets!. . . . . . . . . . . . . 100

Chapter 5 Review . . . . . . . . . . . . . . . . . 101

Chapter 6 ■■Installing a Physical Network 106 Historical/Conceptual . . . . . . . . . . . . . . 107 Understanding Structured Cabling . . . . . . . 107

Cable Basics—A Star Is Born . . . . . . . . . 108 Test Specific. . . . . . . . . . . . . . . . . . . . . 109

Structured Cable Network Components . . . 109 Structured Cable—Beyond the Star. . . . . . 116

Installing Structured Cabling . . . . . . . . . . . 119 Getting a Floor Plan. . . . . . . . . . . . . . 119 Mapping the Runs . . . . . . . . . . . . . . 119 Determining the Location of the

Telecommunications Room . . . . . . . . . 120 Pulling Cable . . . . . . . . . . . . . . . . . 121 Making Connections . . . . . . . . . . . . . 123 Testing the Cable Runs . . . . . . . . . . . . 126

NICs . . . . . . . . . . . . . . . . . . . . . . . . . 130 Buying NICs . . . . . . . . . . . . . . . . . 131 Link Lights . . . . . . . . . . . . . . . . . . 133

Diagnostics and Repair of Physical Cabling . . 134 Diagnosing Physical Problems . . . . . . . . 134 Check Your Lights . . . . . . . . . . . . . . . 135 Check the NIC . . . . . . . . . . . . . . . . . 135 Cable Testing . . . . . . . . . . . . . . . . . 136 Problems in the Telecommunications Room . . 136 Toners . . . . . . . . . . . . . . . . . . . . . 137

Chapter 6 Review . . . . . . . . . . . . . . . . . 139

Chapter 7 ■■TCP/IP Basics 144 Historical/Conceptual . . . . . . . . . . . . . . 145 Standardizing Networking Technology . . . . . 145 Test Specific. . . . . . . . . . . . . . . . . . . . . 146 The TCP/IP Protocol Suite . . . . . . . . . . . . 146

Internet Layer Protocols. . . . . . . . . . . . 146 Transport Layer Protocols . . . . . . . . . . . 147 Application Layer Protocols . . . . . . . . . . 149

IP in Depth . . . . . . . . . . . . . . . . . . . . . 150 IP Addresses . . . . . . . . . . . . . . . . . . 151 IP Addresses in Action . . . . . . . . . . . . 155 Class IDs . . . . . . . . . . . . . . . . . . . 162

CIDR and Subnetting . . . . . . . . . . . . . . . 163 Subnetting . . . . . . . . . . . . . . . . . . . 164 CIDR: Subnetting in the Real World . . . . . 169

Using IP Addresses . . . . . . . . . . . . . . . . 170 Static IP Addressing . . . . . . . . . . . . . 170 Dynamic IP Addressing. . . . . . . . . . . . 173 Special IP Addresses. . . . . . . . . . . . . . 176

Chapter 7 Review . . . . . . . . . . . . . . . . . 177

Chapter 8 ■■The Wonderful World of Routing 182 Historical/Conceptual . . . . . . . . . . . . . . 183 How Routers Work . . . . . . . . . . . . . . . . 183 Test Specific. . . . . . . . . . . . . . . . . . . . . 184

Routing Tables. . . . . . . . . . . . . . . . . 184 Freedom from Layer 2 . . . . . . . . . . . . . 191 Network Address Translation . . . . . . . . . 191

Dynamic Routing . . . . . . . . . . . . . . . . . 196 Routing Metrics . . . . . . . . . . . . . . . . 198 Distance Vector . . . . . . . . . . . . . . . . 199 Link State . . . . . . . . . . . . . . . . . . . 204 EIGRP—the Lone Hybrid . . . . . . . . . . . 208 Dynamic Routing Makes the Internet . . . . 209

Working with Routers . . . . . . . . . . . . . . . 209 Connecting to Routers . . . . . . . . . . . . 210 Basic Router Configuration . . . . . . . . . . 215 Router Problems . . . . . . . . . . . . . . . . 216

Chapter 8 Review . . . . . . . . . . . . . . . . . 219

xiv

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

Contents

Chapter 9 ■■TCP/IP Applications 224 Historical/Conceptual . . . . . . . . . . . . . . 225 Transport Layer and Network Layer

Protocols . . . . . . . . . . . . . . . . . . . . . 225 How People Communicate . . . . . . . . . . 225

Test Specific. . . . . . . . . . . . . . . . . . . . . 225 TCP . . . . . . . . . . . . . . . . . . . . . . 225 UDP . . . . . . . . . . . . . . . . . . . . . . 226 ICMP . . . . . . . . . . . . . . . . . . . . . 227 IGMP . . . . . . . . . . . . . . . . . . . . . 227

The Power of Port Numbers . . . . . . . . . . . 228 Registered Ports . . . . . . . . . . . . . . . . 230 Connection Status . . . . . . . . . . . . . . . 232 Rules for Determining Good vs.

Bad Communications . . . . . . . . . . . 236 Common TCP/IP Applications. . . . . . . . . . 236

The World Wide Web . . . . . . . . . . . . . 236 Telnet . . . . . . . . . . . . . . . . . . . . . 242 E-mail . . . . . . . . . . . . . . . . . . . . . 246 FTP . . . . . . . . . . . . . . . . . . . . . . 249 Internet Applications . . . . . . . . . . . . . 252

Chapter 9 Review . . . . . . . . . . . . . . . . . 253

Chapter 10 ■■Network Naming 258 Historical/Conceptual . . . . . . . . . . . . . . 259 DNS . . . . . . . . . . . . . . . . . . . . . . . . . 259 Test Specific. . . . . . . . . . . . . . . . . . . . . 260

How DNS Works . . . . . . . . . . . . . . . 260 Name Spaces. . . . . . . . . . . . . . . . . . 262 DNS Servers . . . . . . . . . . . . . . . . . 272 Troubleshooting DNS . . . . . . . . . . . . . 279

WINS . . . . . . . . . . . . . . . . . . . . . . . . 282 Configuring WINS Clients . . . . . . . . . . 283 Troubleshooting WINS . . . . . . . . . . . . 284

Diagnosing TCP/IP Networks . . . . . . . . . . 284 Chapter 10 Review. . . . . . . . . . . . . . . . . 288

Chapter 11 ■■Securing TCP/IP 294 Test Specific. . . . . . . . . . . . . . . . . . . . . 295 Making TCP/IP Secure . . . . . . . . . . . . . . 295

Encryption. . . . . . . . . . . . . . . . . . . 295 Nonrepudiation . . . . . . . . . . . . . . . . 302 Authentication . . . . . . . . . . . . . . . . 307 Authorization . . . . . . . . . . . . . . . . . 307

TCP/IP Security Standards . . . . . . . . . . . . 308 Authentication Standards . . . . . . . . . . . 308 Encryption Standards . . . . . . . . . . . . . 316 Combining Authentication and Encryption . . 319

Secure TCP/IP Applications . . . . . . . . . . . 320 HTTPS . . . . . . . . . . . . . . . . . . . . 321 SCP . . . . . . . . . . . . . . . . . . . . . . 321 SFTP. . . . . . . . . . . . . . . . . . . . . . 322 SNMP . . . . . . . . . . . . . . . . . . . . . 322 LDAP . . . . . . . . . . . . . . . . . . . . . 323 NTP . . . . . . . . . . . . . . . . . . . . . . 323

Chapter 11 Review . . . . . . . . . . . . . . . . . 324

Chapter 12 ■■Advanced Networking Devices 330 Client/Server and Peer-to-Peer Topologies . . . 331 Historical/Conceptual . . . . . . . . . . . . . . 331

Client/Server . . . . . . . . . . . . . . . . . 331 Peer-to-Peer . . . . . . . . . . . . . . . . . . 332

Test Specific. . . . . . . . . . . . . . . . . . . . . 333 Client/Server and Peer-to-Peer Today. . . . . 333

Virtual Private Networks . . . . . . . . . . . . . 334 PPTP VPNs . . . . . . . . . . . . . . . . . . 335 L2TP VPNs . . . . . . . . . . . . . . . . . . 336 SSL VPNs . . . . . . . . . . . . . . . . . . . 337

Virtual LANs . . . . . . . . . . . . . . . . . . . . 337 Trunking. . . . . . . . . . . . . . . . . . . . 338 Configuring a VLAN-capable Switch. . . . . 339 Virtual Trunk Protocol . . . . . . . . . . . . 341 InterVLAN Routing . . . . . . . . . . . . . 341

Multilayer Switches . . . . . . . . . . . . . . . . 342 Load Balancing . . . . . . . . . . . . . . . . 343 QoS and Traffic Shaping . . . . . . . . . . . 345 Network Protection . . . . . . . . . . . . . . 346

Chapter 12 Review. . . . . . . . . . . . . . . . . 351

Chapter 13 ■■IPv6 356 Test Specific. . . . . . . . . . . . . . . . . . . . . 357 IPv6 Basics . . . . . . . . . . . . . . . . . . . . . 357

IPv6 Address Notation . . . . . . . . . . . . 357 Link-Local Address . . . . . . . . . . . . . . 359 IPv6 Subnet Masks . . . . . . . . . . . . . . 360 The End of Broadcast . . . . . . . . . . . . . 361 Global Address . . . . . . . . . . . . . . . . 363 Aggregation . . . . . . . . . . . . . . . . . . 364

Using IPv6 . . . . . . . . . . . . . . . . . . . . . 366 Enabling IPv6 . . . . . . . . . . . . . . . . . 367 NAT in IPv6. . . . . . . . . . . . . . . . . . 368 DHCP in IPv6 . . . . . . . . . . . . . . . . 369 DNS in IPv6 . . . . . . . . . . . . . . . . . 370

Moving to IPv6 . . . . . . . . . . . . . . . . . . . 371 IPv4 and IPv6 . . . . . . . . . . . . . . . . . 372 Tunnels . . . . . . . . . . . . . . . . . . . . 372 IPv6 Is Here, Really! . . . . . . . . . . . . . 375

Chapter 13 Review. . . . . . . . . . . . . . . . . 376

BaseTech

xv Contents

Chapter 14 ■■Remote Connectivity 380 Historical/Conceptual . . . . . . . . . . . . . . 381 Telephony and Beyond . . . . . . . . . . . . . . 381

The Dawn of Long Distance. . . . . . . . . . 382 Test Specific. . . . . . . . . . . . . . . . . . . . . 386

Digital Telephony . . . . . . . . . . . . . . . 386 Copper Carriers: T1 and T3 . . . . . . . . . . 387 Fiber Carriers: SONET/SDH and OC . . . . 391 Packet Switching . . . . . . . . . . . . . . . 392 Real-World WAN . . . . . . . . . . . . . . . 395 Alternative to Telephony WAN . . . . . . . . 396

The Last Mile . . . . . . . . . . . . . . . . . . . . 397 Dial-Up . . . . . . . . . . . . . . . . . . . . 397 DSL . . . . . . . . . . . . . . . . . . . . . . 401 Cable Modems . . . . . . . . . . . . . . . . . 404 Satellite . . . . . . . . . . . . . . . . . . . . 406 Cellular WAN . . . . . . . . . . . . . . . . . 406 Fiber . . . . . . . . . . . . . . . . . . . . . . 407 BPL . . . . . . . . . . . . . . . . . . . . . . 407 Which Connection? . . . . . . . . . . . . . . 408

Using Remote Access . . . . . . . . . . . . . . . 408 Dial-Up to the Internet . . . . . . . . . . . . 409 Private Dial-Up . . . . . . . . . . . . . . . . 410 VPNs . . . . . . . . . . . . . . . . . . . . . 411 Dedicated Connection . . . . . . . . . . . . . 411 Remote Terminal . . . . . . . . . . . . . . . 413

Chapter 14 Review. . . . . . . . . . . . . . . . . 417

Chapter 15 ■■Wireless Networking 424 Historical/Conceptual . . . . . . . . . . . . . . 425 Test Specific. . . . . . . . . . . . . . . . . . . . . 425 Wi-Fi Standards . . . . . . . . . . . . . . . . . . 425

802.11 . . . . . . . . . . . . . . . . . . . . . 425 802.11b . . . . . . . . . . . . . . . . . . . . 432 802.11a . . . . . . . . . . . . . . . . . . . . 432 802.11g . . . . . . . . . . . . . . . . . . . . 433 802.11n . . . . . . . . . . . . . . . . . . . . 433 Wireless Networking Security . . . . . . . . 434 Power over Ethernet. . . . . . . . . . . . . . 437

Implementing Wi-Fi . . . . . . . . . . . . . . . . 437 Performing a Site Survey . . . . . . . . . . . 438 Installing the Client . . . . . . . . . . . . . . 439 Setting Up an Ad Hoc Network. . . . . . . . 439 Setting Up an Infrastructure Network . . . . 439 Extending the Network . . . . . . . . . . . . 446 Verify the Installation . . . . . . . . . . . . . 448

Troubleshooting Wi-Fi . . . . . . . . . . . . . . . 448 Hardware Troubleshooting . . . . . . . . . . 448 Software Troubleshooting . . . . . . . . . . . 449

Connectivity Troubleshooting . . . . . . . . . 449 Configuration Troubleshooting . . . . . . . . 450

Chapter 15 Review. . . . . . . . . . . . . . . . . 452

Chapter 16 ■■Protecting Your Network 458 Test Specific. . . . . . . . . . . . . . . . . . . . . 459 Common Threats. . . . . . . . . . . . . . . . . . 459

System Crash/Hardware Failure . . . . . . . 459 Administrative Access Control . . . . . . . . 459 Malware . . . . . . . . . . . . . . . . . . . . 460 Social Engineering . . . . . . . . . . . . . . 462 Man in the Middle . . . . . . . . . . . . . . 463 Denial of Service. . . . . . . . . . . . . . . . 463 Physical Intrusion . . . . . . . . . . . . . . . 464 Attacks on Wireless Connections . . . . . . . 465

Securing User Accounts . . . . . . . . . . . . . . 466 Authentication . . . . . . . . . . . . . . . . 466 Passwords . . . . . . . . . . . . . . . . . . . 467 Controlling User Accounts . . . . . . . . . . 468

Firewalls . . . . . . . . . . . . . . . . . . . . . . 470 Hiding the IPs . . . . . . . . . . . . . . . . . 471 Port Filtering . . . . . . . . . . . . . . . . . 471 Packet Filtering . . . . . . . . . . . . . . . . 473 MAC Filtering . . . . . . . . . . . . . . . . 474 Personal Firewalls . . . . . . . . . . . . . . . 474 Network Zones . . . . . . . . . . . . . . . . 476 Vulnerability Scanners . . . . . . . . . . . . 477

Chapter 16 Review. . . . . . . . . . . . . . . . . 478

Chapter 17 ■■Virtualization 484 Historical/Conceptual . . . . . . . . . . . . . . 485 What Is Virtualization? . . . . . . . . . . . . . . 485

Meet the Hypervisor. . . . . . . . . . . . . . 486 Emulation vs. Virtualization . . . . . . . . . 486 Sample Virtualization . . . . . . . . . . . . . 488

Test Specific. . . . . . . . . . . . . . . . . . . . . 492 Why Do We Virtualize? . . . . . . . . . . . . . . 492

Power Saving . . . . . . . . . . . . . . . . . 492 Hardware Consolidation . . . . . . . . . . . 493 System Recovery . . . . . . . . . . . . . . . 493 System Duplication . . . . . . . . . . . . . . 494 Research . . . . . . . . . . . . . . . . . . . . 494

Virtualization in Modern Networks . . . . . . . 494 Virtual Machine Managers . . . . . . . . . . 496 Hypervisors . . . . . . . . . . . . . . . . . . 497 Virtual Switches . . . . . . . . . . . . . . . 498 Virtual PBX . . . . . . . . . . . . . . . . . . 499 Network as a Service . . . . . . . . . . . . . 499

Chapter 17 Review. . . . . . . . . . . . . . . . . 500

xvi

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

Contents

Chapter 18 ■■Network Management 504 Test Specific. . . . . . . . . . . . . . . . . . . . . 505 Network Configuration Management . . . . . . 505

Configuration Management Documentation . . 505 Change Management Documentation . . . . 511

Monitoring Performance and Connectivity . . . 512 Performance Monitor . . . . . . . . . . . . . 512 Logs and Network Traffic . . . . . . . . . . . 518

Network Performance Optimization . . . . . . 519 Caching . . . . . . . . . . . . . . . . . . . . 520 Controlling Data Throughput. . . . . . . . . 520 Keeping Resources Available . . . . . . . . . 522

Chapter 18 Review. . . . . . . . . . . . . . . . . 528

Chapter 19 ■■Building a SOHO Network 534 Historical/Conceptual . . . . . . . . . . . . . . 535 Test Specific. . . . . . . . . . . . . . . . . . . . . 535 Designing a SOHO Network . . . . . . . . . . . 535 Building the Network . . . . . . . . . . . . . . . 536

Define the Network Needs. . . . . . . . . . . 536 Network Design . . . . . . . . . . . . . . . . 537 Compatibility Issues . . . . . . . . . . . . . . 539 Internal Connections . . . . . . . . . . . . . 540 External Connections . . . . . . . . . . . . . 544 ISPs and MTUs . . . . . . . . . . . . . . . . 546 Peripherals. . . . . . . . . . . . . . . . . . . 548

Security . . . . . . . . . . . . . . . . . . . . . . . 549 Chapter 19 Review. . . . . . . . . . . . . . . . . 550

Chapter 20 ■■Network Troubleshooting 554 Test Specific. . . . . . . . . . . . . . . . . . . . . 555 Troubleshooting Tools . . . . . . . . . . . . . . . 555

Hardware Tools . . . . . . . . . . . . . . . . 555 Software Tools . . . . . . . . . . . . . . . . . 558

The Troubleshooting Process . . . . . . . . . . . 564 Identify the Problem . . . . . . . . . . . . . . 565 Establish a Theory of Probable Cause . . . . . 567

Test the Theory to Determine Cause . . . . . 567 Establish a Plan of Action and Identify

Potential Effects . . . . . . . . . . . . . . 568 Implement and Test the Solution or

Escalate as Necessary . . . . . . . . . . . 568 Verify Full System Functionality and

Implement Preventative Measures . . . . . 569 Document Findings, Actions, and

Outcomes . . . . . . . . . . . . . . . . . . 569 Troubleshooting Scenarios . . . . . . . . . . . . 569

“I Can’t Log In!” . . . . . . . . . . . . . . . 570 “I Can’t Get to This Web Site!” . . . . . . . . 570 “Our Web Server Is Sluggish!” . . . . . . . . 571 “I Can’t See Anything on the Network!” . . . 571 “It’s Time to Escalate!” . . . . . . . . . . . . 572 Troubleshooting Is Fun! . . . . . . . . . . . . 574

Chapter 20 Review. . . . . . . . . . . . . . . . . 575

Appendix A ■■Objectives Map: CompTIA

Network+ 580

Appendix B ■■About the Download 592

System Requirements . . . . . . . . . . . . . . . 592 Installing and Running Total Tester . . . . . . . 592 About Total Tester 593

Mike Meyers’ Video Training 593 Mike’s Cool Tools . . . . . . . . . . . . . . . . . 594

Boson’s NetSim Network Simulator . . . . . . . 594 Technical Support . . . . . . . . . . . . . . . . . 595

Boson Technical Support . . . . . . . . . . . 595

■■Glossary 596

■■Index 632

. . . . . . . . . . . . . . . . . Playing Mike Meyers’ Videos 593 . . . . . . . . . .

. . . . . . . . . .

BaseTech

xvii Preface

I was a teacher long before I was ever an author. I started writing computer books for the simple reason that no one wrote the kind of books I wanted to read. The books were either too simple (Chapter 1, “Using Your Mouse”) or too complex (Chapter 1, “TTL Logic and Transistors”) and none of them provided a motivation for me to learn the information. I guessed that there were geeky readers just like me who wanted to know why they needed to know the information in a computer book.

Good books motivate the reader to learn what he or she is reading. If a book discusses binary arithmetic but doesn’t explain why I need to learn it, for example, that’s not a good book. Tell me that understanding binary makes it easier to understand how an IP address works or why we’re about to run out of IP addresses and how IPv6 can help, then I get excited, no mat- ter how geeky the topic. If I don’t have a good reason, a good motivation to do something, then I’m simply not going to do it (which explains why I haven’t jumped out of an airplane!).

In this book, I teach you why you need to understand the wide world of networking. You’ll learn everything you need to start building, configuring, and supporting networks. In the process, you’ll gain the knowledge you need to pass the CompTIA Network+ certification exam.

Enjoy, my fellow geek.

PrEfACE

This page intentionally left blank

xix CompTIA Approved Quality Curriculum

CompTIA APProvEd QuALITy CurrICuLuM

CompTIA Network+■■ The CompTIA Network+ certification ensures that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure; describe networking technologies; basic design principles; and adhere to wiring standards and use testing tools.

It Pays to Get Certified■■ In a digital world, digital literacy is an essential survival skill. Certification proves you have the knowledge and skill to solve business problems in virtually any business environment. Certifications are highly valued cre- dentials that qualify you for jobs, increased compensation, and promotion.

CompTIA Network+ certification is held by many IT staffers across many organizations. 21% of IT staff within a random sampling of U.S. orga- nizations within a cross section of industry verticals hold CompTIA Net- work+ certification.

The CompTIA Network+ credential—proves knowledge of ■ networking features and functions and is the leading vendor-neutral certification for networking professionals.

Starting salary—the average starting salary of network engineers can ■ be up to $70,000.

Career pathway—CompTIA Network+ is the first step in starting a ■ networking career, and is recognized by Microsoft as part of their MS program. Other corporations, such as Novell, Cisco, and HP also recognize CompTIA Network+ as part of their certification tracks.

More than 325,000 individuals worldwide are CompTIA Network+ ■ certified.

Mandated/recommended by organizations worldwide—Apple, ■ Cisco, HP, Ricoh, the U.S. State Department, and U.S. government contractors such as EDS, General Dynamics, and Northrop Grumman recommend or mandate CompTIA Network+.

BaseTech

xx

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

CompTIA Approved Quality Curriculum

How Certification Helps Your Career

CompTIA Career Pathway CompTIA offers a number of credentials that form a foundation for your career in technology and that allow you to pursue specific areas of concentration. Depend- ing on the path you choose, CompTIA certifications help you build upon your skills and knowledge, supporting learning throughout your career.

BaseTech

xxi CompTIA Approved Quality Curriculum

Steps to Getting Certified and ■■ Staying Certified

Review exam objectives.1. Review the certification objectives to make sure you know what is covered in the exam: www.comptia.org/certifications/testprep/examobjectives.aspx

Practice for the exam.2. After you have studied for the certification, take a free assessment and sample test to get an idea what type of questions might be on the exam: www.comptia.org/certifications/testprep/practicetests.aspx

Purchase an exam voucher.3. Purchase exam vouchers on the CompTIA Marketplace, which is located at: www.comptiastore.com

Take the test!4. Select a certification exam provider, and schedule a time to take your exam. You can find exam providers at the following link: www.comptia.org/certifications/testprep/testingcenters.aspx

Stay certified!5. Continuing education is required. Effective January 1, 2011, CompTIA Network+ certifications are valid for three years from the date of certification. There are a number of ways the certification can be renewed. For more information go to: http:// certification.comptia.org/getCertified/steps_to_certification/ stayCertified.aspx

Join the Professional Community■■ The free online IT Pro Community provides valuable content to students and professionals. Join the IT Pro Community:

http://itpro.comptia.org

Career IT job resources include:

Where to start in IT ■

Career assessments ■

Salary trends ■

U.S. job board ■

Join the IT Pro Community and get access to:

Forums on networking, security, computing, and cutting-edge ■ technologies

Access to blogs written by industry experts ■www.comptia.org/certifications/testprep/examobjectives.aspxwww.comptia.org/certifications/testprep/practicetests.aspxwww.comptiastore.comwww.comptia.org/certifications/testprep/testingcenters.aspxhttp://certification.comptia.org/getCertified/steps_to_certification/stayCertified.aspxhttp://certification.comptia.org/getCertified/steps_to_certification/stayCertified.aspxhttp://certification.comptia.org/getCertified/steps_to_certification/stayCertified.aspxhttp://itpro.comptia.org

xxii

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Front Matter

CompTIA Approved Quality Curriculum

Current information on cutting edge technologies ■

Access to various industry resource links and articles related to IT ■ and IT careers

APPRO V E D Q U A L I T Y C O

N T EN

T Content Seal of Quality■■

This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100 percent of the exam objectives and implements important instructional design principles. CompTIA rec- ommends multiple learning tools to help increase coverage of the learning objectives.

Why CompTIA?■■ Global recognition ■ CompTIA is recognized globally as the leading IT nonprofit trade association and has enormous credibility. Plus, CompTIA’s certifications are vendor-neutral and offer proof of foundational knowledge that translates across technologies.

Valued by hiring managers ■ Hiring managers value CompTIA certification because it is vendor- and technology-independent validation of your technical skills.

Recommended or required by government and businesses ■ Many government organizations and corporations (for example, Dell, Sharp, Ricoh, the U.S. Department of Defense, and many more) either recommend or require technical staff to be CompTIA certified.

Three CompTIA certifications ranked in the top 10 ■ In a study by DICE of 17,000 technology professionals, certifications helped command higher salaries at all experience levels.

BaseTech

CompTIA Approved Quality Curriculum

How to Obtain More Information■■ Visit CompTIA online ■ Go to www.comptia.org to learn more about getting CompTIA certified.

Contact CompTIA ■ Please call 866-835-8020, ext. 5 or e-mail questions@comptia.org.

Join the IT Pro Community ■ Go to http://itpro.comptia.org to join the IT community to get relevant career information.

Connect with CompTIA ■ Find us on Facebook, LinkedIn, Twitter, and YouTube.

CAQC Disclaimer■■ The logo of the CompTIA Approved Quality Curriculum (CAQC) program and the status of this or other training material as “Approved” under the CompTIA Approved Quality Curriculum program signifies that, in Comp- TIA’s opinion, such training material covers the content of CompTIA’s related certification exam.

The contents of this training material were created for the CompTIA Network+ exam covering CompTIA certification objectives that were cur- rent as of the date of publication.

CompTIA has not reviewed or approved the accuracy of the contents of this training material and specifically disclaims any warranties of mer- chantability or fitness for a particular purpose. CompTIA makes no guaran- tee concerning the success of persons using any such “Approved” or other training material in order to prepare for any CompTIA certification exam.

xxiiiwww.comptia.orghttp://itpro.comptia.org

This page intentionally left blank

Instructor and Student Web Site

INsTruCTor ANd sTudENT WEb sITE

For instructor and student resources, please visit:

www.meyersnetplus.com

Students will find chapter quizzes that will help them learn more about troubleshooting and fixing networks, and teachers can access the support materials outlined below.

Additional Resources for Teachers■■ McGraw-Hill Connect, a Web-based learning platform, connects instructors with their support materials and students with chapter assessments. The Connect Online Learning Center provides resources for teachers in a format that follows the organization of the textbook.

This site includes the following:

Answer keys to the end-of-chapter activities in the textbook ■

Instructor’s Manual that contains learning objectives, classroom ■ preparation notes, instructor tips, and a lecture outline for each chapter

Answer keys to the Mike Meyers’ Lab Manual activities (available ■ separately)

Access to test bank files and software that allow you to generate ■ a wide array of paper- or network-based tests, and that feature automatic grading. The test bank includes:

Hundreds of practice questions and a wide variety of question ■ types categorized by exam objective, enabling you to customize each test to maximize student progress

Test bank files available on EZ Test Online and as downloads ■ from the Online Learning Center in these formats: Blackboard, Web CT, EZ Test, and Word

Engaging PowerPoint slides on the lecture topics that include full- ■ color artwork from the book

Please contact your McGraw-Hill sales representative for details.

xxv

BaseTechwww.meyersnetplus.com

1 chapter

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

“Networking is an essential part

of building wealth.”

—Armstrong WilliAms

CompTIA Network+ in a Nutshell

In this chapter, you will learn how to

Describe the importance of ■■ CompTIA Network+ certification

Illustrate the structure and ■■ contents of the CompTIA Network+ certification exam

Plan a strategy to prepare for ■■ the exam

By picking up this book, you’ve shown an interest in learning about networking. But be forewarned. The term networking describes a vast field of study, far too large for any single certification, book, or training course to

cover. Do you want to configure routers and switches for a living? Do you want

to administer a large Windows network at a company? Do you want to install

wide area network connections? Do you want to set up Web servers? Do you

want to secure networks against attacks?

If you’re considering a CompTIA Network+ certification, you probably don’t

yet know exactly what aspect of networking you want to pursue, and that’s

okay! You’re going to love preparing for the CompTIA Network+ certification.

Attaining CompTIA Network+ certification provides you with three

fantastic benefits. First, you get a superb overview of networking that helps

you decide what part of the industry you’d like to pursue. Second, it acts as

a prerequisite toward other, more advanced certifications. Third, the amount

of eye-opening information you’ll gain just makes getting CompTIA Network+

certified plain old fun.

1 chapter

BaseTech / Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

Chapter 1: CompTIA Network+ in a Nutshell 1

CompTIA Network+ in a Nutshell

Nothing comes close to providing a better overview of networking than CompTIA Network+. The certification covers local area networks (LANs), wide area networks (WANs), the Internet, security, cabling, and applica- tions in a wide-but-not-too-deep fashion that showcases the many different parts of a network and hopefully tempts you to investigate the aspects that intrigue you by looking into follow-up certifications.

The process of attaining CompTIA Network+ certification will give you a solid foundation in the whole field of networking. Mastering the compe- tencies will help fill in gaps in your knowledge and provide an ongoing series of “a-ha!” moments of grasping the big picture that make being a tech so much fun.

Ready to learn a lot, grab a great certification, and have fun doing it? Then welcome to CompTIA Network+ certification!

Who Needs CompTIA Network+? ■■ I Just Want to Learn about Networks!

Whoa up there, amigo! Are you one of those folks who either has never heard of the CompTIA Network+ exam or just doesn’t have any real inter- est in certification? Is your goal only to get a solid handle on the idea of networking and a jump start on the basics? Are you looking for that “magic bullet” book that you can read from beginning to end and then start install- ing and troubleshooting a network? Do you want to know what’s involved with running network cabling in your walls or getting your new wireless network working? Are you tired of not knowing enough about what TCP/ IP is and how it works? If these types of questions are running through your mind, then rest easy—you have the right book. Like every book with the Mike Meyers name, you’ll get solid concepts without pedantic details or broad, meaningless overviews. You’ll look at real-world networking as performed by real techs. This is a book that understands your needs and goes well beyond the scope of a single certification.

If the CompTIA Network+ exam isn’t for you, you can skip the rest of this chapter, shift your brain into learn mode, and dive into Chapter 2. But then, if you’re going to have the knowledge, why not get the certification?

What Is CompTIA Network+ ■■ Certification?

CompTIA Network+ certification is an industry-wide, vendor-neutral certi- fication program developed and sponsored by the Computing Technology Industry Association (CompTIA). The CompTIA Network+ certification shows that you have a basic competency in the physical support of net- working systems and knowledge of the conceptual aspects of networking.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 2

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

To date, many hundreds of thousands of technicians have become CompTIA Network+ certified.

CompTIA Network+ certification enjoys wide recognition throughout the IT industry. At first, it rode in on the coattails of the successful CompTIA A+ certification program, but it now stands on its own in the network- ing industry and is considered the obvious next step after CompTIA A+ certification.

What Is CompTIA? CompTIA is a nonprofit, industry trade association based in Oakbrook Ter- race, Illinois, on the outskirts of Chicago. Tens of thousands of computer resellers, value-added resellers, distributors, manufacturers, and training companies from all over the world are members of CompTIA.

CompTIA was founded in 1982. The following year, CompTIA began offering the CompTIA A+ certification exam. CompTIA A+ certification is now widely recognized as a de facto requirement for entrance into the PC industry. Because the CompTIA A+ exam covers networking only lightly, CompTIA decided to establish a vendor-neutral test covering basic net- working skills. So, in April 1999, CompTIA unveiled the CompTIA Net- work+ certification exam.

CompTIA provides certifications for a variety of areas in the computer industry, offers opportunities for its members to interact, and represents its members’ interests to government bodies. CompTIA certifications include CompTIA A+, CompTIA Network+, and CompTIA Security+, to name a few. Check out the CompTIA Web site at www.comptia.org for details on other certifications.

CompTIA is huge. Virtually every company of consequence in the IT industry is a member of CompTIA: Microsoft, Dell, Cisco… Name an IT company and it’s probably a member of CompTIA.

The Current CompTIA Network+ Certification Exam Release CompTIA constantly works to provide exams that cover the latest technolo- gies and, as part of that effort, periodically updates its certification objec- tives, domains, and exam questions. This book covers all you need to know to pass the N10-005 CompTIA Network+ exam released in 2011.

How Do I Become CompTIA Network+ Certified? To become CompTIA Network+ certified, you simply pass one computer- based, multiple-choice exam. There are no prerequisites for taking the CompTIA Network+ exam, and no networking experience is needed. You’re not required to take a training course or buy any training materials. The only requirements are that you pay a testing fee to an authorized test- ing facility and then sit for the exam. Upon completion of the exam, you will immediately know whether you passed or failed.www.comptia.org

BaseTech / Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

Chapter 1: CompTIA Network+ in a Nutshell 3

Once you pass, you become CompTIA Network+ certified for three years. After three years, you’ll need to renew your certification by retaking the current exam or completing approved Continuing Education activities. By completing these activities, you earn credits that (along with an annual fee) allow you to keep your CompTIA Network+ certification. For a full list of approved activities, check out CompTIA’s Web site (www.comptia.org) and search for CompTIA Continuing Education Program.

Now for the details: CompTIA recommends that you have at least nine to twelve months of networking experience and CompTIA A+ knowl- edge, but this is not a requirement. Note the word “recommend.” You may not need experience or CompTIA A+ knowledge, but they help! The CompTIA A+ certification competencies have a degree of overlap with the CompTIA Network+ competencies, such as types of connectors and how networks work.

As for experience, keep in mind that CompTIA Network+ is mostly a practical exam. Those who have been out there supporting real networks will find many of the questions reminiscent of the types of problems they have seen on LANs. The bottom line is that you’ll probably have a much easier time on the CompTIA Network+ exam if you have some CompTIA A+ experience under your belt.

What Is the Exam Like?■■ The CompTIA Network+ exam contains 100 questions, and you have 90 minutes to complete the exam. To pass, you must score at least 720 on a scale of 100–900, at the time of this writing. Check the CompTIA Web site when you get close to testing to determine the current scale: http://certification.comptia.org/getCertified/certifications/network.aspx

The exam questions are divided into five areas that CompTIA calls domains. This table lists the CompTIA Network+ domains and the percent- age of the exam that each represents.

CompTIA Network+ Domain Percentage

1.0 Network Technologies 21%

2.0 Network Installation and Configuration 23%

3.0 Network Media and Topologies 17%

4.0 Network Management 20%

5.0 Network Security 19%

The CompTIA Network+ exam is extremely practical. Questions often present real-life scenarios and ask you to determine the best solution. The CompTIA Network+ exam loves troubleshooting. Let me repeat: many of the test objectives deal with direct, real-world troubleshooting. Be prepared to troubleshoot both hardware and software failures and to answer both “What do you do next?” and “What is most likely the problem?” types of questions.

A qualified CompTIA Network+ certification candidate can install and configure a PC to connect to a network. This includes installing andwww.comptia.orghttp://certification.comptia.org/getCertified/certifications/network.aspx

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 4

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

testing a network card, configuring drivers, and loading all network soft- ware. The exam will test you on the different topologies, standards, and cabling.

Expect conceptual questions about the Open Systems Interconnec- tion (OSI) seven-layer model. If you’ve never heard of the OSI seven-layer model, don’t worry! This book will teach you all you need to know. While this model rarely comes into play during the daily grind of supporting a network, you need to know the functions and protocols for each layer to pass the CompTIA Network+ exam. You can also expect questions on most of the protocol suites, with heavy emphasis on the TCP/IP suite.

How Do I Take the Test? To take the test, you must go to an authorized testing center. You cannot take the test over the Internet. Prometric and Pearson VUE administer the actual CompTIA Network+ exam. You’ll find thousands of Prometric and Pearson VUE testing centers scattered across the United States and Canada, as well as in over 75 other countries around the world. You may take the exam at any testing center. To locate a testing center and schedule an exam, call Prometric at 888-895-6116 or Pearson VUE at 877-551-7587. You can also visit their Web sites at www.prometric.com and www.vue.com.

How Much Does the Test Cost? CompTIA fixes the price, no matter what testing center you use. The cost of the exam depends on whether you work for a CompTIA member. At press time, the cost for non-CompTIA members is US$246.

If your employer is a CompTIA member, you can save money by obtain- ing an exam voucher. In fact, even if you don’t work for a CompTIA member, you can purchase a voucher from member companies and take advantage of significant member savings. You simply buy the voucher and then use the voucher to pay for the exam. Vouchers are delivered to you on paper and electronically via e-mail. The voucher number is the important thing. That number is your exam payment, so protect it from fellow students until you’re ready to schedule your exam.

If you’re in the United States or Canada, you can visit www.totalsem .com or call 800-446-6004 to purchase vouchers. As I always say, “You don’t have to buy your voucher from us, but for goodness’ sake, get one from somebody!” Why pay full price when you have a discount alternative?

You must pay for the exam when you schedule, whether online or by phone. If you’re scheduling by phone, be prepared to hold for a while. Have your Social Security number (or the international equivalent) ready and either a credit card or a voucher number when you call or begin the online scheduling process. If you require any special accommodations, both Pro- metric and Pearson VUE will be able to assist you, although your selection of testing locations may be a bit more limited.

International prices vary; see the CompTIA Web site for international pricing. Of course, prices are subject to change without notice, so always check the CompTIA Web site for current pricing!

CompTIA occasionally makes changes to the content of the exam, as well as the score necessary to pass it. Always check the Web site of my company, Total Seminars (www.totalsem.com), before scheduling your exam.

Although you can’t take the exam over the Internet, both Prometric and Pearson VUE provide easy online registration. Go to www.prometric.com or www.vue.com to register online.www.totalsem.comwww.prometric.comwww.vue.comwww.prometric.comwww.vue.comwww.totalsem.comwww.totalsem.com

BaseTech / Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

Chapter 1: CompTIA Network+ in a Nutshell 5

How to Pass the CompTIA ■■ Network+ Exam

The single most important thing to remember about the CompTIA Net- work+ certification exam is that CompTIA designed it to test the knowl- edge of a technician with as little as nine months of experience—so keep it simple! Think in terms of practical knowledge. Read this book, answer the questions at the end of each chapter, take the practice exams on the media accompanying this book, review any topics you missed, and you’ll pass with flying colors.

Is it safe to assume that it’s probably been a while since you’ve taken an exam? Consequently, has it been a while since you’ve had to study for an exam? If you’re nodding your head yes, you’ll probably want to read the next sections. They lay out a proven strategy to help you study for the CompTIA Network+ exam and pass it. Try it. It works.

Obligate Yourself The first step you should take is to schedule the exam. Ever heard the old adage that heat and pressure make diamonds? Well, if you don’t give your- self a little “heat,” you might procrastinate and unnecessarily delay taking the exam. Even worse, you may end up not taking the exam at all. Do your- self a favor. Determine how much time you need to study (see the next sec- tion), and then call Prometric or Pearson VUE and schedule the exam, giving yourself the time you need to study—and adding a few extra days for safety. Afterward, sit back and let your anxieties wash over you. Suddenly, turning off the television and cracking open the book will become a lot easier! Keep in mind that Prometric and Pearson VUE let you schedule an exam only a few weeks in advance, at most. If you schedule an exam and can’t make it, you must reschedule at least a day in advance or lose your money.

Set Aside the Right Amount of Study Time After helping thousands of techs get their CompTIA Network+ certifica- tion, we at Total Seminars have developed a pretty good feel for the amount of study time needed to pass the CompTIA Network+ exam. Table 1.1 will help you plan how much study time you must devote to the exam. Keep in mind that these are averages. If you’re not a great student or if you’re a little on the nervous side, add another 10 percent. Equally, if you’re the type who can learn an entire semester of geometry in one night, reduce the numbers by 10 percent. To use this table, just circle the values that are most accurate for you and add them up to get the number of study hours.

A complete neophyte will need at least 120 hours of study time. An experienced network technician already CompTIA A+ certified should only need about 24 hours.

Study habits also come into play here. A person with solid study habits (you know who you are) can reduce the number by 15 percent. People with poor study habits should increase that number by 20 percent.

The total hours of study time you need is __________________.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 6

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

Table 1.1 Determining How Much Study Time You Need Amount of Experience

Type of Experience None Once or Twice

On Occasion

Quite a Bit

Installing a SOHO wireless network 4 2 1 1

Installing an advanced wireless network (802.1X, RADIUS, etc.) 2 2 1 1

Installing structured cabling 3 2 1 1

Configuring a home router 5 3 2 1

Configuring a Cisco router 4 2 1 1

Configuring a software firewall 3 2 1 1

Configuring a hardware firewall 2 2 1 1

Configuring an IPv4 client 8 4 2 1

Configuring an IPv6 client 3 3 2 1

Working with a SOHO WAN connection (DSL, cable) 2 2 1 0

Working with an advanced WAN connection (Tx, OCx, ATM) 3 3 2 2

Configuring a DNS server 2 2 2 1

Configuring a DHCP server 2 1 1 0

Configuring a Web application server (HTTP, FTP, SSH, etc.) 4 4 2 1

Configuring a VLAN 3 3 2 1

Configuring a VPN 3 3 2 1 Configuring a dynamic routing protocol (RIP, EIGRP, OSPF) 2 2 1 1

Study for the Test Now that you have a feel for how long it’s going to take to study for the exam, you need a strategy for studying. The following has proven to be an excellent game plan for cramming the knowledge from the study materials into your head.

This strategy has two alternate paths. The first path is designed for highly experienced technicians who have a strong knowledge of PCs and networking and want to concentrate on just what’s on the exam. Let’s call this group the Fast Track group. The second path, and the one I’d strongly recommend, is geared toward people like me: the ones who want to know why things work, those who want to wrap their arms completely around a concept, as opposed to regurgitating answers just to pass the CompTIA Network+ exam. Let’s call this group the Brainiacs.

To provide for both types of learners, I have broken down most of the chapters into two parts:

Historical/Conceptual ■ Although not on the CompTIA Network+ exam, this knowledge will help you understand more clearly what is on the CompTIA Network+ exam.

Test Specific ■ These topics clearly fit under the CompTIA Network+ certification domains.

The beginning of each of these areas is clearly marked with a large ban- ner that looks like the following.

BaseTech / Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 1

Chapter 1: CompTIA Network+ in a Nutshell 7

Historical/Conceptual If you consider yourself a Fast Tracker, skip everything but the Test Spe- cific section in each chapter. After reading the Test Specific sections, jump immediately to the Chapter Review questions, which concentrate on infor- mation in the Test Specific sections. If you run into problems, review the Historical/Conceptual sections in that chapter. After going through every chapter as described, take the free practice exams on the media that accom- panies the book. First, take them in practice mode, and then switch to final mode. Once you start scoring in the 80–85 percent range, go take the test!

Brainiacs should first read the book—the whole book. Read it as though you’re reading a novel, starting on Page 1 and going all the way through. Don’t skip around on the first read-through, even if you are a highly expe- rienced tech. Because there are terms and concepts that build on each other, skipping around might confuse you, and you’ll just end up closing the book and firing up your favorite PC game. Your goal on this first read is to under- stand concepts—to understand the whys, not just the hows.

Having a network available while you read through the book helps a lot. This gives you a chance to see various concepts, hardware, and configu- ration screens in action as you read about them in the book. Nothing beats doing it yourself to reinforce a concept or piece of knowledge!

You will notice a lot of historical information—the Historical/ Conceptual sections—that you may be tempted to skip. Don’t! Understanding how some of the older stuff worked or how something works conceptually will help you appreciate the reason behind current networking features and equipment, as well as how they function.

After you have completed the first read-through, cozy up for a second. This time, try to knock out one chapter per sitting. Concentrate on the Test Specific sections. Get a highlighter and mark the phrases and sentences that make major points. Take a hard look at the pictures and tables, noting how they illustrate the concepts. Then, answer the end of chapter questions. Repeat this process until you not only get all the questions right, but also understand why they are correct!

Once you have read and studied the material in the book, check your knowledge by taking the practice exams included on the media accompa- nying the book. The exams can be taken in practice mode or final mode. In practice mode, you are allowed to check references in the book (if you want) before you answer each question, and each question is graded immediately. In final mode, you must answer all the questions before you are given a test score. In each case, you can review a results summary that tells you which questions you missed, what the right answer is, and where to study further.

Use the results of the exams to see where you need to bone up, and then study some more and try them again. Continue retaking the exams and reviewing the topics you missed until you are consistently scoring in the 80–85 percent range. When you’ve reached that point, you are ready to pass the CompTIA Network+ exam!

If you have any problems or questions, or if you just want to argue about something, feel free to send an e-mail to me atmichaelm@totalsem.com or to my editor, Scott Jernigan, at scottj@totalsem.com.

For additional information about the CompTIA Network+ exam, con- tact CompTIA directly at its Web site: www.comptia.org.

Good luck! —Mike Meyers

We have active and helpful discussion groups at www .totalsem.com/forums. You need to register to participate (though not to read posts), but that’s only to keep the spammers at bay. The forums provide an excellent resource for answers, suggestions, and just socializing with other folks studying for the exam.

Be aware that you may need to return to previous chapters to get the Historical/Conceptual information you need for a later chapter.www.totalsem.com/forumswww.totalsem.com/forumswww.comptia.org

2 chapter

8

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Network Models

“First we thought the PC was a

calculator. Then we found out how

to turn numbers into letters with

ASCII—and we thought it was

a typewriter. Then we discovered

graphics, and we thought it was

a television. With the World

Wide Web, we’ve realized it’s a

brochure.”

—Douglas aDams

In this chapter, you will learn how to

Describe how models such as the ■■ OSI seven-layer model and the TCP/IP model help technicians understand and troubleshoot networks

Explain the major functions of ■■ networks with the OSI seven-layer model

Describe the major functions of ■■ networks with the TCP/IP model

The CompTIA Network+ certification challenges you to understand virtually every aspect of networking—not a small task. Luckily for you, we use two methods to conceptualize the many parts of a network: the Open Systems

Interconnection (OSI) seven-layer model and the Transmission Control

Protocol/Internet Protocol (TCP/IP) model.

These models act as guidelines and break down how a network functions

into discrete parts called layers. If you want to get into networking—and

if you want to pass the CompTIA Network+ certification exam—you must

understand both the OSI seven-layer model and the TCP/IP model in great

detail.

BaseTech

Chapter 2: Network Models 9

These models provide two tools that make them critical for networking techs. First, the OSI and TCP/IP models provide powerful mental tools for diag- nosing problems. Understand- ing the models enables a tech to determine quickly at what layer a problem can occur and helps him or her zero in on a solution with- out wasting a lot of time on false leads. Second, these models also provide a common language to describe networks—a way for us to communicate with each other about the functions of a network. Figure 2.1 shows a sample Cisco Systems Web page about configuring routing—a topic this book covers in detail later. A router operates at Layer 3 of the OSI seven-layer model, for example, so you’ll hear techs (and Web sites) refer to it as a “Layer 3 switch.”

This chapter looks first at models in general and how models help conceptualize and troubleshoot networks. We’ll then go into both the OSI seven-layer model and the TCP/IP model to see how they help clarify net- work architecture for techs.

Figure 2.1 • Using the OSI terminology—Layer 3—in a typical setup screen

The term “Layer 3 switch” has evolved over time and refers today to a variety of complex network boxes that I’ll cover later in the book.

Cross Check Cisco and Certifications

Cisco Systems, Inc. is famous for making many of the “boxes” that interconnect networks all over the world. It’s not too far of a stretch to say that Cisco helps power a huge portion of the Internet. These boxes are complicated to configure, requiring a high degree of techni- cal knowledge.

To address this need, Cisco offers a series of certifications. One of the entry-level certifications, for example, is the Cisco Certified Net- work Associate (CCNA). Go to Cisco’s certification Web site and com- pare their objectives with what you learned about CompTIA Network+ in Chapter 1. Ask yourself this question: could you study for CCNA and CompTIA Network+ simultaneously?

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 10

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Historical/Conceptual

Working with Models■■ Networking is hard. It takes a lot of pieces, both hardware and software, to get anything done. Just making Google appear in your Web browser requires millions of hours in research, development, and manufacturing. Whenever we encounter highly complex technologies, we need to sim- plify the overall process (making Google show up in your browser) by breaking it into discrete, simple, individual processes. We do this using models.

Modeling is critical to the networking world. We use models to under- stand and communicate with other techs about networks. Most beginning network techs, however, might have a very different idea of what model- ing means.

Biography of a Model What does the word “model” mean to you? Does the word make you think of a beautiful woman walking down a catwalk at a fashion show or

some hunky guy showing off the latest style of blue jeans on a huge billboard? Maybe it makes you think of a plastic model airplane? What about those com- puter models that try to predict weather? We use the term “model” in a number of ways, but each use shares certain common themes.

All models are a sim- plified representation of the real thing. The human

model ignores the many different types of body shapes, using only a single “optimal” figure. The model airplane lacks functional engines or the internal framework, and the computerized weather model might disregard subtle differences in wind temperatures or geology (Figure 2.2).

Additionally, a model must have at least all the major functions of the real item, but what constitutes a major rather than a minor function is open to opinion. Figure 2.3 shows a different level of detail for a model. Does it contain all the major components of an airplane? There’s room for argument that perhaps the model should have landing gear to go along with the propeller, wings, and tail.

Figure 2.2 • Types of models (images from left to right courtesy of NOAA, Mike Schinkel, and Michael Smyer)

Figure 2.3 • Simple model airplane

BaseTech

Chapter 2: Network Models 11

Network Models Network models face similar challenges. What functions define all net- works? What details can you omit without rendering the model inaccurate? Does the model retain its usefulness when describing a network that does not employ all the layers?

In the early days of networking, different manufacturers made unique types of networks that functioned fairly well. But each network had its own cabling, hardware, drivers, naming conventions, applications, and many other unique features. Back then, a single manufacturer provided every- thing for a customer whenever you purchased a network solution: cabling, NICs, hubs, drivers, and all the software in one complete and expensive package. Although these networks worked fine as stand-alone networks, the proprietary nature of the hardware and software made it difficult—to put it mildly—to connect networks of multiple manufacturers. To intercon- nect networks and improve networking as a whole, someone needed to create a guide, a model that described the functions of a network, so that people who made hardware and software could work together to make networks that worked together well.

The granddaddy of network models came from the International Orga- nization for Standardization, known as ISO. Their model, known as the OSI seven-layer model, works for almost every type of network, even extremely old and long-obsolete ones. On the other hand, the TCP/IP model only works for networks that use the now-dominant TCP/IP protocol suite. (Don’t worry about what TCP/IP means yet—most of this book’s job is to explain that in great detail.) Since most of the world uses TCP/IP, the TCP/ IP model supplanted the OSI model in many cases, though most discussion that involves the word “Layers” refers to the OSI model. A good tech can talk the talk of both models, and they are objectives on the CompTIA Net- work+ exam, so let’s learn both.

The best way to learn the OSI and TCP/IP models is to see them in action. For this reason, I’ll introduce you to a small network that needs to copy a file from one computer to another. This example goes through each of the OSI and TCP/IP layers needed to copy that file, and I explain each step and why it is necessary. By the end of the chapter, you should have a definite handle on using either of these models as a tool to conceptualize networks. You’ll continue to build on this knowledge throughout the book and turn your OSI and TCP/IP model knowledge into a powerful troubleshooting tool.

I’ll begin by discussing the OSI seven-layer model. After seeing this small network through the lens of the OSI seven-layer model, we’ll repeat the process with the TCP/IP model.

The OSI Seven-Layer Model ■■ in Action

Each layer in the OSI seven-layer model defines an important function in computer networking, and the protocols that operate at that layer offer solutions to those functions. Protocols are sets of clearly defined rules,

ISO may look like a misspelled acronym, but it’s actually a word, derived from the Greek word isos, which means “equal.” The International Organization for Standardization sets standards that promote equality among network designers and manufacturers, thus ISO.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 12

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

regulations, standards, and procedures that enable hardware and software developers to make devices and applications that function properly at a particular level. The OSI seven-layer model encourages modular design in networking, meaning that each layer has as little to do with the opera- tion of other layers as possible. Think of it as an automobile assembly line. The guy painting the car doesn’t care about the gal putting doors on the car—he expects the assembly line process to make sure the cars he paints have doors. Each layer on the model trusts that the other layers on the model do their jobs.

The OSI seven layers are:

Layer 7 ■ Application

Layer 6 ■ Presentation

Layer 5 ■ Session

Layer 4 ■ Transport

Layer 3 ■ Network

Layer 2 ■ Data Link

Layer 1 ■ Physical

The OSI seven layers are not laws of physics—anybody who wants to design a network can do it any way he or she wants. Although many protocols fit neatly into one of the seven layers, others do not.

Now that you know the names of the layers, let’s see what each layer does. The best way to understand the OSI layers is to see them in action. Let’s see them at work at the fictional company of MHTechEd, Inc.

Welcome to MHTechEd! Mike’s High-Tech Educational Supply Store and Post Office, or MHTechEd for short, has a small network of PCs running Windows, a situation typi- cal of many small businesses today. Windows runs just fine on a PC uncon- nected to a network, but it also comes with all the network software it needs to connect to a network. All the computers in the MHTechEd net- work are connected by special network cabling.

As in most offices, virtually everyone at MHTechEd has his or her own PC. Figure 2.4 shows two workers, Janelle and Dana, who han- dle all the administrative functions at MHTechEd. Because of the kinds of work they do, these two often need to exchange data between their two PCs. At the moment, Janelle has just completed a new employee handbook in Microsoft Word, and she wants Dana to check it for accuracy. Janelle could transfer a copy of the file to Dana’s com- puter by the tried-and-true Sneakernet method— saving the file on a thumb drive and walking it over to her—but thanks to the wonders of com- puter networking, she doesn’t even have to turn around in her chair. Let’s watch in detail each

Be sure to memorize both the name and the number of each OSI layer. Network techs use OSI terms such as “Layer 4” and “Transport layer” synonymously. Students have long used mnemonics for memorizing such lists. One of my favorites for the OSI seven-layer model is “Please Do Not Throw Sausage Pizza Away.” Yum!

This section is a conceptual overview of the hardware and software functions of a network. Your network may have different hardware or software, but it will share the same functions!

Figure 2.4 • Janelle and Dana, hard at work

BaseTech

Chapter 2: Network Models 13

piece of the process that gives Dana direct access to Janelle’s computer, so she can copy the Word document from Janelle’s system to her own.

Long before Janelle ever saved the Word document on her system— when the systems were first installed—someone who knew what they were doing set up and configured all the systems at MHTechEd to be part of a common network. All this setup activity resulted in multiple layers of hardware and software that can work together behind the scenes to get that Word document from Janelle’s system to Dana’s. Let’s examine the differ- ent pieces of the network, and then return to the process of Dana grabbing that Word document.

Test Specific

Let’s Get Physical—Network ■■ Hardware and Layers 1–2

Clearly the network needs a physical channel through which it can move bits of data between systems. Most networks use a cable like the one shown in Figure 2.5. This cable, known in the networking industry as unshielded twisted pair (UTP), usually contains four pairs of wires that can transmit and receive data.

Another key piece of hardware the network uses is a special box-like device called a hub (Figure 2.6), often tucked away in a closet or an equip- ment room. Each system on the network has its own cable that runs to the hub. Think of the hub as being like one of those old-time telephone switch- boards, where operators created connections between persons who called in wanting to reach other telephone users.

Readers with some networking experience know that hubs don’t exist in modern networks, having been replaced with much better devices called switches. But the CompTIA Network+ exam expects you to know what hubs are; plus hubs make this modeling discussion simpler. I’ll get to switches soon enough.

Figure 2.6 • Typical hubFigure 2.5 • UTP cabling

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 14

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Layer 1 of the OSI model defines the method of moving data between computers, so the cabling and hubs are part of the Physical layer (Layer 1). Anything that moves data from one system to another, such as copper cabling, fiber optics, even radio waves, is part of the OSI Physical layer. Layer 1 doesn’t care what data goes through; it just moves the data from one system to another sys- tem. Figure 2.7 shows the MHTechEd network in the OSI seven-layer model thus far. Note that each system has the full range of layers, so data from Janelle’s computer can flow to Dana’s computer.

The real magic of a network starts with the net- work interface card, or NIC (pronounced “nick”), which serves as the interface between the PC and the network. While NICs come in a wide array of shapes and sizes, the ones at MHTechEd look like Figure 2.8.

On older systems, a NIC truly was a separate card that snapped into a handy expansion slot, which is why they were called network interface cards. Even though they’re now built into the motherboard, they are still called NICs.

When installed in a PC, the NIC looks like Figure 2.9. Note the cable running from the back of the NIC into the wall; inside that wall is another cable running all the way back to the hub.

Cabling and hubs define the Physical layer of the network, and NICs provide the interface to the PC. Figure 2.10 shows a diagram of the network cabling system. I’ll build on this diagram as I delve deeper into the network process.

You might be tempted to categorize the NIC as part of the Physical layer at this point, and you’d have a valid argument. The NIC clearly is necessary for the physical connection to take place. The CompTIA Network+ exam and many authors put the NIC in OSI Layer 2, the Data Link layer, though, so clearly something else is happening inside the NIC. Let’s take a closer look.

Figure 2.8 • Typical NIC

Figure 2.9 • NIC with cable connecting the PC to the wall jack Figure 2.10 • The MHTechEd network

Dana

Figure 2.7 • The network so far, with the Physical layer hardware installed

BaseTech

Chapter 2: Network Models 15

The NIC To understand networks, you must understand how NICs work. The net- work must provide a mechanism that gives each system a unique identi- fier—like a telephone number—so data is delivered to the right system. That’s one of the NIC’s most important jobs. Inside every NIC, burned onto some type of ROM chip, is special firmware containing a unique identifier with a 48-bit value called the media access control address, or MAC address.

No two NICs ever share the same MAC address—ever. Any com- pany that makes NICs must contact the Institute of Electrical and Electronics Engineers (IEEE) and request a block of MAC addresses, which the company then burns into the ROMs on its NICs. Many NIC makers also print the MAC address on the surface of each NIC, as shown in Figure 2.11. Note that the NIC shown here displays the MAC address in hexadecimal notation. Count the number of hex characters—because each hex character represents 4 bits, it takes 12 hex characters to represent 48 bits.

The MAC address in Figure 2.11 is 004005-607D49, although in print, we represent the MAC address as 00–40–05–60–7D–49. The first six digits, in this example 00–40–05, represent the number of the NIC manufacturer. Once the IEEE issues those six hex digits to a manu- facturer—often referred to as the organizationally unique identifier (OUI)—no other manufacturer may use them. The last six digits, in this example 60–7D–49, are the manufacturer’s unique serial number for that NIC; this portion of the MAC is often referred to as the device ID.

Would you like to see the MAC address for your NIC? If you have a Windows system, type ipconfig /all from a command prompt to display the MAC address (Figure 2.12). Note that ipconfig calls the MAC address the physical address, which is an important distinction, as you’ll see a bit later in the chapter.

Figure 2.12 • Output from ipconfig /all

Figure 2.11 • MAC address

MAC-48 and EUI-48 The Institute of Electrical and Electronics Engineers (IEEE) forms MAC addresses from a numbering name space originally called MAC-48, which simply means that the MAC address will be 48 bits, with the first 24 bits defining the OUI, just as described here. The current term for this numbering name space is EUI-48. EUI stands for Extended Unique Identifier. (IEEE apparently went with the new term because they could trademark it.)

Most techs just call them MAC addresses, as you should, but you might see MAC-48 or EUI-48 on the CompTIA Network+ exam.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 16

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Okay, so every NIC in the world has a unique MAC address, but how is it used? Ah, that’s where the fun begins! Recall that computer data is binary, which means it’s made up of streams of ones and zeroes. NICs send and receive this binary data as pulses of electricity, light, or radio waves. The NICs that use electricity to send and receive data are the most common, so let’s consider that type of NIC. The specific process by which a NIC uses electricity to send and receive data is exceedingly complicated but, luckily for you, not necessary to understand. Instead, just think of a charge on the wire as a one and no charge as a zero. A chunk of data moving in pulses across a wire might look something like Figure 2.13.

If you put an oscilloscope on the wire to measure voltage, you’d see something like Figure 2.14. An oscilloscope is a powerful tool that enables you to see electrical pulses.

Now, remembering that the pulses represent binary data, visualize instead a string of ones and zeroes moving across the wire (Figure 2.15).

Once you understand how data moves along the wire, the next question is how does the network get the right data to the right system? All networks transmit data by breaking whatever is moving across

the Physical layer (files, print jobs, Web pages, and so forth) into discrete chunks called frames. A frame is basically a container for a chunk of data moving across a network. The NIC creates and sends, as well as receives and reads, these frames.

I like to visualize an imaginary table inside every NIC that acts as a frame creation and reading station. I see frames as those pneumatic canis- ters you see when you go to a drive-in teller at a bank. A little guy inside the network card—named Nic, naturally!—builds these pneumatic canis- ters (the frames) on the table and then shoots them out on the wire to the hub (Figure 2.16).

Figure 2.16 • Inside the NIC

Figure 2.13 • Data moving along a wire

Figure 2.14 • Oscilloscope of data

Figure 2.15 • Data as ones and zeroes

A number of different frame types are used in different networks. All NICs on the same network must use the same frame type, or they will not be able to communicate with other NICs.

Try This! What’s Your MAC Address?

You can readily determine your MAC address on a Windows computer from the command line. This works in all modern versions of Windows.

In Windows 2000/XP, click Start | Run. Enter 1. the command cmd and press the enter key to get to a command prompt.

In Windows Vista/7, click Start, enter2. cmd in the Start Search text box, and press the enter key to get to a command prompt.

At the command prompt, type the command3. ipconfig /all and press the enter key.

BaseTech

Chapter 2: Network Models 17

Here’s where the MAC address becomes important. Figure 2.17 shows a representation of a generic frame. Even though a frame is a string of ones and zeroes, we often draw frames as a series of rectangles, each rectangle representing a part of the string of ones and zeroes. You will see this type of frame repre- sentation used quite often, so you should become comfortable with it (even though I still prefer to see frames as pneumatic canisters). Note that the frame begins with the MAC address of the NIC to which the data is to be sent, followed by the MAC address of the sending NIC. Then comes the data, fol- lowed by a special bit of checking information called the frame check sequence (FCS). The FCS uses a type of binary math called a cyclic redundancy check (CRC) that the receiving NIC uses to verify that the data arrived intact.

So, what’s inside the data part of the frame? You neither know nor care. The data may be a part of a file, a piece of a print job, or part of a Web page. NICs aren’t concerned with content! The NIC simply takes whatever data is passed to it via its device driver and addresses it for the correct system. Special software will take care of what data gets sent and what happens to that data when it arrives. This is the beauty of imagining frames as little pneumatic canisters (Figure 2.18). A canister can carry anything from dirt to diamonds—the NIC doesn’t care one bit (pardon the pun).

Like a canister, a frame can hold only a certain amount of data. Different networks use different sizes of frames, but a single frame holds about 1500 bytes of data.

This raises a new question: what happens when the data to be sent is larger than the frame size? Well, the sending system’s software must chop the data up into nice, frame-sized chunks, which it then hands to the NIC for sending. As the receiving system begins to accept the incoming frames, the receiving system’s software recombines the data chunks as they come in from the network. I’ll show how this disassembling and reassembling is done in a moment—first, let’s see how the frames get to the right system!

When a system sends a frame out on the network, the frame goes into the hub. The hub, in turn, makes an exact copy of that frame, sending a copy of the original frame to every other system on the network. The inter- esting part of this process is when the copy of the frame comes into all the other systems. I like to visualize a frame sliding onto the receiving NIC’s “frame assembly table,” where the electronics of the NIC inspect it. Here’s where the magic takes place: only the NIC to which the frame is addressed will process that frame—the other NICs sim- ply erase it when they see that it is not addressed to their MAC address. This is important to appreciate: every frame sent on a network is received by every NIC, but only the NIC with the match- ing MAC address will process that particular frame (Figure 2.19).

Figure 2.18 • Frame as a canister

Tech Tip

FCS in Depth Most FCSs are only 4 bytes long, yet the average frame carries around 1500 bytes of data. How can 4 bytes tell you if all 1500 bytes in the data are correct? That’s the magic of the math of the CRC. Without going into the grinding details, think of the CRC as just the remainder of a division problem. (Remember learning remainders from division back in elementary school?) The NIC sending the frame does a little math to make the CRC. Using binary arithmetic, it works a division problem on the data using a divisor called a key. The result of this division is the CRC. When the frame gets to the receiving NIC, it divides the data by the same key. If the receiving NIC’s answer is the same as the CRC, it knows the data is good.

Data Sender’s

MAC address Recipient’s

MAC address FCS

Figure 2.17 • Generic frame

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 18

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Figure 2.19 • Incoming frame!

Getting the Data on the Line The process of getting data onto the wire and then picking that data off the wire is amazingly complicated. For instance, what happens to keep two NICs from speaking at the same time? Because all the data sent by one NIC is read by every other NIC on the network, only one system may speak at a time. Networks use frames to restrict the amount of data a NIC can send at once, giving all NICs a chance to send data over the network in a reasonable span of time. Dealing with this and many other issues requires sophisti- cated electronics, but the NICs handle these issues completely on their own without our help. Thankfully, the folks who design NICs worry about all these details, so we don’t have to!

Getting to Know You Using the MAC address is a great way to move data around, but this pro- cess raises an important question. How does a sending NIC know the MAC address of the NIC to which it’s sending the data? In most cases, the send- ing system already knows the destination MAC address because the NICs had probably communicated earlier, and each system stores that data. If it doesn’t already know the MAC address, a NIC may send a broadcast onto the network to ask for it. The MAC address of FF-FF-FF-FF-FF-FF is the broadcast address—if a NIC sends a frame using the broadcast address, every single NIC on the network will process that frame. That broadcast frame’s data will contain a request for a system’s MAC address. Without knowing the MAC address to begin with, the requesting computer will use an IP address or host name to pick the target computer out of the crowd. The system with the MAC address your system is seeking will read the request in the broadcast packet and respond with its MAC address.

BaseTech

Chapter 2: Network Models 19

The Complete Frame Movement Now that you’ve seen all the pieces used to send and receive frames, let’s put these pieces together and see how a frame gets from one system to another. The basic send/receive process is as follows.

First, the sending system’s network operating system (NOS) software— such as Windows 7—hands some data to its NIC. The NIC builds a frame to transport that data to the receiving NIC (Figure 2.20).

Figure 2.20 • Building the frame

After the NIC creates the frame, it adds the FCS, and then dumps it and the data into the frame (Figure 2.21).

FC S

Figure 2.21 • Adding the data and FCS to the frame

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 20

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Next, the NIC puts both the destination MAC address and its own MAC address onto the frame. It waits until no other NIC is using the cable, and then sends the frame through the cable to the network (Figure 2.22).

Figure 2.22 • Sending the frame

The frame propagates down the wire into the hub, which creates copies of the frame and sends it to every other system on the network. Every NIC receives the frame and checks the MAC address. If a NIC finds that a frame is addressed to it, it processes the frame (Figure 2.23); if the frame is not addressed to it, the NIC erases it.

Figure 2.23 • Reading an incoming frame

So, what happens to the data when it gets to the correct NIC? First, the receiving NIC uses the FCS to verify that the data is valid. If it is, the

BaseTech

Chapter 2: Network Models 21

receiving NIC strips off all the framing information and sends the data to the software—the network operating system—for processing. The receiv- ing NIC doesn’t care what the software does with the data; its job stops the moment it passes on the data to the software.

Any device that deals with a MAC address is part of the OSI Data Link layer, or Layer 2 of the OSI model. Let’s update the OSI model to include details about the Data Link layer (Figure 2.24).

Figure 2.24 • Layer 1 and Layer 2 are now properly applied to the network.

Note that the cabling and the hub are located in the Physical layer. The NIC is in the Data Link layer, but spans two sublayers.

The Two Aspects of NICs Consider how data moves in and out of a NIC. On one end, frames move into and out of the NIC’s network cable connection. On the other end, data moves back and forth between the NIC and the network operating system software. The many steps a NIC performs to keep this data moving—send- ing and receiving frames over the wire, creating outgoing frames, reading incoming frames, and attaching MAC addresses—are classically broken down into two distinct jobs.

The first job is called the Logical Link Control (LLC). The LLC is the aspect of the NIC that talks to the operating system, places data coming from the software into frames, and creates the CRC on each frame. The LLC is also responsible for dealing with incoming frames: processing those that are addressed to this NIC and erasing frames addressed to other machines on the network.

The second job is called the Media Access Control (MAC), and I bet you can guess what it does! That’s right—it remembers the NIC’s own MAC address and attaches MAC addresses to the frames. Recall that each frame the LLC creates must include both the sender’s and recipient’s MAC addresses. The MAC also ensures that the frames, now complete with their MAC addresses, are then sent along the network cabling. Figure 2.25 shows the Data Link layer in detail.

The CompTIA Network+ exam tests you on the details of the OSI seven-layer model, so remember that the Data Link layer is the only layer that has any sublayers.

The Data Link layer provides a service called Data Link Control (DLC). The only reason to mention this is there’s an ancient printing protocol with the same name. DLC might show up as an incorrect answer on the exam.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 22

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Figure 2.25 • LLC and MAC, the two parts of the Data Link layer

Tech Tip

NIC and Layers Most networking materials that describe the OSI seven-layer model put NICs squarely into the Data Link layer of the model. It’s at the MAC sublayer, after all, that data gets encapsulated into a frame, destination and source MAC addresses get added to that frame, and error checking occurs. What bothers most students with placing NICs solely in the Data Link layer is the obvious other duty of the NIC—putting the ones and zeroes on the network cable. How much more physical can you get?

Many teachers will finesse this issue by defining the Physical layer in its logical sense—that it defines the rules for the ones and zeroes—and then ignore the fact that the data sent on the cable has to come from something. The first question when you hear a statement like that—at least to me—is, “What component does the sending?” It’s the NIC, of course, the only device capable of sending and receiving the physical signal.

Network cards, therefore, operate at both Layer 2 and Layer 1 of the OSI seven-layer model. If cornered to answer one or the other, however, go with the more common answer, Layer 2.

Beyond the Single Wire—Network ■■ Software and Layers 3–7

Getting data from one system to another in a simple network (defined as one in which all the computers connect to one hub) takes relatively little effort on the part of the NICs. But one problem with simple networks is that computers need to broadcast to get MAC addresses. It works for small networks, but what happens when the network gets big, like the size of the

BaseTech

Chapter 2: Network Models 23

entire Internet? Can you imagine millions of computers all broadcasting? No data could get through.

Equally important, data flows over the Internet using many technolo- gies, not just Ethernet. These technologies, such as SONET, ATM, and oth- ers, don’t know what to do with Ethernet MAC addresses. When networks get large, you can’t use the MAC addresses anymore.

Large networks need a logical addressing method, like a postal code or telephone numbering scheme, that ignores the hardware and enables you to break up the entire large network into smaller networks called subnets. Figure 2.26 shows two ways to set up a network. On the left, all the com- puters connect to a single hub. On the right, however, the LAN is separated into two five-computer subnets.

Figure 2.26 • Large LAN complete (left) and broken up into two subnets (right)

To move past the physical MAC addresses and start using logical addressing requires some special software called a network protocol. Net- work protocols exist in every operating system. A network protocol not only has to create unique identifiers for each system, but also must create a set of communication rules for issues like how to handle data chopped up into multiple packets and how to ensure those packets get from one subnet to another. Let’s take a moment to learn a bit about the most famous network protocol—TCP/IP—and its unique universal addressing system.

To be accurate, TCP/IP is really several network protocols designed to work together—but two protocols, TCP and IP, do so much work that the folks who invented all these protocols named the whole thing TCP/IP. TCP stands for Transmission Control Protocol, and IP stands for Internet Protocol. IP is the network protocol I need to discuss first; rest assured, however, I’ll cover TCP in plenty of detail later.

MAC addresses are also known as physical addresses.

TCP/IP dominates the networking universe. Almost every network in existence uses TCP/IP. Because it is more specific, a simpler model called the TCP/IP model was created to describe it. You’ll learn all about this model later in the chapter.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 24

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

IP—Playing on Layer 3, the Network Layer At the Network layer, Layer 3, packets get created and addressed so they can go from one network to another. The Internet Protocol is the primary logical addressing protocol for TCP/IP. IP makes sure that a piece of data gets to where it needs to go on the network. It does this by giving each device on the network a unique numeric identifier called an IP address. An IP address is known as a logical address to distinguish it from the physical address, the MAC address of the NIC.

Every network protocol uses some type of naming convention, but no two protocols use the same convention. IP uses a rather unique dotted decimal notation (sometimes referred to as a dotted-octet numbering sys- tem) based on four 8-bit numbers. Each 8-bit number ranges from 0 to 255, and the four numbers are separated by periods. (If you don’t see how 8-bit numbers can range from 0 to 255, don’t worry—by the end of this book, you’ll understand these naming conventions in more detail than you ever believed possible!) A typical IP address might look like this:

192.168.4.232

No two systems on the same network share the same IP address; if two machines accidentally receive the same address, they won’t be able to send or receive data. These IP addresses don’t just magically appear—they must be configured by the end user (or the network administrator).

Take a look at Figure 2.26. What makes logical addressing powerful is the magic box—called a router—that connects each of the subnets. Routers use the IP address, not the MAC address, to forward data. This enables networks to connect across data lines that don’t use Ethernet, like the tele- phone network. Each network type (such as Ethernet, SONET, ATM, and others that we’ll discuss later in the book) uses a unique frame. Figure 2.27 shows a typical router.

Figure 2.27 • Typical small router

Try to avoid using redundant expressions. Even though many techs will say “IP protocol,” for example, you know that “IP” stands for “Internet Protocol.” It wouldn’t be right to say “Internet Protocol protocol” in English, so it doesn’t work in network speak either.

BaseTech

Chapter 2: Network Models 25

What’s important here is for you to appreciate that in a TCP/IP net- work, each system has two unique identifiers: the MAC address and the IP address. The MAC address (the physical address) is literally burned into the chips on the NIC, whereas the IP address (the logical address) is simply stored in the system’s software. MAC addresses come with the NIC, so you don’t configure MAC addresses, whereas you must configure IP addresses using software. Figure 2.28 shows the MHTechEd network diagram again; this time with the MAC and IP addresses displayed for each system.

Figure 2.28 • MHTechEd addressing

Packets Within Frames For a TCP/IP network to send data successfully, the data must be wrapped up in two distinct containers. A frame of some type enables the data to move from one device to another. Inside that frame is both an IP-specific container that enables routers to determine where to send data—regardless of the physical connection type—and the data itself. In TCP/IP, that inner container is called a packet.

Figure 2.29 shows a typical IP packet; notice the similarity to the frames you saw earlier.

Destination IP address

Source IP address

Data

Figure 2.29 • IP packet

This is a highly simplified IP packet. I am not including lots of little parts of the IP packet in this diagram because they are not important to what you need to understand right now—but don’t worry, you’ll see them later in the book!

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 26

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

But IP packets don’t leave their PC home without any clothes on! Each IP packet is handed to the NIC, which then encloses the IP packet in a regular frame, creating, in essence, a packet within a frame. I like to visualize the packet as an envelope, with the envelope in the pneu- matic canister frame (Figure 2.30). A more conventional drawing would look like Figure 2.31.

When you send data from one com- puter to another on a TCP/IP network such as the Internet, that data can go through many routers before it reaches its destination. Each router strips off the incoming frame, determines where to send the data according to the IP address in the packet, creates a new frame, and then sends the packet within a frame on its merry way. The new frame type will be the appropriate technology for what- ever connection technology connects to the next router. That could be a cable or DSL network connection, for example (Figure 2.32). The IP packet, on the other hand, remains unchanged.

Once the packet reaches the destination subnet’s router, that router will strip off the incoming frame—no matter what type—look at the destination IP address, and then add a frame with the appropriate destination MAC address that matches the destination IP address.

Frame Header

Packet Header FCS

Data

Packet

Frame

Figure 2.31 • IP packet in a frame

Keep in mind that not all networks are Ethernet networks. Ethernet may dominate, but IP packets fit in all sorts of other connectivity options. For example, cable modems use a type of frame called DOCSIS. T1 lines use a frame called DS1. The beauty of IP packets is that they can travel unchanged in each of these and many others. For more about these technologies, check out Chapter 14.

Figure 2.30 • IP packet in a frame (as a canister)

Frame stripped

Incoming frame

New frame added

New frame out

Figure 2.32 • Router removing network frame and adding one for the outgoing connection

BaseTech

Chapter 2: Network Models 27

The receiving NIC strips away the Ethernet frame and passes the remaining packet off to the software. The networking software built into your operating system handles all the rest of the work. The NIC’s driver software is the interconnection between the hardware and the software. The NIC driver knows how to communicate with the NIC to send and receive frames, but it can’t do anything with the packet. Instead, the NIC driver hands the packet off to other programs that know how to deal with all the separate packets and turn them into Web pages, e-mail messages, files, and so forth.

The Network layer (Layer 3) is the last layer that deals directly with hardware. All the other layers of the OSI seven-layer model work strictly within software.

Assembly and Disassembly—Layer 4, the Transport Layer Because most chunks of data are much larger than a single packet, they must be chopped up before they can be sent across a network. When a serv- ing computer receives a request for some data, it must be able to chop the requested data into chunks that will fit into a packet (and eventually into the NIC’s frame), organize the packets for the benefit of the receiving sys- tem, and hand them to the NIC for sending. The receiving system must be able to recognize a series of incoming packets as one data transmission, reassemble the packets correctly based on information included in the packets by the sending system, and verify that all the packets for that piece of data arrived in good shape.

This part is relatively simple—the transport protocol breaks up the data into packets and gives each packet some type of sequence number. I like to compare this process to the one that my favorite international shipping company uses. I receive boxes from UPS almost every day; in fact, some days I receive many, many boxes from UPS. To make sure I get all the boxes for one shipment, UPS puts a numbering system, like the one shown in Figure 2.33, on the label of each box. A computer sending data on a network does the same thing. Embedded into the data of each packet is a sequencing number. By reading the sequencing numbers, the receiving system knows both the total number of packets and how to put them back together.

Figure 2.33 • Labeling the boxes

I’m using the term “packets” here to refer to a generic container. Because the OSI model can be applied to many different network protocols, the terminology for this container changes. Almost all protocols split up data at the Transport layer and add sequencing numbers so the receiving computer can put them together in logical order. What happens at that point depends on the protocol suite. In TCP/IP, for example, the precisely named IP packet is created at the Network layer and other container types are created at the Transport layer.

I’ll go into a lot more detail on this in the TCP/IP model section later in this book. That model, rather than the OSI model, makes more sense for TCP/IP network descriptions.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 28

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

The MHTechEd network just keeps getting more and more complex, doesn’t it? And the Word document still hasn’t been copied, has it? Don’t worry; you’re almost there—just a few more pieces to go!

Layer 4, the Transport layer of the OSI seven-layer model, has a big job: it’s the assembler/disassembler software. As part of its job, the Transport layer also initializes requests for packets that weren’t received in good order (Figure 2.34).

Figure 2.34 • OSI updated

Talking on a Network—Layer 5, the Session Layer

Now that you understand that the system uses software to assemble and disassemble data packets, what’s next? In a network, any one system may be talking to many other systems at any given moment. For example, Janelle’s PC has a printer used by all the MHTechEd systems, so there’s a better than average chance that, as Dana tries to access the Word document, another sys- tem will be sending a print job to Janelle’s PC (Figure 2.35).

Janelle’s system must direct these incoming files, print jobs, Web pages, and so on, to the right pro- grams (Figure 2.36). Additionally, the operating system must enable one system to make a connection to another system to verify that the other system can handle whatever

A lot of things happen on a TCP/IP network at the Transport layer. I’m simplifying here because the TCP/IP model does a way better job explaining each thing than does the OSI model.

Figure 2.35 • Handling multiple inputs

BaseTech

Chapter 2: Network Models 29

operation the initiating system wants to perform. If Bill’s system wants to send a print job to Janelle’s printer, it first contacts Janelle’s system to ensure that it is ready to handle the print job. The session software handles this part of networking, connecting applications to applications.

Figure 2.36 • Each request becomes a session.

Layer 5, the Session layer of the OSI seven-layer model, handles all the sessions for a system (Figure 2.37). The Session layer initiates sessions, accepts incoming sessions, and opens and closes existing sessions. The Session layer also keeps track of computer naming conventions, such as calling your computer SYSTEM01 or some other type of name that makes more sense than an IP or MAC address.

Figure 2.37 • OSI updated

Try This! See Your Sessions

How many sessions does a typical system have run- ning at one time? Well, if you have a TCP/IP network (and who doesn’t these days), you can run the netstat program from a command prompt to see all of them. Open a com- mand prompt and type the following:

netstat -a

Then press the enter key to see your sessions. Don’t worry about trying to inter- pret what you see—Chapter 9 covers netstat in detail. For now, simply appreciate that each line in the netstat output is a session. Count them!

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 30

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Standardized Formats, or Why Layer 6, Presentation, Has No Friends One of the most powerful aspects of a network lies in the fact that it works with (almost) any operating system. Today’s networks easily connect, for

example, a Macintosh system to a Windows PC, despite the fact that these different operating sys- tems use different formats for many types of data. Different data formats used to drive us crazy back in the days before word processors (like Micro- soft Word) could import or export a thousand other word processor formats (Figure 2.38).

This issue motivated folks to create stan- dardized formats that anyone—at least with the right program—could read from any type of computer. Specialized file formats, such as Adobe’s popular Portable Document Format (PDF) for documents and PostScript for print- ing, provide standard formats that any system, regardless of operating system, can read, write, and edit ( Figure 2.39).

Figure 2.39 • Everyone recognizes PDF files!

Layer 6, the Presentation layer of the OSI seven-layer model, handles the conversion of data into formats that are readable by the system. Of all the OSI layers, the high level of file format standardization has made the Presentation layer the least important and least used (Figure 2.40).

Figure 2.38 • Different data formats were often unreadable between systems.

Tech Tip

Acrobat as Open Standard Adobe released the PDF standard to ISO in 2007 and PDF became the ISO 32000 open standard. Adobe Reader remains the premier application for reading PDF documents. Note that Adobe seems to be phasing out the Acrobat branding of PDF documents, but many techs still call PDF “Adobe Acrobat format.”

BaseTech

Chapter 2: Network Models 31

Figure 2.40 • OSI updated

Network Applications—Layer 7, the Application Layer The last and most visible part of any network is the software applications that use it. If you want to copy a file residing on another system in your net- work, you need an application like Network in Windows 7 (or My Network Places in earlier versions of Windows) that enables you to access files on remote systems. If you want to view Web pages, you need a Web browser like Internet Explorer or Mozilla Firefox. The people who use a network experience it through an application. A user who knows nothing about all the other parts of a network may still know how to open an e-mail applica- tion to retrieve mail (Figure 2.41).

Figure 2.41 • Network applications at work

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 32

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Applications may include a number of additional functions, such as encryption, user authentication, and tools to control the look of the data. But these functions are specific to the given applications. In other words, if you want to put a password on your Word document, you must use the password functions in Word to do so.

The Application layer is Layer 7 in the OSI seven-layer model. Keep in mind that the Application layer doesn’t refer to the applications themselves. It refers to the code built into all operating systems that enables network- aware applications. All operating systems have Application Programming Interfaces (APIs) that programmers can use to make their programs network aware (Figure 2.42). An API, in general, provides a standard way for pro- grammers to enhance or extend an application’s capabilities.

Figure 2.42 • OSI updated

The TCP/IP Model■■ The OSI model was developed as a reaction to a world of hundreds, if not thousands, of different protocols made by different manufacturers that needed to play together. The ISO declared the OSI seven-layer model as the tool for manufacturers of networking equipment to find common ground between multiple protocols, enabling them to create standards for interop- erability of networking software and hardware.

The OSI model is extremely popular and very well-known to all net- working techs. Today’s world, however, is a TCP/IP world. The complexity of the OSI model doesn’t make sense in a world with one protocol suite. Given its dominance, the aptly named TCP/IP model shares equal popular- ity with the venerable OSI model.

The TCP/IP model consists of four layers:

Application ■

Transport ■

BaseTech

Chapter 2: Network Models 33

Internet ■

Link/Network Interface ■

It’s important to appreciate that the TCP/IP model doesn’t have a standards body to define the layers. Because of this, there are a surprising number of variations on the TCP/IP model.

A great example of this lack of standardization is the Link layer. Without a standardizing body, we can’t even agree on the name. While “Link layer” is extremely common, the term “Network Interface layer” is equally popular. A good tech knows both of these terms and understands that they are interchangeable. Notice also that, unlike the OSI model, the TCP/IP model does not identify each layer with a number.

CompTIA has chosen one popular version of the TCP/IP model for the CompTIA Network+ competencies and exam. That’s the version you’ll learn right here. It’s concise, having only four layers, and many important companies, like Cisco and Microsoft, use it, although with a few varia- tions in names as just described. The TCP/IP model gives each protocol in the TCP/IP protocol suite a clear home in one of the four layers.

The clarity of the TCP/IP model shows the flaws in the OSI model. The OSI model couldn’t perfectly describe all the TCP/IP protocols. In fact, the OSI model couldn’t perfectly describe any of the now defunct alternative protocols, such as IPX/SPX and NetBIOS/NetBEUI. Network nerds have gotten into fistfights over a particular protocol’s exact location in the OSI model.

The TCP/IP model fixes this ambiguity, at least for TCP/IP. Because of its tight protocol-to-layer integration, the TCP/IP model is a descriptive model, whereas the OSI seven-layer model is a prescriptive model.

The Link Layer The TCP/IP model lumps together the OSI model’s Layer 1 and Layer 2 into a single layer called the Link layer (or Network Interface layer), as seen in Figure 2.43. It’s not that the Physical and Data Link layers are unimportant to TCP/IP, but the TCP/ IP protocol suite really begins at Layer 3 of the OSI model. In essence, TCP/IP techs count on other techs to handle the physical connections in their networks. All of the pieces that you learned in the OSI model (cabling, hubs, physical addresses, and NICs) sit squarely in the Link layer.

A nice way to separate layers in the TCP/IP model is to think about packets and frames. Any part of the network that deals with complete frames is in the Link layer. The moment the frame information is stripped away from an IP packet, we move out of the Link layer and into the Internet layer.

Transport

Internet

Link

Transport

Session

Presentation Application

Application

Network

Data Link

Physical

Figure 2.43 • TCP/IP Link layer compared to OSI Layers 1 and 2

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 34

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

The Internet Layer The Internet layer should really be called the “IP packet” layer (Figure 2.44). Any device or protocol that deals with pure IP packets—getting an IP packet to its destination—sits in the Internet layer. IP addressing itself is also part of the Internet layer, as are routers and the magic they perform to get IP packets to the next router. IP packets are created at this layer.

The Internet layer doesn’t care about the type of data an IP packet carries, nor does it care whether the data gets there in good order or not. Those jobs are for the next layer: the Transport layer.

The Transport Layer The Transport layer combines features of the OSI Transport and Session layers with a dash of Appli- cation layer just for flavor (Figure 2.45). While the TCP/IP model is certainly involved with the assem- bly and disassembly of data, it also defines other functions, such as connection-oriented and connec- tionless communication.

Connection-Oriented vs. Connectionless Communication Some protocols, like the popular Post Office Protocol (POP) used for sending e-mail messages, require that the e-mail client and server verify that they have a good connection before a message is sent (Figure 2.46). This makes sense because you don’t want your e-mail message to be a corrupted mess when it arrives.

Figure 2.46 • Connection between e-mail client and server

Application

Transport

Link

Internet

Session

Transport

Application

Presentation

Data Link

Physical

Network

Figure 2.44 • TCP/IP Internet layer compared to OSI Layer 3

Transport

Session

Application

Link

Transport

Application

Presentation

Data Link

Physical

Network Internet

Figure 2.45 • TCP/IP Transport layer compared to OSI Layers 4, 5, and part of 7

BaseTech

Chapter 2: Network Models 35

Alternatively, a number of TCP/IP protocols simply send data without first waiting to verify that the receiving system is ready (Figure 2.47). When using Voice over IP (VoIP), for example, the call is made without verifying first whether another device is there.

Figure 2.47 • Connectionless communication

The connection-oriented protocol is called Transmission Control Protocol (TCP). The connectionless protocol is called User Datagram Protocol (UDP).

Everything you can do on the Internet, from Web browsing to Skype phone calls to playing World of Warcraft, is predetermined to be either connection-oriented or connectionless. It’s simply a matter of knowing your applications.

Segments Within Packets To see the Transport layer in action, strip away the IP addresses from an IP packet. What’s left is a chunk of data in yet another container called a TCP segment. TCP segments have many other fields that ensure the data gets to its destination in good order. These fields have names such as Checksum, Flags, and Acknowledgement. Chapter 7 goes into more detail on TCP seg- ments, but, for now, just know that TCP segments have fields that ensure the connection-oriented communication works properly. Figure 2.48 shows a typical (although simplified) TCP segment.

Destination port

Source port

Sequence number

Checksum Flags Acknowledgement Data

Figure 2.48 • TCP segment

Data comes from the Application layer applications. The Transport layer breaks that data into chunks, adding port numbers and sequence numbers, creating the TCP segment. The Transport layer then hands the TCP segment to the Internet layer that, in turn, creates the IP packet.

Most traffic on a TCP/IP network uses TCP at the Transport layer, but like Yoda said, “There is another,” and that’s UDP. UDP also gets data from

Chapter 7 covers TCP, UDP, and all sorts of other protocols in detail.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 36

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

the Application layer programs and adds port and sequencing numbers to create a container called a UDP datagram. A UDP datagram lacks most of the extra fields found in TCP segments, simply because UDP doesn’t care if the receiving computer gets its data. Figure 2.49 shows a UDP datagram.

Destination port

Source port

Sequence number

Checksum Data

Figure 2.49 • UDP datagram

The Application Layer The TCP/IP Application layer combines features of the top three layers of the OSI model (Figure 2.50). Every application, especially connection- oriented applications, must know how to initiate, control, and disconnect from a remote system. No single method exists for doing this. Each TCP/IP application uses its own method.

Transport

Internet

Link

Transport

Session

Presentation Application

Application

Network

Data Link

Physical

Figure 2.50 • TCP/IP Application layer compared to OSI layers 5–7

TCP/IP uses a unique port numbering system that gives each applica- tion a unique number between 1 and 65535. Some of these port numbers are very famous. The protocol that makes Web pages work, HTTP, uses port 80, for example.

Although we can say that the OSI model’s Presentation layer fits inside the TCP/IP model’s Application layer, no application requires any particu- lar form of presentation as seen in the OSI model. Standard formats are part and parcel with TCP/IP protocols. For example, all e-mail messages use an extremely strict format called MIME. All e-mail servers and clients read MIME without exception.

BaseTech

Chapter 2: Network Models 37

In the OSI model, we describe the API—the smarts that make applica- tions network-aware—as being part of the Application layer. While this is still true for the TCP/IP model, all applications designed for TCP/IP are, by definition, network-aware. There is no such thing as a “TCP/IP word pro- cessor” or a “TCP/IP image editor” that requires the added ability to know how to talk to a network—all TCP/IP applications can talk to the network, as long as they are part of a network. And every TCP/IP application must be a part of a network to function: Web browsers, e-mail clients, multiplayer games, and so on.

Don’t think that the TCP/IP model is any simpler than the OSI model just because it only uses four layers. With the arguable exception of the Pre- sentation layer, everything you saw in the OSI model is also found in the TCP/IP model (Figure 2.51).

Transport

Internet

Link

Transport

Session

Presentation Application

Application

Network

Data Link

Physical

I work at the Application layer.

And, not surprisingly, the other Application

layer.

I work on both of the Transport layers.

Figure 2.51 • OSI model and TCP/IP model side by side

Frames, Packets, and Segments, Oh My! The TCP/IP model shows its power in its ability to describe what happens at each layer to the data that goes from one computer to another. The Application layer programs create the data. The Transport layer breaks the data into chunks, putting those chunks into TCP segments or UDP datagrams. The Internet layer adds the IP addressing and creates the IP packets. The Link layer wraps the IP packet into a frame, with the MAC address information and a frame check sequence (FCS). Now the data is ready to hit the wire (or airwaves, if you’re in a café). Figure 2-52 shows all this encapsulating goodness relative to the TCP/IP model.

Application data

Segment/ datagram

Packet

FrameIP Packet

Segment

Header Data

Data

Header

Header

Figure 2.52 • Data encapsulation in TCP/IP

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 38

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

For the exam, remember at what layer each encapsulation happens. Table 2.1 shows the layers and the corresponding data structure.

Table 2.1 TCP/IP Model Layers and Corresponding Data Structures TCP/IP Model Layer Data Structure

Link Frame

Internet IP packet

Transport TCP segment/UDP datagram Application (The data starts and ends here)

The Tech’s Troubleshooting Tool The OSI seven-layer model and TCP/IP model provide you with a way to conceptualize a network to determine what could cause a specific prob- lem when the inevitable problems occur. Good techs always use a model to troubleshoot their networks.

If Jane can’t print to the networked printer, for example, a model can help solve the problem. If her NIC shows activity, then, using the OSI model, you can set aside both the Physical layer (Layer 1) and Data Link layer (Layer 2). If you’re a TCP/IP model tech, you can look at the same symptoms and eliminate the Link layer. In either case, you’ll find yourself moving up the layer ladder to the OSI model’s Network layer (Layer 3) or the TCP/IP model’s Internet layer. If her computer has a proper IP address, then you can set that layer aside too, and you can move on up to check other layers to solve the problem.

Understanding both the OSI and TCP/IP models is important. Sure, they’re on the CompTIA Network+ exam, but more importantly, they are your primary diagnostic tool for troubleshooting networks and a commu- nication tool for talking to your fellow techs.

BaseTech

39 Chapter 2: Network Models

Chapter 2 Review■■

Chapter Summary ■

After reading this chapter and completing the exercises, you should understand the following about networking.

Describe how models such as the OSI seven-layer model and the TCP/IP model help technicians understand and troubleshoot networks

Modeling is critical to the networking world. You ■ use models to understand and communicate with other techs about networks.

All models are a simplified representation of the ■ real thing. The human model ignores the many different types of body shapes, using only a single “optimal” figure. The model airplane lacks functional engines or the internal framework, and the computerized weather model might disregard subtle differences in wind temperatures or geology.

In the early days of networking, different ■ manufacturers made unique types of networks that functioned fairly well. But each network had its own cabling, hardware, drivers, naming conventions, applications, and many other unique features. To interconnect networks and improve networking as a whole, someone needed to create a guide—a model that described the functions of a network—so people who made hardware and software could work together to make networks that worked together well.

The OSI seven-layer model defines the role played ■ by each protocol. The OSI model also provides a common jargon that network techs can use to describe the function of any network protocol.

The TCP/IP four-layer model applies only to ■ networks that use the TCP/IP protocol suite, such as the Internet.

Explain the major functions of networks with the OSI seven-layer model.

OSI Layer 1, the Physical layer, includes anything ■ that moves data from one system to another, such as cabling or radio waves.

OSI Layer 2, the Data Link layer, defines the rules ■ for accessing and using the Physical layer. The

Data Link layer is divided into two sublayers: Media Access Control (MAC) and Logical Link Control (LLC).

The MAC sublayer controls access to the Physical ■ layer, or shared media. It encapsulates (creates the frames for) data sent from the system, adding source and destination MAC addresses and error-checking information; it also decapsulates (removes the MAC addresses and CRC from) data received by the system.

The LLC sublayer provides an interface with ■ the Network layer protocols. It is responsible for the ordered delivery of frames, including retransmission of missing or corrupt packets, and for flow control (moderating data flow so one system doesn’t overwhelm the other). Any device that deals with a MAC address is part of the Data Link layer.

OSI Layer 3, the Network layer, is the last layer to ■ work directly with hardware. It adds the unique identifiers (such as IP addresses) to the packets that enable routers to make sure the packets get to the correct system without worrying about the type of hardware used for transmission. Anything having to do with logical addressing works at the Network layer.

A network protocol creates unique identifiers ■ for each system and also creates a set of communication rules for issues such as how to handle data chopped up into multiple packets and how to make sure those packets get from one subnet to another.

OSI Layer 4, the Transport layer, breaks up data ■ received from the upper layers into smaller pieces for transport and adds sequencing numbers to make sure the receiving computer can reassemble the data properly.

Session software at OSI Layer 5 handles the ■ process of differentiating between various types of connections on a PC. The Session layer initiates sessions, accepts incoming sessions, and opens and closes existing sessions. You can use the netstat program to view existing sessions.

40 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks,Third Edition / Meyers / 911-1 / Chapter 2

OSI Layer 6, the Presentation layer, presents ■ data from the sending system in a form that the applications on the receiving system can understand. Standardized data formats, such as PDF, enable computers running on different platforms to share data across a network; the result is that the Presentation layer is the least important and least used of the seven layers.

OSI Layer 7, the Application layer, defines a set of ■ tools that programs can use to access the network. Application layer programs provide services to the programs that the users see.

Describe the major functions of networks with the TCP/IP model

The TCP/IP Link layer (or Network Interface ■ layer) covers the first two layers of the OSI model—the physical components like hubs and cables as well as network frames.

The TCP/IP Internet layer works just like the OSI ■ model’s Network layer. Anything involved with IP, including packets, addressing, and routing, happens at this layer.

The TCP/IP Transport layer is similar to the OSI ■ model’s Transport layer, except that the TCP/ IP version differentiates between connection- oriented communication and connectionless communication.

In TCP/IP, the Transport layer takes data from ■ the applications, splits the data into chunks called TCP segments or UDP datagrams, depending on the protocol used, and adds port and sequence numbers. The segments and datagrams get handed down to the Internet layer for IP to further encapsulate the data.

The TCP/IP Application layer combines the top ■ three layers of the OSI model into one super layer. The session component works similarly to the OSI model’s Session layer. There is no presentation component that compares to the OSI model’s Presentation layer, however. The TCP/IP Application layer is like the OSI model’s version, except that TCP/IP connectivity is implied and not a separate program or function.

Key Terms ■

Application layer (32) broadcast address (18) cyclic redundancy check (CRC) (17) Data Link layer (21) device ID (15) frame (16) frame check sequence (FCS) (17) hub (13) Internet layer (34) Internet Protocol (23, 24) IP address (24) Link layer (33) logical address (24) Logical Link Control (LLC) (21) MAC address (15) Media Access Control (MAC) (21) network interface card (14) Network Interface layer (33) Network layer, Layer 3 (24) network protocol (23)

NIC (14) Open Systems Interconnection (OSI) seven-layer

model (8) organizationally unique identifier (OUI) (15) packet (25) physical address (15) Physical layer (14) Presentation layer (30) protocols (11) router (24) Session layer (29) session software (29) subnets (23) TCP segment (35) Transmission Control Protocol (TCP) (23) Transmission Control Protocol/Internet Protocol

(TCP/IP) model (8) Transport layer (28) UDP datagram (36) unshielded twisted pair (UTP) (13) User Datagram Protocol (UDP) (35)

BaseTech

41 Chapter 2: Network Models

Key Term Quiz ■

Use the Key Terms list to complete the sentences that follow. Not all terms will be used.

The _______________ is an example of software 1. that creates packets for moving data across networks.

Most often, the _______________ provides the 2. physical connection between the PC and the network.

Using the _______________ enables a computer 3. to send a packet that every other PC on the network will process.

You can connect two very different networks by 4. using a(n) _______________.

Every NIC has a hard-coded identifier called a(n) 5. _______________.

The _______________ provides an excellent tool 6. for conceptualizing how a TCP/IP network works. (Select the best answer.)

On a sending machine, data gets broken up 7. at the _______________ of the OSI seven-layer model.

NICs encapsulate data into a(n) _______________ 8. for sending that data over a network.

A(n) _______________ enables multiple machines 9. to connect over a network.

The _______________ provides the key interface 10. between the Physical and Network layers.

Multiple-Choice Quiz ■

Which of the following OSI layers converts the 1. ones and zeroes to electrical signals and places these signals on the cable?

Physical layerA.

Transport layerB.

Network layerC.

Data Link layerD.

The term “unshielded twisted pair” describes 2. which of the following network components?

CableA.

HubB.

RouterC.

NICD.

From the options that follow, select the one 3. that best describes the contents of a typical (simplified) network frame.

Sender’s MAC address, recipient’s MAC A. address, data, FCS

Recipient’s MAC address, sender’s MAC B. address, data, FCS

Recipient’s IP address, sender’s IP address, C. data, FCS

Recipient’s e-mail address, sender’s e-mail D. address, data, FCS

Which of the following is most likely to be a 4. MAC address assigned to a NIC?

192.168.1.121A.

24.17.232.7BB.

23.4F.17.8A.4C.10C.

713.555.1212D.

Which layer of the TCP/IP model involves 5. routing?

Link layerA.

Transport layerB.

Internet layerC.

Application layerD.

How much data can a typical frame contain?6.

500 bytesA.

1500 bytesB.

1500 kilobytesC.

1 megabyteD.

42 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 2

Which of the following best describes an IP 7. address?

A unique dotted decimal notation burned A. into every NIC

A unique 48-bit identifying number burned B. into every NIC

A dotted decimal notation assigned to a NIC C. by software

A 48-bit identifying number assigned to a D. NIC by software

Which layer of the OSI model makes sure the 8. data is in a readable format for the Application layer?

Application layerA.

Presentation layerB.

Session layerC.

Transport layerD.

At which layer of the TCP/IP model are UDP 9. datagrams created?

Link/Network InterfaceA.

InternetB.

TransportC.

ApplicationD.

Which protocol creates the final IP packet?10.

NICA.

IPB.

TCPC.

UDPD.

Which TCP/IP layer includes Layers 5–7 from 11. the OSI seven-layer model?

Application layerA.

Transport layerB.

Internet layerC.

Link layerD.

What component of Layer 2 of the OSI seven-12. layer model is responsible for the ordered delivery of frames, including retransmission of missing or corrupt packets?

MAC sublayerA.

LLC sublayerB.

CRC sublayerC.

Data Link sublayerD.

Which components work at Layer 1 of the OSI 13. seven-layer model? (Select two.)

CablesA.

HubB.

Network protocolC.

Session softwareD.

Andalyn says complete 48-bit MAC addresses 14. are allocated to NIC manufacturers from the IEEE. Buster says the IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to manufacturers. Who is correct?

Only Andalyn is correct.A.

Only Buster is correct.B.

Only Carlos is correct.C.

No one is correct.D.

If a sending system does not know the MAC 15. address of the intended recipient system, it sends a broadcast frame with what MAC address?

192.168.0.0A.

FF-FF-FF-FF-FF-FFB.

11-11-11-11-11-11C.

00-00-00-00-00-00D.

Essay Quiz ■ Some new techs at your office are confused by 1. the differences between a NIC’s frame and an IP packet. Write a short essay describing the two encapsulations, including the components that do the encapsulating.

Your boss has received a set of files with the file 2. extension .WP and is worried because he’s never seen that extension before. He wants people to have access to the information in those files from anywhere in the network. Write a short memo describing how Microsoft Word can handle these files, including a discussion of how that fits with the OSI seven-layer model.

BaseTech

43 Chapter 2: Network Models

Lab Projects

Lab Project 2.1 •

Examine your classroom network. What components does it have? How would you classify those components according to the OSI seven-layer model?

Lab Projects

Lab Project 2.2 •

Create a mnemonic phrase to help you remember the OSI seven-layer model. With two layers beginning with the letter P, how will you differentiate in your mnemonic between Presentation and Physical? How will you incorporate the two sublayers of the Data Link layer?

44

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

3 chapter Cabling and Topology

“It’s from someone who says

she’s a fan of my work on low-

dimensional topology. And she’s

a fan of my . . . hair.”

—Charlie eppes, Numb3rs

In this chapter, you will learn how to

Explain the different types of ■■ network topologies

Describe the different types of ■■ network cabling

Describe the IEEE networking ■■ standards

Every network must provide some method to get data from one system to another. In most cases, this method consists of some type of cabling (usually copper or fiber-optic) running between systems, although many

networks skip wires and use wireless methods to move data. Stringing those

cables brings up a number of critical issues you need to understand to work on a

network. How do all these cables connect the computers? Does every computer

on the network run a cable to a central point? Does a single cable snake through

the ceiling, with all the computers on the network connected to it? These

questions need answering! Furthermore, manufacturers need standards so they

can make networking equipment that works well together. While we’re talking

about standards, what about the cabling itself? What type of cable? What

quality of copper? How thick should it be? Who defines the standards for cables

so they all work in the network?

This chapter answers these questions in three parts. First, you will learn

about network topology—the way that cables and other pieces of hardware

connect to one another. Second, you will tour the most common standardized

cable types used in networking. Third, you will discover the IEEE committees

that create network technology standards.

BaseTech

Chapter 3: Cabling and Topology 45

Test Specific

Topology■■ Computer networks employ many different topologies, or ways of connect- ing computers together. This section looks at both the historical topologies— bus, ring, and star—and the modern topologies—hybrid, mesh, point-to- multipoint, and point-to-point.

Bus and Ring The first generation of wired networks used one of two topologies, both shown in Figure 3.1. A bus topology uses a single cable that con- nects all of the computers in a line. A ring topology connects all computers on the network with a ring of cable.

Note that topologies are diagrams, much like an electrical circuit diagram. Real network cabling doesn’t go in perfect circles or perfect straight lines. Figure 3.2 shows a bus topology network that illustrates how the cable might appear in the real world.

Data flows differently between bus and ring networks, creating different problems and solutions. In bus topol- ogy networks, data from each computer simply goes out on the whole bus. A network using a bus topology needs termination at each end of the cable to prevent a signal sent from one com- puter from reflecting at the ends of the cable, quickly bringing the network down (Figure 3.3).

Figure 3.1 • Bus and ring topologies

Figure 3.2 • Real-world bus topology

Figure 3.3 • Terminated bus topology

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 46

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

In a ring topology network, in contrast, data traffic moves in a circle from one computer to the next in the same direction (Figure 3.4). With no end to the cable, ring networks require no termination.

Bus and ring topology networks work well but suffer from the same problem: the entire network stops working if the cable breaks at any point. The broken ends on a bus topology network aren’t terminated, causing reflection between computers that are still connected. A break in a ring topology network simply breaks the circuit, stopping the data flow ( Figure 3.5).

Figure 3.4 • Ring topology moving in a certain direction Figure 3.5 • Nobody is talking!

Star The star topology uses a central connection box for all the computers on the network (Figure 3.6). Star topol- ogy has a huge benefit over ring and bus topologies by offering fault tolerance—if one of the cables breaks, all of the other computers can still communicate. Bus and ring topology networks were popular and inex- pensive to implement, however, so the old-style star topology networks weren’t very successful. Network hardware designers couldn’t easily redesign their existing networks to use a star topology.

Figure 3.6 • Star topology

BaseTech

Chapter 3: Cabling and Topology 47

Hybrids Even though network designers couldn’t easily use a star topology, the benefits of star topologies were overwhelming, motivating smart people to come up with a way to use star topologies without requiring a major redesign—and the way they did so was ingenious. The ring topology net- work designers struck first by taking the entire ring and shrinking it into a small box, as shown in Figure 3.7.

This was quickly followed by the bus topology folks who, in turn, shrunk their bus (better known as the segment) into their own box ( Figure 3.8).

Figure 3.7 • Shrinking the ring

The most successful of the star ring topology networks was called Token Ring, manufactured by IBM.

Figure 3.8 • Shrinking the segment

Physically, they looked like a star, but if you examined it as an electronic schematic, the signals acted like a ring or a bus. Clearly the old definition of topology needed a little clarification. When we talk about topology today, we separate how the cables physically look (the physical topology) from how the signals travel electronically (the signaling topology or logical topology).

Any form of networking technology that combines a physical topology with a signaling topology is called a hybrid topology. Hybrid topologies have come and gone since the earliest days of networking. Only two hybrid topologies, star-ring topology and star-bus topology, ever saw any amount of popularity. Eventually star-ring lost market share, and star-bus reigned as the undisputed king of topologies.

Mesh and Point-to-Multipoint Topologies aren’t just for wired networks. Wireless networks also need topologies to get data from one machine to another, but using radio waves instead of cables involves somewhat different topologies. Almost all wire- less networks use one of two different topologies: a mesh topology or a point-to-multipoint topology (Figure 3.9).

Most techs refer to the signaling topology as the logical topology today. That’s how you’ll see it on the CompTIA Network+ exam as well.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 48

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks,Third Edition / Meyers / 911-1 / Chapter 3

Figure 3.9 • Mesh and point-to-multipoint topologies

Mesh In a mesh topology network, every computer connects to every other com- puter via two or more routes. Some of the routes between two computers may require traversing through another member of the mesh network.

There are two types of meshed topologies: partially meshed and fully meshed (Figure 3.10). In a partially meshed topology network, at least two machines have redundant connections. Every machine doesn’t have to con- nect to every other machine. In a fully meshed topology network, every com- puter connects directly to every other computer.

Figure 3.10 • Partially and fully meshed topologies

If you’re looking at Figure 3.10 and thinking that a mesh topology looks amazingly resilient and robust, it is—at least on paper. Because every

BaseTech

Chapter 3: Cabling and Topology 49

computer connects to every other computer on the fully meshed network, even if half the PCs crash, the network still functions as well as ever (for the survivors). In a practical sense, however, implementing a fully meshed topology for a wired network would be an expensive mess. Even a tiny fully meshed network with 10 PCs, for example, would need 45 separate and distinct pieces of cable to connect every PC to every other PC. What a mesh mess! Because of this, mesh topologies have never been practical for a wired network.

Make sure you know the formula to calculate the number of connec- tions needed to create a fully meshed network, given a certain number of computers. Here’s the formula:

y = number of computers

Number of connections = y(y – 1)/2

So, if you have six computers, you need 6(6 – 1)/2 = 30/2 = 15 connections to create a fully meshed network.

Point-to-Multipoint In a point-to-multipoint topology, a single system acts as a common source through which all members of the point-to-multipoint network converse. If you compare a star topology to a slightly rearranged point-to-multipoint topology, you might be tempted to say they’re the same thing. Granted, they’re similar, but look at Figure 3.11. See what’s in the middle? The subtle but important difference is that a point-to-multipoint topology requires an intelligent device in the center, whereas the device in the center of a star topology has little more to do than send or provide a path for a signal down all the connections.

Figure 3.11 • Comparing star and point-to-multipoint topologies

You’ll sometimes find mesh or point-to-multipoint topology used in wired networks, but they’re rare. These two topologies are far more com- monly seen in wireless networks.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 50

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks,Third Edition / Meyers / 911-1 / Chapter 3

Point-to-Point In a point-to-point topology network, two computers connect directly together with no need for a central device of any kind. You’ll find point-to-point topologies implemented in both wired and wireless networks (Figure 3.12).

Parameters of a Topology Although a topology describes the method by which systems in a network connect, the topology alone doesn’t describe all of the features necessary to enable those networks. The term bus topology, for example, describes a net- work that consists of some number of machines connected to the network via a single linear piece of cable. Notice that this definition leaves a lot of questions unanswered. What is the cable made of? How long can it be? How do the machines decide which machine should send data at a specific moment? A network based on a bus topology can answer these questions in a number of different ways—but it’s not the job of the topology to define issues like these. A functioning network needs a more detailed standard.

Over the years, particular manufacturers and standards bodies have created several specific network technologies based on different topologies. A network technology is a practical application of a topology and other criti- cal technologies that provides a method to get data from one computer to another on a network. These network technologies have names like 10BaseT, 1000BaseF, and 10GBaseLX. You will learn all about these in the next two chapters.

Cabling■■ The majority of networked systems link together using some type of cabling. Different types of networks over the years have used a number of different types of cables—and you need to learn about all these cables to succeed on the CompTIA Network+ exam! This section explores both the cabling types used in older networks and those found in today’s networks.

All cables used in the networking industry can be categorized in three distinct groups: coaxial (coax), twisted pair, and fiber-optic. Let’s look at all three.

Coaxial Cable Coaxial cable contains a central conductor wire surrounded by an insulating material, which, in turn, is surrounded by a braided metal shield. The cable is referred to as coaxial (coax for short) because the center wire and the braided metal shield share a common axis or centerline (Figure 3.13).

Coaxial cable shields data transmissions from electromag- netic interference (EMI). Many devices in the typical office environment generate magnetic fields, including lights, fans,

Figure 3.12 • Point-to-point topology

Make sure you know all your topologies: bus, ring, star, hybrid, mesh, point-to- multipoint, and point-to-point.

Figure 3.13 • Cutaway view of coaxial cable

BaseTech

Chapter 3: Cabling and Topology 51

copy machines, and refrigerators. When a metal wire encounters these magnetic fields, electrical current is generated along the wire. This extra current—EMI—can shut down a network because it is easily misinterpreted as a signal by devices like NICs. To prevent EMI from affecting the network, the outer mesh layer of a coaxial cable shields the center wire (on which the data is transmitted) from interference (Figure 3.14).

Early bus topology networks used coaxial cable to connect computers together. Back in the day, the most popular cable used special bayonet-style connectors called BNC connectors (Figure 3.15). Even earlier bus networks used thick cable that required vampire connections—sometimes called vampire taps—that literally pierced the cable.

Figure 3.14 • Coaxial cable showing braided metal shielding

Figure 3.15 • BNC connector on coaxial cable

You’ll find coaxial cable used today primarily to enable a cable modem to connect to an Internet service provider (ISP). Connecting a computer to the cable modem enables that computer to access the Internet. This cable is the same type used to connect televisions to cable boxes or to satellite receivers. These cables use an F-connector that screws on, making for a secure connec- tion (Figure 3.16).

Figure 3.16 • F-type connector on coaxial cable

Coaxial cabling is also very popular with satellite, over-the- air antennas, and even some home video devices. This book covers cable and other Internet connectivity options in great detail in Chapter 14.

Tech Tip

What’s in a Name? Techs all around the globe argue over the meaning of BNC. A solid percentage says with authority that it stands for “British Naval Connector.” An opposing percentage says with equal authority that it stands for “Bayonet Neill-Concelman,” after the stick-and-twist style of connecting and the purported inventors of the connector. The jury is still out, though this week I’m leaning toward Neill and Concelman and their bayonet- style connector.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 52

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

Cable modems connect using either RG-6 or, rarely, RG-59. RG-59 was used primarily for cable television rather than networking. Its thinness and the introduction of digital cable motivated the move to the more robust RG-6, the predominant cabling used today (Figure 3.17).

All coax cables have a Radio Grade (RG) rating. The U.S. military devel- oped these ratings to provide a quick reference for the different types of coax. The only important measure of coax cabling is its Ohm rating, a relative measure of the resistance (or more precisely, characteristic impedance) on the cable. You may run across other coax cables that don’t have acceptable Ohm ratings, although they look just like network-rated coax. Fortunately, most coax cable types display their Ohm ratings on the cables themselves (see Figure 3.18). Both RG-6 and RG-59 cables are rated at 75 Ohms.

The Ohm rating of a particular piece of cable describes the impedance of that cable. Impedance describes a set of characteristics that define how much a cable resists the flow of electricity. This isn’t simple resistance, though. Impedance also factors in things like how long it takes the wire to get a full charge—the wire’s capacitance—and more.

Figure 3.17 • RG-6 cable Figure 3.18 • Ohm rating (on an older, RG-58 cable used for networking)

Given the popularity of cable for television and Internet in homes today, you’ll run into situations where people need to take a single coaxial cable and split it. Coaxial handles this quite nicely with coaxial splitters like the one shown in Figure 3.19. You can also connect two coaxial cables together easily using a barrel connector when you need to add some distance to a connection (Figure 3.20).

Figure 3.19 • Coaxial splitter Figure 3.20 • Barrel connector

BaseTech

Chapter 3: Cabling and Topology 53

Twisted Pair The most common type of cabling used in networks consists of twisted pairs of cables, bundled together into a common jacket. Twisted-pair cabling for networks is composed of multiple pairs of wires, twisted around each other at specific intervals. The twists reduce interference, called crosstalk: the more twists, the less crosstalk. Networks use two types of twisted-pair cabling: shielded twisted pair and unshielded twisted pair.

Shielded Twisted Pair Shielded twisted pair (STP), as its name implies, consists of twisted pairs of wires surrounded by shielding to protect them from EMI. STP is pretty rare, primarily because there’s so little need for STP’s shielding. The shielding only really matters in locations with excessive electronic noise, such as a shop floor with lots of lights, electric motors, or other machin- ery that could cause problems for other cables. Figure 3.21 shows the most common STP type: the venerable IBM Type 1 cable used in Token Ring network technology.

Unshielded Twisted Pair Unshielded twisted pair (UTP) is by far the most common type of network cabling used today. UTP consists of twisted pairs of wires surrounded by a plastic jacket (Figure 3.22). This jacket does not provide any protection from EMI, so when install- ing UTP cabling, you must be careful to avoid interference from fluorescent lights, motors, and so forth. UTP costs much less than STP but, in most cases, performs just as well.

Although more sensitive to interference than coaxial or STP cable, UTP cabling provides an inexpensive and flexible means to cable networks. UTP cable isn’t exclusive to networks. Many other technologies (such as telephone systems) employ the same cabling. This makes working with UTP a bit of a challenge. Imagine going up into a ceil- ing and seeing two sets of UTP cables: how would you determine which is for the telephones and which is for the network? Not to worry—a number of installation standards and tools exist to help those who work with UTP answer these types of questions.

Have you ever picked up a telephone and heard a distinct crackling noise? That’s an example of crosstalk.

Figure 3.21 • Shielded twisted pair

Figure 3.22 • Unshielded twisted pair

Cross Check OSI Seven-Layer and TCP/IP Model

You’ve seen UTP cabling before when Dana accessed documents on Janelle’s PC at MHTechEd. Refer to Chapter 2, and cross-check your memory. At what layer of the OSI seven-layer model would you put UTP cabling? For that matter, at what layer would you put network topology? How about on the TCP/IP model?

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 54

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks,Third Edition / Meyers / 911-1 / Chapter 3

Not all UTP cables are the same! UTP cabling has a number of varia- tions, such as the number of twists per foot. To help network installers get the right cable for the right network technology, the cabling industry has developed a variety of grades called category (CAT) ratings. CAT ratings are officially rated in megahertz (MHz), indicating the highest frequency the cable can handle. Table 3.1 shows the most common categories along with their status with the TIA/EIA (see the Tech Tip for more information).

Table 3.1 CAT Ratings for UTP CAT Rating Max Frequency Max Bandwidth Status with TIA/EIA

CAT 1 < 1 MHz Analog phone lines only

No longer recognized

CAT 2 4 MHz 4 Mbps No longer recognized

CAT 3 16 MHz 16 Mbps Recognized

CAT 4 20 MHz 20 Mbps No longer recognized

CAT 5 100 MHz 100 Mbps No longer recognized

CAT 5e 100 MHz 1000 Mbps Recognized CAT 6 250 MHz 10000 Mbps Recognized

UTP cables are rated to handle a certain frequency or cycles per second, such as 100 MHz or 1000 MHz. You could take the frequency number in the early days of networking and translate that into the maximum throughput for a cable. Each cycle per second (or hertz) basically accounted for one bit of data per second. A 10 million cycle per second (10 MHz) cable, for example, could handle 10 million bits per second (10 Mbps). The maximum amount of data that goes through the cable per second is called the bandwidth.

For current networks, developers have implemented bandwidth-efficient encoding schemes, which means they can squeeze more bits into the same signal as long as the cable can handle it. Thus, the CAT 5e cable can handle a throughput of up to 1000 Mbps, even though it’s rated to handle a fre- quency of only up to 100 MHz.

Because most networks can run at speeds of up to 1000 MHz, most new cabling installations use Category 5e (CAT 5e) cabling, although a large number of installations use CAT 6 to future-proof the network. CAT 5e cabling currently costs much less than CAT 6, although as CAT 6 gains

in popularity, it’s slowly drop- ping in price.

Make sure you can look at UTP and know its CAT rating. There are two places to look. First, UTP is typically sold in boxed reels, and the manufacturer will clearly mark the CAT level on the box (Figure 3.23). Second, look on the cable itself. The category level of a piece of cable is usually printed on the cable (Figure 3.24).

The CompTIA Network+ exam is only interested in CAT 3, CAT 5, CAT 5e, and CAT 6 cables.

Tech Tip

Industry Standards Bodies Several international groups set the standards for cabling and networking in general. Ready for alphabet soup? At or near the top is the International Organization for Standardization (ISO). The American National Standards Institute (ANSI) is both the official U.S. representative to the ISO and a major international player. ANSI checks the standards and accredits other groups, such as the Telecommunications Industry Association (TIA) and the Electronic Industries Alliance (EIA). The TIA and EIA together set the standards for UTP cabling, among many other things.

Try This! Shopping Spree!

Just how common has CAT 6 become in your neighborhood? Take a run down to your local hardware store or office supply store and shop for UTP cabling. Do they carry CAT 6? CAT 5? CAT 7? What’s the dif- ference in price? If it’s not much more expensive to go with the better cable, the expected shift in networking standards has occurred and you might want to upgrade your network.

BaseTech

Chapter 3: Cabling and Topology 55

Anyone who’s plugged in a telephone has probably already dealt with the registered jack (RJ) connectors used with UTP cable. Telephones use RJ-11 connectors, designed to support up to two pairs of wires. Networks use the four-pair RJ-45 connectors (Figure 3.25).

Fiber-Optic Fiber-optic cable transmits light rather than electricity, making it attractive for both high-EMI areas and long-distance transmissions. Whereas a sin- gle copper cable cannot carry data more than a few hundred meters at best, a single piece of fiber-optic cabling will operate, depending on the implementation, for distances of up to tens of kilometers. A fiber-optic cable has four components: the glass fiber itself (the core); the cladding, which is the part that makes the light reflect down the fiber; buffer material to give strength, and the insulating jacket (Figure 3.26).

Fiber-optic cabling is manufactured with many different diameters of core and cladding. In a convenient bit of standardization, cable manufacturers use a two- number designator to define fiber-optic cables according to their core and cladding measurements. The most common fiber-optic cable size is 62.5/125 µm. Almost all network technologies that use fiber-optic cable require

Figure 3.23 • CAT level marked on box of UTP

Figure 3.24 • CAT level on UTP

Figure 3.25 • RJ-11 (left) and RJ-45 (right) connectors

Figure 3.26 • Cross section of fiber-optic cabling

Tech Tip

CAT 6a If you have a need for speed, the latest finalized update to the venerable UTP cable is Category 6a. This update doubles the bandwidth of CAT 6 to 500 MHz to accommodate 10-Gbps speeds up to 100 meters. Take that, fiber! (The 100-meter limitation, by the way, refers to the Ethernet standard, the major implementation of UTP in the networking world. Chapter 4 covers Ethernet in great detail.)

Other standards are in the works, however, so by the time you read this paragraph, CAT 6a might be old news. CAT 7 (600 MHz), CAT 7a (1000 MHz), and CAT 8 (1200 MHz) are just around the corner.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 56

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks,Third Edition / Meyers / 911-1 / Chapter 3

pairs of fibers. One fiber is used for sending, the other for receiving. In response to the demand for two-pair cabling, manufacturers often con- nect two fibers together like a lamp cord to create the popular duplex fiber-optic cabling (Figure 3.27).

Fiber cables are pretty tiny! Light can be sent down a fiber-optic cable as regular light or as laser light. The two types of light require totally different fiber-optic cables. Most network technologies that use fiber optics use LEDs (light emitting diodes) to send light signals. A fiber-optic cable that uses LEDs is known as multimode fiber (MMF).

A fiber-optic cable that uses lasers is known as single- mode fiber (SMF). Using laser light and single-mode fiber- optic cables prevents a problem unique to multimode fiber optics called modal distortion (signals sent at the same time don’t arrive at the same time because the paths differ slightly in length) and enables a network to achieve phenomenally high transfer rates over incredibly long distances.

Fiber optics also define the wavelength of light used, measured in nanometers (nm). Almost all multimode cables transmit 850-nm wavelengths, whereas single-mode trans- mits either 1310 or 1550 nm, depending on the laser.

Fiber-optic cables come in a broad choice of connector types. There are over one hundred different connectors, but the three you need to know for the CompTIA Net- work+ exam are ST, SC, and LC (Figure 3.28). LC is unique because it is a duplex connector, designed to accept two fiber cables.

Figure 3.28 • From left to right: ST, SC, and LC fiber-optic connectors

Other Cables Fiber-optic and UTP make up almost all network cabling, but a few other types of cabling may serve from time to time as alternatives to these two: the ancient serial and parallel cables from the earliest days of PCs and the modern high-speed serial connection, better known as FireWire. These cables are only used with quick-and-dirty temporary connections, but they do work, so they bear at least a quick mention.

For those of you unfamiliar with it, the odd little u-shaped symbol describing fiber cable size (µ) stands for micro, or 1/1,000,000.

Figure 3.27 • Duplex fiber-optic cable

Tech Tip

What’s in a Name? Most technicians call common fiber-optic connectors by their initials—such as ST, SC, or LC—perhaps because there’s no consensus about what words go with those initials. ST probably stands for straight tip, although some call it snap twist. But SC and LC? How about subscriber connector, standard connector, or Siemon connector for the former, and local connector or Lucent connector for the latter?

If you want to remember the connectors for the exam, try these: stick and twist for the bayonet- style ST connectors; stick and click for the straight push-in SC connectors; and little connector for the . . . little . . . LC connector.

BaseTech

Chapter 3: Cabling and Topology 57

Classic Serial Serial cabling predates both networking and the personal com- puter. RS-232, the recommended standard (RS) upon which all serial communication takes place on your PC, dates from 1969 and hasn’t substantially changed in around 40 years. When IBM invented the PC way back in 1980, serial connections were just about the only standard input/output technology available, so IBM included two serial ports on every PC. The most common serial port is a 9-pin, male D-subminiature (or DB-9) connector, as shown in Figure 3.29.

Serial ports offer a poor option for networking, with very slow data rates—only about 56,000 bps—and only point-to-point con- nections. In all probability, copying something on a flash drive and just walking over to the other system is faster, but serial network- ing does work if needed. Serial ports are quickly fading away, however, and you no longer see them on new PCs.

Parallel Parallel connections are as ancient as serial ports. Parallel can run up to around 2 Mbps, although when used for networking, they tend to be much slower. Parallel is also limited to point-to-point topology but uses a 25-pin female—rather than male—DB type connector (Figure 3.30). The IEEE 1284 committee sets the standards for parallel communication. (See the section “Networking Industry Standards—IEEE,” later in this chapter.)

FireWire FireWire (based on the IEEE 1394 standard) is the only viable alternative cabling option to fiber-optic or UTP. FireWire is also restricted to point-to- point connections, but it’s very fast (currently the standard is up to 800 Mbps). FireWire has its own unique connector (Figure 3.31).

Figure 3.31 • FireWire connector

Figure 3.29 • Serial port

Figure 3.30 • Parallel connector

Concentrate on UTP—that’s where the hardest CompTIA Network+ exam questions come into play. Don’t forget to give coax, STP, and fiber-optic a quick pass, and make sure you understand the reasons for picking one type of cabling over another. Even though the CompTIA Network+ exam does not test too hard on cabling, this is important information that you will use in the real networking world.

You cannot network computers using FireWire in Windows Vista or Windows 7.

Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks 58

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

Fire Ratings Did you ever see the movie The Towering Inferno? Don’t worry if you missed it—The Towering Inferno was one of the better disaster movies of the 1970s, although it was no Airplane! Anyway, Steve McQueen stars as the fireman who saves the day when a skyscraper goes up in flames because of poor-quality electrical cabling. The burning insulation on the wires ultimately spreads the fire to every part of the building. Although no cables made today contain truly flammable insulation, the insulation is made from plastic, and if you get any plastic hot enough, it will create smoke and noxious fumes. The risk of burning insulation isn’t fire—it’s smoke and fumes.

To reduce the risk of your network cables burning and creating nox- ious fumes and smoke, Underwriters Laboratories and the National Elec- trical Code (NEC) joined forces to develop cabling fire ratings. The two most common fire ratings are PVC and plenum. Cable with a polyvinyl chloride (PVC) rating has no significant fire protection. If you burn a PVC cable, it creates lots of smoke and noxious fumes. Burning plenum-rated cable creates much less smoke and fumes, but plenum-rated cable—often referred to simply as “plenum”—costs about three to five times as much as PVC-rated cable. Most city ordinances require the use of plenum cable for network installations. The bottom line? Get plenum!

The space between the acoustical tile ceiling in an office building and the actual concrete ceiling above is called the plenum—hence the name for the proper fire rating of cabling to use in that space. A third type of fire rating, known as riser, designates the proper cabling to use for vertical runs between floors of a building. Riser-rated cable provides less protec- tion than plenum cable, though, so most installations today use plenum for runs between floors.

Networking Industry ■■ Standards—IEEE

The Institute of Electrical and Electronics Engineers (IEEE) defines industry- wide standards that promote the use and implementation of technol- ogy. In February 1980, a new committee called the 802 Working Group took over from the private sector the job of defining network standards. The IEEE 802 committee defines frames, speeds, distances, and types of cabling to use in a network environment. Concentrating on cables, the IEEE recognizes that no single cabling solution can work in all situations and, therefore, provides a variety of cabling standards.

IEEE committees define standards for a wide variety of electronics. The names of these committees are often used to refer to the standards they publish. The IEEE 1284 committee, for example, sets standards for parallel communication. Have you ever seen a printer cable marked “IEEE

BaseTech

Chapter 3: Cabling and Topology 59

1284–compliant,” as in Figure 3.32? This means the manufacturer followed the rules set by the IEEE 1284 committee. Another committee you may have heard of is the IEEE 1394 committee, which controls the FireWire standard.

The IEEE 802 committee sets the standards for net- working. Although the original plan was to define a single, universal standard for networking, it quickly became apparent that no single solution would work for all needs. The 802 committee split into smaller subcommittees, with names such as IEEE 802.3 and IEEE 802.5. Table 3.2 shows the currently recog- nized IEEE 802 subcommittees and their areas of jurisdiction. I’ve included the inactive subcommittees for reference. The missing numbers, such as 802.4 and 802.12, were used for committees long-ago disbanded. Each sub- committee is officially called a Working Group, except the few listed as a Technical Advisory Group (TAG) in the table.

Some of these committees deal with technologies that didn’t quite make it, and the committees associated with those standards, such as IEEE 802.4, Token Bus, have become dormant. When preparing for the CompTIA Network+ exam, concentrate on the IEEE 802.3 and 802.11 stan- dards. You will see these again in later chapters.

Table 3.2 IEEE 802 Subcommittees IEEE 802 LAN/MAN Overview & Architecture

IEEE 802.1 Higher Layer LAN Protocols

802.1s Multiple Spanning Trees

802.1 Rapid Reconfiguration of Spanning Tree

802.1x Port Based Network Access Control

IEEE 802.2 Logical Link Control (LLC); now inactive

IEEE 802.3 Ethernet

802.3ae 10 Gigabit Ethernet

IEEE 802.5 Token Ring; now inactive

IEEE 802.11 Wireless LAN (WLAN); specifications, such as Wi-Fi

IEEE 802.15 Wireless Personal Area Network (WPAN)

IEEE 802.16 Broadband Wireless Access (BWA); specifications for implementing Wireless Metropolitan Area Networks (Wireless MANs); referred to also as WiMAX

IEEE 802.17 Resilient Packet Ring (RPR)

IEEE 802.18 Radio Regulatory Technical Advisory Group

IEEE 802.19 Coexistence Technical Advisory Group

IEEE 802.20 Mobile Broadband Wireless Access (MBWA)

IEEE 802.21 Media Independent Handover IEEE 802.22 Wireless Regional Area Networks

Memorize the 802.3 and 802.11 standards. Ignore the rest.

Fire Ratings Did you ever see the movie The Towering Inferno? Don’t worry if you missed it—The Towering Inferno was one of the better disaster movies of the 1970s, although it was no Airplane! Anyway, Steve McQueen stars as the fireman who saves the day when a skyscraper goes up in flames because of poor-quality electrical cabling. The burning insulation on the wires ultimately spreads the fire to every part of the building. Although no cables made today contain truly flammable insulation, the insulation is made from plastic, and if you get any plastic hot enough, it will create smoke and noxious fumes. The risk of burning insulation isn’t fire—it’s smoke and fumes.

To reduce the risk of your network cables burning and creating nox- ious fumes and smoke, Underwriters Laboratories and the National Elec- trical Code (NEC) joined forces to develop cabling fire ratings. The two most common fire ratings are PVC and plenum. Cable with a polyvinyl chloride (PVC) rating has no significant fire protection. If you burn a PVC cable, it creates lots of smoke and noxious fumes. Burning plenum-rated cable creates much less smoke and fumes, but plenum-rated cable—often referred to simply as “plenum”—costs about three to five times as much as PVC-rated cable. Most city ordinances require the use of plenum cable for network installations. The bottom line? Get plenum!

The space between the acoustical tile ceiling in an office building and the actual concrete ceiling above is called the plenum—hence the name for the proper fire rating of cabling to use in that space. A third type of fire rating, known as riser, designates the proper cabling to use for vertical runs between floors of a building. Riser-rated cable provides less protec- tion than plenum cable, though, so most installations today use plenum for runs between floors.

Networking Industry ■■ Standards—IEEE

The Institute of Electrical and Electronics Engineers (IEEE) defines industry- wide standards that promote the use and implementation of technol- ogy. In February 1980, a new committee called the 802 Working Group took over from the private sector the job of defining network standards. The IEEE 802 committee defines frames, speeds, distances, and types of cabling to use in a network environment. Concentrating on cables, the IEEE recognizes that no single cabling solution can work in all situations and, therefore, provides a variety of cabling standards.

IEEE committees define standards for a wide variety of electronics. The names of these committees are often used to refer to the standards they publish. The IEEE 1284 committee, for example, sets standards for parallel communication. Have you ever seen a printer cable marked “IEEE

Figure 3.32 • Parallel cable marked IEEE 1284–compliant

60 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

Chapter 3 Review■■

Chapter Summary ■

After reading this chapter and completing the exer- cises, you should understand the following about cabling and topology.

Explain the different types of network topologies

A network’s ■ topology describes how computers connect to each other in that network. The most common network topologies are called bus, ring, star, and mesh.

In a bus topology, all computers connect to ■ the network via a main line. The cable must be terminated at both ends to prevent signal reflections.

In a ring topology, all computers on the network ■ attach to a ring of cable. A single break in the cable stops the flow of data through the entire network.

In a star topology, the computers on the network ■ connect to a central wiring point, which provides fault tolerance.

Modern networks use one of two hybrid ■ topologies: star-bus or star-ring. Star-bus is overwhelmingly the most common topology used today.

In a mesh topology, each computer has a ■ dedicated line to every other computer. Mesh networks can be further categorized as partially meshed or fully meshed, both of which require a significant amount of physical cable. Network techs are able to determine the amount of cable segments needed with a mathematical formula.

In a point-to-multipoint topology, a single ■ system acts as a common source through which all members of the network converse.

Mesh and point-to-multipoint topologies are ■ common among wireless networks.

In a point-to-point topology, two computers ■ connect directly together.

Describe the different types of network cabling

Coaxial cable, or coax, shields data transmissions ■ from EMI. Coax was widely used in early bus networks and used BNC connectors. Today, coax is used mainly to connect a cable modem to an ISP.

Coax cables have an RG rating, with RG-6 being ■ the predominant coax today.

Twisted pair, which comes shielded or ■ unshielded, is the most common type of networking cable today. UTP is less expensive and more popular than STP, though it doesn’t offer any protection from EMI.

UTP is categorized by its CAT rating, with ■ CAT 5, CAT 5e, and CAT 6 being the most commonly used today.

Telephones use RJ-11 connectors, whereas UTP ■ uses RJ-45 connectors.

Fiber-optic cabling transmits light instead of the ■ electricity used in CAT cable or coax. It is thin and more expensive, yet less flexible and more delicate, than other types of network cabling.

There are two types of fiber-optic cable based ■ on what type of light is used. LEDs require multimode cable, whereas lasers generally require single-mode cable.

All fiber-optic cable has three parts: the fiber ■ itself; the cladding, which covers the fiber and helps it reflect down the fiber; and the outer insulating jacket. Additionally, there are over one hundred types of connectors for fiber-optic cable, but ST, SC, and LC are the most common for computer networking.

Plenum-rated UTP is required by most cities for ■ network installations.

Serial cables adhering to the RS-232 standard ■ and parallel cables adhering to the IEEE-1284 standard may be used to network two computers

BaseTech

61 Chapter 3: Cabling and Topology

directly together. You can also use IEEE 1394 (FireWire) connections for direct connection, although not with Windows Vista or Windows 7.

Describe the IEEE networking standards

Networking standards are established and ■ promoted by the Institute of Electrical and Electronics Engineers (IEEE).

The IEEE 802 committee defines frames, ■ speeds, distances, and types of cabling to use in networks. IEEE 802 is split into several subcommittees, including IEEE 802.3 and IEEE 802.11.

The IEEE 1284 committee defines the standards ■ for parallel communications, whereas the IEEE 1394 committee defines the standards for FireWire High-Performance Serial Bus.

Key Terms ■

bandwidth (54) BNC connectors (51) bus topology (45) category (CAT) ratings (54) cladding (55) coaxial cable (50) core (55) crosstalk (53) electromagnetic interference (EMI) (50) fault tolerance (46) fiber-optic cable (55) fully meshed topology (48) hybrid topology (47) IEEE 1284 (57) IEEE 1394 (57) Institute of Electrical and Electronics Engineers

(IEEE) (58) insulating jacket (55) logical topology (47) mesh topology (48) modal distortion (56) multimode fiber (MMF) (56)

network topology (44) Ohm rating (52) partially meshed topology (48) physical topology (47) plenum (58) point-to-multipoint topology (49) point-to-point topology (50) polyvinyl chloride (PVC) (58) Radio Grade (RG) rating (52) ring topology (45) riser (58) RJ-11 (55) RJ-45 (55) RS-232 (57) segment (47) shielded twisted pair (STP) (53) signaling topology (47) single-mode fiber (SMF) (56) star-bus topology (47) star-ring topology (47) star topology (46) unshielded twisted pair (UTP) (53)

Key Term Quiz ■ Use the Key Terms list to complete the sentences that follow. Not all terms will be used.

The _______________ is a network topology that 1. relies on a main line of network coaxial cabling.

The _______________ of a cable will determine 2. its speed.

A(n) _______________ provides more fault 3. tolerance than any other basic network topology.

When your network has all computers connected 4. to a centrally located wiring closet, you have a physical _______________ network.

62 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

_______________ networks use more than one 5. type of basic network topology.

CAT 5e cable is a type of _______________ 6. wiring.

Coaxial cable uses a braided metal shield to 7. protect data from _______________.

Network cabling can use either light or electricity 8. to transmit data. The faster of these types uses light along _______________.

_______________-grade UTP must be installed 9. in ceilings, whereas _______________-grade UTP is often used to connect one floor to another vertically in a building.

The twisting of the cables in UTP and STP 10. reduces _______________.

Multiple-Choice Quiz ■

Which of the following are standard network 1. topologies? (Select three.)

BusA.

StarB.

RingC.

Dual-ringD.

John was carrying on at the water cooler the 2. other day, trying to show off his knowledge of networking. He claimed that the company had installed special cabling to handle the problems of crosstalk on the network. What kind of cabling did the company install?

CoaxialA.

Shielded coaxialB.

Unshielded twisted pairC.

Fiber-opticD.

Jill needs to run some UTP cable from one 3. office to another. She found a box of cable in the closet and wants to make sure it’s CAT 5 or better. How can she tell the CAT level of the cable? (Select two.)

Check the box.A.

Scan for markings on the cable.B.

Check the color of the cable—gray means C. CAT 5, yellow means CAT 6e, and so on.

Check the ends of the cable.D.

What topology provides the most fault 4. tolerance?

BusA.

RingB.

Star-busC.

MeshD.

What organization is responsible for 5. establishing and promoting networking standards?

Institute of Electrical and Electronics A. Engineers (IEEE)

International Networking Standards B. Organization (INSO)

Federal Communications Commission C. (FCC)

International Telecommunications D. Association (ITA)

What aspects of network cabling do the IEEE 6. committees establish? (Select three.)

Frame sizeA.

SpeedB.

Color of sheathingC.

Cable typesD.

BaseTech

63 Chapter 3: Cabling and Topology

What types of coax cabling have been used in 7. computer networking? (Select three.)

RG-8A.

RG-45B.

RG-58C.

RG-62D.

What applications are best suited for fiber-8. optic cabling? (Select two.)

Short distancesA.

Wireless networksB.

High-EMI areasC.

Long distancesD.

What are the main components of fiber-optic 9. cabling? (Select three.)

CladdingA.

Insulating jacketB.

Copper coreC.

FiberD.

What is the most popular size fiber-optic 10. cabling?

62.5/125 µmA.

125/62.5 µmB.

50/125 µmC.

125/50 µmD.

Most fiber-optic installations use LEDs to send 11. light signals and are known as what?

Single-modeA.

MultimodeB.

Complex modeC.

Duplex modeD.

Why must the main cable in a bus topology be 12. terminated at both ends?

To allow the signal to be amplified so it can A. reach both ends of the network

To prevent the signal from dropping off the B. network before reaching all computers

To prevent the signal from bouncing back C. and forth

To convert the signal to the proper format D. for a bus network

Where are you most likely to encounter a mesh 13. network?

On any network using fiber-optic cableA.

On any network using plenum cableB.

On wireless networksC.

On wired networksD.

You are asked by your boss to research 14. upgrading all the network cable in your office building. The building manager requires the safest possible cabling type in case of fire, and your boss wants to future- proof the network so cabling doesn’t need to be replaced when network technologies faster than 1 Gbps are available. You decide to use CAT 5e plenum cabling throughout the building. Which objective have you satisfied?

Neither the building manager’s nor your A. boss’s requirements have been met.

Only the building manager’s requirement B. has been met.

Only your boss’s requirement has C. been met.

Both the building manager’s and your D. boss’s requirements have been met.

Which committee is responsible for wireless 15. networking standards?

IEEE 802.2A.

IEEE 802.3B.

IEEE 802.5C.

IEEE 802.11D.

64 Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 3

Lab Project 3.1 •

Lab ProjectsLab Projects

This lab project requires you to demonstrate knowledge of the four basic network topologies. Obtain four blank pieces of paper. Proceed to draw six boxes on each page to represent six computers—neatness counts!

At the top of each sheet, write one of the following: bus topology, mesh topology, ring topology, or star topology. Then draw lines to represent the physical network cabling required by each network topology.

Lab Project 3.2 •

In your studies of network cabling for the CompTIA Network+ certification exam, you realize you could use a simplified chart to study from and memorize. Build a reference study chart that describes the features of

network cabling. Create your completed chart using a spreadsheet program, or simply a sheet of paper, with the column headings and names shown in the following table. If you wish, you can start by writing your notes here.

Essay Quiz ■ You work in the computer training department 1. at your company. A newly developed mobile training program is being planned. The plan requires setting up five training computers in a particular department you use to train on weekly. Write a short essay that describes which network topology would be quickest to set up and tear down for this type of onsite training.

Your boss has decided to have cable run to 2. every computer in the office, but doesn’t know which type to use. In an effort to help bring the company into the 21st century, write a short

essay comparing the merits of UTP and fiber- optic cabling.

The NICs on your company’s computers all 3. have dual 10-Mbps and 100-Mbps capability, yet users complain that the network is slow. Write a brief essay that explains what could be the cause of the problem.

Your company has hired a group of new 4. network techs, and you’ve been tasked to do their training session on networking standards organizations. Write a brief essay detailing the IEEE and its various committees.

BaseTech

65 Chapter 3: Cabling and Topology

Cable Type Description Benefits Drawbacks

CAT 5

CAT 5e

CAT 6

Fiber-optic

Lab Project 3.3 •

In this lab project, you will demonstrate knowledge of the different IEEE committees that are most prevalent today. Use the Internet to research each of these subcommittees:

IEEE 802.3, IEEE 802.5, and IEEE 802.11. Give an example of where each type of technology might best be used.

4 chapter

66

/ Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Third Edition / Meyers / 911-1 / Chapter 4

Ethernet Basics

“In theory there is no difference

between theory and practice. In

practice there is.”

—Yogi Berra

In this chapter, you will learn how to

Define and describe Ethernet■■

Explain early Ethernet ■■ implementations

Describe ways to extend and ■■ enhance Ethernet networks

In the beginning, there were no networks. Computers were isolated, solitary islands of information in a teeming sea of proto-geeks who used clubs and wore fur pocket protectors. Okay, maybe it wasn’t that bad, but if you wanted to

move a file from one machine to another—and proto-geeks were as much into

that as modern geeks—you had to use Sneakernet, which meant you saved the

file on a disk, laced up your tennis shoes, and hiked over to the other system.

All that walking no doubt produced lots of health benefits, but frankly, proto-

geeks weren’t all that into health benefits—they were into speed, power, and

technological coolness in general. (Sound familiar?) It’s no wonder, then, that

geeks everywhere agreed on the need to replace Sneakernet with a faster and

more efficient method of sharing data. The method they came up with is the

subject of this chapter.

Categories
coursework help dissertation proposal help help me write my essay pay for essay professional essay writers

which of the following is not an example of plagiarism

Which of the following is not an example of plagiarism?

Cheating••

Stealing

Copying without providing sources

Quoting with source

Correct me

0 1 1,045
asked by Tula
May 8, 2016
No. You’re wrong on this one.

0 0
posted by Reed
May 8, 2016
How about D??

0 0
posted by Tula
May 8, 2016
D is correct. It’s fine to quote with attribution (citation). Plagiarism IS cheating.

1 0
posted by Reed
May 8, 2016
D
A
D
these are the correct answers, will yield 100%.

21 0
posted by 雨
May 9, 2017

D
A
D
these are the correct answers!!!

11 0
posted by SpeedyFastBoiiiii
Oct 11, 2017
Yes for me it was 1.D, 2.A, 3.D.

6 0
posted by Nevaeh & Carmen
Apr 24, 2018
finally, DAD gave us the answers

7 0
posted by PurpleGwen
May 1, 2018
Thank you, Rain.

1 0
posted by 柔
May 1, 2018
they are right D A D

3 0
posted by your dad
Feb 20, 2019

It spells DaD

2 0
posted by Sugar cream pie
Mar 14, 2019
GOOD JOB SON!

3 0
posted by DAD
Mar 28, 2019
LOL

1 0
posted by LOL
Apr 11, 2019
Ur epic dad

0 0
posted by Anonymous
Apr 16, 2019
I hate you dad, why did you have to help me with this?? Yes you did! YOUR NAME IS WRITTEN ALL OVER IT!!!!

0 0
posted by Death
Apr 18, 2019

I DID BECAUSE U NOT MY SUN AND MY SUN IS STOOPID AND U R NOT SO I HELP U

0 0
posted by DAD
Apr 18, 2019
LOL

0 0
posted by Death
Apr 18, 2019

Categories
essay writing service how to write an admission essay professional essay writers

attendance at​ orlando’s newest disneylike​ attraction, lego​ world, has been as​ follows:

ISBN-13: 978-0-13-413042-2 ISBN-10: 0-13-413042-1

9 780134 130422

9 0 0 0 0

OPER ATIONS MANAGEMENT Sustainability and Supply Chain Management

TWELFTH EDITION

O PER

A T

IO N

S M A

N A

G E

M E

N T

Su stain

ability an d

Su p

ply C h

ain M

an agem

en t

TWELFTH EDITION

JAY HEIZER | BARRY RENDER | CHUCK MUNSON

HEIZER RENDER MUNSON

www.pearsonhighered.com

IMPROVING RESULTS A proven way to help individual students achieve

the goals that educators set for their course.

ENGAGING EXPERIENCES Dynamic, engaging experiences that personalize and

activate learning for each student.

AN EXPERIENCED PARTNER From Pearson, a long-term partner with a true grasp

of the subject, excellent content, and an eye on the future of education.

Pearson’s MyLab™

O P E R A T I O N S MANAGEMENT Sustainability and Supply Chain Management

A01_HEIZ0422_12_SE_FM.indd iA01_HEIZ0422_12_SE_FM.indd i 29/12/15 4:08 pm29/12/15 4:08 pm

561590_MILL_MICRO_FM_ppi-xxvi.indd 2 24/11/14 5:26 PM

This page intentionally left blank

T W E L F T H E D I T I O N

O P E R A T I O N S MANAGEMENT Sustainability and Supply Chain Management

HEIZER J A Y

RENDER B A R R Y

Jesse H. Jones Professor of Business Administration Texas Lutheran University

Charles Harwood Professor of Operations Management Graduate School of Business Rollins College

Boston Columbus Indianapolis New York San Francisco Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto

Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

C H U C K

MUNSON Professor of Operations Management Carson College of Business Washington State University

A01_HEIZ0422_12_SE_FM.indd iiiA01_HEIZ0422_12_SE_FM.indd iii 29/12/15 4:08 pm29/12/15 4:08 pm

Vice President, Business Publishing: Donna Battista Editor-in-Chief: Stephanie Wall Acquisitions Editor: Daniel Tylman Editorial Assistant: Linda Albelli Vice President, Product Marketing: Maggie Moylan Director of Marketing, Digital Services and Products:

Jeanette Koskinas Field Marketing Manager: Lenny Ann Kucenski Product Marketing Assistant: Jessica Quazza Team Lead, Program Management: Ashley Santora Program Manager: Claudia Fernandes Team Lead, Project Management: Jeff Holcomb Senior Project Manager: Jacqueline A. Martin Operations Specialist: Carol Melville Creative Director: Blair Brown Art Director: Janet Slowik

Vice President, Director of Digital Strategy and Assessment: Paul Gentile

Manager of Learning Applications: Paul DeLuca Director, Digital Studio: Sacha Laustsen Digital Studio Manager: Diane Lombardo Digital Studio Project Manager: Andra Skaalrud Digital Studio Project Manager: Regina DaSilva Digital Studio Project Manager: Alana Coles Digital Studio Project Manager: Robin Lazrus Digital Content Project Lead: Courtney Kamauf Full-Service Project Management and Composition:

Cenveo® Publisher Services Interior and Cover Designer: Cenveo® Publisher Services Cover Photos: Alaska Airlines Printer/Binder: Courier Kendallville Cover Printer: Phoenix Color/Hagerstown

Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services.

The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.

Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.

Copyright © 2017, 2014, 2011 by Pearson Education, Inc. or its affiliates. All Rights Reserved. Manufactured in the United States of America. This publication is protected by copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights and Permissions department, please visit www.pearsoned.com/permissions/ .

Acknowledgments of third-party content appear on the appropriate page within the text.

PEARSON, ALWAYS LEARNING, and MYOMLABTM are exclusive trademarks owned by Pearson Education, Inc. or its affiliates in the U.S. and/or other countries.

Unless otherwise indicated herein, any third-party trademarks, logos, or icons that may appear in this work are the property of their respective owners, and any references to third-party trademarks, logos, icons, or other trade dress are for demonstrative or descriptive purposes only. Such references are not intended to imply any sponsorship, endorsement, authorization, or promotion of Pearson’s products by the owners of such marks, or any relationship between the owner and Pearson Education, Inc., or its affiliates, authors, licensees, or distributors.

Library of Congress Cataloging-in-Publication Data

Heizer, Jay. [Production and operations management] Operations management; sustainability and supply chain management / Jay Heizer, Jesse H. Jones Professor of Business Administration, Texas Lutheran University, Barry Render, Charles Harwood Professor of Operations Management, Crummer Graduate School of Business, Rollins College, Chuck Munson, Professor of Operations Management, Carson College of Business, Washington State University. — Twelfth edition. pages cm Original edition published under the Title: Production and operations management. Includes bibliographical references and index. ISBN 978-0-13-413042-2 — ISBN 0-13-413042-1 1. Production management. I. Render, Barry. II. Munson, Chuck. III. Title. TS155.H3725 2015 658.5–dc23 2015036857

10 9 8 7 6 5 4 3 2 1

ISBN 10: 0-13-413042-1

ISBN 13: 978-0-13-413042-2

A01_HEIZ0422_12_SE_FM.indd ivA01_HEIZ0422_12_SE_FM.indd iv 29/12/15 4:08 pm29/12/15 4:08 pmhttp://www.pearsoned.com/permissions/

To Karen Heizer Herrmann, all a sister could ever be

To Donna, Charlie, and Jesse

J.H.

B.R.

To Kim, Christopher, and Mark Munson for their unwavering support, and to Bentonville High School teachers Velma Reed and Cheryl Gregory,

who instilled in me the importance of detail and a love of learning C.M.

A01_HEIZ0422_12_SE_FM.indd vA01_HEIZ0422_12_SE_FM.indd v 29/12/15 4:08 pm29/12/15 4:08 pm

ABOUT THE A U T H O R S

JAY HEIZER

BARRY RENDER

Professor Emeritus, the Jesse H. Jones Chair of Business Administration, Texas Lutheran University, Seguin, Texas. He received his B.B.A. and M.B.A. from the University of North Texas and his Ph.D. in Management and Statistics from Arizona State University. He was previously a member of the faculty at the University of Memphis, the University of Oklahoma, Virginia Commonwealth University, and the University of Richmond. He has also held visiting positions at Boston University, George Mason University, the Czech Management Center, and the Otto-Von-Guericke University, Magdeburg.

Dr. Heizer’s industrial experience is extensive. He learned the practical side of operations management as a machinist apprentice at Foringer and Company, as a production planner for Westinghouse Airbrake, and at General Dynamics, where he worked in engineering administration. In addition, he has been actively involved in consulting in the OM and MIS areas for a variety of organizations, includ- ing Philip Morris, Firestone, Dixie Container Corporation, Columbia Industries, and Tenneco. He holds the CPIM certification from APICS—the Association for Operations Management.

Professor Heizer has co-authored 5 books and has published more than 30 arti- cles on a variety of management topics. His papers have appeared in the Academy of Management Journal , Journal of Purchasing , Personnel Psychology , Production & Inventory Control Management , APICS—The Performance Advantage , Journal of Management History , IIE Solutions, and Engineering Management , among others. He has taught operations management courses in undergraduate, graduate, and executive programs.

Professor Emeritus, the Charles Harwood Professor of Operations Management, Crummer Graduate School of Business, Rollins College, Winter Park, Florida. He received his B.S. in Mathematics and Physics at Roosevelt University, and his M.S. in Operations Research and Ph.D. in Quantitative Analysis at the University of Cincinnati. He previously taught at George Washington University, University of New Orleans, Boston University, and George Mason University, where he held the Mason Foundation Professorship in Decision Sciences and was Chair of the Decision Sciences Department. Dr. Render has also worked in the aerospace indus- try for General Electric, McDonnell Douglas, and NASA.

Professor Render has co-authored 10 textbooks for Pearson, including Managerial Decision Modeling with Spreadsheets , Quantitative Analysis for Management , Service Management , Introduction to Management Science , and Cases and Readings in Management Science . Quantitative Analysis for Management, now in its 13th edition, is a leading text in that discipline in the United States and globally. Dr.  Render’s more than 100 articles on a variety of management topics have appeared in Decision Sciences , Production and Operations Management , Interfaces , Information and Management , Journal of Management Information Systems , Socio-Economic Planning Sciences , IIE Solutions , and Operations Management Review , among others.

Dr. Render has been honored as an AACSB Fellow and was twice named a Senior Fulbright Scholar. He was Vice President of the Decision Science Institute Southeast Region and served as Software Review Editor for Decision Line for six years and as Editor of the New York Times Operations Management special issues for five years. For nine years, Dr. Render was President of Management Service Associates of Virginia, Inc., whose technology clients included the FBI, NASA, the U.S. Navy, Fairfax County, Virginia, and C&P Telephone. He is currently Consulting Editor to Pearson Press .

Dr. Render has received Rollins College’s Welsh Award as leading Professor and was selected by Roosevelt University as the recipient of the St. Claire Drake Award for Outstanding Scholarship. Dr. Render also received the Rollins College MBA Student Award for Best Overall Course, and was named Professor of the Year by full-time MBA students.

vi

A01_HEIZ0422_12_SE_FM.indd viA01_HEIZ0422_12_SE_FM.indd vi 29/12/15 4:08 pm29/12/15 4:08 pm

Professor of Operations Management, Carson College of Business, Washington State University, Pullman, Washington. He received his BSBA summa cum laude in finance, along with his MSBA and Ph.D. in operations management, from Washington University in St. Louis. For two years, he served as Associate Dean for Graduate Programs in Business at Washington State. He also worked for three years as a financial analyst for Contel Telephone Corporation.

Professor Munson serves as a senior editor for Production and Operations Management , and he serves on the editorial review board of four other journals . He has published more than 25 articles in such journals as Production and Operations Management , IIE Transactions, Decision Sciences , Naval Research Logistics , European Journal of Operational Research , Journal of the Operational Research Society , and Annals of Operations Research. He is editor of the book The Supply Chain Management Casebook: Comprehensive Coverage and Best Practices in SCM , and he has co-authored the research monograph Quantity Discounts: An Overview and Practical Guide for Buyers and Sellers . He is also coauthor of Managerial Decision Modeling with Spreadsheets (4th edition), published by Pearson.

Dr. Munson has taught operations management core and elective courses at the undergraduate, MBA, and Ph.D. levels at Washington State University. He has also conducted several teaching workshops at international conferences and for Ph.D. students at Washington State University. His major awards include being a Founding Board Member of the Washington State University President’s Teaching Academy (2004); winning the WSU College of Business Outstanding Teaching Award (2001 and 2015), Research Award (2004), and Service Award (2009 and 2013); and being named the WSU MBA Professor of the Year (2000 and 2008).

CHUCK MUNSON

ABOUT THE AUTHORS vii

A01_HEIZ0422_12_SE_FM.indd viiA01_HEIZ0422_12_SE_FM.indd vii 29/12/15 4:08 pm29/12/15 4:08 pm

561590_MILL_MICRO_FM_ppi-xxvi.indd 2 24/11/14 5:26 PM

This page intentionally left blank

PART ONE Introduction to Operations Management 1

Chapter 1 Operations and Productivity 1 Chapter 2 Operations Strategy in a Global Environment 29 Chapter 3 Project Management 59 Chapter 4 Forecasting 105

PART TWO Designing Operations 159

Chapter 5 Design of Goods and Services 159 ◆ Supplement 5 Sustainability in the Supply Chain 193

Chapter 6 Managing Quality 213 ◆ Supplement 6 Statistical Process Control 245

Chapter 7 Process Strategy 279 ◆ Supplement 7 Capacity and Constraint Management 307

Chapter 8 Location Strategies 337 Chapter 9 Layout Strategies 367 Chapter 10 Human Resources, Job Design, and Work Measurement 407

PART THREE Managing Operations 441

Chapter 11 Supply Chain Management 441 ◆ Supplement 11 Supply Chain Management Analytics 471

Chapter 12 Inventory Management 487 Chapter 13 Aggregate Planning and S&OP 529 Chapter 14 Material Requirements Planning (MRP) and ERP 563 Chapter 15 Short-Term Scheduling 599 Chapter 16 Lean Operations 635 Chapter 17 Maintenance and Reliability 659

PART FOUR Business Analytics Modules 677

Module A Decision-Making Tools 677 Module B Linear Programming 699 Module C Transportation Models 729 Module D Waiting-Line Models 747 Module E Learning Curves 775 Module F Simulation 791

ONLINE TUTORIALS

1. Statistical Tools for Managers T1-1 2. Acceptance Sampling T2-1 3. The Simplex Method of Linear Programming T3-1 4. The MODI and VAM Methods of Solving Transportation Problems T4-1 5. Vehicle Routing and Scheduling T5-1

Brief Table of Contents

ix

A01_HEIZ0422_12_SE_FM.indd ixA01_HEIZ0422_12_SE_FM.indd ix 29/12/15 4:08 pm29/12/15 4:08 pm

561590_MILL_MICRO_FM_ppi-xxvi.indd 2 24/11/14 5:26 PM

This page intentionally left blank

Table of Contents

About the Authors vi Preface xxiii

Chapter 1 Operations and Productivity 1

GLOBAL COMPANY PROFILE: HARD ROCK CAFE 2 What Is Operations Management? 4 Organizing to Produce Goods and Services 4 The Supply Chain 6 Why Study OM? 6 What Operations Managers Do 7 The Heritage of Operations Management 8 Operations for Goods and Services 11

Growth of Services 11

Service Pay 12

The Productivity Challenge 13 Productivity Measurement 14

Productivity Variables 15

Productivity and the Service Sector 17

Current Challenges in Operations Management 18 Ethics, Social Responsibility, and Sustainability 19 Summary 20 Key Terms 20 Ethical Dilemma 20 Discussion Questions 20 Using Software for Productivity Analysis 21 Solved Problems 21 Problems 22 CASE STUDIES 24

Uber Technologies, Inc. 24

Frito-Lay: Operations Management in Manufacturing Video Case 25

Hard Rock Cafe: Operations Management in Services Video Case 25

Endnotes 26 Rapid Review 27 Self Test 28

Chapter 2 Operations Strategy in a Global Environment 29

GLOBAL COMPANY PROFILE: BOEING 30 A Global View of Operations and Supply

Chains 32 Cultural and Ethical Issues 35

Developing Missions and Strategies 35 Mission 36

Strategy 36

Achieving Competitive Advantage Through Operations 36 Competing on Diff erentiation 37

Competing on Cost 38

Competing on Response 39

Issues in Operations Strategy 40 Strategy Development and Implementation 41

Key Success Factors and Core Competencies 41

Integrating OM with Other Activities 43

Building and Staffi ng the Organization 43

Implementing the 10 Strategic OM Decisions 44

Strategic Planning, Core Competencies, and Outsourcing 44 The Theory of Comparative Advantage 46

Risks of Outsourcing 46

Rating Outsource Providers 47

Global Operations Strategy Options 49 Summary 50 Key Terms 50 Ethical Dilemma 51 Discussion Questions 51 Using Software to Solve Outsourcing

Problems 51 Solved Problems 52 Problems 53 CASE STUDIES 55

Rapid-Lube 55

Strategy at Regal Marine Video Case 55

Hard Rock Cafe’s Global Strategy Video Case 55

Outsourcing Off shore at Darden Video Case 56

Endnotes 56 Rapid Review 57 Self Test 58

Chapter 3 Project Management 59

GLOBAL COMPANY PROFILE: BECHTEL GROUP 60 The Importance of Project Management 62

PART ONE Introduction to Operations Management 1

xi

A01_HEIZ0422_12_SE_FM.indd xiA01_HEIZ0422_12_SE_FM.indd xi 29/12/15 4:08 pm29/12/15 4:08 pm

xii TABLE OF CONTENTS

Project Planning 62 The Project Manager 63

Work Breakdown Structure 64

Project Scheduling 65 Project Controlling 66 Project Management Techniques: PERT and CPM 67

The Framework of PERT and CPM 67

Network Diagrams and Approaches 68

Activity-on-Node Example 69

Activity-on-Arrow Example 71

Determining the Project Schedule 71 Forward Pass 72

Backward Pass 74

Calculating Slack Time and Identifying the Critical Path(s) 75

Variability in Activity Times 77 Three Time Estimates in PERT 77

Probability of Project Completion 79

Cost-Time Trade-Off s and Project Crashing 82 A Critique of PERT and CPM 85 Using Microsoft Project to Manage Projects 86 Summary 88 Key Terms 88 Ethical Dilemma 89 Discussion Questions 89 Using Software to Solve Project Management

Problems 89 Solved Problems 90 Problems 93 CASE STUDIES 98

Southwestern University: (A) 98

Project Management at Arnold Palmer Hospital Video Case 99

Managing Hard Rock’s Rockfest Video Case 100

Endnotes 102 Rapid Review 103 Self Test 104

Chapter 4 Forecasting 105

GLOBAL COMPANY PROFILE: WALT DISNEY PARKS & RESORTS 106

What is Forecasting? 108 Forecasting Time Horizons 108

Types of Forecasts 109

The Strategic Importance of Forecasting 109 Supply-Chain Management 109

Human Resources 110

Capacity 110

Seven Steps in the Forecasting System 110 Forecasting Approaches 111

Overview of Qualitative Method 111

Overview of Quantitative Methods 112

Time-Series Forecasting 112 Decomposition of a Time Series 112

Naive Approach 113

Moving Averages 114

Exponential Smoothing 116

Measuring Forecast Error 117

Exponential Smoothing with Trend Adjustment 120

Trend Projections 124

Seasonal Variations in Data 126

Cyclical Variations in Data 131

Associative Forecasting Methods: Regression and Correlation Analysis 131 Using Regression Analysis for Forecasting 131

Standard Error of the Estimate 133

Correlation Coeffi cients for Regression Lines 134

Multiple-Regression Analysis 136

Monitoring and Controlling Forecasts 138 Adaptive Smoothing 139

Focus Forecasting 139

Forecasting in the Service Sector 140 Summary 141 Key Terms 141 Ethical Dilemma 141 Discussion Questions 142 Using Software in Forecasting 142 Solved Problems 144 Problems 146 CASE STUDIES 153

Southwestern University: (B) 153

Forecasting Ticket Revenue for Orlando Magic Basketball Games Video Case 154

Forecasting at Hard Rock Cafe Video Case 155

Endnotes 156 Rapid Review 157 Self Test 158

PART TWO Designing Operations 159

Chapter 5 Design of Goods and Services 159

GLOBAL COMPANY PROFILE: REGAL MARINE 160 Goods and Services Selection 162

Product Strategy Options Support Competitive Advantage 163

Product Life Cycles 164

Life Cycle and Strategy 164

A01_HEIZ0422_12_SE_FM.indd xiiA01_HEIZ0422_12_SE_FM.indd xii 29/12/15 4:08 pm29/12/15 4:08 pm

TABLE OF CONTENTS xiii

Product-by-Value Analysis 165

Generating New Products 165 Product Development 166

Product Development System 166

Quality Function Deployment (QFD) 166

Organizing for Product Development 169

Manufacturability and Value Engineering 170

Issues for Product Design 171 Robust Design 171

Modular Design 171

Computer-Aided Design (CAD) and Computer-Aided Manufacturing (CAM) 171

Virtual Reality Technology 172

Value Analysis 173

Sustainability and Life Cycle Assessment (LCA) 173

Product Development Continuum 173 Purchasing Technology by Acquiring a Firm 174

Joint Ventures 174

Alliances 175

Defi ning a Product 175 Make-or-Buy Decisions 176

Group Technology 177

Documents for Production 178 Product Life-Cycle Management (PLM) 178

Service Design 179 Process–Chain–Network (PCN) Analysis 179

Adding Service Effi ciency 181

Documents for Services 181

Application of Decision Trees to Product Design 182

Transition to Production 184 Summary 184 Key Terms 185 Ethical Dilemma 185 Discussion Questions 185 Solved Problem 186 Problems 186 CASE STUDIES 189

De Mar’s Product Strategy 189

Product Design at Regal Marine Video Case 189

Endnotes 190 Rapid Review 191 Self Test 192

Supplement 5 Sustainability in the Supply Chain 193

Corporate Social Responsibility 194 Sustainability 195

Systems View 195

Commons 195

Triple Bottom Line 195

Design and Production for Sustainability 198 Product Design 198

Production Process 200

Logistics 200

End-of-Life Phase 203

Regulations and Industry Standards 203 International Environmental Policies and Standards 204

Summary 205 Key Terms 205 Discussion Questions 205 Solved Problems 206 Problems 207 CASE STUDIES 208

Building Sustainability at the Orlando Magic’s Amway Center Video Case 208

Green Manufacturing and Sustainability at Frito-Lay Video Case 209

Endnotes 210 Rapid Review 211 Self Test 212

Chapter 6 Managing Quality 213

GLOBAL COMPANY PROFILE: ARNOLD PALMER HOSPITAL 214

Quality and Strategy 216 Defi ning Quality 217

Implications of Quality 217

Malcolm Baldrige National Quality Award 218

ISO 9000 International Quality Standards 218

Cost of Quality (COQ) 218

Ethics and Quality Management 219

Total Quality Management 219 Continuous Improvement 220

Six Sigma 221

Employee Empowerment 222

Benchmarking 222

Just-in-Time (JIT) 224

Taguchi Concepts 224

Knowledge of TQM Tools 225

Tools of TQM 226 Check Sheets 226

Scatter Diagrams 227

Cause-and-Eff ect Diagrams 227

Pareto Charts 227

Flowcharts 228

Histograms 229

Statistical Process Control (SPC) 229

The Role of Inspection 230 When and Where to Inspect 230

Source Inspection 231

A01_HEIZ0422_12_SE_FM.indd xiiiA01_HEIZ0422_12_SE_FM.indd xiii 29/12/15 4:08 pm29/12/15 4:08 pm

xiv TABLE OF CONTENTS

Service Industry Inspection 232

Inspection of Attributes versus Variables 233

TQM in Services 233 Summary 235 Key Terms 235 Ethical Dilemma 235 Discussion Questions 236 Solved Problems 236 Problems 237 CASE STUDIES 239

Southwestern University: (C) 239

The Culture of Quality at Arnold Palmer Hospital Video Case 240

Quality Counts at Alaska Airlines Video Case 240

Quality at the Ritz-Carlton Hotel Company Video Case 242

Endnotes 242 Rapid Review 243 Self Test 244

Supplement 6 Statistical Process Control 245

Statistical Process Control (SPC) 246 Control Charts for Variables 248

The Central Limit Theorem 248

Setting Mean Chart Limits ( x -Charts) 250

Setting Range Chart Limits ( R-Charts) 253

Using Mean and Range Charts 254

Control Charts for Attributes 256

Managerial Issues and Control Charts 259

Process Capability 260 Process Capability Ratio ( C p ) 260

Process Capability Index ( C pk ) 261

Acceptance Sampling 262 Operating Characteristic Curve 263

Average Outgoing Quality 264

Summary 265 Key Terms 265 Discussion Questions 265 Using Software for SPC 266 Solved Problems 267 Problems 269 CASE STUDIES 274

Bayfi eld Mud Company 274

Frito-Lay’s Quality-Controlled Potato Chips Video Case 275

Farm to Fork: Quality at Darden Restaurants Video Case 276

Endnotes 276 Rapid Review 277 Self Test 278

Chapter 7 Process Strategy 279

GLOBAL COMPANY PROFILE: HARLEY-DAVIDSON 280 Four Process Strategies 282

Process Focus 282

Repetitive Focus 283

Product Focus 284

Mass Customization Focus 284

Process Comparison 286

Selection of Equipment 288 Process Analysis and Design 288

Flowchart 289

Time-Function Mapping 289

Process Charts 289

Value-Stream Mapping 290

Service Blueprinting 292

Special Considerations for Service Process Design 293

Production Technology 294 Machine Technology 294

Automatic Identifi cation Systems (AISs) and RFID 295

Process Control 295

Vision Systems 296

Robots 296

Automated Storage and Retrieval Systems (ASRSs) 296

Automated Guided Vehicles (AGVs) 296

Flexible Manufacturing Systems (FMSs) 297

Computer-Integrated Manufacturing (CIM) 297

Technology in Services 298 Process Redesign 298 Summary 299 Key Terms 299 Ethical Dilemma 300 Discussion Questions 300 Solved Problem 300 Problems 301 CASE STUDIES 302

Rochester Manufacturing’s Process Decision 302

Process Strategy at Wheeled Coach Video Case 302

Alaska Airlines: 20-Minute Baggage Process— Guaranteed! Video Case 303

Process Analysis at Arnold Palmer Hospital Video Case 304

Endnotes 304 Rapid Review 305 Self Test 306

Supplement 7 Capacity and Constraint Management 307

Capacity 308 Design and Eff ective Capacity 309

A01_HEIZ0422_12_SE_FM.indd xivA01_HEIZ0422_12_SE_FM.indd xiv 29/12/15 4:08 pm29/12/15 4:08 pm

TABLE OF CONTENTS xv

Capacity and Strategy 311

Capacity Considerations 311

Managing Demand 312

Service-Sector Demand and Capacity Management 313

Bottleneck Analysis and the Theory of Constraints 314 Theory of Constraints 317

Bottleneck Management 317

Break-Even Analysis 318 Single-Product Case 319

Multiproduct Case 320

Reducing Risk with Incremental Changes 322 Applying Expected Monetary Value (EMV)

to Capacity Decisions 323 Applying Investment Analysis to Strategy-Driven

Investments 324 Investment, Variable Cost, and Cash Flow 324

Net Present Value 324

Summary 326 Key Terms 327 Discussion Questions 327 Using Software for Break-Even Analysis 327 Solved Problems 328 Problems 330 CASE STUDY 333

Capacity Planning at Arnold Palmer Hospital Video Case 333

Endnote 334 Rapid Review 335 Self Test 336

Chapter 8 Location Strategies 337

GLOBAL COMPANY PROFILE: FEDEX 338 The Strategic Importance of Location 340 Factors That Aff ect Location Decisions 341

Labor Productivity 342

Exchange Rates and Currency Risk 342

Costs 342

Political Risk, Values, and Culture 343

Proximity to Markets 343

Proximity to Suppliers 344

Proximity to Competitors (Clustering) 344

Methods of Evaluating Location Alternatives 344 The Factor-Rating Method 345

Locational Cost–Volume Analysis 346

Center-of-Gravity Method 348

Transportation Model 349

Service Location Strategy 350 Geographic Information Systems 351 Summary 353

Key Terms 353 Ethical Dilemma 354 Discussion Questions 354 Using Software to Solve Location Problems 354 Solved Problems 355 Problems 357 CASE STUDIES 362

Southern Recreational Vehicle Company 362

Locating the Next Red Lobster Restaurant Video Case 362

Where to Place the Hard Rock Cafe Video Case 363

Endnote 364 Rapid Review 365 Self Test 366

Chapter 9 Layout Strategies 367

GLOBAL COMPANY PROFILE: McDONALD’S 368 The Strategic Importance of Layout Decisions 370 Types of Layout 370 Offi ce Layout 371 Retail Layout 372

Servicescapes 375

Warehouse and Storage Layouts 375 Cross-Docking 376

Random Stocking 377

Customizing 377

Fixed-Position Layout 377 Process-Oriented Layout 378

Computer Software for Process-Oriented Layouts 382

Work Cells 383 Requirements of Work Cells 383

Staffi ng and Balancing Work Cells 384

The Focused Work Center and the Focused Factory 386

Repetitive and Product-Oriented Layout 386 Assembly-Line Balancing 387

Summary 392 Key Terms 392 Ethical Dilemma 392 Discussion Questions 392 Using Software to Solve Layout Problems 393 Solved Problems 394 Problems 396 CASE STUDIES 402

State Automobile License Renewals 402

Laying Out Arnold Palmer Hospital’s New Facility Video Case 402

Facility Layout at Wheeled Coach Video Case 404

Endnotes 404 Rapid Review 405 Self Test 406

A01_HEIZ0422_12_SE_FM.indd xvA01_HEIZ0422_12_SE_FM.indd xv 29/12/15 4:08 pm29/12/15 4:08 pm

xvi TABLE OF CONTENTS

Chapter 10 Human Resources, Job Design, and Work Measurement 407

GLOBAL COMPANY PROFILE: RUSTY WALLACE’S NASCAR RACING TEAM 408

Human Resource Strategy for Competitive Advantage 410 Constraints on Human Resource Strategy 410

Labor Planning 411 Employment-Stability Policies 411

Work Schedules 411

Job Classifi cations and Work Rules 412

Job Design 412 Labor Specialization 412

Job Expansion 413

Psychological Components of Job Design 413

Self-Directed Teams 414

Motivation and Incentive Systems 415

Ergonomics and the Work Environment 415 Methods Analysis 417 The Visual Workplace 420 Labor Standards 420

Historical Experience 421

Time Studies 421

Predetermined Time Standards 425

Work Sampling 427

Ethics 430 Summary 430 Key Terms 430 Ethical Dilemma 431 Discussion Questions 431 Solved Problems 432 Problems 434 CASE STUDIES 437

Jackson Manufacturing Company 437

The “People” Focus: Human Resources at Alaska Airlines Video Case 437

Hard Rock’s Human Resource Strategy Video Case 438

Endnotes 438 Rapid Review 439 Self Test 440

PART THREE Managing Operations 441

Chapter 11 Supply Chain Management 441

GLOBAL COMPANY PROFILE: DARDEN RESTAURANTS 442 The Supply Chain’s Strategic Importance 444 Sourcing Issues: Make-or-Buy and

Outsourcing 446 Make-or-Buy Decisions 447

Outsourcing 447

Six Sourcing Strategies 447 Many Suppliers 447

Few Suppliers 447

Vertical Integration 448

Joint Ventures 448

Keiretsu Networks 448

Virtual Companies 449

Supply Chain Risk 449 Risks and Mitigation Tactics 450

Security and JIT 451

Managing the Integrated Supply Chain 451 Issues in Managing the Integrated Supply Chain 451

Opportunities in Managing the Integrated Supply Chain 452

Building the Supply Base 454 Supplier Evaluation 454

Supplier Development 454

Negotiations 455

Contracting 455

Centralized Purchasing 455

E-Procurement 456

Logistics Management 456 Shipping Systems 456

Warehousing 457

Third-Party Logistics (3PL) 458

Distribution Management 459 Ethics and Sustainable Supply Chain

Management 460 Supply Chain Management Ethics 460

Establishing Sustainability in Supply Chains 460

Measuring Supply Chain Performance 461 Assets Committed to Inventory 461

Benchmarking the Supply Chain 463

The SCOR Model 463

Summary 464 Key Terms 465 Ethical Dilemma 465 Discussion Questions 465 Solved Problems 465 Problems 466 CASE STUDIES 467

Darden’s Global Supply Chains Video Case 467

A01_HEIZ0422_12_SE_FM.indd xviA01_HEIZ0422_12_SE_FM.indd xvi 29/12/15 4:08 pm29/12/15 4:08 pm

TABLE OF CONTENTS xvii

Supply Chain Management at Regal Marine Video Case 467

Arnold Palmer Hospital’s Supply Chain Video Case 468

Endnote 468 Rapid Review 469 Self Test 470

Supplement 11 Supply Chain Management Analytics 471

Techniques for Evaluating Supply Chains 472 Evaluating Disaster Risk in the Supply Chain 472 Managing the Bullwhip Eff ect 474

A Bullwhip Eff ect Measure 475

Supplier Selection Analysis 476 Transportation Mode Analysis 477 Warehouse Storage 478 Summary 479 Discussion Questions 480 Solved Problems 480 Problems 482 Rapid Review 485 Self Test 486

Chapter 12 Inventory Management 487

GLOBAL COMPANY PROFILE: AMAZON.COM 488 The Importance of Inventory 490

Functions of Inventory 490

Types of Inventory 490

Managing Inventory 491 ABC Analysis 491

Record Accuracy 493

Cycle Counting 493

Control of Service Inventories 494

Inventory Models 495 Independent vs. Dependent Demand 495

Holding, Ordering, and Setup Costs 495

Inventory Models for Independent Demand 496 The Basic Economic Order Quantity (EOQ) Model 496

Minimizing Costs 497

Reorder Points 501

Production Order Quantity Model 502

Quantity Discount Models 505

Probabilistic Models and Safety Stock 508 Other Probabilistic Models 511

Single-Period Model 513 Fixed-Period (P) Systems 514 Summary 515 Key Terms 515 Ethical Dilemma 515

Discussion Questions 515 Using Software to Solve Inventory Problems 516 Solved Problems 517 Problems 520 CASE STUDIES 524

Zhou Bicycle Company 524

Parker Hi-Fi Systems 525

Managing Inventory at Frito-Lay Video Case 525

Inventory Control at Wheeled Coach Video Case 526

Endnotes 526 Rapid Review 527 Self Test 528

Chapter 13 Aggregate Planning and S&OP 529

GLOBAL COMPANY PROFILE: FRITO-LAY 530 The Planning Process 532 Sales and Operations Planning 533 The Nature of Aggregate Planning 534 Aggregate Planning Strategies 535

Capacity Options 535

Demand Options 536

Mixing Options to Develop a Plan 537

Methods for Aggregate Planning 538 Graphical Methods 538

Mathematical Approaches 543

Aggregate Planning in Services 545 Restaurants 546

Hospitals 546

National Chains of Small Service Firms 546

Miscellaneous Services 546

Airline Industry 547

Revenue Management 547 Summary 550 Key Terms 550 Ethical Dilemma 551 Discussion Questions 551 Using Software for Aggregate Planning 552 Solved Problems 554 Problems 555 CASE STUDIES 559

Andrew-Carter, Inc. 559

Using Revenue Management to Set Orlando Magic Ticket Prices Video Case 560

Endnote 560 Rapid Review 561 Self Test 562

Chapter 14 Material Requirements Planning (MRP) and ERP 563

GLOBAL COMPANY PROFILE: WHEELED COACH 564 Dependent Demand 566

A01_HEIZ0422_12_SE_FM.indd xviiA01_HEIZ0422_12_SE_FM.indd xvii 29/12/15 4:08 pm29/12/15 4:08 pm

xviii TABLE OF CONTENTS

Dependent Inventory Model Requirements 566 Master Production Schedule 567

Bills of Material 568

Accurate Inventory Records 570

Purchase Orders Outstanding 570

Lead Times for Components 570

MRP Structure 571 MRP Management 575

MRP Dynamics 575

MRP Limitations 575

Lot-Sizing Techniques 576 Extensions of MRP 580

Material Requirements Planning II (MRP II) 580

Closed-Loop MRP 581

Capacity Planning 581

MRP in Services 583 Distribution Resource Planning (DRP) 584

Enterprise Resource Planning (ERP) 584 ERP in the Service Sector 587

Summary 587 Key Terms 587 Ethical Dilemma 587 Discussion Questions 588 Using Software to Solve MRP Problems 588 Solved Problems 589 Problems 592 CASE STUDIES 595

When 18,500 Orlando Magic Fans Come to Dinner Video Case 595

MRP at Wheeled Coach Video Case 596

Endnotes 596 Rapid Review 597 Self Test 598

Chapter 15 Short-Term Scheduling 599

GLOBAL COMPANY PROFILE: ALASKA AIRLINES 600 The Importance of Short-Term Scheduling 602 Scheduling Issues 602

Forward and Backward Scheduling 603

Finite and Infi nite Loading 604

Scheduling Criteria 604

Scheduling Process-Focused Facilities 605 Loading Jobs 605

Input–Output Control 606

Gantt Charts 607

Assignment Method 608

Sequencing Jobs 611 Priority Rules for Sequencing Jobs 611

Critical Ratio 614

Sequencing N Jobs on Two Machines: Johnson’s Rule 615

Limitations of Rule-Based Sequencing Systems 616

Finite Capacity Scheduling (FCS) 617 Scheduling Services 618

Scheduling Service Employees with Cyclical Scheduling 620

Summary 621 Key Terms 621 Ethical Dilemma 621 Discussion Questions 622 Using Software for Short-Term Scheduling 622 Solved Problems 624 Problems 627 CASE STUDIES 630

Old Oregon Wood Store 630

From the Eagles to the Magic: Converting the Amway Center Video Case 631

Scheduling at Hard Rock Cafe Video Case 632

Endnotes 632 Rapid Review 633 Self Test 634

Chapter 16 Lean Operations 635

GLOBAL COMPANY PROFILE: TOYOTA MOTOR CORPORATION 636

Lean Operations 638 Eliminate Waste 638

Remove Variability 639

Improve Throughput 640

Lean and Just-in-Time 640 Supplier Partnerships 640

Lean Layout 642

Lean Inventory 643

Lean Scheduling 646

Lean Quality 649

Lean and the Toyota Production System 649 Continuous Improvement 649

Respect for People 649

Processes and Standard Work Practice 650

Lean Organizations 650 Building a Lean Organization 650

Lean Sustainability 652

Lean in Services 652 Summary 653 Key Terms 653 Ethical Dilemma 653 Discussion Questions 653 Solved Problem 653 Problems 654

A01_HEIZ0422_12_SE_FM.indd xviiiA01_HEIZ0422_12_SE_FM.indd xviii 29/12/15 4:08 pm29/12/15 4:08 pm

TABLE OF CONTENTS xix

CASE STUDIES 655 Lean Operations at Alaska Airlines Video Case 655

JIT at Arnold Palmer Hospital Video Case 656

Endnote 656 Rapid Review 657 Self Test 658

Chapter 17 Maintenance and Reliability 659

GLOBAL COMPANY PROFILE: ORLANDO UTILITIES COMMISSION 660

The Strategic Importance of Maintenance and Reliability 662

Reliability 663 System Reliability 663

Providing Redundancy 665

Maintenance 667

Implementing Preventive Maintenance 667

Increasing Repair Capabilities 670

Autonomous Maintenance 670

Total Productive Maintenance 671 Summary 671 Key Terms 671 Ethical Dilemma 671 Discussion Questions 671 Using Software to Solve Reliability Problems 672 Solved Problems 672 Problems 672 CASE STUDY 674

Maintenance Drives Profi ts at Frito-Lay Video Case 674

Rapid Review 675 Self Test 676

PART FOUR Business Analytics Modules 677

Module A Decision-Making Tools 677

The Decision Process in Operations 678 Fundamentals of Decision Making 679 Decision Tables 680 Types of Decision-Making Environments 681

Decision Making Under Uncertainty 681

Decision Making Under Risk 682

Decision Making Under Certainty 683

Expected Value of Perfect Information (EVPI) 683

Decision Trees 684 A More Complex Decision Tree 686

The Poker Decision Process 688

Summary 689 Key Terms 689 Discussion Questions 689 Using Software for Decision Models 689 Solved Problems 691 Problems 692 CASE STUDY 696

Warehouse Tenting at the Port of Miami 696

Endnote 696 Rapid Review 697 Self Test 698

Module B Linear Programming 699

Why Use Linear Programming? 700 Requirements of a Linear Programming

Problem 701 Formulating Linear Programming Problems 701

Glickman Electronics Example 701

Graphical Solution to a Linear Programming Problem 702

Graphical Representation of Constraints 702

Iso-Profi t Line Solution Method 703

Corner-Point Solution Method 705

Sensitivity Analysis 705 Sensitivity Report 706

Changes in the Resources or Right-Hand-Side Values 706

Changes in the Objective Function Coeffi cient 707

Solving Minimization Problems 708 Linear Programming Applications 710

Production-Mix Example 710

Diet Problem Example 711

Labor Scheduling Example 712

The Simplex Method of LP 713 Integer and Binary Variables 713

Creating Integer and Binary Variables 713

Linear Programming Applications with Binary Variables 714

A Fixed-Charge Integer Programming Problem 715

Summary 716 Key Terms 716 Discussion Questions 716 Using Software to Solve LP Problems 716 Solved Problems 718 Problems 720 CASE STUDIES 725

Quain Lawn and Garden, Inc. 725

Scheduling Challenges at Alaska Airlines Video Case 726

Endnotes 726 Rapid Review 727 Self Test 728

A01_HEIZ0422_12_SE_FM.indd xixA01_HEIZ0422_12_SE_FM.indd xix 29/12/15 4:08 pm29/12/15 4:08 pm

xx TABLE OF CONTENTS

Module C Transportation Models 729

Transportation Modeling 730 Developing an Initial Solution 732

The Northwest-Corner Rule 732

The Intuitive Lowest-Cost Method 733

The Stepping-Stone Method 734 Special Issues in Modeling 737

Demand Not Equal to Supply 737

Degeneracy 737

Summary 738 Key Terms 738 Discussion Questions 738 Using Software to Solve Transportation

Problems 738 Solved Problems 740 Problems 741 CASE STUDY 743

Custom Vans, Inc. 743

Rapid Review 745 Self Test 746

Module D Waiting-Line Models 747

Queuing Theory 748 Characteristics of a Waiting-Line System 749

Arrival Characteristics 749

Waiting-Line Characteristics 750

Service Characteristics 751

Measuring a Queue’s Performance 752

Queuing Costs 753 The Variety of Queuing Models 754

Model A (M/M/1): Single-Server Queuing Model with Poisson Arrivals and Exponential Service Times 754

Model B (M/M/S): Multiple-Server Queuing Model 757

Model C (M/D/1): Constant-Service-Time Model 762

Little’s Law 763

Model D (M/M/1 with Finite Source): Finite-Population Model 763

Other Queuing Approaches 765 Summary 765 Key Terms 765 Discussion Questions 765 Using Software to Solve Queuing Problems 766 Solved Problems 766 Problems 768 CASE STUDIES 771

New England Foundry 771

The Winter Park Hotel 772

Endnotes 772 Rapid Review 773 Self Test 774

Module E Learning Curves 775

What Is a Learning Curve? 776 Learning Curves in Services and

Manufacturing 777 Applying the Learning Curve 778

Doubling Approach 778

Formula Approach 779

Learning-Curve Table Approach 779

Strategic Implications of Learning Curves 782 Limitations of Learning Curves 783 Summary 783 Key Term 783 Discussion Questions 783 Using Software for Learning Curves 784 Solved Problems 784 Problems 785 CASE STUDY 787

SMT’s Negotiation with IBM 787

Endnote 788 Rapid Review 789 Self Test 790

Module F Simulation 791

What Is Simulation? 792 Advantages and Disadvantages of Simulation 793 Monte Carlo Simulation 794 Simulation with Two Decision Variables:

An Inventory Example 797 Summary 799 Key Terms 799 Discussion Questions 799 Using Software in Simulation 800 Solved Problems 801 Problems 802 CASE STUDY 805

Alabama Airlines’ Call Center 805

Endnote 806 Rapid Review 807 Self Test 808

Appendix A1 Bibliography B1 Name Index I1 General Index I7

A01_HEIZ0422_12_SE_FM.indd xxA01_HEIZ0422_12_SE_FM.indd xx 29/12/15 4:08 pm29/12/15 4:08 pm

TABLE OF CONTENTS xxi

ONLINE TUTORIALS

1. Statistical Tools for Managers T1-1

Discrete Probability Distributions T1-2 Expected Value of a Discrete Probability Distribution T1-3

Variance of a Discrete Probability Distribution T1-3

Continuous Probability Distributions T1-4 The Normal Distribution T1-4

Summary T1-7 Key Terms T1-7 Discussion Questions T1-7 Problems T1-7 Bibliography T1-7

2. Acceptance Sampling T2-1

Sampling Plans T2-2 Single Sampling T2-2

Double Sampling T2-2

Sequential Sampling T2-2

Operating Characteristic (OC) Curves T2-2 Producer’s and Consumer’s Risk T2-3 Average Outgoing Quality T2-5 Summary T2-6 Key Terms T2-6 Solved Problem T2-7 Discussion Questions T2-7 Problems T2-7

3. The Simplex Method of Linear Programming T3-1

Converting the Constraints to Equations T3-2 Setting Up the First Simplex Tableau T3-2 Simplex Solution Procedures T3-4 Summary of Simplex Steps for Maximization

Problems T3-6 Artifi cial and Surplus Variables T3-7 Solving Minimization Problems T3-7 Summary T3-8 Key Terms T3-8 Solved Problem T3-8

Discussion Questions T3-8 Problems T3-9

4. The MODI and VAM Methods of Solving Transportation Problems T4-1

MODI Method T4-2 How to Use the MODI Method T4-2 Solving the Arizona Plumbing Problem with MODI T4-2

Vogel’s Approximation Method: Another Way to Find an Initial Solution T4-4

Discussion Questions T4-8 Problems T4-8

5. Vehicle Routing and Scheduling T5-1

Introduction T5-2 Service Delivery Example: Meals-for-ME T5-2

Objectives of Routing and Scheduling Problems T5-2

Characteristics of Routing and Scheduling Problems T5-3 Classifying Routing and Scheduling Problems T5-3 Solving Routing and Scheduling Problems T5-4

Routing Service Vehicles T5-5 The Traveling Salesman Problem T5-5 Multiple Traveling Salesman Problem T5-8 The Vehicle Routing Problem T5-9 Cluster First, Route Second Approach T5-10

Scheduling Service Vehicles T5-11 The Concurrent Scheduler Approach T5-13

Other Routing and Scheduling Problems T5-13 Summary T5-14 Key Terms T5-15 Discussion Questions T5-15 Problems T5-15 Case Study: Routing and Scheduling of

Phlebotomists T5-17 Bibliography T5-17

A01_HEIZ0422_12_SE_FM.indd xxiA01_HEIZ0422_12_SE_FM.indd xxi 29/12/15 4:08 pm29/12/15 4:08 pm

561590_MILL_MICRO_FM_ppi-xxvi.indd 2 24/11/14 5:26 PM

This page intentionally left blank

Welcome to your operations management (OM) course. In this book, we present a state-of-the- art view of the operations function. Operations is an exciting area of management that has a profound effect on productivity. Indeed, few other activities have as much impact on the quality of our lives. The goal of this text is to present a broad introduction to the field of operations in a realistic, practical manner. Even if you are not planning on a career in the operations area, you will likely be working with people in operations. Therefore, having a solid understanding of the role of operations in an organization will be of substantial benefit to you. This book will also help you understand how OM affects society and your life. Certainly, you will better understand what goes on behind the scenes when you attend a concert or major sports event; purchase a bag of Frito-Lay potato chips; buy a meal at an Olive Garden or a Hard Rock Cafe; place an order through Amazon.com; board a flight on Alaska Airlines; or enter a hospital for medical care. More than one and a half million readers of our earlier editions seem to have endorsed this premise.

We welcome comments by email from our North American readers and from students using the International edition, the Indian edition, the Arabic edition, and our editions in Portuguese, Spanish, Turkish, Indonesian, and Chinese. Hopefully, you will find this material useful, interest- ing, and even exciting.

New to This Edition We’ve made significant revisions to this edition, and want to share some of the changes with you.

Five New Video Case Studies Featuring Alaska Airlines In this edition, we take you behind the scenes of Alaska Airlines, consistently rated as one of the top carriers in the country. This fascinating organization opened its doors—and planes— so we could examine leading edge OM in the airlines industry. We observe: the quality pro- gram at Alaska Air (Chapter 6); the process analysis behind the airline’s 20-minute baggage retrieval guarantee (Chapter 7); how Alaska empowers its employees (Chapter 10); the air- line’s use of Lean, 5s, kaizen, and Gemba walks (Chapter 16); and the complexities of sched- uling (Module B).

Our prior editions focused on integrated Video Case Studies for the Orlando Magic basketball team, Frito-Lay, Darden Restaurants, Hard Rock Cafe, Arnold Palmer Hospital, Wheeled Coach Ambulances, and Regal Marine. These Video Case Studies appear in this edition as well, along with the five new ones for Alaska Airlines. All of our videos are created by the authors, with the outstanding coauthorship of Beverly Amer at Northern Arizona University, to explicitly match with text content and terminology.

Preface

xxiii

A01_HEIZ0422_12_SE_FM.indd xxiiiA01_HEIZ0422_12_SE_FM.indd xxiii 29/12/15 4:08 pm29/12/15 4:08 pmwww.Amazon.com

xxiv PREFACE

Creating Your Own Excel Spreadsheets We continue to provide two free decision support software programs, Excel OM for Windows and Mac and POM for Windows, to help you and your students solve homework problems and case studies. These excellent packages are found in MyOMLab and at our text’s Student Download Page.

Many instructors also encourage students to develop their own Excel spreadsheet models to tackle OM issues. With this edition, we provide numerous examples at chapter end on how to do so. “Creating Your Own Excel Spreadsheets” examples now appear in Chapters 1, 2, 4, 8, 12, and 13, Supplement 6, Supplement 7, and Modules A, B, and F. We hope these eleven samples will help expand students’ spreadsheet capabilities.

Video Case Alaska Airlines: 20-Minute Baggage Process—Guaranteed! Alaska Airlines is unique among the nine major U.S. carriers not only for its extensive flight coverage of remote towns throughout Alaska (it also covers the U.S., Hawaii, and Mexico from its pri- mary hub in Seattle). It is also one of the smallest independent airlines, with 10,300 employees, including 3,000 flight attendants and 1,500 pilots. What makes it really unique, though, is its abil- ity to build state-of-the-art processes, using the latest technology, that yield high customer satisfaction. Indeed, J. D. Power and Associates has ranked Alaska Airlines highest in North America for seven years in a row for customer satisfaction.

Alaska Airlines was the first to sell tickets via the Internet, first to offer Web check-in and print boarding passes online, and first with kiosk check-in. As Wayne Newton, Director of System Operation Control, states, “We are passionate about our pro- cesses. If it’s not measured, it’s not managed.”

One of the processes Alaska is most proud of is its baggage han- dling system. Passengers can check in at kiosks, tag their own bags with bar code stickers, and deliver them to a customer service agent at the carousel, which carries the bags through the vast under- ground system that eventually delivers the bags to a baggage han- dler. En route, each bag passes through TSA automated screening and is manually opened or inspected if it appears suspicious. With the help of bar code readers, conveyer belts automatically sort and transfer bags to their location (called a “pier”) at the tarmac level. A baggage handler then loads the bags onto a cart and takes it to Al

as ka

A irl

in es

M09_HEIZ0422_12_SE_C07.indd 303 20/11/15 4:35 PM

Using Software for Productivity Analysis

This section presents three ways to solve productivity problems with computer software. First, you can create your own Excel spreadsheets to conduct productivity analysis. Second, you can use the Excel OM software that comes with this text. Third, POM for Windows is another program that is available with this text .

Program 1.1

Actions Copy C7 to B7, Copy B14 to C14, Copy C15 to B15, and Copy D14 to D15

Create a row for each of the inputs used for the productivity measure. Put the output in the last row.

=C5*C6

=B10/B7

Enter the values for the old system in column B and the new system in Column C.

Productivity = Output/Input

=(C14-B14)/B14=C10/(C8+C9)

X USING EXCEL OM Excel OM is an Excel “add-in” with 24 Operations Management decision support “Templates.” To access the templates, double- click on the Excel OM tab at the top of the page, then in the menu bar choose the appropriate chapter (in this case Chapter 1 ), from either the “Chapter” or “Alphabetic” tab on the left. Each of Excel OM’s 24 modules includes instructions for that particular module. The instructions can be turned on or off via the “instruction” tab in the menu bar.

P USING POM FOR WINDOWS POM for Windows is decision support software that includes 24 Operations Management modules. The modules are accessed by double-clicking on Module in the menu bar, and then double-clicking on the appropriate (in this case Productivity ) item. Instructions are provided for each module just below the menu bar.

CREATING YOUR OWN EXCEL SPREADSHEETS Program 1.1 illustrates how to build an Excel spreadsheet for the data in Example 2.

M01_HEIZ0422_12_SE_C01.indd 21 01/12/15 2:19 PM

A01_HEIZ0422_12_SE_FM.indd xxivA01_HEIZ0422_12_SE_FM.indd xxiv 29/12/15 4:08 pm29/12/15 4:08 pm

PREFACE xxv

Expanding and Reordering Our Set of Homework Problems We believe that a vast selection of quality homework problems, ranging from easy to challeng- ing (denoted by one to four dots), is critical for both instructors and students. Instructors need a broad selection of problems to choose from for homework, quizzes, and exams—without reus- ing the same set from semester to semester. We take pride in having more problems—by far, with 807—than any other OM text. We added dozens of new problems this edition. The following table illustrates the selection by chapter.

Further, with the majority of our adopters now using the MyOMLab learning system in their classes, we have reorganized all the homework problems—both those appearing in the printed text, as well as the Additional Homework Problems that are available in MyOMLab—by topic heading. We are identifying all problems by topic (see the following example).

The list of all problems by topic also appears at the end of each boxed example, as well as in the Rapid Review that closes each chapter. These handy references should make it easier to assign problems for homework, quizzes, and exams. A rich set of assignable problems and cases makes the learning experience more complete and pedagogically sound.

CHAPTER 5 | DESIGN OF GOODS AND SERVICES 187

Problems 5.4–5.8 relate to Product Development

• • 5.4 Construct a house of quality matrix for a wrist- watch. Be sure to indicate specific customer wants that you think the general public desires. Then complete the matrix to show how an operations manager might identify specific attributes that can be measured and controlled to meet those customer desires.

• • 5.5 Using the house of quality, pick a real product (a good or service) and analyze how an existing organization satis- fies customer requirements.

• • 5.6 Prepare a house of quality for a mousetrap.

• • 5.7 Conduct an interview with a prospective purchaser of a new bicycle and translate the customer’s wants into the specific hows of the firm.

• • • • 5.8 Using the house of quality sequence, as described in Figure 5.4 on page 169, determine how you might deploy resources to achieve the desired quality for a product or service whose production process you understand.

Problems 5.9–5.17 relate to Defining a Product

• • 5.9 Prepare a bill of material for (a) a pair of eyeglasses and its case or (b) a fast-food sandwich (visit a local sandwich

Problems 5.21–5.28 relate to the Application of Decision Trees to Product Design

• • 5.21 The product design group of Iyengar Electric Supplies, Inc., has determined that it needs to design a new series of switches. It must decide on one of three design strategies. The market forecast is for 200,000 units. The better and more sophisticated the design strategy and the more time spent on value engineering, the less will be the variable cost. The chief of engineering design, Dr. W. L. Berry, has decided that the following costs are a good estimate of the initial and variable costs connected with each of the three strategies: a) Low-tech: A low-technology, low-cost process consisting of

hiring several new junior engineers. This option has a fixed cost of $45,000 and variable-cost probabilities of .3 for $.55 each, .4 for $.50, and .3 for $.45.

b) Subcontract: A medium-cost approach using a good outside design staff. This approach would have a fixed cost of $65,000 and variable-cost probabilities of .7 of $.45, .2 of $.40, and .1 of $.35.

c) High-tech: A high-technology approach using the very best of the inside staff and the latest computer-aided design technol- ogy. This approach has a fixed cost of $75,000 and variable- cost probabilities of .9 of $.40 and .1 of $.35.

What is the best decision based on an expected monetary value (EMV) criterion? ( Note: We want the lowest EMV, as we are dealing with costs in this problem.) PX

• • 5.22 MacDonald Products, Inc., of Clarkson, New York, has the option of (a) proceeding immediately with production of

Problem 5.3 is available in MyOMLab.

M05_HEIZ0422_12_SE_C05.indd 187 20/11/15 2:56 PM

Chapter Number of Problems

15 27

16 12

17 24

Module A 32

Module B 42

Module C 18

Module D 39

Module E 33

Module F 25

Chapter Number of Problems

Supplement 7 45

8 34

9 27

10 46

11 8

Supplement 11 20

12 53

13 26

14 32

Chapter Number of Problems

1 18

2 12

3 33

4 59

5 28

Supplement 5 19

6 21

Supplement 6 55

7 17

A01_HEIZ0422_12_SE_FM.indd xxvA01_HEIZ0422_12_SE_FM.indd xxv 29/12/15 4:08 pm29/12/15 4:08 pm

Jay, Barry, and Chuck’s OM Blog As a complement to this text, we have created a companion blog, with coordinated features to help teach the OM course. There are teaching tips, highlights of OM items in the news (along with class discussion questions and links), video tips, guest posts by instructors using our text, sample OM syllabi from dozens of colleges, and much more—all arranged by chapter. To learn more about any chapter topics, visit www.heizerrenderOM.wordpress.com . As you prepare your lectures and syllabus, scan our blog for discussion ideas, teaching tips, and classroom exercises.

Lean Operations In previous editions, we sought to explicitly differentiate the concepts of just-in-time, Lean, and Toyota Production System in Chapter 16. However, there is significant overlap and interchangea- bility among those three concepts, so we have revised Chapter 16 to incorporate the three concepts into an overall concept of “Lean.” The chapter suggests that students view Lean as a comprehen- sive integrated operations strategy that sustains competitive advantage and results in increased returns to all stakeholders.

Chapter-by-Chapter Changes To highlight the extent of the revisions in this edition, here are a few of the changes, on a chapter- by-chapter basis.

Chapter 1 : Operations and Productivity We updated Table 1.4 to reflect employment in various sectors and expanded our discussion of Lean operations. Our new case, Uber Technologies, introduces productivity by discussing the dis- ruptive nature of the Uber business model. In addition, there is a new “Creating Your Own Excel Spreadsheets” example for both labor productivity and multifactor productivity.

Chapter 2 : Operations Strategy in a Global Environment We have updated Figure 2.1 to better reflect changes in the growth of world trade and Figure 2.5 to reflect product life cycle changes. The Minute Lube case has been revised as Rapid Lube. Example 1 (National Architects) has been expanded to clarify factor rating calculations and is also demonstrated with a “Creating Your Own Excel Spreadsheets” presentation.

Chapter 3 : Project Management We rewrote and updated the Bechtel Global Company Profile and added a new section on well- defined projects with the “agile” and “waterfall” approaches. There are two new OM in Action boxes: “Agile Project Management at Mastek,” and “Behind the Tour de France.”

Chapter 4 : Forecasting We created a new table comparing the MAD, MSE, and MAPE forecasting error measures. There is also a new OM in Action box called “NYC’s Potholes and Regression Analysis.”

Chapter 5 : Design of Goods and Services We expanded our treatment of concurrent engineering and added two new discussion questions. Solved Problem 5.1 has been revised.

Supplement 5: Sustainability in the Supply Chain We wrote a new introductory section on Corporate Social Responsibility. There is also a new OM in Action box called “Blue Jeans and Sustainability” and 10 new homework problems.

Chapter 6 : Managing Quality We added new material to expand our discussion of Taguchi’s quality loss function. There is a new sec- tion on SERVQUAL, and a new video case study, “Quality Counts at Alaska Airlines,” appears here.

xxvi PREFACE

A01_HEIZ0422_12_SE_FM.indd xxviA01_HEIZ0422_12_SE_FM.indd xxvi 29/12/15 4:08 pm29/12/15 4:08 pmhttp://www.heizerrenderOM.wordpress.com

Supplement 6: Statistical Process Control We added a figure on the relationship between sample size and sampling distribution. We also added raw data to Examples S2 and S3 to illustrate how ranges are computed. There is a new Excel spreadsheet to show students how to make their own c -chart, and we have added three new homework problems.

Chapter 7 : Process Strategy We wrote a new section on machine technology and additive manufacturing. There are two new discussion questions and three new homework problems. Our second new video case study is called “Alaska Airlines: 20-Minute Baggage Process—Guaranteed!”

Supplement 7: Capacity and Constraint Management We added a new Table S7.1, which compares and clarifies three capacity measurements, with an example of each. There is a new treatment of expected output and actual output in Example S2. The discussion of bottleneck time versus throughput time has also been expanded. Example S3, capacity analysis with parallel processes, has been revised. We have also added a new “Creating Your Own Excel Spreadsheets” example for a break-even model. Finally, we updated the Arnold Palmer Hospital capacity planning case with recent data.

Chapter 8 : Location Strategies We added two new OM in Action boxes: “Iowa—Home of Corn and Facebook” and “Denmark’s Meat Cluster.” We changed the notation for the center-of-gravity model to simplify the equa- tion and provided a new “Creating Your Own Excel Spreadsheets” presentation for the center-of- gravity example.

Chapter 9 : Layout Strategies We created a new Muther grid for office relationship charting and added a spread of five layouts showing how offices have evolved over time. There is a new OM in Action box called “Amazon Lets Loose the Robots,” and there is a new graphic example of Proplanner’s Flow Path Calculator. We have included a formula for idle time as a second measure of balance assignment efficiency and added new technology issues to the Arnold Palmer Hospital video case.

Chapter 10 : Human Resources, Job Design, and Work Measurement We added a new OM in Action box, “The Missing Perfect Chair,” and revised the Operations Chart as a service example. Our third new video case study is “The ‘People’ Focus: Human Resources at Alaska Airlines.”

Chapter 11 : Supply Chain Management We added “outsourcing” as a supply chain risk in Table 11.3.

Supplement 11: Supply Chain Management Analytics We added a major section on the topic of Warehouse Storage, with a new model for allocating inven- tory to storage locations. There is a new discussion question and three new homework problems.

Chapter 12 : Inventory Management New Programs 12.1 and 12.2 illustrate “Creating Your Own Excel Spreadsheets” for both the production run model and the single-period inventory model. The Excel function NORMSINV is introduced throughout the chapter. The Quantity Discount Model section is totally rewritten to illustrate the feasible solution shortcut. Solved Problem 12.5 is likewise redone with the new approach.

Chapter 13 : Aggregate Planning and S&OP We added a new OM in Action box, “Revenue Management Makes Disney the ‘King’ of the Broadway Jungle.” We also provided a new “Creating Your Own Excel Spreadsheets” example for the transportation method for aggregate planning, using the Solver approach.

Categories
essay writing service how to write an admission essay professional essay writers

a negative correlation means that ________.

Question: A negative correlation between a hockey player’s age and the number of minutes he spends in the penalty box indicates that:
the older a player is, the less time he spends in the penalty box.
spending more time on the ice leads hockey players to become skilled at avoiding the referees.
an older player’s greater experience has taught him how to avoid making penalties.
older players make fewer penalties because they have reduced testosterone levels.

  Flag this Question Question 22 pts Gretchen, an adult, takes an intelligence test and it shows she has slightly above average intelligence. Four years later, she has the chance to take the same test again. This time it reports that she is a genius. While she wants to believe the results, she wonders if the inconsistency of results over time might mean the test:
is poorly correlated with intelligence.
has low test–retest reliability.
has high split-half reliability.
has a high coefficient alpha.

  Flag this Question Question 32 pts Researchers who study the process of reading in children have discovered that better readers make smoother eye movements across the page (i.e., there is a positive correlation between reading skill and the smoothness of the eye movements). Which of the following statements is a possible cause of the correlation between smooth eye movements and reading ability?
Having good reading skills allows a child to make smooth eye movements.
All of these options are possible causes of the correlation.
The ability to make smooth eye movements improves reading ability.
Some third factor might cause both smooth eye movements and improved reading ability.

  Flag this Question Question 42 pts What is the correlation between a person’s weight as measured in grams and a person’s weight as measured in pounds?
+1.00
–1.00
0.00
It is impossible to determine from the information provided.

  Flag this Question Question 52 pts The model of possible causal explanations for a correlation is called the:
A-B-C model.
cause-and-effect model.
causal explanation model.
1-2-3 model.

  Flag this Question Question 62 pts “The incidence of depression among college students is negatively correlated with the number of sunny days each year in the locale where they attend college.” This statement means that:
if a depressed student were to move to a locale with more sunny days, her depression would subside.
a student attending college in a locale with very few sunny days will become depressed.
the chances of a college student being depressed tend to increase as the number of sunny days increases.
the chances of a college student being depressed tend to be higher with fewer sunny days.

  Flag this Question Question 72 pts A positive correlation between head size and foot size indicates that:
having large feet causes a person to have a large head.
having a large head causes a person to have large feet.
people with larger feet tend to have smaller heads.
people with larger feet also tend to have larger heads.

  Flag this Question Question 82 pts A perfect linear relationship will yield a Pearson’s r value of:
1.00 or –1.00.
0.
1.00.
–1.00.

  Flag this Question Question 92 pts The best and most widely used measure of reliability is:
the split-half correlation, in which the odd and even numbered items of a measure are correlated to assess internal consistency.
criterion-related reliability.
coefficient alpha, the average of all possible split-half correlations.
the test-retest reliability.

  Flag this Question Question 102 pts Test-retest reliability is determined by:
correlating the odd numbered items of a measure with an individual’s performance on the even numbered items of that same measure.
correlating the odd numbered items of a measure with an individual’s performance on the even numbered items of a different measure.
administering the same measure to two different samples at two different points in time and calculating the correlation between an individual’s performance at the two different times
administering the same measure to the same sample at two different points in time and calculating the correlation between an individual’s performance on the two administrations.

  Flag this Question Question 112 pts The sign of the correlation communicates:
the direction of the association.
the direction and strength of the correlation.
the direction of the causal relationship.
the strength of the correlation.

  Flag this Question Question 122 pts Psychometricians are concerned with:
studying illness and the onset of psychological illness.
developing high quality tests and measures.
statistics and computers.
fixing psychological issues in people.

  Flag this Question Question 132 pts One assumption for using hypothesis testing for Pearson correlation is that one variable should vary equally at each level of the other variable. What is the easiest way to determine whether this assumption has been met?
If the calculation of r is high, then the assumption has been met.
Calculate the cross-products of the deviation scores. If the result is positive, then the assumption has been met.
Conduct a post-hoc test following the calculation of r.
Draw a scatterplot to see whether the range of values is equal across all values of the other variable.

  Flag this Question Question 142 pts Which of the following numbers would represent a perfect correlation?
–1.00
1.00
–1.00 or 1.00
0

  Flag this Question Question 152 pts What kind of correlation would you expect to find between the severity of snowstorms and rates of attendance at college classes?
positive
perfect negative
negative
zero

  Flag this Question Question 162 pts The denominator of the Pearson correlation equation corrects for ________ and ________ issues present in the numerator.
negative values; nonlinear data
sample size; nonnormality
negative values; variability
sample size; variability

  Flag this Question Question 172 pts In a reanalysis of published studies, Twenge and Im (2007) found that for the time period 1958–2001, the need for social approval of people in the United States was negatively correlated with the U.S. violent crime rate during the same period (the correlation coefficient was –0.31). This correlation means that:
as the need for social approval went up, the number of violent crimes also increased.
the need for social approval prevented people from committing violent crimes.
the need for social approval spurred people to commit violent crimes.
as the need for social approval went up, the number of violent crimes decreased.

  Flag this Question Question 182 pts Imagine that you’ve just read the results of a study that finds a positive correlation between gum chewing and life expectancy. Which of the following statements would be a statistically appropriate response to the results of the study?
You bemoan the possibility of living so long that you will have to chew lots of gum.
You become curious about what third variables might cause both increases in gum chewing and increases in life expectancy.
You purchase a lifetime supply of gum because chewing gum is good for your health.
You tell all your friends and family members to chew gum because it is good for their health.

  Flag this Question Question 192 pts If all the points on a scatterplot fall on a single line:
there is a positive correlation between the two variables.
the relation between the variables is perfect.
there is no relation between the variables.
the variables are causally related.

  Flag this Question Question 202 pts What kind of correlation would you expect to find between levels of family income and household spending on consumer goods?
zero
perfect positive
positive
negative

  Flag this Question Question 212 pts The numerator (top half) of the Pearson correlation coefficient formula includes:
the difference between the two sample means.
the sum of the product of the deviations for each variable.
.
the square root of the product of the two sums of squares.

  Flag this Question Question 222 pts Suppose a researcher discovers that length of time spent following a Mediterranean diet is negatively correlated with risk of developing cancer. Which of the statements logically follows from this information?
Eating a Mediterranean diet reduces the risk of developing cancer.
People who ate a Mediterranean diet for more time were more likely to have cancer.
Eating a Mediterranean diet increases the risk of developing cancer.
People who ate a Mediterranean diet for more time were less likely to have cancer.

  Flag this Question Question 232 pts Figure: Student-Faculty Ratio

Reference: Figure 1
(Figure: Student–Faculty Ratio) The relation depicted in the scatterplot is potentially deceptive because of:
poor validity.
poor reliability.
the presence of outliers.
restriction of range.

  Flag this Question Question 242 pts Assume that the correlation coefficient between class attendance and number of problems missed on an exam is (–0.77). Which statement regarding this finding is correct?
There is definitely no causal relationship between the two variables.
The correlation provides definitive information pertaining to causation.
If you attend class regularly, you are more likely to do well on the exam than someone who does not attend class regularly.
If you start attending class more regularly, the number of problems you miss on the next exam is certain to be reduced.

  Flag this Question Question 252 pts The Pearson correlation coefficient is symbolized:
x
r
c
t

  Flag this Question Question 262 pts The ________ quantifies the relationship between two variables.
magnitude of the correlation
sign of the correlation
correlation coefficient
correlation

  Flag this Question Question 272 pts A ________ is a graphical representation of the relation between two variables.
polygon
correlation coefficient
scatterplot
histogram

  Flag this Question Question 282 pts The proportionate reduction in error is a measure of the:
correlation between two variables.
variability of the dependent measure.
amount of variance in the dependent variable explained by the independent variable.
slope of a regression line.

  Flag this Question Question 292 pts With regression we are concerned about variability around the ________, rather than variability around the ________ which would be the case in t tests or ANOVAs.
line of best fit; mean
median; tails of the distribution
mean; outliers
outliers; line of best fit

  Flag this Question Question 302 pts To determine the slope of the line of best fit using the z-score regression information, we compare the values of:
X at zero versus X at 1.0.
X at zero versus Y at zero.
Y at zero versus X at zero.
Y at zero versus Y at 1.0.

  Flag this Question Question 312 pts The regression line is also called the:
prediction estimate.
error of estimate.
line of best fit.
line of central limit.

  Flag this Question Question 322 pts If we have information about the slope of the line of best fit that corresponds to two sets of data about class grades for different instructors, we cannot make comparisons based on these slopes because:
they are based on different populations.
slopes cannot be compared meaningfully.
they are not on a common scale.
the slopes have to share the same sign.

  Flag this Question Question 332 pts Every year it seems as though last season’s baseball rookie of the year fails to live up to expectations for his sophomore season. What might explain this phenomenon?
regression to the mean
standard error of the estimation
overestimation of effect size
proportionate reduction in error

  Flag this Question Question 342 pts Multiple regression predicts scores on a single ________ from scores on more than one ________.
dependent variable; independent variable
scale variable; nominal variable
independent variable; predictor variable
predictor; dependent variable

  Flag this Question Question 352 pts As the standard error of estimate becomes larger, predictions become:
less accurate.
more accurate.
smaller.
larger.

  Flag this Question Question 362 pts Proportionate reduction in error is sometimes called:
coefficient phi.
correlation coefficient.
alpha coefficient.
the coefficient of determination.

  Flag this Question Question 372 pts A researcher calculates a standardized regression coefficient on data from 52 events and computes β as 0.274. Assuming a two-tailed hypothesis test of the relation between these two variables is being conducted with an alpha of 0.05, what are the critical cutoffs?
–0.288 and 0.288
–0.273 and 0.273
–0.361 and 0.361
–0.250 and 0.250

  Flag this Question Question 382 pts The measure of effect size used with regression is:
R2, just like with ANOVA.
the proportionate reduction in error, r2.
the alpha coefficient.
standard error of correlation.

  Flag this Question Question 392 pts Which of the following statistics quantifies the improvement in ability to predict a person’s score when using the regression line rather than the mean?
standard deviation
proportionate reduction in error
standard error of the estimation
slope

  Flag this Question Question 402 pts The standardized regression coefficient is not equal to the correlation coefficient when:
both variables are measured on an interval scale.
there is greater variability in the X variables compared to the Y variable.
the equation includes more than one independent variable.
a negative relationship is present.

  Flag this Question Question 412 pts In a study designed to predict blood cholesterol levels from amount of daily saturated fat in grams (X1) and number of hours of daily exercise (X2), we determine that the slope of X1 is 5, the slope of X2 is –4, and the y intercept is 130. Which of the following formulas is the regression equation for these data?
Ŷ = 130 + 5(X1) – 4(X2)
Ŷ = 130 + 5(X1) + 4(X2)
Ŷ = 130 + 1(X)
Ŷ = 130 – 5(X1) – 4(X2)

  Flag this Question Question 422 pts The standardized regression coefficient expresses the:
likelihood of rejecting the null hypothesis with a regression analysis.
relation between the independent and dependent variable in terms of squared units.
strength of the correlation between the two variables that are now incorporated into a regression analysis.
predicted change in the dependent variable in terms of standard deviation units as a result of a 1 standard deviation increase in the independent variable.

  Flag this Question Question 432 pts The standardized regression coefficient is often called a:
normalized regression.
beta weight.
weighted estimate.
estimate of best fit.

  Flag this Question Question 442 pts The regression line is the line that:
minimizes the correlation coefficient.
is the mean of the dependent variable.
minimizes error in predicting scores on the independent variable.
minimizes error in predicting scores on the dependent variable.

  Flag this Question Question 452 pts The standardized regression coefficient expresses a predicted change in the dependent variable in terms of:
error units.
slope.
a 1-unit change in the independent variable.
standard deviations units.

  Flag this Question Question 462 pts We can examine a graph to get a sense of how much error there is in a regression equation. Which of the following describes a graph that reveals there will be a high amount of error when using our regression equation?
Data points cluster very close to the line with several outlier exceptions.
The data points consistently cluster far away from the line of best fit.
Data points cluster close around the line of best fit.
Data points fall directly on the line.

  Flag this Question Question 472 pts In the equation Ŷ = 98 + 4.30(X1) + 7.20(X2), what is the slope?
98
4.30
Both 4.30 and 7.20 are slopes.
7.20

  Flag this Question Question 482 pts In the equation for a regression line, the intercept is the:
predicted value for Y when X is equal to 0.
value for X when Y is equal to 0.
z score of the amount that Y is predicted to increase as X increases.
amount that Y is predicted to increase for a one-unit increase in X.

  Flag this Question Question 492 pts In a study designed to predict blood cholesterol levels from amount of daily saturated fat in grams (X1) and number of hours of daily exercise (X2), we determine that the slope of X1 is 5, the slope of X2 is –4, and the y intercept is 130. If someone reports that she typically eats 10 grams of saturated fat daily and exercises 1 hour daily, what would you predict for the person’s cholesterol level?
184
180
176
150

  Flag this Question Question 502 pts A small standard error of the estimate means that:
your two variables are poorly correlated.
confounding variables may be present.
variability is high in your Y variable.
you are making predictions with great accuracy.

  Flag this Question Question 512 pts The table includes information for creating a regression equation to predict students’ attitude toward statistics from their attitudes toward Britney Spears and beer.

Table: Coefficients(a)

Model  Unstandardized Coefficients Standardized Coefficients t Sig.
  B Std. Error Beta  
1 (Constant) 4.974 0.590  8.432 0.000
 attbritneyspears 0.264 0.155 0.256 1.701 0.097
 attbeer -0.309 0.122 -0.381 -2.536 0.015
a Dependent variable: attstatistics Reference: Table 1
(Table: Coefficients) What is the y intercept for this problem?
0.590
0.000
4.974
8.432

  Flag this Question Question 522 pts The table includes information for creating a regression equation to predict students’ attitude toward statistics from their attitudes toward Britney Spears and beer.

Table: Coefficients(a)

Model  Unstandardized Coefficients Standardized Coefficients t Sig.
  B Std. Error Beta  
1 (Constant) 4.974 0.590  8.432 0.000
 attbritneyspears 0.264 0.155 0.256 1.701 0.097
 attbeer -0.309 0.122 -0.381 -2.536 0.015
a Dependent variable: attstatistics Reference: Table 1
(Table: Coefficients) Was either variable a significant predictor for attitude toward statistics?
Attitude toward Britney Spears was a significant predictor but attitude toward beer was not.
No; neither was a signigicant predictor.
Yes; both were significant predictors.
Attitude toward beer was a significant predictor but attitude toward Britney Spears was not.

  Flag this Question Question 532 pts If two variables, independently, can help us predict the outcome of a third variable, we say that they are:
orthogonal.
autonomous.
standardized.
proportionate.

Categories
essay writing service how to write an admission essay professional essay writers

marcos nunca se despierta temprano

Try it!

Complete the sentences using the preterite of being or going.

TO GO

Model The travelers went to Peru.  

1. Patricia ________   to Cuzco.

2.You ___________   to Iquitos.

3.Gregorio and I_________________   to Lima.

4. I _______________   to Trujillo.

5. You __________________   to Arequipa.

6.My father___________________   to Lima.

7.Nosotras __________________   to Cuzco.

8. He ________________ to Machu Picchu.

9.You ___________________   to Nazca.

Model You were very kind. 

BE

10. I ______________   very cordial.

11.They   sympathetic _____________ .

12. We _____________   very stupid.

13. She _________________   unfriendly.

14.You _________________   very generous.

15. You ______________ cordial.

16. The people_____________   kind.

17.Tomás and I__________________   very happy.

18. Teachers ______________ good

To complete

Complete these conversations with the correct form of the preterite to be or go. Indicates the infinitive of each verbal form. Follow the model.

Model:

 JUAN Did you go to the movies last night? to go

MARIA No, I did not go to the movies. to go 

Conversation 1

RAÚL Where (1) _________   you on vacation?   ___________

PILAR (2) ____________   to Peru. ___________

RAÚL How (3) _____________   the trip? _____________ 

PILAR (4) ___________   great! Machu Picchu and El Callao are incredible ._______________ 

RAÚL (5) ______________   expensive the trip? ______________

PILAR No, the price (6) ____________   very low. It only cost three thousand dollars. __________

Conversation 2

ISABEL Tina and Vicente (7) _______________   boyfriends, right? _____________________ 

LUCIA Yes, but not now. Last night Tina (8) ________________   to eat with Gregorio and last week they (9) _______________   to the soccer game. _____________     ________________ 

ISABEL Oh yes? Javier and I (10) ____________________   to the game and we did not see them. __________________

Prayers

Make sentences. Use the preterit forms of being and going. Make other changes if necessary.

1. two friends and me / go / Machu Picchu / last summer

2. Holidays / be / wonderful

3.yo / go / to the Manu National Park / also

4. people / be / very nice

5. Where / go / you / on vacation / last year?

Complete the following paragraph with the appropriate forms of the past tense verbs be or go.

 Between 15 and 25 years old, I______________  musician in an orchestra (musician in an orchestra). My colleagues and I _____________   to play (to play) to several countries. The public always_______________   very kind to us. _______________ an unforgettable experience (unforgettable experience) for me. Those______________   the best years of my life.

Try it!

Complete with the indirect object pronoun and the present tense form in each sentence.

Model He loves to travel. 

Fascinate

1.To me ____________ dance.

2. To us______________   sing.

3.To you________________   read.

4.To you________________   run and skate.

5. To them_______________   the planes.

6.To my parents_______________   walk.

7.To you ______________ play tennis.

8. To my __________________espouse and to me to   sleep.

9.To Alberto______________   draw and paint.

10.To all________________ to   say.

11.A Pili__________________   the hats.

Model They are bored by sports. 

Bore

12.To you______________   the movies.

13. To you ____________ the trips.

14.To me ____________   the magazines.

15.To Jorge and Luis_________________   the dogs.

16.To us______________   holidays.

17.To you _________________ baseball.

18.A Marcela ____________________ the books.

19.To my friends_____________________   museums.

20.To her _________________ cycling.

21.To Omar _______________________-   go shopping.

22.To you and me _______________   the dance

To complete

Complete the sentences with all the necessary elements.

1. _________________Adela _______________ (enchant) the music of Tito “El Bambino”.

2.A ___________   me____________   (interest) the music of other countries.

3.To my friends________________   (love) the songs (songs) of Calle 13.

4.To Juan and_______________   Rafael do not _________________   (bother) loud music.

5. _________________nosotros____________   (fascinate) Latin pop groups.

6. _____________ Mr. Ruiz_______________   (interest) plus classical music.

7.A   _______________me________________   (boring) classical music.

8. To _____________   te_______________   (missing) money for the Carlos Santana concert?

9.No. I already bought the ticket and _____________ (stay) five dollars.

10. How much money will you______________   (stay) to _____________?

Complete the sentences using the appropriate indirect object pronoun. Use also the correct form of the verb indicated in the present tense. Follow the model.

Model A Julio loves (to love) being with Sonia. 

1 .To Pedro and Felipe_____________   (love) the action movies, but to Armando_____________   (fascinate) the horror movies.

2. I know that you do not ____________   (like) read and that books _________ (bored).

3.To me __________   (fascinate) the museums, but I know that your friends do not__________   (interest).

4.A Patrick not__________   ( fit ) his tennis shoes, but____________   (missing) money to go shopping.

5 ._________ (interest) wake up in time for classes, but to Luisa _________ (disturb) the alarm clock.

Form correct and logical sentences from the given elements. Make the necessary changes. Follow the model.

Model

you / fascinate / Italian food

You love Italian food. 

6. we / do not stay / money / buy gifts

7.Antonio / love / play (to play) the piano

8.my friends and I / bore / afternoon classes

9. Your father and you / interest / the sciences

10. Margarita / bother / study in summer

But what about?

Complete the sentences logically using but or otherwise.

1. Marcos never wakes up early,    (but) ( otherwise ) he always arrives punctually to class.

2. Lisa and Katarina do not go to bed early     (but) ( otherwise ) very late.

3. Alfonso is smart,     (but) ( otherwise ) he  is sometimes unfriendly.

4. The directors of the school are not Ecuadorian     (but) ( otherwise )  Peruvians.

5. We do not remember to buy shampoo,     (but) (otherwise) we buy soap.

6. Emilia is not a student     (but) (if not) a  teacher.

7. I do not want to get up,     (but) (otherwise)  I have to go to class.

8. Miguel does not shave in the morning     (but) ( otherwise )  at night.

To complete

Complete the sentences using the indefinite (indefinite) and negative words of the list.

something someone nothing

neither … nor any

none not always

also not 

1. Do   you know where there is a good restaurant?

2.No, there is not   around here.

3. Do you want   to eat?

4.No, thanks. I do not want   .

5. And I do not want to eat   .

6. Mr. Sánchez   is a Bolivian   Peruvian   .

7. Carlos   gets up early because he never goes to bed after ten.

8.No   student wants to write five jobs in a week.

9. Lourdes likes white wine, and me   .

10. Did not you see   your sisters yesterday?

Complete the following sentences with the appropriate indefinite or negative words.

 1. As I am the last to bathe, __________________   bathes after me.

2. Luis does not like coffee, Miguel ___________________ likes it.

3. I need to talk to________________.

4. ____________________ of my friends is at home today.

5.Paula wants to go to the movies and I_____________________   I want to go.

Categories
essay writing services how to write an admission essay professional essay writers

name five essential components of a reflex arc

WEEK 3 ASSIGNMENT 1: REFLEXES

Submission Instructions

Please complete your answers to the lab questions on this form. Please complete your answers, and SAVE the file in a location which you will be able to find again. Then, attach and submit the completed form to the Week 3 Laboratory dropbox in the Ashford University classroom. 

Post-Lab Questions

1. What is the pupillary response of the right eye when a light was shone into the pupil?

2. What is the consensual response? (The response of the left eye).

3. What branch of the nervous system controls this response?

4. Can this response be inhibited?

5. Define what a reflex is.

6. Name five essential components of a reflex arc.

WEEK 3 ASSIGNMENT 2: TESTING CRANIAL NERVE FUNCTIONS

Result Tables

Table 2: Cranial Nerve Function Testing

Cranial Nerve

Test

Result

Post-Lab Questions

1. What do your cranial nerve test results tell you?

2. When might these tests be used in a clinical setting?

3. What cranial nerve may not be functioning properly if a patient cannot detect taste on the anterior tongue?

4. What cranial nerve may not be functioning properly if a patient can move his/her eyes medial, superior, and inferior, but not lateral?

WEEK 3 ASSIGNMENT 3: TESTING TOUCH, TEMPERATURE, AND PAIN

Result Tables

Table 3: Blind Coin Differentiation

Coin

Observation

Guess

Quarter

Dime

Nickel

Penny

Post-Lab Questions

1. Describe the difference between the four US coins.

2. Was the participant able to distinguish between these coins?

3. Which coin was the easiest to identify by touch? Which was the most difficult to distinguish by touch?

4. Why is the detection of temperature important to maintaining overall health?

5. Did the participant notice any difference between the amounts of pain reception in the different areas tested?

Categories
coursework help essay writing service essays online professional essay writers

what do you call it when someone pays back a loan quickly

What Do You Call It When Someone Pays Back a Loan Quickly?

I would Really Apreciate To Get The answer.

11 4 6,977
asked by Seam
Feb 8, 2008
I got: A Sudden Debt Payoff

😛 Not sure if its right but… idek. their self correcting. 😛

8 4
posted by 😛
Mar 30, 2011
3,2

2 3
posted by yesica
Feb 4, 2014
the answer is not a sudden debt payoff but it is : A SUDDEN LATE PAYOFF. THATS WUT MY ANSWER ISSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSJSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSKSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSJK~!!!!!!!!!!!!!!!!!!!!!!!!!!!!

2 16
posted by jomama
Mar 17, 2014
A sudden debt payoff

13 0
posted by Meagan
Dec 2, 2014

a sudden debt payoff

7 0
posted by -A
Jan 12, 2015
a sudden debt payoff 😉

7 1
posted by Anonymous
Feb 20, 2015
A Sudden Debt Payoff

6 1
posted by Neka
Jan 27, 2016
what do you call when someone pays back a loan quickly

0 4
posted by Anonymous
Dec 13, 2016
Di ko din alam tolong

0 5
posted by Clarrise almojuela
Oct 10, 2017

thats not right

0 2
posted by gucci main
Jan 23, 2018
x+y=5
3x-y=7

1 3
posted by logan
May 31, 2018
Bars

1 4
posted by lIlIlIlIlIlIlIlIlIlIIIIIIIIIl
Nov 30, 2018
Yes

0 1
posted by NO
Dec 18, 2018
A sudden debt pay off, I don’t really get it 🤷

3 0
posted by Brooo
Jan 10, 2019

a sudden debt pay off………………….

3 0
posted by SOPAOHIAafAFI
Jan 16, 2019
Hi, i’m from the future.

2 3
posted by Alyssa
Jan 17, 2019
Hi Alyssa from the past now I’m from the future

2 2
posted by Anonymous
Jan 19, 2019
-_-

0 0
posted by hElLo HuMaNs
Feb 15, 2019
Road work ahead?

1 0
posted by Vine_Bot
Feb 22, 2019

8 3 5,243 views wow

0 0
posted by Barry Allen aka the flash
Mar 12, 2019
5,629 views now

0 0
posted by Barry Allen aka the flash
Mar 19, 2019
I don’t get it

1 0
posted by :p
Apr 19, 2019

Categories
essay writing services how to write an admission essay professional essay writers

argon is compressed in a polytropic process with n=1.2

ME 3310/5310 Thermodynamics I – Summer 2015 WRIGHT STATE UNIVERSITY

Department of Mechanical and Materials Engineering

Homework #3 Assigned 5/28/2015

Due 6/18/2015

Worth 90 Points Problems involving Specific Heats, ∆u, ∆h Problem 4-57 (10 pnts) – Consider the cases of neon and argon behaving as Ideal gases so that their specific heats are functions of temperature only. The temperature of the neon gas is increases from 20 °C to 180 °C. (a) Calculate the change in the specific internal energy of the neon, in kJ/kg. (b) Repeat this calculation for argon. Why is the value for neon larger than that of argon? Answers: (a) neon: 98.9 kJ/kg, (b) argon: 50.0 kJ/kg Bob Problem 1 (10 pnts) – Consider the cases of argon and neon behaving as Ideal gases so that their specific heats are functions of temperature only. (a) Calculate the change in the specific enthalpy of argon, in kJ/kg, when it is cooled from 400 °C to 100 °C during a constant pressure process. (b) Repeat this calculation for neon. Why is the value for neon larger than that of argon? Answers: (a) argon: 156.1 kJ/kg, (b) neon: 309.0 kJ/kg Bob Problem 2 (5 pnts) – A granite block is heated from 50 °F to 80 °F. The change in internal energy of the granite block is ∆U = 145.8 Btu. Determine the mass of the block (lbm). Use an average specific heat value for granite obtained from the tables in the text. Answer: 20 lbm Problem 4-60 (10 pnts) – Consider hydrogen (H2) behaving as an Ideal gas so that its specific heats are functions of only temperature. Determine the specific internal energy change ∆u of hydrogen, in kJ/kg, as it is heated from 200 to 800 K, using (a) the empirical specific heat equation as a function of temperature (Table A-2c), (b) the cv value at the average temperature (Table A-2b), and (c) the cv value at room temperature (Table A-2a). Answers: (a) 6194 kJ/kg, (b) 6233 kJ/kg, (c) 6110 kJ/kg Moving Boundary Work and Polytropic Process Problems Problem 4-23 (5 pnts) – A piston-cylinder device initially contains 0.25 kg of nitrogen gas at 130 kPa and 180 °C. The nitrogen gas is now expanded isothermally to a pressure of 80 kPa (the gas System performs moving boundary work ON the piston). First, derive the following expression for the “pdV” moving boundary work:

pdV 2out 1 1 1

V W p V ln

V  

=    

Next, compute the value for the moving boundary work done BY the System ON the piston during this process. Assume that the nitrogen behaves as an Ideal gas during the entire process. Answer: 16.3 kJ

Problem 4-7 (15 pnts) Modified – A piston-cylinder device initially contains 0.07 m3 of nitrogen gas at 130 kPa and 120 °C. The nitrogen gas is now expanded polytropically to a state of 100 kPa and 100 ° C (the gas System performs moving boundary work ON the piston). (a) First, determine the polytropic exponent, n. Second, derive the following expression for the “pdV” moving boundary work:

pdV 2 2 1 1out p V p V

W n 1 −

= −

(c) Finally, compute the value for the moving boundary work done BY the System ON the piston during this process. Assume that the nitrogen behaves as an Ideal gas during the entire process. Hint: To find the polytropic exponent, n, first compute the volume at state 2 (0.08637 m3). Next, write down the general expression for a polytropic process from State 1 to State 2. Take the natural logarithm of both sides of this equation and solve for n, algebraically. Then plug numbers into the equation to compute the value of n….if you don’t follow these steps you are more likely to make a mistake. Answer: (a) n = 1.249, (c) Moving “pdV” Boundary Work = 1.86 kJ. Bob Problem 3 (20 pnts) – A piston-cylinder device initially contains 0.07 m3 of nitrogen gas at 130 kPa and 120 °C. The nitrogen gas is now expanded polytropically to a pressure of 100 kPa with a polytropic exponent having a value equal to the specific heat ratio (this process is called an isentropic expansion—we will learn this in Chapter 7). Assume that the nitrogen behaves as an Ideal gas. Hint: the specific heat ratios for gases can be found in Table A-2a

(a) Derive the following expression for the final temperature at State 2:

2 2 2

p V T

mR =

where m is the mass of the System and R is the specific gas constant for nitrogen.

(b) Use the polytropic relations to derive the following expression for the volume at State 2,

1 k

1 2 1

2

p V V

p  

=    

,

and compute this volume using the given information.

(c) Compute the mass of the System and then compute the final temperature, T2, in Celsius.

(d) Compute the “pdV” moving boundary work output done BY the System ON the piston.

Answers: (b) 0.08443 m3, (c) 0.07802 kg, 91.6 °C, (d) 1.64 kJ

Bob Problem 4 (15 pnts) – Argon gas is compressed in a polytropic process having n=1.2 from 120 kPa and 30 °C to 1200 kPa in a piston-cylinder device. The mass of argon is 0.4377 g and the initial volume of the piston-cylinder is 230 cm3. (a) Compute the final State temperature, T2, of the argon (°C), (b) compute the “pdV” moving boundary work done BY the piston ON the System (J) during this process, and (c) compute the final State volume (cm3). Assume that the argon always behaves as an Ideal gas. Answers: (a) 171.7 °C, (b) 64.53 J, (c) 33.8 cm3

Categories
business plan writing services custom dissertation writing do my assignment pay for essay professional essay writers

expand the logarithmic expression log8 a/2

Expand the logarithmic expression. log8 a/2 My answer is log8a-log8 2
71,833 questions
Algebra2
Expand the logarithmic expression. log8 a/2 My answer is log8a-log8 2

asked by Steve on November 22, 2016
College Algebra
I REALLY don’t understand the reason/basis/use of logarithms. I have listened to my teacher, who never is clear on much of anything (it would help if he spoke better English), and a more advanced student, who couldn’t explain them to me. The problem I am

asked by Mary on October 21, 2010
Algebra 1
solve: log8(w-6)=2-log8(w+15) note: the 8 is to be little at the bottom right corner of log

asked by Britt on November 19, 2012
Test prep
solve: log8(w-6)=2-log8(w+15) note: the 8 is to be little at the bottom right corner of log

asked by Britt on November 19, 2012
Algebra 2
Solve the equation : 8^2x-1 = 16^x+1 i know you have to log both sides log8^2x-1 = log16^x+1 and then you use the exponential rule 2x-1 log8 = x+1 log16 but then i don’t know what to do…

asked by Brooke on February 22, 2015

Algebra
How do I start to solve -2log8(x+1) = -8? I think -2log8(x+1) is log8^(x+1)to the 2nd but then what do I do because then I think I should do log-8/log8 = x+1)^2 but that doesn’t work at all Thank you for any help you can give

asked by Anna on December 13, 2010
Pre Calculus
Assume that x, y, and b are positive numbers. Use the properties of logarithms to write the expression logb ^8xy in terms of the logarithms of x and y. a. logb^8 + logb x + logb^y b. logb^8+logbx c. logb^8+logby d. logb^8 + log8 x + log8^y e. logb^8+log8xy

asked by Jessica Maths on July 6, 2016
Algebra-Reiny please explain this
Hi Reiny, I posted this problem earlier and you responded but I don’t get the reasoning- The problem was -2log8(x+1) = -8 you said multiply by -2 and then you put log8(x+1)=4(wasn’t that dividing by -2) log8(x+1)^2 = 8 (how did you get to the power of 2

asked by Anna on December 13, 2010
algebra
This is a problem about logarithms: I’m completely confused as to what to do here: The logarithmic form of 84 = 4,096 is log8 4,096 = 4 Write the logarithmic form of x5 = the value of this quantity Explain the steps of conversion.

asked by Vilma on June 26, 2012
math
Determine the value of each of the following logarithmic expressions. Do not change bases. A) log8 4

asked by mark on March 19, 2012
math–please check
Change the logarithmic equation to an equivalent equation involving an exponent. log8^64=2 note that the 8 should be lower than the g 8^(log64)=8^2 64=8^2 is this correct

asked by Roger on January 9, 2013
math 12
log6=x and log8=y, determine an expression for log3 in terms of x an y.

asked by nat on October 3, 2010
math
Use properties of logarithms to expand each logarithmic expression as much as possible. Where possible evaluate logarithmic expsressions without using a calculator. logb x^7

asked by Ashley on October 15, 2012
Logarithms
log8(8^2) − ln(e^0.5)

asked by Jason N on February 14, 2017
Logarithms
8log8(5) − log8(7) = ?

asked by Jason N on February 14, 2017

Discrete Mathematics
If f(x) = log2 (x – 2)3 and g(x) = log8 (x – 2), when is (f + g)(x) = 0?

asked by Joy on July 30, 2013
Math
log(x-2) +log8 (x-4) =log6 (x-1)

asked by Jeconiah on March 26, 2013
Math
Solve this equation log8 (x2 – 7x) = 1

asked by Anonymous on April 15, 2010
math
log8 4(square root sign) 1/2

asked by DAVE on November 7, 2010
Math
Solve: Log5(x-2) + log8(x-4)= log6(x-1)

asked by NR on January 23, 2017
Math
Log8 4 + log16 2 x log 27 81= x solve for x

asked by John on February 11, 2012
Log Algebra
Find the inverse of the function y=log8 x

asked by Marta on May 1, 2011
Math
log8(768 x 16) –> the 8 is a subscript to log –> please show steps.

asked by Sam on December 30, 2010
Please help me!!!! maths
Solve for x: log5(x-2)+log8(x-4) = log6(x-1). I do not have any idea on this topic.

asked by Seth on April 3, 2013
math:logarithms
prove that:log25+log8*log16/log64 -log14/5+log28=3

asked by mohamed sedeeq on February 15, 2012

Please Reiny Solve it For me Again! please……
Solve for the value of x: log5(x-2)+log8(x-4)=Log6(x-1)..For your information that 5,8 and 6 are bases not just multipliers. Thank you.

asked by Seth on April 10, 2013
College Algebra

  1. 2log8^x=log8(4x+12) both log bases are 8. I have no clue what to do. 2. 1/2ln (x) -3 ln y – ln (z-2) so far for this second one i have ln sqrt(x)-ln y^3 – ln (z-2) dont know what to do next

asked by Billy on December 4, 2013
math
Use properties of logarithms to condense the logarithmic expression. Write the expression as a single logarithm whose coefficient is 1. Where possible, evaluate logarithmic expressions. 8 ln x -(1/3) ln y Choose one answer. a. ln x^8 y^3 b. ln x^8

asked by Coug on December 6, 2009
algebra
The cariable x satisfies the equation 3^x.4^(2x+1)=6^(x+2). By taking logarithms of both sides,show that x=log9/log8

asked by Matteo on November 2, 2010
Math (Expanding logarithmic expression)
Use the properties of logarithms to expand the logarithmic function ln[(x^2+1)(x-1)] Would this be the correct answer? ln[x^3-x^2+x-1] I can’t seem to expand it any further than that.

asked by Ray on October 1, 2016
pre cal
Simplify the following expressions. Your answers must be exact and in simplest form. (a) log8(8^−5x−10)= (b) 12^log12(−5+7q)= (c) log4(64^k)= (d) 3^3log3(10−10log3^3)=

asked by tor on July 25, 2016
Precalc
Given log2=0.3010, log3=0.4771, log5=0.6690, and log7=0.8451… Find a.) log8 b) log5/7 c.) log1.5 d.) log3/14 e) log12 I didn’t know how to do b, c, and d. I also don’t know if log 12 is right. Answer: a.) 0.903 b.)? c.)? d.)? e.) 1.0791

asked by Katie on November 11, 2015
Algebra 2
What is the exact value of x? 5⋅84x=376 x=log75.2/4log8 x=4log8/log75.2

asked by sammiexo on June 5, 2017
pre-calculus
solve the following logarithmic equation. Be sure to reject any value of x that is not in thedomain of the orginal logarithmic expression. Give the exact answer. log3(x+8)=4 The three actually drops down a little below the g. Can someone tell me how to do

asked by ladybug on October 6, 2012
math
I tried everthing but,I couldn’t solve it. Please help me.the answer at the back is 40960.13 question: solve for x and check your solution. logx/log2 + logx/log4 + logx/log8 + logx/log16 = 25 THANK YOU FOR YOUR KIND HELP!!!!

asked by priya on June 2, 2011

calc
Find the missing value: 1) log _ = 1/2 Solve the equation, round to the thousandths place: 2) log8 – log(n-2) = 4log2 + log5

asked by summer on December 4, 2015
Math
Write the fraction you would use to change the base for log8 15 (base 6)

asked by Anonymous on July 31, 2018
Algebra 2 ..

  1. Solve 3=log8+3logx 2. Solve 2logx-log4=0

asked by Anonymous on February 24, 2013
Algebra
Write the fraction you would use to change the base for log8 15 (base 8)

asked by Anonymous on July 31, 2018
math
(6) Which equation is equivalent to 4^-x=8? a. log8 4=x b. logx = -4 c. log -x 4=8 d. log 4 8= -x

asked by bob on January 23, 2009
algebra
Use properties of logarithms to condense the logarithmic expression. Write the expression as a single logarithm whose coefficient is 1. Where possible, evaluate logarithmic expressions. 4logbx – logby

asked by ada on December 5, 2014
college algebra
Use properties of logarithms to condense the logarithmic expression. Wreite the expression as a simple logarithm whose coefficient is 1. Where possible, evaluate logarithmic expressions. Inx + In 15 Please show work

asked by Ladybug on November 28, 2012
Math
If Joe wanted to create a function that modeled an exponential function with base of 8 and what exponents were needed to reach specific values, how would he set up his function? f(x) = x^8 f(x) = log8 x f(x) = logx 8 f(x) = 8^x

asked by Please Help Me on October 8, 2014
Algebra 2
Find the distance between the points (12, 8) and (4, 2). 100 units 14 units 10 units –10 units Find the midpoint of the points (3, 1) and (7, –5). (1, 6) (2, 1) (2, –3) (5, –2) Find the vertex and focus of the parabola whose equation is 4y = x2 +

asked by Ben on June 4, 2011
Pre-Calculus
PLEASE CHECK MY ANSWERS 1. Write f(x)=4^x-3 in f(x)=ab^x F(x)=(1/64)(4)^x 2.solve for x 4^x+2=3^x-5 X=-log4/3(3888) 3.solve for x Log5(x+4)+log5(8)=log8(64) X=-7/8

asked by Lexy on November 27, 2018

Algebra
Solve the logarithmic equation. Be sure to reject any value of x that is not in the domain of the original logarithmic expression. ln ã(x+4)=1 What is the exact solution? Select the correct choice below and, if necessary, fill in the answer box to

asked by edward on February 3, 2016
pre-calculus
solve the following logarithmic equation. be sure to reject any value of x that is not in the domain of the original logarithmic expression. give the exact answer. then, use the calculator to obtain a decimal appromiation, correct to two decimal places,

asked by ladybug on October 6, 2012
Algebra
How do you find the inverse of functions? for example how would you find the inverse of y= log8 x

asked by Kenya on May 1, 2011
college algebra, Please help!!
change the exponential expression to an equivalent expression involving a logarithm. 1.9=a^6 a=1.1129 is this the correct logarithmic expression???

asked by Heather on November 27, 2012
calculus
solve the logarithmic equation. be sure to reject any value of x that is not in the domain of the orginal logarithmic expression. In square root x+7=2 what is the exact solution? a.)the solution set is ? b.)there are infinitely many solutions c.)there is

asked by Brock on January 1, 2013
Math
Logarithms 3^x-2=18 Work log(3^x-2)=log18 (x-2)log3=log18 xlog3-2log3=log18 x=log3/(log9-log18) e^3x+1=10 lne^3x+1=ln10 3x+1=ln10 I’m stuck here 8^x=5^2x-1 xlog8=(2x-1)log5 xlog8=2xlog5-log5 x=log10/(log5-log8) Are these right?

asked by jackson on September 5, 2016
algebra
change the logarithmic expression to an equivalent expression involving an exponent. 4^16=x log (base4)16=x is it x=e^2?

asked by alli on September 2, 2012
alg
change the logarithmic expression to an equivalent expression involving an exponent. 4^16=x log (base4)16=x is it x=e^2?

asked by alli on September 2, 2012
Math – changing logarithmic expression
Change the logarithmic expression to an equivalent expression involving an exponent. Log1/5(1/625) = C

asked by CheezyReezy on June 6, 2011
prcalculus
change the logarithmic expression to an equivalent expression involving an exponent. log416=x

asked by deanne on March 24, 2013

math
chane the logarithmic expression to an equivalent expression involving an exponent log416=x the 4 is supposed to be dropedd down lower by the g.

asked by Heather on January 3, 2013
pre-calculus
Change the logarithmic expression to an equivalent expression involving an exponent. Log7343=x the 7 should drop down lower than the 343.

asked by ladybug on October 9, 2012
pre-cal
use the properties of logarithms to condense the logarithmic expression. write the expression as a single logiarithm whose coefficient is 1. 2IN(x+3)-3INx

asked by ladybug on October 9, 2012
Math
The problem I have to solve is log with base 2 ^6 multiply by log base 6 ^ 8. I use the change of base formula and got log6/log2 * log8/log6 Which become log6/log2 * log2()^3/ log 6 I’m stuck here thanks.

asked by Shadow on June 18, 2013
maths
Expand the brackets in the following expression (5y-3)^2 My answer is 5y^2-3^2 The answer i worked out seems to simple but is it correct? If not can someone tell me what i need to do. thanks

asked by susan on March 8, 2011
calculus
solve the logarithmic equation. Be sure to reject any value of x that is not in the domain of the orginal logarithmic expression. In square root x+7=1 I get this far and then get stuck, can you help me? In square root x+7=1 e=square root x+7 e^2=x+7

asked by Heather on January 4, 2013
pre-calculus
solve the logarithmic equation. be sure to reject any value of x that is not in the domain of the orginal logarithmic expression. In square root of x+2=2 (If I try to make the square root sign it will not come out right so I wrote it out instead) What is

asked by ladybug on October 6, 2012
math,help
I need help factoring this out 6a^2-5a+1 so far what i have is this: (3a-1)(3a ) If you expand your answer you will not get the original expression, so you are wrong. hint: 3a x ?a = 6a^2

asked by jas20 on March 2, 2007
Math
Write the expression in terms of natural logarithms. (Express all logarithmic functions in terms of In(x) in your answer.) log8.4=

asked by Ms. Jackie on October 30, 2012
calculus
use the properties of logarithms to condense the logarithmic expression. write the expression as a single logarithms whose coeffient is 1. Inx+In5=? Can you show work

asked by Heather on January 7, 2013

Intermediate Algebra
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of x that are greater

asked by Samantha on September 10, 2010
Algebra
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of x that are greater

asked by Sol on June 19, 2010
Intermediate algebra
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of x that are greater

asked by Anonymous on September 12, 2010
math
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of x that are greater

asked by Marlee on September 10, 2010
algebra, logarithms
Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of x that are greater

asked by Renee’ on September 11, 2010
Algebra
Totally lost here! Evaluate the exponential equation for three positive values of x, three negative values of x, and at x=0. Transform the second expression into the equivalent logarithmic equation; and evaluate the logarithmic equation for three values of

asked by Ally on June 19, 2010
algebra
Rewrite the following as an equivalent logarithmic equation.Do not solve. y^t = x answer logy+logt=logx-is this right also Express as an equivalent expression that is a sum of logt (3ab) the t is at the bottom of the g answer log3+loga+logb logarithms.

asked by dani on May 5, 2010
Precalculus
1.Find the third term of the expansion of the given expression. (a+b)^6 2.se the Binomial Theorem to expand and (where possible) simplify the expression. (c-d)^8

asked by Mary on October 30, 2010
algebra homework
please check my answers. Solve the logarithmic equation. Be sure to reject any value that is not in the domain of the original logarithmic expressions. Give the exact answer. ln sqrt x+6 = 9 i got {e^9-6} log (x + 4) = log (5x – 5) i got: 9/4 log (x + 30)

asked by Ang on October 26, 2007
Math
Can someone please double check my answers. 1. What pattern does the logarithmic function exhibit? a. y = b+a(lnx) b. y = a+b(lnx) c. y = ax+b d. y = axb I think A and B both look right..I just went with B. 2. Let f(x) = log6x and g(x) = log1/2x. For all

asked by mysterychicken on June 18, 2013

math
Can someone please double check my answers. 1. What pattern does the logarithmic function exhibit? a. y = b+a(lnx) b. y = a+b(lnx) c. y = ax+b d. y = axb I think A and B both look right..I just went with B. 2. Let f(x) = log6x and g(x) = log1/2x. For all

asked by mysterychicken on June 18, 2013
Math
use the properties of logarithms to simplify the logarithmic expression. log10 (9/300) Please explain!!

asked by Hannah on July 28, 2009
Math
Use the properties of logarithms to rewrite and simplify the logarithmic expression. 1.) log(9/300) 2.) log2(4^2 x 3^4)

asked by Porsha on November 6, 2014
Math
Use the properties of logarithms to rewrite and simplify the logarithmic expression. 1.) log(9/300) 2.) log2(4^2 x 3^4)

asked by Porsha on November 6, 2014
College Algebra
Use the Laws of Logarithms to expand the expression. loga(x^5/yz^6) and this was my answer and I got it wrong can any one tell me what I did wrong and what they got? 5log(x)-log(y)-6log(z)

asked by Melany on July 31, 2015
Algebra
Use the properties of logarithms to expand the expression. ln y(y+1)^5, I keep coming up with the same answer which is wrong. y^5ln(y)+5y^4ln(y)+10y^3ln(y)+10y^2ln(y)+ln(y)

asked by Lins on July 9, 2016
algebra
I am supposed to write each logarithmic expression as a single logarithm. I have logbase3of13 + logbase3of3 and my answer is logbase3of39. Can I simplify that any further? also logbase3 of 3 is 1 1+ log3 13 is another answer, simpler, to me. oh, okay, so

asked by Gloria on April 12, 2007
ALGEBRA
(a) Write the expression in terms of natural logarithms. (Express all logarithmic functions in terms of ln(x) in your answer.) log_(8.9) (135) = (b) Give a calculator approximation (correct to four decimal places). log_(8.9) (135) ~=

asked by Urgen please help on June 12, 2012
ALGEBRA
(a) Write the expression in terms of natural logarithms. (Express all logarithmic functions in terms of ln(x) in your answer.) log_(8.5) (127) = Give a calculator approximation (correct to four decimal places). log_(8.5) (127) ~=

asked by Randy on April 16, 2012
math
Expand the expression 3(x+4) 6(2x+3) 2(7+6x)

asked by Deken on April 11, 2013

math
Expand the expression 3(x+4) 6(2x+3) 2(7+6x)

asked by Deken on April 11, 2013
Math
Expand the following expression. 3(m+2) + 4(6+m)

asked by Janey on April 18, 2013
urgent urgent algebra
rewrite each in exponential expression as a logarithmic expression a)log,x=4 b)log 5=2 c)log ,8=x

asked by zachary on March 21, 2013
urgent urgent algebra / precalculas
rewrite each in exponential expression as a logarithmic expression log, x=4 log 5=2 log b=x

asked by zachary on March 22, 2013
Science (Chemistry)
Hello DrBob222 Regarding the answer you gave me thank you very much. However when you expand the denominator, I don’t get -0.14 but I get -0.28. I get that because when I first expand I get 0.0049 – 0.14x – 0.14x + 4x^2. So when I simplify that I get

asked by Kibito on May 19, 2015
math
Use the Distributive Property to expand the expression –3(6.3x + 1.5y).

asked by daquan on November 3, 2017
Math
Expand the expression using the distributive property : 4(9x-8)

asked by Amy on September 7, 2016
MATH HELP PLEASE
I don’t know how to do these 13/4(2x+3/4) It wants me to expand the linear expression and I got 13(8x+3)/16

asked by Michael on November 13, 2014
math
write the expression in expand form (4.2z)(-5y-3)

asked by Bruce on November 11, 2015
precalculus
use pascal’s triangle to expand the expression (2x-3y)^3

asked by richard on May 9, 2015

Algebra
3/(4x-36)- 5/(2x-4) – 2x/(x^2-11x+18) Simplify and expand the expression?

asked by Anonymous on April 16, 2014
binomial theorem again
How do i do this question using the binomial theorem concept? It says, expand (2+x)^5 up to x^2 term, hence, expand (2 + x + x^2)^5 up to the x^2 term. I could do the first part, and the answer would be (32 + 80x + …) But how should i make use of the

asked by nicholas on August 4, 2009
binomial theorem!
How do i do this question using the binomial theorem concept? It says, expand (2+x)^5 up to x^2 term, hence, expand (2 + x + x^2)^5 up to the x^2 term. I could do the first part, and the answer would be (32 + 80x + …) But how should i make use of the

asked by nicholas on August 4, 2009
Calculus
I need to find the derivative of the following problem via logarithmic differentiation, but I’m getting stuck. I know how to solve via logarithmic differentiation, but I can’t figure out how to re-write the exponent(s) as logs. Could someone help me? y=

asked by Jessie on January 24, 2008
Math
Do the following. (a) Write the expression in terms of natural logarithms. (Express all logarithmic functions in terms of ln(x) in your answer.) log 8.6 (114) =_ (b) Give a calculator approximation (correct to four decimal places). log 8.6 (114)~~_

asked by Regina M on December 21, 2012

Categories
Assignment Help dissertation writing services professional essay writers write my dissertation for me

where is most freshwater found on earth

Where is most freshwater on Earth found? lakes and rivers oceans and seas underground ice caps and glaciers How does algal growth caused by agricultural waste kill marine organisms?
22,409 results
Science
Where is most freshwater on Earth found? A. lakes and rivers B. oceans and seas C. underground D. ice caps and glaciers

asked by Anonymous on December 10, 2018
science
1.where is most freshwater found on earth? A.lakes and rivers B.oceans and seas C.Underground D.icecaps and glaciers

asked by nathan on April 25, 2017
Science help.
Where is most freshwater on Earth found? lakes and rivers oceans and seas underground ice caps and glaciers How does algal growth caused by agricultural waste kill marine organisms? by blocking sunlight and depleting oxygen by increasing oxygen levels in

asked by Princess Anna on January 4, 2014
Science
Where is most of the freshwater on Earth? F. lakes G. glaciers H. rivers J. oceans

asked by DTBR on January 5, 2012
Check my answers?
A. 75 % B. 12.5% C. 25% D. 3.13% E. 9.38% 3. what percentage of land on the earths surface is inhospital lands? – B 4. what percentage of earths surface is covered by land? – C 5. what percentage of land on earth is usable, for living on, but not for

asked by Selena on November 15, 2013

Earth space science, check answers?
A. 75 % B. 12.5% C. 25% D. 3.13% E. 9.38% 3. what percentage of land on the earths surface is inhospital lands? – B 4. what percentage of earths surface is covered by land? – C 5. what percentage of land on earth is usable, for living on, but not for

asked by Selena on November 15, 2013
Scienc
The Main difference between terrestrial planets and gas giants is the way they are formed the shape of their obits the level of their density*** the plane in which they lie Where is most of Earth’s freshwater located in lakes in rivers in oceans in

asked by Haley on May 16, 2017
oceanography

  1. How much of the total water at earth’s surface is fresh water? 2. Of all the freshwater at the earth’s surface, what percent is found as ice and glaciers? 3. What percent of all freshwater is groundwater? 4. What percent of the rainfall that falls on

asked by Ashley on December 12, 2006
Science
Oceans receive freshwater from precipitation and rivers. Yet ocean level do not change very much from these actions. Why are ocean level not greatly affected? a) Water is constantly seeping underground in the ocean; B)Water is constantly evaporating over

asked by Maria on February 21, 2012
Science
Where is most of the surface water on earth found? a) as freshwater in rivers b) as frozen water near the pole c) as groundwater under the surface d) as salt water in oceans I think its either A or D. Am I correct?

asked by Val on May 12, 2016
science
The earth wobbles slightly on its axis. which of the following earth processes might best account for these changes in earth’s rotation? 1)underground nuclear explosions 2)population increases 3)variations in rainfall and river flooding 4)motion of

asked by kayci on May 12, 2010
physics
The polar ice caps contain about 2.76E+19 kg of ice. This mass contributes negligibly to the moment of inertia of Earth because it is located at the poles, close to the axis of rotation. Estimate the change in the length of the day that would be expected

asked by Jordan on April 9, 2010
science-plz help this is so urgent!

  1. a) after the oceans, where is the next largest reserve of water found? b) does this reserve contain salt water or fresh water? Fresh water lakes on the surface. Glaciers and icecaps account for a greater amount of water than lakes swamps and rivers if

asked by jen on June 7, 2007
Science
What percent of water is not easily accessible or usable on earth? *A. .6% B. 12.5% C. 50% D. 99% Subtract the answer from the last question from 100%. What does the remainder represent and what are the sources of this percentage of water? A. 97% rivers

asked by Cassie on October 30, 2013
Science
1) How does water vapour change into solid and liquid water above earth’s surface? 2)does all surface runoff move directley into lakes, rivers and oceans? Please help asap it means alot!

asked by Enviormental Kid on September 11, 2013

Science
What is the average yearly rainfall for Rivers: Lakes & Ponds: Coral Reefs: Temperate Oceans: ?? thanks:)

asked by Nicky on October 3, 2009
Science
Bacterial action purifies water in lakes, streams, oceans, and A)in the air B)deep underground C)In the first few inches of soil D)On the surface of the ground. Thanks for helping out with this.

asked by Maureen on March 14, 2009
Science
About what percent of all of Earth’s fresh water is found in ground water, streams, lakes, and rivers?

asked by Sue on February 24, 2016
7th grade
Is the Carribean Sea the only major body of water connected to Aruba. Is there any other oceans,lakes or rivers. Not sure if the Pacific Ocean is close enough to it. Thanks.

asked by Brooke on April 2, 2009
Geography
What general statements could you make about water resources in Africa south of the Sahara? Include rainfall, rivers, lakes, and oceans.

asked by Tempesta on August 7, 2012
Science
A hurricane becomes more powerful be evaporating water from? lakes mountains oceans*** rivers 1. Over time, scientists have changed their model of our solar system. It has transitioned from A) a sun-centered to an moon-centered model. B) a sun-centered to

asked by Haley on May 16, 2017
science
Bacterial action purifies water in lakes, streams, oceans, and BLANK? The options are in the air, deep underground, in the first couple inches of soil, or on the surface of the ground? thanks for your explanation 🙂

asked by Nikkie on March 13, 2009
SCIENCE (correct I hope)
Freshwater Resource Challenge: aquifer depletion overdrawing surface water saltwater intrusion Ocean Water Resource Challenge: Flooding (flood)is an overflow of an expanse of water that submerges land, a deluge. water pollution is the contamination of

asked by scooby91320002 on September 12, 2008
Environmental Sciencee

  1. The water resources of the Earth are located in a. salt water fround in the ocean b. fresh water found in icecaps and glaciers c. fresh water found in rivers, lakes, and streams d. all of the above D

asked by y912f on January 19, 2010
Science
Why is freshwater a limited resource? A. because most water on Earth is in lakes B. because most water on Earth is in clouds C. because most water on Earth is in the ground D. because most water on Earth is saltwater D

asked by Anonymous on January 10, 2014

Environmental Science
Earth’s surface water is found in a.lakes b.rivers c.streams d.all of the above I picked d. because that’s where SURFACE water is at right? yup ditto…..

asked by Mack on April 20, 2007
English
Which sentence best summarizes the main idea of the article? A. You can do an experiment with a baggie, cup, water, food color, and a marker. B. When the water in a cloud falls as precipitation, it may fall on land or water. C. In the water cycle, water

asked by hunter on December 6, 2018
Math & science
Earth has a radius of about 6.4*10^m. What is the approximate surface are of Earth? Use the formula for the surface area of a sphere,S= 4 pi ^2 . Oceans cover about 70% of the surface of the Earth.A bout how many squares of Earth’s surface are covered by

asked by patama on October 16, 2018
Earth Science
Which aquartic biome would cypress, cedar, and dogwood trees, and submerged floating plants ne located? Lakes and Ponds Streams and RIvers Swamps Freshwater Marsh Saltwater Marsh Intertidal Zone

asked by Antentardeb on August 30, 2017
science
1.why is freshwater a limited resource? a)because most water on earth is in lakes** b)because most water on earth is in clouds c)because most water on earth is in the ground d)because most water on earth is salt water

asked by HOMEWORK on March 22, 2015
Enviro Science

  1. The water resources of Earth are located in a. salt water found in the ocean b. freshwater found in icecaps and glaciers c. fresh water found in rivers, lakes, and streams d. all of the above C 4. Weather is the state of the atmosphere at a moment in

asked by mysterychicken on April 29, 2012
Science
What are the dominant plants in the Tundra Taiga: Temperate Deciduous Forest: Tropical Rainforest: Grasslands: Desert: Rivers: Lakes & Ponds: Coral Reefs: Temperate Oceans: ? if you know of a website with the information that would be great!

asked by Natile Peterson on October 3, 2009
Social Studies
Ships from the Great Lakes travel the St Lawrence river to what ocean? Answer these questions with true or false The five great lakes are large enough to be called inland seas False? The great lakes form north americas most important waterway true? The

asked by Jerald on November 12, 2012
Science
Do you guys know of a website where i can find the average temperature of these biomes? Tundra, Tiaga, Temperate Deciduous Forest: Tropical Rainforest: Grasslands: Desert: Rivers: Lakes & Ponds: Coral Reefs: Temperate Oceans: thanks:)

asked by Nicole on October 8, 2009
Biology
If water were not a polar molecule and could not form hydrogen bonds, how would this change the structure and density of ice? Why would change? How would this affect the organisms living in lakes and ponds? 1. It would be heavier than water and sink. 2. If

asked by Abraham on November 14, 2006

SCIENCE (correct I hope)
Summarize the hydrologic cycle. How important is this cycle to Earth? The hydrologic cycle is a circulation of water from the oceans to the atmosphere and land, and back to the oceans. The hydrologic cycle starts with evaporation of water which comes from

asked by scooby91320002 on June 19, 2009
science
sedimentary rock is formed from bits and pieces of dirt, clay and sand that have been carried. a) on the earth’s crust b) underground c) in rivers and streams d) over mountaintops

asked by pam on September 21, 2010
Science
PLEASE CHECK MY ANSWERS!! I AM SOO FAR BEHIND IN THIS CLASS! 1. Which of the following describes the effect of high altitude on climate? Rain is very rare Flooding is more likely Temperatures are lower

asked by Kristen on November 21, 2018
Science
Water on Earth is either freshwater or saltwater. What is the percent ratio of freshwater to percent saltwater on Earth? A) 1% freshwater : 99% saltwater B) 3% freshwater : 97% saltwater C) 30% freshwater : 70% saltwater D) 50% freshwater : 50% saltwater I

asked by Sasha on March 30, 2017
Science
Which biome is found near the polar ice caps?

asked by Kyrstyn White on May 19, 2014
History
All of the following are examples of how geographical boundaries can limit cultural interaction except rivers deserts mountains oceans I think its A. since rivers are the easiest boundraies to pass through

asked by Jiskha on April 26, 2016
chemistry
Global warming refers to the rise in average global temperature due to the increased concentration of certain gases, called greenhouse gases, in our atmosphere. Earth’s oceans, because of their high heat capacity, can absorb heat and therefore act to slow

asked by Al on February 5, 2010
chem.
How much heat would be required to warm Earth’s oceans by 1.0 degree celsius ? Assume that the volume of Earth’s oceans is 137×10^7 km^3 and that the density of seawater is 1.03 g/cm^3. Also assume that the heat capacity of seawater is the same as that of

asked by Al on February 5, 2010
earth
the area around the great lakes was once covered by thick sheets of ice. Use the principal of isostasy to explain how the melting of these ice sheets has effected the land around the lakes?

asked by matt on February 23, 2010
Science
The area around the Great Lakes Was once covered by thick sheets of ice. Use the principle of isostasy to explain how the melting of these ice sheets has affected the land around the lakes.

asked by Angie on March 19, 2009

geography
the wide looping curves which are found along parts of the courses of some rivers are called: a.meanders b.flood plains c.river bluffs d.ox-bow lakes

asked by Natalia on February 22, 2010
English
I am making a mini book and in it i am writing these words: Peninsula,island,continent,island,ocean,seas,rivers,lakes,and glaciers and writing definitions for these words. So I wanted to know what could I put for the title of this mini book.

asked by Sumaiya on October 11, 2009
Biology
7) The dumping of large amounts of raw sewage into rivers or lakes typically leads to massive fish kills, although sewage itself is not toxic to fish. Similar fish kills also occur in shallow lakes that become covered in ice during the winter. What kills

asked by Cassie on November 8, 2011
Physics
When land ice on Antarctica melts and flows into the sea, eventually it circulates and therefore distributes uniformly over the earth’s oceans. As a result, does the earth’s rotational speed increase, decrease or remain unaffected? (If it does have an

asked by Bill on October 26, 2009
biology

  1. how does the density of ice compare to that liquid water and why is that property important to aquatic oranisms a. the density of ice is higher than that liquid water, which means that ice forms from the bottom of lakes upward , protecting aquatic life

asked by 9th grader on August 23, 2016
Math: slope problem
Suppose a line passes through the point (6 caps, $3/cap) and has a slope of -3. Which of the following points also lie along that line? Select all that apply. a) 4 caps, $9/cap b) 7 caps, $0/cap c) 5 caps, $5/cap d) 2 caps, $7/cap e) 7 caps, $1/cap f) 4

asked by Anonymous on January 10, 2009
Biology
Which is one way that a freshwater wetland differs from a lake or pond? A. water flows in a lake or pond but never flows in a wetland. B. Wetlands are nesting areas for birds, but lakes and ponds are not. C. Water does not always cover a wetland as it does

asked by Cassie on September 17, 2013
biology

  1. how does the density of ice compare to that liquid water and why is that property important to aquatic oranisms a. the density of ice is higher than that liquid water, which means that ice forms from the bottom of lakes upward , protecting aquatic life

asked by 9th grader on August 23, 2016
civics
Which of the following describes how features of countries in north america influence change in these countries ? A.Most have flat terrain, making railroads the least expensive method of transporting goods. B.with oceans on both sides, most countries have

asked by cheyenne on June 4, 2014
Science
Which of the following is NOT a common landform caused by the passing of a glacier? Drumlins Esker Moraine Steppe There are sometimes flowing rivers within a glacier. True * False Glaciers form and grow when

asked by Cassie on March 12, 2014

physics
Suppose partial melting of the polar ice caps increases the moment of inertia of the Earth from 0.331MR^2 to 0.332MR^2. What is the change in length of day in seconds?

asked by nikki on March 17, 2011
chem
Global warming refers to the rise in average global temperature due to the increased concentration of certain gases, called greenhouse gases, in our atmosphere. Earth¡¯s oceans, because of their high heat capacity, can absorb heat and therefore act to

asked by marie on January 24, 2011
math chem
Global warming refers to the rise in average global temperature due to the increased concentration of certain gases, called greenhouse gases, in our atmosphere. Earth¡¯s oceans, because of their high heat capacity, can absorb heat and therefore act to

asked by Anonymous on January 24, 2011
Ms. Sue PLZ HELP!!!(Civics)
Which of the following describes how the physical features of countries in North America influence trade in these countries? Most have flat terrain, making railroads the least expensive method of transporting goods. With oceans on both sides, most

asked by Anonymous on May 17, 2015
Civics HELP!!! Ms.Sue
Which of the following describes how the physical features of countries in North America influence trade in these countries? A) Most have flat terrain, making railroads the least expensive method of transporting goods. B) With oceans on both sides, most

asked by Anon101 on April 29, 2015
Science
Jupiter, Saturn, Uranus, and Neptune: what is one reason why life probably does not exist on these four planets? A) They have no gravity. B) They are the gas planets. C) They are the giant planets. **** D) They are the rocky planets. Earth seems to be the

asked by Haley on May 16, 2017
Planets
Jupiter, Saturn, Uranus, and Neptune: what is one reason why life probably does not exist on these four planets? A) They have no gravity. B) They are the gas planets. C) They are the giant planets. **** D) They are the rocky planets. Earth seems to be the

asked by Haley on May 16, 2017
Science
Why does the water of lakes and oceans look alike?

asked by Abby on August 15, 2010
Civics ASAP PLZ =:)
Which of the following describes how the physical features of countries in North America influence trade in these countries? (3 points) Most have flat terrain, making railroads the least expensive method of transporting goods. With oceans on both sides,

asked by Anonymous on May 30, 2015
Science
3) what 2 chemical contaminants that can be found in a freshwater source for each one b) identify a source of contaminants that can be found in a freshwater source for each one. 4) briefly describe how a biological contaminant was able to get into

asked by Help ASAP on September 30, 2013

french
How do you differentiate the prepositions for bodies of water. I know seas are feminine and oceans are masculine, but what prepostions do you use?

asked by sidhant on March 10, 2010
chemistry
how much heat would be required to warm the earth’s oceans by 1 degree celcius if the volume of the earths oceans is 137x100000000km3 and the density of the seawater is 1.03g/cm3

asked by Kay on May 25, 2013
chem/math
How much heat would be required to warm Earth¡¯s oceans by 1.0 ¡ãC? Assume that the volume of Earth¡¯s oceans is 137 x ¡¼10¡½^7 ¡¼km¡½^3 and that the density of sea water is 1.03 g/cm3. Also assume that the heat capacity of seawater is the

asked by marie on January 24, 2011
Quantitative Reasoning
if the volume of the oceans combined is about 1,350,000,000 cubic km by what height with the oceans increase if all the ice melted

asked by Keiyonna on October 10, 2016
Basic Geology
I need help with a Science essay. The question reads: “Hannah is comparing a rock from a riverbed and a rock from deep underground. One is very smooth, and the other has very rough edges. Explain why each rock was probably found in that location.” In order

asked by JPtiger13 on May 25, 2017
science
how is the rivers and oceans so important to us besides it provides water and habitat?

asked by Shelby on April 7, 2008
science
Discuss how comets might have a role to play in life evolving on an earth-like extrasolar planet in a distant solar system. can some one please help me out here. If life came to Earth via a comet, wouldn’t it make sense to predict that some comet could

asked by kat on May 18, 2007
science

  1. Why do earthquakes occur along the San Andreas Fault? a. Two plates meet at the San Andreas Fault and they slide next to each other causing earthquakes b. Two plates converge at the San Andreas Fault causing earthquakes*** c. Two plates pull apart at

asked by what on May 4, 2014
science
On Earth as a whole, what happens to most of the presipitation? 1 It recharges the soil moisture deflict. 2 it becomes runoff and moves o the oceans. 3 it is store in the soil as capillary oceans. 4 it is returned to the atmosphere through evaporation and

asked by Anonymous on February 11, 2009
language arts peer edit
The Lightning Thief book and movie are different and same in many ways. The book of the Lightning Thief is more interesting and detailed for most people who read the book and watched the movie. The movie sometimes has things that the book doesn’t have

asked by Justin on February 8, 2011

Chemistry
The pH of healthy lakes is around 6.0. Due to acid rain, the pH of our lakes & rivers is decreasing. At low pH levels, producers such as phytoplankton cannot thrive. Decreased plankton can cause consumer populations to crash. The end result is a lake

asked by Lucy on December 16, 2007
Social Studies
How do the rivers/seas and deserts of China impact it’s culture over time? I need to write a paper so if i could get a lot of info on this it wud be great help!

asked by Dee on May 19, 2008
GEOGRAPHY
1)The branches of rivers within a delta are called:(a)tributaries(b)confluences(c)distributaries(d)meanders 2)All of the following are conditions that m,ust be met so that deltas may form except:(a)steep drop in the sea floor(b)area protected from strong

asked by Devaughn on March 8, 2010
Science
Hannah is comparing a rock from a riverbed and a rock from deep underground. One is very smooth, and the other has very rough edges. Explain why each rock was probably found in that location. Answer: The rock that is very smooth is likely to be the one

asked by Bunny Funny on December 3, 2015
biology
What geological process is used to explain how nearly identical animals that cannot swim, are found on continents separated by large oceans? What is the half-life of Uranium 238 and what did we use that radioisotope to date as the oldest item on Earth?

asked by Anonymous on April 21, 2012
Reading
Icebergs can be slippery slopes for ships at sea. An iceberg can be dangerous to ships because more than 3/4 of it is under the water. Most of it isnt visible. Icebergs are found in the cold seas near the North and South Poles. The wind and currents move

asked by Alex on January 5, 2012
AP Chemistry
The Antarctic ice sheet contains an estimated 7.0 million cubic miles of ice. If the entire ice sheet melted, how many feet would the average global sea level rise? The density of ice is about 0.90 g/cm^3. The density of water is about 1.0 g/cm^3. The

asked by Alliya on September 11, 2011
science
I’m stuck on the following questions 1)The geocentric model of the universe states that the Earth is the center of the universe. This is an example of a A)scientific conclusion B)pseudoscience C)scientific law*** D)Scientific method Through process of

asked by katrina on November 30, 2016
Science
How does radioactivity make it possible to understand how Earth can be so old and still have a hot interior? (1 point) A.Radioactive elements trap heat from underground magma chambers. B.Radioactive elements absorb heat from the atmosphere and release it

asked by jeje on January 21, 2015
Physics -I’m stumped
Europa, a satellite of Jupiter, appears to have an ocean beneath its icy surface. Proposals have been made to send a robotic submarine to Europa to see if there might be life there. There is no atmosphere on Europa, and we shall assume that the surface ice

asked by Christina on November 30, 2007

social studies
How many lakes does the National Trust in England have? It’s hard to find the information about that on the Internet. About 136 lakes or 500 lakes? Would you let me know that or the website? Thank you.

asked by rfvv on October 18, 2012
English
Can someone check these sentences, please? I need to prepare them for Tomorrow. 1) Air pollution is mainly caused by gases from factories and car exhaust fumes. It can cause acid rain, breathing problems and it can increase the risk of cancer. 2)The

asked by Frank on January 8, 2014
Science 6th Grade Please Help!
How does wind affect precipitation? a. Wind does not have any effect on precipitation. b. Winds that blow from over the land contain a lot of water vapor that will cause precipitation. c. Winds that blow inland from oceans or large lakes contain very

asked by Trr on May 13, 2015
Chemistry
Earth’s oceans have an average depth of 3800 m, a total area of 3.63 108 km2, and an average concentration of dissolved gold of 5.8 10-9 g/L. (a) How many grams of gold are in the oceans? (b) How many cubic meters of gold are in the oceans? Assuming the

asked by Anonymous on August 25, 2013
geography
what causes deferred junctions on on rivers flood plains? a.swamps b.ox-bow lakes c.raised riverf banks d.river cliffs

asked by Nyasha on February 22, 2010
physics
There is a great deal of ice floating on the ocean near the north pole. If this ice were to melt due to global warming, what would happen to the level of the oceans? A.Rise B.Fall C.Remain the same water is slightly more dense than water, but when the ice

asked by Sarah on December 7, 2009
physics
The volume of the Earth’s oceans is approximately 1.4×1018 m3. The Earth’s radius is 6.4×106 m. What percentage of the Earth, by volume, is ocean?

asked by julianna on December 5, 2010
science
I am studying science at GCSE. I a working through a revision book and have come across a question which i am unsure of the answer. The question is, “state the number of different elements present in C6H5CO2Na.” The answer i have is 14 but still i am

asked by sam on March 19, 2007
geololgy
Earth and Venus are so similar in size and overall composition that they are almost “twins.” Why did these two planets evolve so differently? Why is Earth’s atmosphere rich in oxygen and poor in carbon dioxide, whereas the reverse is true on Venus?

asked by anonymous on May 24, 2011
Biology
What is the difference between an environment with freshwater and an environment with pristine wates? I need to design an experiment with a shrimp that is found in freshwater but not in pristine but I don’t understand what is the difference between the

asked by Anonymous on October 7, 2015

math
There are some caps in a box. 1/6 of them are red, 1/3 of them are blue and 3/7 of the remainder are green. If there are 27 green caps, how many caps are there altogether? How should I solve this?

asked by Claire on December 3, 2015
science
the threat of global warming is mainly associated with ? 1 radioactive wastes 2 use of hydroelectric energy 3 burning of fossil fuels 4 thermal pollution of lakes and rivers

asked by amber on May 29, 2012
Social studies
Posted by rfvv on Thursday, October 18, 2012 at 9:03pm. How many lakes does the National Trust in England have? It’s hard to find the information about that on the Internet. About 136 lakes or 500 lakes? Would you let me know that or the website? Thank

asked by rfvv on October 19, 2012
Moon Science
What causes the phases of the moon as observed from the Earth? A) Filtering of the light from the moon due to the Earth’s atmosphere. B) The tidal forces of the Earth’s oceans change the appearance of the moon. C) Change in distance of the moon from the

asked by Haley on May 16, 2017
Global

  1. What are the 3 mountain ranges with the longest area of high elevation? I guessed Himalayas, Andes, and Alps. 5. How many inches of annual rainfall are in areas that have year long growing seasons? 17. What two countries have the longest growing season

asked by Anonymous on September 8, 2008

Categories
essay writing services how to write an admission essay professional essay writers

journal entries based on the bank reconciliation are required in the depositor’s accounts for

study objectives

After studying this chapter, you should be able to:

1 Define fraud and internal control.

2 Identify the principles of internal control activities.

3 Explain the applications of internal control principles to cash receipts.

4 Explain the applications of internal control principles to cash disbursements.

5 Prepare a bank reconciliation.

6 Explain the reporting of cash.

7 Discuss the basic principles of cash management.

8 Identify the primary elements of a cash budget.

chapter

FRAUD, INTERNAL CONTROL, AND CASH

7

334

● Scan Study Objectives

● Read Feature Story

● Scan Preview

● Read Text and Answer p. 346 p. 349 p. 358 p. 363

● Work Using the Decision Toolkit

● Review Summary of Study Objectives

● Work Comprehensive p. 369

● Answer Self-Test Questions

● Complete Assignments

● Go to WileyPLUS for practice and tutorials

● Read A Look at IFRS p. 393

● the navigator

Do it!

Do it!

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 334

feature story

335

If you’re ever looking for a cappuccino in Moose Jaw,

Saskatchewan, stop by Stephanie’s Gourmet Coffee

and More, located on Main Street. Staff there serve,

on average, 650 cups of coffee a day, including both

regular and specialty coffees, not to mention soups,

Italian sandwiches, and a wide assortment of gourmet

cheesecakes.

“We’ve got high school stu-

dents who come here, and students

from the community college,”

says owner/manager Stephanie

Mintenko, who has run the place since opening it in

1995. “We have customers who are retired, and oth-

ers who are working people and have only 30 minutes

for lunch. We have to be pretty quick.”

That means that the cashiers have to be efficient.

Like most businesses where purchases are low-cost

and high-volume, cash control has to be simple.

“We have an electronic cash register, but it’s not

the fancy new kind where you just punch in the item,”

explains Ms. Mintenko. “You have to punch in the

prices.” The machine does keep track of sales in sev-

eral categories, however. Cashiers punch a button to

indicate whether each item is a beverage, a meal, or

a charge for the cafe’s Internet connections. An in-

ternal tape in the machine keeps a record of all trans-

actions; the customer receives a receipt only upon

request.

There is only one cash register. “Up to three of us

might operate it on any given shift, including myself,”

says Ms. Mintenko.

She and her staff do two

“cashouts” each day—one with the

shift change at 5:00 p.m. and one

when the shop closes at 10:00

p.m. At each cashout, they count the cash in the reg-

ister drawer. That amount, minus the cash change car-

ried forward (the float), should match the shift total on

the register tape. If there’s a discrepancy, they do an-

other count. Then, if necessary, “we go through the

whole tape to find the mistake,” she explains. “It usu-

ally turns out to be someone who punched in $18 in-

stead of $1.80, or something like that.”

Ms. Mintenko sends all the cash tapes and float

totals to a bookkeeper, who double-checks everything

and provides regular reports. “We try to keep the ac-

counting simple, so we can concentrate on making

great coffee and food.”

● SOX Boosts the Role of Human Resources (p. 345) ● Big Theft at Small Companies (p. 345) ● How Employees Steal (p. 351) ● Madoff’s Ponzi Scheme (p. 357)

INSIDE CHAPTER 7 . . .

M I N D I N G TH E MON EY I N MOOS E JAW

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 335

Fraud, Internal Control, and Cash

As the story about recording cash sales at Stephanie’s Gourmet Coffee and More indicates, control of cash is important to ensure that fraud does not occur. Companies also need controls to safeguard other types of assets. For example, Stephanie’s undoubtedly has controls to prevent the theft of food and supplies, and con- trols to prevent the theft of tableware and dishes from its kitchen.

In this chapter, we explain the essential features of an internal control system and how it prevents fraud. We also describe how those controls apply to a specific asset—cash. The applications include some controls with which you may be already familiar, such as the use of a bank.

The content and organization of Chapter 7 are as follows.

preview of chapter 7

• Fraud • The Sarbanes-Oxley

Act • Internal control • Principles of internal

control activities • Limitations

Fraud and Internal Control

• Cash receipts controls • Cash disbursements

controls

Cash Controls

• Bank statements • Reconciling the bank

account

Use of a Bank

• Cash equivalents • Restricted cash

Reporting Cash

• Basic principles

Managing and Monitoring Cash

336

Fraud and Internal Control The Feature Story describes many of the internal control procedures used by Stephanie’s Gourmet Coffee and More. These procedures are necessary to dis- courage employees from fraudulent activities.

FRAUD

A fraud is a dishonest act by an employee that results in personal benefit to the employee at a cost to the employer. Examples of fraud reported in the financial press include:

• A bookkeeper in a small company diverted $750,000 of bill payments to a personal bank account over a three-year period.

• A shipping clerk with 28 years of service shipped $125,000 of merchandise to himself.

• A computer operator embezzled $21 million from Wells Fargo Bank over a two-year period.

• A church treasurer “borrowed” $150,000 of church funds to finance a friend’s business dealings.

Why does fraud occur? The three main factors that contribute to fraudulent activity are depicted by the fraud triangle in Illustration 7-1.

The most important element of the fraud triangle is opportunity. For an employee to commit fraud, the workplace environment must provide opportu- nities that an employee can exploit. Opportunities occur when the workplace lacks sufficient controls to deter and detect fraud. For example, inadequate

1 Define fraud and internal control.

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 336

monitoring of employee actions can create opportunities for theft and can embolden employees because they believe they will not be caught.

A second factor that contributes to fraud is financial pres- sure. Employees sometimes commit fraud because of personal fi- nancial problems caused by too much debt. Or they might com- mit fraud because they want to lead a lifestyle that they cannot afford on their current salary.

The third factor that contributes to fraud is rationalization. In order to justify their fraud, employees rationalize their dishon- est actions. For example, employees sometimes justify fraud because they be- lieve they are underpaid while the employer is making lots of money. These em- ployees feel justified in stealing because they believe they deserve to be paid more.

THE SARBANES-OXLEY ACT

What can be done to prevent or to detect fraud? After numerous corporate scan- dals came to light in the early 2000s, Congress addressed this issue by passing the Sarbanes-Oxley Act of 2002 (SOX). Under SOX, all publicly traded U.S. corporations are required to maintain an adequate system of internal control. Corporate executives and boards of directors must ensure that these controls are reliable and effective. In addition, independent outside auditors must attest to the adequacy of the internal control system. Companies that fail to comply are subject to fines, and company officers can be imprisoned. SOX also created the Public Company Accounting Oversight Board (PCAOB) to establish auditing standards and regulate auditor activity.

One poll found that 60% of investors believe that SOX helps safeguard their stock investments. Many say they would be unlikely to invest in a company that fails to follow SOX requirements. Although some corporate executives have criticized the time and expense involved in following the SOX require- ments, SOX appears to be working well. For example, the chief accounting of- ficer of Eli Lily noted that SOX triggered a comprehensive review of how the company documents controls. This review uncovered redundancies and pointed out controls that needed to be added. In short, it added up to time and money well spent. And the finance chief at General Electric noted, “We have seen value in SOX. It helps build investors’ trust and gives them more confidence.”1

INTERNAL CONTROL

Internal control consists of all the related methods and measures adopted within an organization to safeguard its assets, enhance the reliability of its ac- counting records, increase efficiency of operations, and ensure compliance with laws and regulations. Internal control systems have five primary components as listed below.2

• A control environment. It is the responsibility of top management to make it clear that the organization values integrity and that unethical activity will not be tolerated. This component is often referred to as the “tone at the top.”

Illustration 7-1 Fraud triangle

Fraud and Internal Control 337

Opportunity

Financial Pressure

Rationalization

1“Corporate Regulation Must Be Working—There’s a Backlash,” Wall Street Journal (June 16, 2004), p. C1; and Judith Burns, “Is Sarbanes-Oxley Working?” Wall Street Journal (June 21, 2004), pp. R8–R9. 2The Committee of Sponsoring Organizations of the Treadway Commission, “Internal Control— Integrated Framework,” www.coso.org/publications/executive_summary_integrated_framework.htm (accessed March 2008).

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 337

338 chapter 7 Fraud, Internal Control, and Cash

• Risk assessment. Companies must identify and analyze the various factors that create risk for the business and must determine how to manage these risks.

• Control activities. To reduce the occurrence of fraud, management must design policies and procedures to address the specific risks faced by the company.

• Information and communication. The internal control system must cap- ture and communicate all pertinent information both down and up the or- ganization, as well as communicate information to appropriate external parties.

• Monitoring. Internal control systems must be monitored periodically for their adequacy. Significant deficiencies need to be reported to top manage- ment and/or the board of directors.

PRINCIPLES OF INTERNAL CONTROL ACTIVITIES

Each of the five components of an internal control system is important. Here, we will focus on one component, the control activities. The reason? These ac- tivities are the backbone of the company’s efforts to address the risks it faces, such as fraud. The specific control activities used by a company will vary, de- pending on management’s assessment of the risks faced. This assessment is heav- ily influenced by the size and nature of the company.

The six principles of control activities are as follows.

• Establishment of responsibility • Segregation of duties • Documentation procedures • Physical controls • Independent internal verification • Human resource controls

We explain these principles in the following sections. You should recognize that they apply to most companies and are relevant to both manual and computer- ized accounting systems.

Establishment of Responsibility An essential principle of internal control is to assign responsibility to specific employees. Control is most effective when only one person is responsible for a given task.

To illustrate, assume that the cash on hand at the end of the day in a Safe- way supermarket is $10 short of the cash rung up on the cash register. If only one person has operated the register, the shift manager can quickly determine responsibility for the shortage. If two or more individuals have worked the reg- ister, it may be impossible to determine who is responsible for the error. In the Feature Story, the principle of establishing responsibility does not appear to be strictly applied by Stephanie’s, since three people operate the cash register on any given shift.

Establishing responsibility often requires limiting access only to authorized personnel, and then identifying those personnel. For example, the automated systems used by many companies have mechanisms such as identifying pass- codes that keep track of who made a journal entry, who rang up a sale, or who entered an inventory storeroom at a particular time. Use of identifying passcodes enables the company to establish responsibility by identifying the particular em- ployee who carried out the activity.

2 Identify the principles of internal control activities.

It’s your shift now. I’m turning in my cash drawer

and heading home.

Transfer of cash drawers

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 338

Segregation of Duties Segregation of duties is indispensable in an internal control system. There are two common applications of this principle:

1. Different individuals should be responsible for related activities.

2. The responsibility for record-keeping for an asset should be separate from the physical custody of that asset.

The rationale for segregation of duties is this: The work of one employee should, without a duplication of effort, provide a reliable basis for evalu- ating the work of another employee. For example, the personnel that design and program computerized systems should not be assigned duties related to day- to-day use of the system. Otherwise, they could design the system to benefit them personally and conceal the fraud through day-to-day use.

SEGREGATION OF RELATED ACTIVITIES. Making one individual responsible for related activities increases the potential for errors and irregularities.

For example, companies should assign related purchasing activities to differ- ent individuals. Related purchasing activities include ordering merchandise, or- der approval, receiving goods, authorizing payment, and paying for goods or services. Various frauds are possible when one person handles related purchas- ing activities. For example:

• If a purchasing agent is allowed to order goods without supervisory approval, the likelihood of the agent receiving kickbacks from suppliers increases.

• If an employee who orders goods also handles receipt of the goods and in- voice, as well as payment authorization, he or she might authorize payment for a fictitious invoice.

These abuses are less likely to occur when companies divide the purchasing tasks. Similarly, companies should assign related sales activities to different individ-

uals. Related selling activities include making a sale, shipping (or delivering) the goods to the customer, billing the customer, and receiving payment. Various frauds are possible when one person handles related sales transactions. For example:

• If a salesperson can make a sale without obtaining supervisory approval, he or she might make sales at unauthorized prices to increase sales commissions.

Fraud and Internal Control 339

Maureen Frugali was a training supervisor for claims processing at Colossal Healthcare. As a standard part of the claims processing training program, Maureen created fictitious claims for use by trainees. These fictitious claims were then sent to the accounts payable department. After the training claims had been processed, she was to notify Accounts Payable of all ficti- tious claims, so that they would not be paid. However, she did not inform Accounts Payable about every fictitious claim. She created some fictitious claims for entities that she controlled (that is, she would receive the payment), and she let Accounts Payable pay her.

ANATOMY OF A FRAU D

Total take: $11 million

THE MISSING CONTROL Establishment of responsibility. The healthcare company did not adequately restrict the responsibility for authoring and approving claims transactions. The training supervisor should not have been authorized to create claims in the company’s “live” system.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 61–70.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 339

340 chapter 7 Fraud, Internal Control, and Cash

• A shipping clerk who also has access to accounting records could ship goods to himself.

• A billing clerk who handles billing and cash receipts could understate the amount billed for sales made to friends and relatives.

These abuses are less likely to occur when companies divide the sales tasks: the salespeople make the sale; the shipping department ships the goods on the basis of the sales order; and the billing department prepares the sales invoice after comparing the sales order with the report of goods shipped.

SEGREGATION OF RECORD-KEEPING FROM PHYSICAL CUSTODY. The accountant should have neither physical custody of the asset nor access to it. Likewise, the custodian of the asset should not maintain or have access to the accounting records. The custodian of the asset is not likely to convert the asset to per- sonal use when one employee maintains the record of the asset, and a dif- ferent employee has physical custody of the asset. The separation of account- ing responsibility from the custody of assets is especially important for cash and inventories because these assets are very vulnerable to fraud.

Lawrence Fairbanks, the assistant vice-chancellor of communications at Aesop University, was allowed to make purchases of under $2,500 for his department without external approval. Unfortunately, he also sometimes bought items for himself, such as expensive antiques and other collectibles. How did he do it? He replaced the vendor invoices he received with fake vendor invoices that he created. The fake invoices had descriptions that were more consis- tent with communications department purchases. He submitted these fake invoices to the accounting department as the basis for their journal entries and to the accounts payable department as the basis for payment.

ANATOMY OF A FRAU D

Total take: $475,000

THE MISSING CONTROL Segregation of duties. The university had not properly segregated related purchasing activities. Lawrence was ordering items, receiving the items, and receiving the invoice. By receiving the invoice, he had control over the documents that were used to account for the purchase and thus was able to substitute a fake invoice.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 3–15.

Angela Bauer was an accounts payable clerk for Aggasiz Construction Company. She pre- pared and issued checks to vendors and reconciled bank statements. She perpetrated a fraud in this way: She wrote checks for costs that the company had not actually incurred (e.g., fake taxes). A supervisor then approved and signed the checks. Before issuing the check, though, Angela would “white-out” the payee line on the check and change it to personal accounts that she controlled. She was able to conceal the theft because she also reconciled the bank account. That is, nobody else ever saw that the checks had been altered.

ANATOMY OF A FRAU D

Total take: $570,000

Segregation of duties (Accountability for assets)

Assistant cashier B Maintains custody of cash on hand

Accounting employee A Maintains cash

balances per books

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 340

Documentation Procedures Documents provide evidence that transactions and events have occurred. At Stephanie’s Gourmet Coffee and More, the cash register tape is the restaurant’s documentation for the sale and the amount of cash received. Similarly, a ship- ping document indicates that the goods have been shipped, and a sales invoice indicates that the company has billed the customer for the goods. By requiring signatures (or initials) on the documents, the company can identify the individ- ual(s) responsible for the transaction or event. Companies should document transactions when the transaction occurs.

Companies should establish procedures for documents. First, whenever pos- sible, companies should use prenumbered documents, and all documents should be accounted for. Prenumbering helps to prevent a transaction from being recorded more than once, or conversely, from not being recorded at all. Second, the control system should require that employees promptly forward source documents for accounting entries to the accounting department. This control measure helps to ensure timely recording of the transaction and contributes directly to the accuracy and reliability of the accounting records.

Fraud and Internal Control 341

THE MISSING CONTROL Segregation of duties. Aggasiz Construction Company did not properly segregate record- keeping from physical custody. Angela had physical custody of the blank checks, which essentially was control of the cash. She also had record-keeping responsibility because she prepared the bank reconciliation.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 100–107.

To support their reimbursement requests for travel costs incurred, employees at Mod Fashions Corporation’s design center were required to submit receipts. The receipts could include the detailed bill provided for a meal, or the credit card receipt provided when the credit card pay- ment is made, or a copy of the employee’s monthly credit card bill that listed the item. A num- ber of the designers who frequently traveled together came up with a fraud scheme: They submitted claims for the same expenses. For example, if they had a meal together that cost $200, one person submitted the detailed meal bill, another submitted the credit card receipt, and a third submitted a monthly credit card bill showing the meal as a line item. Thus, all three received a $200 reimbursement.

ANATOMY OF A FRAU D

Total take: $75,000

THE MISSING CONTROL Documentation procedures. Mod Fashions should require the original, detailed receipt. It should not accept photocopies, and it should not accept credit card statements. In addition, documentation procedures could be further improved by requiring the use of a corporate credit card (rather than personal credit card) for all business expenses.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 79–90.

Physical Controls Use of physical controls is essential. Physical controls relate to the safeguarding of assets and enhance the accuracy and reliability of the accounting records. Illustration 7-2 (page 342) shows examples of these controls.

125 Main Street Chelsea, IL 60915

Chelsea Video No. 0123

No. 0124

No. 0125

No. 0126

No. 0127

Firm Name

Attention of

Address

S O L D

T O

City State Zip

Date 5/8/12 Salesperson Malone Invoice No. 731 Invoice Date 5/4/12

Catalogue No. Description Quantity Price Amount

A2547Z45 Production Model Circuits (Inoperative)

1 300 $300

Approved Reid

Highpoint Electronic

Susan Malone, Sales Representative

27 Circle Drive

Harding MI 48281

Prenumbered invoices

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 341

342 chapter 7 Fraud, Internal Control, and Cash

Illustration 7-2 Physical controls

Physical Controls

Alarms to prevent break-ins

Locked warehouses and storage cabinets for inventories and records

Safes, vaults, and safety deposit boxes for cash and business papers

Television monitors and garment sensors to deter theft

Computer facilities with pass key access or fingerprint or eyeball scans

Time clocks for recording time worked

At Centerstone Health, a large insurance company, the mailroom each day received insurance applications from prospective customers. Mailroom employees scanned the applications into electronic documents before the applications were processed. Once the applications are scanned they can be accessed online by authorized employees.

Insurance agents at Centerstone Health earn commissions based upon successful appli- cations. The sales agent’s name is listed on the application. However, roughly 15% of the applications are from customers who did not work with a sales agent. Two friends—Alex, an employee in record keeping, and Parviz, a sales agent—thought up a way to perpetrate a fraud. Alex identified scanned applications that did not list a sales agent. After business hours, he entered the mailroom and found the hardcopy applications that did not show a sales agent. He wrote in Parviz’s name as the sales agent and then rescanned the application for process- ing. Parviz received the commission, which the friends then split.

ANATOMY OF A FRAU D

Total take: $240,000

THE MISSING CONTROL Physical controls. Centerstone Health lacked two basic physical controls that could have pre- vented this fraud. First, the mailroom should have been locked during nonbusiness hours, and access during business hours should have been tightly controlled. Second, the scanned appli- cations supposedly could be accessed only by authorized employees using their password. However, the password for each employee was the same as the employee’s user ID. Since employee user ID numbers were available to all other employees, all employees knew all other employees’ passwords. Thus, Alex could enter the system using another employee’s password and access the scanned applications.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 316–326.

Independent Internal Verification Most internal control systems provide for independent internal verification. This principle involves the review of data prepared by employees. To obtain max- imum benefit from independent internal verification:

1. Companies should verify records periodically or on a surprise basis.

2. An employee who is independent of the personnel responsible for the infor- mation should make the verification.

3. Discrepancies and exceptions should be reported to a management level that can take appropriate corrective action.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 342

Independent internal verification is especially useful in comparing recorded transactions with existing assets. The reconciliation of the cash register tape with the cash in the register at Stephanie’s Gourmet Coffee and More is an example of this internal control principle. Another common example is the reconciliation of a company’s cash balance per books with the cash balance per bank and the verification of the perpetual inventory records through a count of physical in- ventory. Illustration 7-3 shows the relationship between this principle and the segregation of duties principle.

Large companies often assign independent internal verification to internal au- ditors. Internal auditors are company employees who continuously evaluate the effectiveness of the company’s internal control systems. They review the activities of departments and individuals to determine whether prescribed internal controls are being followed. They also recommend improvements when needed. In fact, most fraud is discovered by the company through internal mechanisms such as existing internal controls and internal audits. For example, the fraud at World- Com, involving billions of dollars, was uncovered by an internal auditor.

Fraud and Internal Control 343

Illustration 7-3 Comparison of segregation of duties principle with independent internal verification principle

Accounting Employee Maintains cash

balances per books

Assistant Treasurer Makes monthly comparisons; reports

any unreconcilable differences to treasurer

Assistant Cashier Maintains custody of cash on hand

Segregation of Duties

Independent Internal Verification

Bobbi Jean Donnelly, the office manager for Mod Fashions Corporation’s design center, was responsible for preparing the design center budget and reviewing expense reports submitted by design center employees. Her desire to upgrade her wardrobe got the better of her, and she enacted a fraud that involved filing expense-reimbursement requests for her own per- sonal clothing purchases. She was able to conceal the fraud because she was responsible for reviewing all expense reports, including her own. In addition, she sometimes was given ulti- mate responsibility for signing off on the expense reports when her boss was “too busy.” Also, because she controlled the budget, when she submitted her expenses, she coded them to budget items that she knew were running under budget, so that they would not catch any- one’s attention.

ANATOMY OF A FRAU D

Total take: $275,000

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 343

344 chapter 7 Fraud, Internal Control, and Cash

Human Resource Controls Human resource control activities include the following.

1. Bond employees who handle cash. Bonding involves obtaining insurance protection against theft by employees. It contributes to the safeguarding of cash in two ways: First, the insurance company carefully screens all individ- uals before adding them to the policy and may reject risky applicants. Sec- ond, bonded employees know that the insurance company will vigorously prosecute all offenders.

2. Rotate employees’ duties and require employees to take vacations. These measures deter employees from attempting thefts since they will not be able to permanently conceal their improper actions. Many banks, for ex- ample, have discovered employee thefts when the employee was on vacation or assigned to a new position.

3. Conduct thorough background checks. Many believe that the most impor- tant and inexpensive measure any business can take to reduce employee theft and fraud is for the human resources department to conduct thorough back- ground checks. Two tips: (1) Check to see whether job applicants actually grad- uated from the schools they list. (2) Never use the telephone numbers for pre- vious employers given on the reference sheet; always look them up yourself.

THE MISSING CONTROL Independent internal verification. Bobbi Jean’s boss should have verified her expense reports. When asked what he thought her expenses for a year were, the boss said about $10,000. At $115,000 per year, her actual expenses were more than ten times what would have been expected. However, because he was “too busy” to verify her expense reports or to review the budget, he never noticed.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 79–90.

Ellen Lowry was the desk manager and Josephine Rodriquez was the head of housekeeping at the Excelsior Inn, a luxury hotel. The two best friends were so dedicated to their jobs that they never took vacations, and they frequently filled in for other employees. In fact, Ms. Rodriquez, whose job as head of housekeeping did not include cleaning rooms, often cleaned rooms her- self, “just to help the staff keep up.” These two “dedicated” employees, working as a team, found a way to earn a little more cash. Ellen, the desk manager, provided significant discounts to guests who paid with cash. She kept the cash and did not register the guest in the hotel’s computer- ized system. Instead, she took the room out of circulation “due to routine maintenance.” Because the room did not show up as being used, it did not receive a normal housekeeping assignment. Instead, Josephine, the head of housekeeping, cleaned the rooms during the guests’ stay.

ANATOMY OF A FRAU D

Total take: $95,000

THE MISSING CONTROL Human resource controls. Ellen, the desk manager, had been fired by a previous employer after being accused of fraud. If the Excelsior Inn had conducted a thorough background check, it would not have hired her. The hotel fraud was detected when Ellen missed work for a few days due to illness. A system of mandatory vacations and rotating days off would have increased the chances of detecting the fraud before it became so large.

Source: Adapted from Wells, Fraud Casebook (2007), pp. 145–155.

If I take a vacation they will know that I’ve been stealing.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 344

LIMITATIONS OF INTERNAL CONTROL

Companies generally design their systems of internal control to provide reason- able assurance of proper safeguarding of assets and reliability of the accounting records. The concept of reasonable assurance rests on the premise that the costs of establishing control procedures should not exceed their expected benefit.

To illustrate, consider shoplifting losses in retail stores. Stores could elimi- nate such losses by having a security guard stop and search customers as they leave the store. But store managers have concluded that the negative effects of such a procedure cannot be justified. Instead, stores have attempted to control shoplifting losses by less costly procedures: They post signs saying, “We reserve the right to inspect all packages” and “All shoplifters will be prosecuted.” They use hidden TV cameras and store detectives to monitor customer activity, and they install sensor equipment at exits.

The human element is an important factor in every system of internal con- trol. A good system can become ineffective as a result of employee fatigue, care- lessness, or indifference. For example, a receiving clerk may not bother to count goods received and may just “fudge” the counts. Occasionally, two or more in- dividuals may work together to get around prescribed controls. Such collusion can significantly reduce the effectiveness of a system, eliminating the protection offered by segregation of duties. No system of internal control is perfect.

The size of the business also may impose limitations on internal control. A small company, for example, may find it difficult to segregate duties or to pro- vide for independent internal verification.

Fraud and Internal Control 345

SOX Boosts the Role of Human Resources

Under SOX, a company needs to keep track of employees’ degrees and cer- tifications to ensure that employees continue to meet the specified requirements of a job. Also, to ensure proper employee supervision and proper separation of duties, companies must develop and monitor an organizational chart. When one corporation went through this exercise it found that out of 17,000 employees, there were 400 people who did not report to anyone, and they had 35 people who reported to each other. In addition, SOX also mandates that, if an employee complains of an unfair firing and mentions financial issues at the company, HR must refer the case to the company audit committee and pos- sibly to its legal counsel.

Accounting Across the Organization

? Why would unsupervised employees or employees who report to each other rep-resent potential internal control threats? (See page 392.)

Helpful Hint Controls may vary with the risk level of the activity. For example, management may consider cash to be high risk and maintaining inventories in the stockroom as lower risk. Thus, management would have stricter controls for cash.

Big Theft at Small Companies

A study by the Association of Certified Fraud Examiners indicates that busi- nesses with fewer than 100 employees are most at risk for employee theft. In fact, 38% of frauds occurred at companies with fewer than 100 employees. The median loss at small companies was $200,000, which was higher than the median fraud at companies with more than 10,000 employees ($147,000). A $200,000 loss can threaten the very existence of a small company.

Source: 2008 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners, www.acfe.com/documents/2008-rttn.pdf, p. 26.

Ethics Insight

? Why are small companies more susceptible to employee theft? (See page 392.)

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 345

Cash Controls Cash is the one asset that is readily convertible into any other type of asset. It also is easily concealed and transported, and is highly desired. Because of these characteristics, cash is the asset most susceptible to fraudulent activities. In addition, because of the large volume of cash transactions, numerous errors may occur in executing and recording them. To safeguard cash and to ensure the ac- curacy of the accounting records for cash, effective internal control over cash is critical.

CASH RECEIPTS CONTROLS

Illustration 7-4 shows how the internal control principles explained earlier apply to cash receipts transactions. As you might expect, companies vary con- siderably in how they apply these principles. To illustrate internal control over

DECISION TOOLKIT DECISION CHECKPOINTS TOOL TO USE FOR DECISION HOW TO EVALUATE RESULTS

Are the company’s financial statements supported by adequate internal controls?

Auditor’s report, management discussion and analysis, articles in financial press

The principles of internal control activities are (1) establishment of responsibility, (2) segregation of duties, (3) documentation procedures, (4) physical controls, (5) independent internal verification, and (6) human resource controls.

If any indication is given that these or other controls are lacking, use the financial statements with caution.

INFO NEEDED FOR DECISION

346 chapter 7 Fraud, Internal Control, and Cash

CONTROL ACTIVITIES

before you go on… Do it!

Identify which control activity is violated in each of the following situ- ations, and explain how the situation creates an opportunity for a fraud.

1. The person with primary responsibility for reconciling the bank account is also the company’s accountant and makes all bank deposits.

2. Wellstone Company’s treasurer received an award for distinguished service because he had not taken a vacation in 30 years.

3. In order to save money on order slips, and to reduce time spent keeping track of order slips, a local bar/restaurant does not buy prenumbered order slips.

Solution

Action Plan

• Familiarize yourself with each of the control activities listed on page 338.

• Understand the nature of the frauds that each control activity is intended to address.

1. Violates the control activity of segregation of duties. Record-keeping should be sepa- rate from physical custody. As a consequence, the employee could embezzle cash and make journal entries to hide the theft.

2. Violates the control activity of human resource controls. Key employees, such as a treasurer, should be required to take vacations. The treasurer, who manages the com- pany’s cash, might embezzle cash and use his position to conceal the theft.

3. Violates the control activity of documentation procedures. If pre-numbered documents are not used, then it is virtually impossible to account for the documents. As a conse- quence, an employee could write up a dinner sale, receive the cash from the customer, and then throw away the order slip and keep the cash.

Related exercise material: BE7-1, BE7-2, BE7-3, 7-1, E7-1, and E7-2.Do it!

3 Explain the applications of internal control principles to cash receipts.

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 346

cash receipts, we will examine control activities for a retail store with both over- the-counter and mail receipts.

Over-the-Counter Receipts In retail businesses, control of over-the-counter receipts centers on cash regis- ters that are visible to customers. A cash sale is rung-up on a cash register with the amount clearly visible to the customer. This activity prevents the cashier from ringing up a lower amount and pocketing the difference. The customer receives an itemized cash register receipt slip and is expected to count the change re- ceived. The cash register’s tape is locked in the register until a supervisor re- moves it. This tape accumulates the daily transactions and totals.

At the end of the clerk’s shift, the clerk counts the cash and sends the cash and the count to the cashier. The cashier counts the cash, prepares a deposit slip, and deposits the cash at the bank. The cashier also sends a duplicate of the deposit slip to the accounting department to indicate cash received. The super- visor removes the cash register tape and sends it to the accounting department as the basis for a journal entry to record the cash received. The tape is com- pared to the deposit slip for any discrepancies. Illustration 7-5 (page 348) sum- marizes this process.

This system for handling cash receipts uses an important internal control principle—segregation of record-keeping from physical custody. The supervisor has access to the cash register tape, but not to the cash. The clerk and the cashier have access to the cash, but not to the register tape. In addition, the cash reg- ister tape provides documentation and enables independent internal verification with the deposit slip. Use of these three principles of internal control (segrega- tion of record-keeping from physical custody, documentation, and independent internal verification) provides an effective system of internal control. Any at- tempt at fraudulent activity should be detected unless there is collusion among the employees.

Cash Controls 347

Cash Receipts Controls

Physical Controls

Store cash in safes and bank vaults; limit access to storage areas; use cash registers

Documentation Procedures

Use remittance advice (mail receipts), cash register tapes, and deposit slips

125 Main Street Chelsea, IL 60915

Beyer Video No. 0123

No. 0124

No. 0125

No. 0126

No. 0127

Firm Name

Attention of

Address

S O L D

T O

City State Zip

Date 5/8/12 Salesperson Malone Invoice No. 731 Invoice Date 5/4/12

Catalogue No. Description Quantity Price Amount

A2547Z45 Production Model Circuits (Inoperative)

1 $300

z Reid

Sellers

Susan Malone, Sales Representative

27 Circle Drive

Harding MI 48281

300

Independent Internal

Verification Supervisors count cash receipts daily; treasurer compares total receipts to bank deposits daily

Human Resource Controls

Bond personnel who handle cash; require employees to take vacations; conduct background checks

Different individuals receive cash, record cash receipts, and hold the cash

Segregation of Duties

Establishment of Responsibility

Only designated personnel are authorized to handle cash receipts (cashiers)

Illustration 7-4 Application of internal control principles to cash receipts

c07Fraud,InternalControl,andCash.qxd 8/17/10 2:35 PM Page 347

348 chapter 7 Fraud, Internal Control, and Cash

In some instances, the amount deposited at the bank will not agree with the cash recorded in the accounting records based on the cash register tape. These differences often result because the clerk hands incorrect change back to the retail customer. In this case, the difference between the actual cash and the amount reported on the cash register tape is reported in a Cash Over and Short account. For example, suppose that the cash register tape indicated sales of $6,956.20 but the amount of cash was only $6,946.10. A cash shortfall of $10.10 exists. To account for this cash shortfall and related cash, the company makes the following entry.

Cash 6,946.10 Cash Over and Short 10.10

Sales Revenue 6,956.20 (To record cash shortfall)

Cash Over and Short is an income statement item. It is reported as miscel- laneous expense when there is a cash shortfall, and as miscellaneous revenue when there is an overage. Clearly, the amount should be small. Any material amounts in this account should be investigated.

Mail Receipts All mail receipts should be opened in the presence of at least two mail clerks. These receipts are generally in the form of checks. A mail clerk should endorse each check “For Deposit Only.” This restrictive endorsement reduces the likelihood that

Deposit slip

Deposit slip

Clerk Rings up sales, counts cash

Sends cash and count to cashier

Counts cash, prepares deposit slips

Sends cash and deposit slip to bank

Cashier

Bank

Supervisor Removes locked cash register tape

Sends cash register tape to accounting dept.

Accounting Department Agrees register tape to deposit slip

and records journal entry

Sends deposit slip copy to accounting

Illustration 7-5 Control of over-the-counter receipts

Helpful Hint Flowcharts such as this one enhance the understanding of the flow of documents, the processing steps, and the internal control procedures.

Cash Flows �6,946.10

A SEL= +

�6,946.10 �10.10

�6,956.20

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 348

someone could divert the check to personal use. Banks will not give an individual cash when presented with a check that has this type of endorsement.

The mail-receipt clerks prepare, in triplicate, a list of the checks received each day. This list shows the name of the check issuer, the purpose of the payment, and the amount of the check. Each mail clerk signs the list to establish responsibility for the data. The original copy of the list, along with the checks, is then sent to the cashier’s department. A copy of the list is sent to the accounting department for recording in the accounting records. The clerks also keep a copy.

This process provides excellent internal control for the company. By employ- ing two clerks, the chance of fraud is reduced; each clerk knows he or she is be- ing observed by the other clerk(s). To engage in fraud, they would have to col- lude. The customers who submit payments also provide control, because they will contact the company with a complaint if they are not properly credited for payment. Because the cashier has access to cash but not the records, and the accounting department has access to records but not cash, neither can engage in undetected fraud.

CASH DISBURSEMENTS CONTROLS

Companies disburse cash for a variety of reasons, such as to pay expenses and liabilities or to purchase assets. Generally, internal control over cash disburse- ments is more effective when companies pay by check, rather than by cash. One exception is for incidental amounts that are paid out of petty cash.3

Companies generally issue checks only after following specified control pro- cedures. Illustration 7-6 (page 350) shows how principles of internal control ap- ply to cash disbursements.

Voucher System Controls Most medium and large companies use vouchers as part of their internal con- trol over cash disbursements. A voucher system is a network of approvals by authorized individuals, acting independently, to ensure that all disbursements by check are proper.

Cash Controls 349

Action Plan

• Differentiate among the internal control principles of (1) establishment of responsibility, (2) physical controls, and (3) independent internal verification.

• Design an effective system of internal control over cash receipts.

L. R. Cortez is concerned about the control over cash receipts in his fast-food restaurant, Big Cheese. The restaurant has two cash registers. At no time do more than two employees take customer orders and ring up sales. Work shifts for em- ployees range from 4 to 8 hours. Cortez asks your help in installing a good system of in- ternal control over cash receipts.

Solution

Cortez should assign a cash register to each employee at the start of each work shift, with register totals set at zero. Each employee should be instructed to use only the assigned register and to ring up all sales. Each customer should be given a receipt. At the end of the shift, the employee should do a cash count. A separate employee should compare the cash count with the register tape, to be sure they agree. In addition, Cortez should install an automated system that would enable the company to compare orders rung up on the register to orders processed by the kitchen.

CONTROL OVER CASH RECEIPTS

before you go on…

Do it!

Related exercise material: BE7-4, BE7-5, 7-2, and E7-3.Do it!

4 Explain the applications of internal control principles to cash disbursements.

3We explain the operation of a petty cash fund in the appendix to this chapter on pages 366–368.

study objective

c07Fraud,InternalControl,andCash.qxd 8/17/10 2:36 PM Page 349

350 chapter 7 Fraud, Internal Control, and Cash

The system begins with the authorization to incur a cost or expense. It ends with the issuance of a check for the liability incurred. A voucher is an author- ization form prepared for each expenditure in a voucher system. Companies re- quire vouchers for all types of cash disbursements except those from petty cash.

The starting point in preparing a voucher is to fill in the appropriate infor- mation about the liability on the face of the voucher. The vendor’s invoice pro- vides most of the needed information. Then, an employee in accounts payable records the voucher (in a journal called a voucher register) and files it accord- ing to the date on which it is to be paid. The company issues and sends a check on that date, and stamps the voucher “paid.” The paid voucher is sent to the ac- counting department for recording (in a journal called the check register). A voucher system involves two journal entries, one to record the liability when the voucher is issued and a second to pay the liability that relates to the voucher.

The use of a voucher system improves internal control over cash disburse- ments. First, the authorization process inherent in a voucher system establishes responsibility. Each individual has responsibility to review the underlying doc- umentation to ensure that it is correct. In addition, the voucher system keeps track of the documents that back up each transaction. By keeping these docu- ments in one place, a supervisor can independently verify the authenticity of

Establishment of Responsibility Only designated personnel are authorized to sign checks (treasurer) and approve vendors

Different individuals approve and make payments; check signers do not record disbursements

Segregation of Duties

Documentation Procedures

Use prenumbered checks and account for them in sequence; each check must have an approved invoice; require employees to use corporate credit cards for reimbursable expenses; stamp invoices “paid.”

Physical Controls

Store blank checks in safes, with limited access; print check amounts by machine in indelible ink

Human Resource Controls

Independent Internal

Verification Compare checks to invoices; reconcile bank statement monthly

Cash Disbursements Controls

6489 00032 385700991

Smith Company 123 Cherry Lane Anytown, Montana

PAY to

No. 408

6489 00032 385700991

Smith Company 123 Cherry Lane Anytown, Montana

PAY to

No. 407

6489 00032 385700991

Smith Company 123 Cherry Lane Anytown, Montana

PAY to

No. 406

6489 00032 385700991

Smith Company 123 Cherry Lane Anytown, Montana

PAY to

No. 405

6489 00032 385700991

Smith Company 123 Cherry Lane Anytown, Montana

PAY to

No. 404

Payments Due S M Tu W Th F S

1 2 3 4 5 6 7 8 10 11 13 14 15 16 17 18 19 20 21 22 24 25 26 27 28

23 29 30

12 9

TR EA

SU RE

R

Payments Due S M Tu W Th F S

1 2 3 4 5 6 7 8 10 11 13 14 15 16 17 18 19 20 21 22 24 25 26 27 28

23 29 30

12 9

TR EA

SU RE

R

Bond personnel who handle cash; require employees to take vacations; conduct background checks

Illustration 7-6 Application of internal control principles to cash disbursements

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 350

each transaction. Consider, for example, the case of Aesop University presented on page 340. Aesop did not use a voucher system for transactions under $2,500. As a consequence, there was no independent verification of the documents, which enabled the employee to submit fake invoices to hide his unauthorized purchases.

Petty Cash Fund As you learned earlier in the chapter, better internal control over cash disburse- ments is possible when companies make payments by check. However, using checks to pay such small amounts as those for postage due, employee working lunches, and taxi fares is both impractical and a nuisance. A common way of handling such payments, while maintaining satisfactory control, is to use a petty cash fund. A petty cash fund is a cash fund used to pay relatively small amounts. We explain the operation of a petty cash fund in the appendix at the end of this chapter.

Control Features: Use of a Bank The use of a bank contributes significantly to good internal control over cash. A company can safeguard its cash by using a bank as a depository and clearinghouse for checks received and checks written. The use of a bank check- ing account minimizes the amount of currency that must be kept on hand. It also facilitates control of cash because a double record is maintained of all bank transactions—one by the business and the other by the bank. The asset account

Ethics Note Internal control over a petty cash fund is strengthened by: (1) having a supervisor make surprise counts of the fund to confirm whether the paid petty cash receipts and fund cash equal the fund amount, and (2) canceling or mutilating the paid petty cash receipts so they cannot be resubmitted for reimbursement.

Control Features: Use of a Bank 351

How Employees Steal

A recent study by the Association of Certified Fraud Examiners found that two-thirds of all employee thefts involved a fraudulent disbursement by an employee. The most common form (28.3% of cases) was fraudulent billing schemes. In these, the employee causes the company to issue a payment to the employee by submitting a bill for nonexistent goods or services, purchases of personal goods by the employee, or in- flated invoices. The following graph shows various types of fraudulent disbursements and the median loss from each.

Ethics Insight

? How can companies reduce the likelihood of fraudulent disbursements? (See page 392.)

23.9%

10%0% 20% 30% 40% 50% 90%

9.3%

Billing ($100,000)

Payroll ($49,000)

Breakdown of Fraudulent Disbursements

C at

eg o

ry (

M ed

ia n

L o

ss )

14.7% Check tampering

($138,000)

13.2% Expense reimbursement

($25,000)

Source: 2008 Report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners, www.acfe.com/documents/2008_rttn.pdf, p. 13.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 351

352 chapter 7 Fraud, Internal Control, and Cash

Cash maintained by the company is the “flip-side” of the bank’s liability account for that company. A bank reconciliation is the process of comparing the bank’s bal- ance with the company’s balance, and explaining the differences to make them agree.

Many companies have more than one bank account. For efficiency of oper- ations and better control, national retailers like Wal-Mart and Target often have regional bank accounts. Similarly, a company such as ExxonMobil with more than 100,000 employees may have a payroll bank account as well as one or more general bank accounts. In addition, a company may maintain several bank ac- counts in order to have more than one source for short-term loans.

BANK STATEMENTS

Each month, the company receives from the bank a bank statement showing its bank transactions and balances.4 For example, the statement for Laird Com- pany in Illustration 7-7 shows the following: (1) checks paid and other debits that reduce the balance in the depositor’s account, (2) deposits and other credits that increase the balance in the depositor’s account, and (3) the account balance after each day’s transactions.

4Our presentation assumes that a company makes all adjustments at the end of the month. In practice, a company may also make journal entries during the month as it receives information from the bank regarding its account.

Illustration 7-7 Bank statement

National Bank & Trust Midland, Michigan 48654 Member FDIC

ACCOUNT STATEMENT

LAIRD COMPANY 77 WEST CENTRAL AVENUE MIDLAND, MICHIGAN 48654

Statement Date/Credit Line Closing Date

April 30, 2012

457923

ACCOUNT NUMBER

Balance Last Statement

Deposits and Credits Checks and Debits Balance This StatementNo. Total Amount No. Total Amount

13,256.90 20 34,805.10 26 32,154.55 15,907.45

CHECKS AND DEBITS DEPOSITS AND CREDITS DAILY BALANCE

Date No. Amount

4–2 4–5 4–4 4–3 4–8 4–7 4–8 4–11 4–12

4–29 4–29 4–30 4–30

435 436 437 438 439 440 441 442 443

NSF 459 DM 461

644.95 3,260.00 1,185.79

776.65 1,781.70 1,487.90 2,420.00 1,585.60 1,226.00

425.60 1,080.30

30.00 620.15

Date Amount

4–2 4–3 4–5 4–7 4–8 4–9 CM 4–11 4–12 4–13

4–27 4–29 4–30

4,276.85 2,137.50 1,350.47

982.46 1,320.28 1,035.00 2,720.00

757.41 1,218.56

1,545.57 2,929.45 2,128.60

Date Amount

4–2 4–3 4–4 4–5 4–7 4–8 4–9 4–11 4–12

4–27 4–29 4–30

16,888.80 18,249.65 17,063.86 15,154.33 14,648.89 11,767.47 12,802.47 13,936.87 13,468.28

13,005.45 14,429.00 15,907.45

Symbols: CM DM

Credit Memo Debit Memo

EC INT

Error Correction Interest Earned

NSF SC

Not Sufficient Funds Service Charge

Reconcile Your Account Promptly

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 352

Remember that bank statements are prepared from the bank’s perspective. For example, every deposit the bank receives is an increase in the bank’s liabil- ities (an account payable to the depositor). Therefore, in Illustration 7-7, Na- tional Bank and Trust credits to Laird Company every deposit it received from Laird. The reverse occurs when the bank “pays” a check issued by Laird Com- pany on its checking account balance: Payment reduces the bank’s liability and is therefore debited to Laird’s account with the bank.

The bank statement lists in numerical sequence all paid checks along with the date the check was paid and its amount. Upon paying a check, the bank stamps the check “paid”; a paid check is sometimes referred to as a canceled check. In addition, the bank includes with the bank statement memoranda ex- plaining other debits and credits it made to the depositor’s account.

A check that is not paid by a bank because of insufficient funds in a bank account is called an NSF check (not sufficient funds). The bank uses a debit memorandum when a previously deposited customer’s check “bounces” because of insufficient funds. In such a case, the customer’s bank marks the check NSF (not sufficient funds) and returns it to the depositor’s bank. The bank then deb- its (decreases) the depositor’s account, as shown by the symbol NSF in Illustra- tion 7-7, and sends the NSF check and debit memorandum to the depositor as notification of the charge. The NSF check creates an account receivable for the depositor and reduces cash in the bank account.

RECONCILING THE BANK ACCOUNT

Because the bank and the company maintain independent records of the com- pany’s checking account, you might assume that the respective balances will always agree. In fact, the two balances are seldom the same at any given time, and both balances differ from the “correct or true” balance. Therefore, it is necessary to make the balance per books and the balance per bank agree with the correct or true amount—a process called reconciling the bank account. The need for reconciliation has two causes:

1. Time lags that prevent one of the parties from recording the transaction in the same period.

2. Errors by either party in recording transactions.

Time lags occur frequently. For example, several days may elapse between the time a company pays by check and the date the bank pays the check. Sim- ilarly, when a company uses the bank’s night depository to make its deposits, there will be a difference of one day between the time the company records the receipts and the time the bank does so. A time lag also occurs whenever the bank mails a debit or credit memorandum to the company.

The incidence of errors depends on the effectiveness of the internal controls maintained by the company and the bank. Bank errors are infrequent. However, either party could accidentally record a $450 check as $45 or $540. In addition, the bank might mistakenly charge a check drawn by C. D. Berg to the account of C. D. Burg.

Reconciliation Procedure In reconciling the bank account, it is customary to reconcile the balance per books and balance per bank to their adjusted (correct or true) cash balances. To obtain maximum benefit from a bank reconciliation, an employee who has no other responsibilities related to cash should prepare the reconciliation. When companies do not follow the internal control principle of independent in- ternal verification in preparing the reconciliation, cash embezzlements may es- cape unnoticed. For example, in the Anatomy of a Fraud box at the bottom of page 340, a bank reconciliation by someone other than Angela Bauer might have exposed her embezzlement.

Helpful Hint Essentially, the bank statement is a copy of the bank’s records sent to the customer for periodic review.

Control Features: Use of a Bank 353

5 Prepare a bank reconciliation.

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 353

354 chapter 7 Fraud, Internal Control, and Cash

Illustration 7-8 shows the reconciliation process. The starting point in prepar- ing the reconciliation is to enter the balance per bank statement and balance per books on a schedule. The following steps should reveal all the reconciling items that cause the difference between the two balances.

Helpful Hint Deposits in transit and outstanding checks are reconciling items because of time lags.

Illustration 7-8 Bank reconciliation adjustments

Bank errors

Deposits in transit

Outstanding checks

Notes collected by banks

Check printing or other service charges

Company errors

NSF (bounced) checks

Adjustments to the bank balance

Correct Cash Amount

Cash Balances

Adjustments to the book balance

Per Bank Statement Per Books

“Oops” “Oops”

Step 1. Deposits in transit. Compare the individual deposits on the bank state- ment with the deposits in transit from the preceding bank reconcilia- tion and with the deposits per company records or copies of duplicate deposit slips. Deposits recorded by the depositor that have not been recorded by the bank represent deposits in transit. Add these deposits to the balance per bank.

Step 2. Outstanding checks. Compare the paid checks shown on the bank statement or the paid checks returned with the bank statement with (a) checks outstanding from the preceding bank reconciliation, and (b) checks issued by the company as recorded in the cash payments jour- nal. Issued checks recorded by the company that have not been paid by the bank represent outstanding checks. Deduct outstanding checks from the balance per the bank.

Step 3. Errors. Note any errors discovered in the previous steps and list them in the appropriate section of the reconciliation schedule. For example,

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 354

if the company mistakenly recorded as $159 a paid check correctly writ- ten for $195, the company would deduct the error of $36 from the bal- ance per books. All errors made by the depositor are reconciling items in determining the adjusted cash balance per books. In contrast, all er- rors made by the bank are reconciling items in determining the ad- justed cash balance per the bank.

Step 4. Bank memoranda. Trace bank memoranda to the depositor’s records. The company lists in the appropriate section of the reconciliation sched- ule any unrecorded memoranda. For example, the company would deduct from the balance per books a $5 debit memorandum for bank service charges. Similarly, it would add to the balance per books a $32 credit memorandum for interest earned.

Bank Reconciliation Illustrated Illustration 7-7 presented the bank statement for Laird Company. It shows a bal- ance per bank of $15,907.45 on April 30, 2012. On this date the balance of cash per books is $11,589.45. From the foregoing steps, Laird determines the follow- ing reconciling items.

Step 1. Deposits in transit: April 30 deposit (received by bank on May 1). $2,201.40

Step 2. Outstanding checks: No. 453, $3,000.00; No. 457, $1,401.30; No. 460, $1,502.70. 5,904.00

Step 3. Errors: Check No. 443 was correctly written by Laird for $1,226.00 and was correctly paid by the bank. However, Laird recorded the check as $1,262.00. 36.00

Step 4. Bank memoranda: (a) Debit—NSF check from J. R. Baron for $425.60 425.60 (b) Debit—Printing company checks charge, $30 30.00 (c) Credit—Collection of note receivable for $1,000 plus

interest earned $50, less bank collection fee $15 1,035.00

Illustration 7-9 shows Laird’s bank reconciliation.

Helpful Hint Note in the bank statement that the bank has paid checks No. 459 and 461, but check No. 460 is not listed. Thus, this check is outstanding. If a complete bank statement were provided, checks No. 453 and 457 also would not be listed. Laird obtains the amounts for these three checks from its cash payments records.

Control Features: Use of a Bank 355

Illustration 7-9 Bank reconciliationLAIRD COMPANY

Bank Reconciliation April 30, 2012

Cash balance per bank statement $ 15,907.45 Add: Deposits in transit 2,201.40

18,108.85

Less: Outstanding checks No. 453 $3,000.00 No. 457 1,401.30 No. 460 1,502.70 5,904.00

Adjusted cash balance per bank $12,204.85

Cash balance per books $ 11,589.45 Add: Collection of note receivable for

$1,000 plus interest earned $50, less collection fee $15 $1,035.00

Error in recording check No. 443 36.00 1,071.00

12,660.45

Less: NSF check 425.60 Bank service charge 30.00 455.60

Adjusted cash balance per books $12,204.85

Alternative Terminology The terms adjusted cash balance, true cash balance, and correct cash balance are used interchangeably.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 355

356 chapter 7 Fraud, Internal Control, and Cash

Entries from Bank Reconciliation The depositor (that is, the company) next must record each reconciling item used to determine the adjusted cash balance per books. If the company does not journalize and post these items, the Cash account will not show the correct balance. The adjusting entries for the Laird Company bank reconciliation on April 30 are as follows.

COLLECTION OF NOTE RECEIVABLE. This entry involves four accounts. Assuming that the interest of $50 has not been recorded and the collection fee is charged to Miscellaneous Expense, the entry is:

BOOK ERROR. An examination of the cash disbursements journal shows that check No. 443 was a payment on account to Andrea Company, a supplier. The correcting entry is:

NSF CHECK. As indicated earlier, an NSF check becomes an accounts receivable to the depositor. The entry is:

BANK SERVICE CHARGES. Companies typically debit to Miscellaneous Expense the check printing charges (DM) and other bank service charges (SC) because they are usually small in amount. Laird’s entry is:

Helpful Hint These entries are adjusting entries. In prior chapters, we considered Cash an account that did not require adjustment because we had not yet explained a bank reconciliation.

Apr. 30 Cash 1,035 Miscellaneous Expense 15

Notes Receivable 1,000 Interest Revenue 50

(To record collection of note receivable by bank)

A SEL= +

�1,035 �15 Exp

�1,000 �50 Rev

Cash Flows �1,035

Apr. 30 Cash 36 Accounts Payable—Andrea Company 36

(To correct error in recording check No. 443)

A SEL= +

�36 �36

Cash Flows �36

Apr. 30 Accounts Receivable—J. R. Baron 425.60 Cash 425.60

(To record NSF check)

A SEL= +

�425.60 �425.60

Cash Flows �425.60

Apr. 30 Miscellaneous Expense 30 Cash 30

(To record charge for printing company checks)

A SEL= +

�30 Exp �30

Cash Flows �30

The foregoing entries could also be combined into one compound entry. After Laird posts the entries, the Cash account will appear as in Illustration

7-10. The adjusted cash balance in the ledger should agree with the adjusted cash balance per books in the bank reconciliation in Illustration 7-9 (page 355).

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 356

What entries does the bank make? If the company discovers any bank er- rors in preparing the reconciliation, it should notify the bank so the bank can make the necessary corrections on its records. The bank does not make any en- tries for deposits in transit or outstanding checks. Only when these items reach the bank will the bank record these items.

Electronic Funds Transfer (EFT) System It is not surprising that companies and banks have developed approaches to trans- fer funds among parties without the use of paper (deposit tickets, checks, etc.). Such procedures, called electronic funds transfers (EFTs), are disbursement sys- tems that use wire, telephone, or computers to transfer cash from one location to another. Use of EFT is quite common. For example, many employees receive no formal payroll checks from their employers. Instead, employers send electronic payroll data to the appropriate banks. Also, individuals now frequently make reg- ular payments such as those for house, car, and utilities by EFT.

EFT transactions normally result in better internal control since no cash or checks are handled by company employees. This does not mean that opportu- nities for fraud are eliminated. In fact, the same basic principles related to in- ternal control apply to EFT transactions. For example, without proper segrega- tion of duties and authorizations, an employee might be able to redirect electronic payments into a personal bank account and conceal the theft with fraudulent accounting entries.

Control Features: Use of a Bank 357

Illustration 7-10 Adjusted balance in Cash account

Cash

Apr. 30 Bal. 11,589.45 Apr. 30 425.60

30 1,035.00 30 30.00

30 36.00

Apr. 30 Bal. 12,204.85

Madoff’s Ponzi Scheme

No recent fraud has generated more interest and rage than the one perpe- trated by Bernard Madoff. Madoff was an elite New York investment fund manager who was highly regarded by securities regulators. Investors flocked to him because he de- livered very steady returns of between 10% and 15%, no matter whether the market was going up or going down. However, for many years, Madoff did not actually invest the cash that people gave to him. Instead, he was running a Ponzi scheme: He paid re- turns to existing investors using cash received from new investors. As long as the size of his investment fund continued to grow from new investments at a rate that exceeded the amounts that he needed to pay out in returns, Madoff was able to operate his fraud smoothly. To conceal his misdeeds, he fabricated false investment statements that were provided to investors. In addition, Madoff hired an auditor that never verified the accu- racy of the investment records but automatically issued unqualified opinions each year. Although a competing fund manager warned the SEC a number of times over a nearly 10-year period that he thought Madoff was engaged in fraud, the SEC never aggres- sively investigated the allegations. Investors, many of which were charitable organiza- tions, lost more than $18 billion. Madoff was sentenced to a jail term of 150 years.

Investor Insight

? How was Madoff able to conceal such a giant fraud? (See page 392.)

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 357

358 chapter 7 Fraud, Internal Control, and Cash

Reporting Cash Cash consists of coins, currency (paper money), checks, money orders, and money on hand or on deposit in a bank or similar depository. Checks that are dated later than the current date (post-dated checks) are not included in cash. Companies re- port cash in two different statements: the balance sheet and the statement of cash flows. The balance sheet reports the amount of cash available at a given point in time. The statement of cash flows shows the sources and uses of cash during a period of time. The cash flow statement was introduced in Chapters 1 and 2 and will be discussed in much detail in Chapter 12. In this section, we discuss some important points regarding the presentation of cash in the balance sheet.

When presented in a balance sheet, cash on hand, cash in banks, and petty cash are often combined and reported simply as Cash. Because it is the most liquid asset owned by the company, cash is listed first in the current assets sec- tion of the balance sheet.

CASH EQUIVALENTS

Many companies use the designation “Cash and cash equivalents” in reporting cash. (See Illustration 7-11 for an example.) Cash equivalents are short-term, highly liquid investments that are both:

1. Readily convertible to known amounts of cash, and

2. So near their maturity that their market value is relatively insensitive to changes in interest rates.

BANK RECONCILIATION

before you go on… Do it!

Sally Kist owns Linen Kist Fabrics. Sally asks you to explain how she should treat the following reconciling items when reconciling the company’s bank ac- count: (1) a debit memorandum for an NSF check, (2) a credit memorandum for a note collected by the bank, (3) outstanding checks, and (4) a deposit in transit.

Solution

Action Plan

• Understand the purpose of a bank reconciliation.

• Identify time lags and explain how they cause reconciling items.

Sally should treat the reconciling items as follows.

(1) NSF check: Deduct from balance per books. (2) Collection of note: Add to balance per books. (3) Outstanding checks: Deduct from balance per bank. (4) Deposit in transit: Add to balance per bank.

Related exercise material: BE7-8, BE7-9, BE7-10, BE7-11, 7-3, E7-6, E7-7, E7-8, E7-9, E7-10, and E7-11.

Do it!

6 Explain the reporting of cash.

DELTA AIR LINES, INC. Balance Sheet (partial) December 31, 2009

(in millions)

Assets

Current assets Cash and cash equivalents $4,607 Short-term investments 71 Restricted cash 423 Accounts receivable and other, net 1,360 Parts inventories 327 Prepaid expenses and other 953

Total current assets $7,741

Illustration 7-11 Balance sheet presentation of cash

study objective

c07Fraud,InternalControl,andCash.qxd 10/1/10 5:22 PM Page 358

Examples of cash equivalents are Treasury bills, commercial paper (short-term corporate notes), and money market funds. All typically are purchased with cash that is in excess of immediate needs.

Occasionally a company will have a net negative balance in its bank account. In this case, the company should report the negative balance among current li- abilities. For example, farm equipment manufacturer Ag-Chem recently reported “Checks outstanding in excess of cash balances” of $2,145,000 among its cur- rent liabilities.

RESTRICTED CASH

A company may have restricted cash, cash that is not available for general use but rather is restricted for a special purpose. For example, landfill companies are often required to maintain a fund of restricted cash to ensure they will have adequate resources to cover closing and clean-up costs at the end of a landfill site’s useful life. McKesson Corp. recently reported restricted cash of $962 mil- lion to be paid out as the result of investor lawsuits.

Cash restricted in use should be reported separately on the balance sheet as restricted cash. If the company expects to use the restricted cash within the next year, it reports the amount as a current asset. When this is not the case, it re- ports the restricted funds as a noncurrent asset.

Illustration 7-11 shows restricted cash reported in the financial statements of Delta Air Lines. The company is required to maintain restricted cash as col- lateral to support insurance obligations related to workers’ compensation claims. Delta does not have access to these funds for general use, and so it must report them separately, rather than as part of cash and cash equivalents.

Managing and Monitoring Cash 359

Ethics Note Recently, some companies were forced to restate their financial statements because they had too broadly interpreted which types of investments could be treated as cash equivalents. By reporting these items as cash equivalents, the companies made themselves look more liquid.

DECISION TOOLKIT DECISION CHECKPOINTS TOOL TO USE FOR DECISION HOW TO EVALUATE RESULTS

Is all of the company’s cash available for general use?

Balance sheet and notes to financial statements

Does the company report any cash as being restricted?

A restriction on the use of cash limits management’s ability to use those resources for general obligations. This might be considered when assessing liquidity.

INFO NEEDED FOR DECISION

Managing and Monitoring Cash Many companies struggle, not because they fail to generate sales, but because they can’t manage their cash. A real-life example of this is a clothing manufac- turing company owned by Sharon McCollick. McCollick gave up a stable, high- paying marketing job with Intel Corporation to start her own company. Soon she had more orders from stores such as JC Penney and Dayton Hudson (now Target) than she could fill. Yet she found herself on the brink of financial disas- ter, owing three mortgage payments on her house and $2,000 to the IRS. Her company could generate sales, but it was not collecting cash fast enough to sup- port its operations. The bottom line is that a business must have cash.5

A merchandising company’s operating cycle is generally shorter than that of a manufacturing company. Illustration 7-12 (page 360) shows the cash to cash operating cycle of a merchandising operation.

5Adapted from T. Petzinger, Jr., “The Front Lines—Sharon McCollick Got Mad and Tore Down a Bank’s Barriers,” Wall Street Journal (May 19, 1995), p. B1.

c07Fraud,InternalControl,andCash.qxd 9/3/10 11:51 AM Page 359

360 chapter 7 Fraud, Internal Control, and Cash

To understand cash management, consider the operating cycle of Sharon McCollick’s clothing manufacturing company. First, it purchases cloth. Let’s as- sume that it purchases the cloth on credit provided by the supplier, so the com- pany owes its supplier money. Next, employees convert the cloth to clothing. Now the company also owes its employees money. Next, it sells the clothing to retailers, on credit. McCollick’s company will have no money to repay suppliers or employees until it receives payments from customers. In a manufacturing op- eration there may be a significant lag between the original purchase of raw ma- terials and the ultimate receipt of cash from customers.

Managing the often-precarious balance created by the ebb and flow of cash during the operating cycle is one of a company’s greatest challenges. The objective is to ensure that a company has sufficient cash to meet payments as they come due, yet minimize the amount of non-revenue-generating cash on hand.

BASIC PRINCIPLES OF CASH MANAGEMENT

Management of cash is the responsibility of the company treasurer. Any com- pany can improve its chances of having adequate cash by following five basic principles of cash management.

1. Increase the speed of receivables collection. Money owed Sharon McCollick by her customers is money that she can’t use. The more quickly customers pay her, the more quickly she can use those funds. Thus, rather than have an average collection period of 30 days, she may want an average collection period of 15 days. However, she must carefully weigh any attempt to force her customers to pay earlier against the possibility that she may anger or alienate customers. Perhaps her competitors are willing to provide a 30-day grace period. As noted in Chapter 5, one common way to encourage customers to pay more quickly is to offer cash discounts for early payment under such terms as 2/10, n/30.

2. Keep inventory levels low. Maintaining a large inventory of cloth and fin- ished clothing is costly. It ties up large amounts of cash, as well as ware- house space. Increasingly, companies are using techniques to reduce the inventory on hand, thus conserving their cash. Of course, if Sharon McCollick has inadequate inventory, she will lose sales. The proper level of inventory is an important decision.

3. Monitor payment of liabilities. Sharon McCollick should monitor when her bills are due, so she avoids paying bills too early. Let’s say her supplier

Sell Inventory

Merchandising Company

Cash

InventoryAccountsReceivable

Receive Cash Buy Inventory

PCPC

MENU

Brien’s itunes playlist

Sgt. Pepper’s L. H.C.B.

All I Want is A Life

What Gonna Do Wia Cowboy?

When My Ship Comes In

T VT VT V

Illustration 7-12 Operating cycle of a merchandising company

7 Discuss the basic principles of cash management.

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 360

allows 30 days for payment. If she pays in 10 days, she has lost the use of that cash for 20 days. Therefore, she should use the full payment period. But, she should not pay late. This could damage her credit rating (and future borrowing ability). Also, late payments to suppliers can damage important supplier relationships and may even threaten a supplier’s viability. Sharon McCollick’s company also should conserve cash by taking cash discounts of- fered by suppliers, when possible.

4. Plan the timing of major expenditures. To maintain operations or to grow, all companies must make major expenditures. These often require some form of outside financing. In order to increase the likelihood of obtaining outside financing, McCollick should carefully consider the timing of major expendi- tures in light of her company’s operating cycle. If at all possible, she should make any major expenditure when the company normally has excess cash— usually during the off-season.

5. Invest idle cash. Cash on hand earns nothing. An important part of the trea- surer’s job is to ensure that the company invests any excess cash, even if it is only overnight. Many businesses, such as Sharon McCollick’s clothing com- pany, are seasonal. During her slow season, when she has excess cash, she should invest it.

To avoid a cash crisis, however, it is very important that investments of idle cash be highly liquid and risk-free. A liquid investment is one with a market in which someone is always willing to buy or sell the invest- ment. A risk-free investment means there is no concern that the party will default on its promise to pay its principal and interest. For example, us- ing excess cash to purchase stock in a small company because you heard that it was probably going to increase in value in the near term is totally inappropriate. First, the stock of small companies is often illiquid. Sec- ond, if the stock suddenly decreases in value, you might be forced to sell the stock at a loss in order to pay your bills as they come due. The most common form of liquid investments is interest-paying U.S. government securities.

Illustration 7-13 summarizes these five principles of cash management.

Managing and Monitoring Cash 361

International Note International sales complicate cash management. For example, if Nike must repay a Japanese supplier 30 days from today in Japanese yen, Nike will be concerned about how the exchange rate of U.S. dollars for yen might change during those 30 days. Often, corporate treasurers make investments known as hedges to lock in an exchange rate to reduce the com- pany’s exposure to exchange-rate fluctuation.

1. Increase the speed of receivables collection

3. Monitor payment of liabilities 5. Invest idle cash

2. Keep inventory low

4. Plan timing of major expenditures

Expand factory

$ high

$ low

$ low

Payments due

Warehou se

Payments Due S M Tu W Th F S

1 2 3 4 5 6 7 8 10 11 13 14 15 16 17 18 19 20 21 22 24 25 26 27 28

23 29 30

12 9

T Bill

Illustration 7-13 Five principles of sound cash management

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 361

362 chapter 7 Fraud, Internal Control, and Cash

KEEPING AN EYE ON CASH

Because cash is so vital to a company, planning the company’s cash needs is a key business activity. It enables the company to plan ahead to cover possible cash shortfalls and to make investments of idle funds. The cash budget shows anticipated cash flows, usually over a one- to two-year period. In this section, we introduce the basics of cash budgeting. More advanced discussion of cash budgets and budgets in general is provided in managerial accounting texts.

As shown below, the cash budget contains three sections—cash receipts, cash disbursements, and financing—and the beginning and ending cash balances.

The Cash receipts section includes expected receipts from the company’s principal source(s) of cash, such as cash sales and collections from customers on credit sales. This section also shows anticipated receipts of interest and div- idends, and proceeds from planned sales of investments, plant assets, and the company’s capital stock.

The Cash disbursements section shows expected payments for inventory, labor, overhead, and selling and administrative expenses. It also includes pro- jected payments for income taxes, dividends, investments, and plant assets. Note that it does not include depreciation since depreciation expense does not use cash.

The Financing section shows expected borrowings and repayments of bor- rowed funds plus interest. Financing is needed when there is a cash deficiency or when the cash balance is less than management’s minimum required balance.

Companies must prepare multi-period cash budgets in sequence because the ending cash balance of one period becomes the beginning cash balance for the next period. In practice, companies often prepare cash budgets for the next 12 months on a monthly basis.

To minimize detail, we will assume that Hayes Company prepares an annual cash budget by quarters. Preparing a cash budget requires making some assump- tions. For example, Hayes makes assumptions regarding collection of accounts receivable, sales of securities, payments for materials and salaries, and purchases of property, plant, and equipment. The accuracy of the cash budget is very de- pendent on the accuracy of these assumptions.

On the next page, we present the cash budget for Hayes Company. The budget indicates that the company will need $3,000 of financing in the second quarter to maintain a minimum cash balance of $15,000. Since there is an excess of available cash over disbursements of $22,500 at the end of the third quarter, Hayes will repay the borrowing, plus $100 interest, in that quarter.

A cash budget contributes to more effective cash management. For ex- ample, it can show when a company will need additional financing, well before the actual need arises. Conversely, it can indicate when the company will have excess cash available for investments or other purposes.

8 Identify the primary elements of a cash budget.

ANY COMPANY Cash Budget

Beginning cash balance $X,XXX Add: Cash receipts (itemized) X,XXX

Total available cash X,XXX Less: Cash disbursements (itemized) X,XXX

Excess (deficiency) of available cash over cash disbursements X,XXX

Financing Add: Borrowings X,XXX Less: Repayments X,XXX

Ending cash balance $X,XXX

study objective

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 362

Managing and Monitoring Cash 363

HAYES COMPANY Cash Budget

For the Year Ending December 31, 2012

Quarter

1 2 3 4

Beginning cash balance $ 38,000 $ 25,500 $ 15,000 $ 19,400 Add: Cash receipts

Collections from customers 168,000 198,000 228,000 258,000 Sale of securities 2,000 0 0 0

Total receipts 170,000 198,000 228,000 258,000

Total available cash 208,000 223,500 243,000 277,400 Less: Cash disbursements

Inventory 23,200 27,200 31,200 35,200 Salaries 62,000 72,000 82,000 92,000 Selling and administrative

expenses (excluding depreciation) 94,300 99,300 104,300 109,300

Purchase of truck 0 10,000 0 0 Income tax expense 3,000 3,000 3,000 3,000

Total disbursements 182,500 211,500 220,500 239,500

Excess (deficiency) of available cash over disbursements 25,500 12,000 22,500 37,900

Financing Add: Borrowings 0 3,000 0 0 Less: Repayments—plus $100

interest 0 0 3,100 0

Ending cash balance $ 25,500 $ 15,000 $ 19,400 $ 37,900

DECISION TOOLKIT DECISION CHECKPOINTS TOOL TO USE FOR DECISION HOW TO EVALUATE RESULTS

Will the company be able to meet its projected cash needs?

Cash budget (typically available only to management)

The cash budget shows projected sources and uses of cash. If cash uses exceed internal cash sources, then the company must look for outside sources.

Two issues: (1) Are management’s projections reasonable? (2) If outside sources are needed, are they available?

INFO NEEDED FOR DECISION

CASH BUDGET

before you go on…

Do it! Martian Company’s management wants to maintain a minimum

monthly cash balance of $15,000. At the beginning of March, the cash balance is $16,500; expected cash receipts for March are $210,000; and cash disbursements are expected to be $220,000. How much cash, if any, must Martian borrow to maintain the desired min- imum monthly balance?

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 363

364 chapter 7 Fraud, Internal Control, and Cash

Solution

Beginning cash balance $ 16,500 Add: Cash receipts for March 210,000

Total available cash 226,500 Less: Cash disbursements for March 220,000

Excess of available cash over cash disbursements 6,500 Financing

Add: Borrowings 8,500

Ending cash balance $ 15,000

To maintain the desired minimum cash balance of $15,000, Martian Company must borrow $8,500 of cash.

Related exercise material: BE7-13, 7-4, and E7-14.Do it!

Action Plan

• Add the beginning cash balance to receipts to determine total available cash.

• Subtract disbursements to determine excess or deficiency.

• Compare excess or deficiency with desired minimum cash to determine borrowing needs.

Presented below is hypothetical financial information for Mattel Corporation. In- cluded in this information is financial statement data from the year ended Decem- ber 31, 2011, which should be used to evaluate Mattel’s cash position.

Selected Financial Information Year Ended December 31, 2011

(in millions)

Net cash provided by operations $325 Capital expenditures 162 Dividends paid 80 Total expenses 680 Depreciation expense 40 Cash balance 206

Also provided are projected data which are management’s best estimate of its sources and uses of cash during 2012. This information should be used to prepare a cash budget for 2012.

Projected Sources and Uses of Cash (in millions)

Beginning cash balance $206 Cash receipts from sales of product 355 Cash receipts from sale of short-term investments 20 Cash payments for inventory 357 Cash payments for selling and administrative costs 201 Cash payments for property, plant, and equipment 45 Cash payments for taxes 17

Mattel Corporation’s management believes it should maintain a balance of $200 mil- lion cash.

Instructions

(a) Using the hypothetical projected sources and uses of cash information presented above, prepare a cash budget for 2012 for Mattel Corporation.

(b) Comment on the company’s cash adequacy, and discuss steps that might be taken to improve its cash position.

USING THE DECISION TOOLKIT

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 364

Summary of Study Objectives 365

Solution

(a) MATTEL CORPORATION Cash Budget

For the Year 2012 (in millions)

Beginning cash balance $206 Add: Cash receipts

From sales of product $355 From sale of short-term investments 20 375

Total available cash 581 Less: Cash disbursements

Payments for inventory 357 Payments for selling and administrative costs 201 Payments for property, plant, and equipment 45 Payments for taxes 17

Total disbursements 620

Excess (deficiency) of available cash over disbursements (39) Financing

Add: Borrowings 239

Ending cash balance $200

(b) Using these hypothetical data, Mattel’s cash position appears adequate. For 2012, Mattel is projecting a cash shortfall. This is not necessarily of concern, but it should be investigated. Given that its primary line of business is toys, and that most toys are sold during December, we would expect Mattel’s cash position to vary significantly during the course of the year. After the holiday season, it prob- ably has a lot of excess cash. Earlier in the year, when it is making and selling its product but has not yet been paid, it may need to borrow to meet any tem- porary cash shortfalls.

If Mattel’s management is concerned with its cash position, it could take the following steps: (1) Offer its customers cash discounts for early payment, such as 2/10, n/30. (2) Implement inventory management techniques to reduce the need for large inventories of such things as the plastics used to make its toys. (3) Carefully time payments to suppliers by keeping track of when payments are due, so as not to pay too early. (4) If it has plans for major expenditures, time those expenditures to coincide with its seasonal period of excess cash.

Summary of Study Objectives 1 Define fraud and internal control. A fraud is a dishon-

est act by an employee that results in personal bene- fit to the employee at a cost to the employer. The fraud triangle refers to the three factors that contribute to fraudulent activity by employees: opportunity, finan- cial pressure, and rationalization. Internal control consists of all the related methods and measures adopted within an organization to safeguard its assets, enhance the reliability of its accounting records, in- crease efficiency of operations, and ensure compliance with laws and regulations.

2 Identify the principles of internal control activities. The principles of internal control are: establishment of responsibility; segregation of duties; documentation procedures; physical controls; independent internal verification; and human resource controls.

3 Explain the applications of internal control principles to cash receipts. Internal controls over cash receipts in- clude: (a) designating only personnel such as cashiers to handle cash; (b) assigning the duties of receiving cash, recording cash, and having custody of cash to different individuals; (c) obtaining remittance advices for mail receipts, cash register tapes for over-the- counter receipts, and deposit slips for bank deposits; (d) using company safes and bank vaults to store cash with access limited to authorized personnel, and using cash registers in executing over-the-counter receipts; (e) making independent daily counts of register re- ceipts and daily comparisons of total receipts with total deposits; and (f) conducting background checks and bonding personnel who handle cash, as well as requiring them to take vacations.

c07Fraud,InternalControl,andCash.qxd 9/2/10 1:42 PM Page 365

366 chapter 7 Fraud, Internal Control, and Cash

4 Explain the applications of internal control principles to cash disbursements. Internal controls over cash dis- bursements include: (a) having only specified individ- uals such as the treasurer authorized to sign checks; (b) assigning the duties of approving items for payment, paying the items, and recording the payment to dif- ferent individuals; (c) using prenumbered checks and accounting for all checks, with each check supported by an approved invoice; after payment, stamping each approved invoice “paid”; (d) storing blank checks in a safe or vault with access restricted to authorized per- sonnel, and using a machine with indelible ink to imprint amounts on checks; (e) comparing each check with the approved invoice before issuing the check, and making monthly reconciliations of bank and book balances; and (f) bonding personnel who handle cash, requiring employees to take vacations, and conduct- ing background checks.

5 Prepare a bank reconciliation. In reconciling the bank account, it is customary to reconcile the balance per books and the balance per bank to their adjusted balance. The steps reconciling the Cash account are to

determine deposits in transit, outstanding checks, errors by the depositor or the bank, and unrecorded bank memoranda.

6 Explain the reporting of cash. Cash is listed first in the current assets section of the balance sheet. Compa- nies often report cash together with cash equivalents. Cash restricted for a special purpose is reported separately as a current asset or as a noncurrent asset, depending on when the company expects to use the cash.

7 Discuss the basic principles of cash management. The basic principles of cash management include: (a) in- crease the speed of receivables collection, (b) keep inventory levels low, (c) monitor the timing of payment of liabilities, (d) plan timing of major expenditures, and (e) invest idle cash.

8 Identify the primary elements of a cash budget. The three main elements of a cash budget are the cash receipts section, cash disbursements section, and financing section.

Are the company’s financial statements supported by adequate internal controls?

Auditor’s report, management discussion and analysis, articles in financial press

The principles of internal control activities are (1) establishment of responsibility, (2) segregation of duties, (3) documentation procedures, (4) physical controls, (5) independent internal verification, and (6) human resource controls.

If any indication is given that these or other controls are lacking, use the financial statements with caution.

Is all of the company’s cash available for general use?

Balance sheet and notes to financial statements

Does the company report any cash as being restricted?

A restriction on the use of cash limits management’s ability to use those resources for general obligations. This might be considered when assessing liquidity.

Will the company be able to meet its projected cash needs?

Cash budget (typically available only to management)

The cash budget shows projected sources and uses of cash. If cash uses exceed internal cash sources, then the company must look for outside sources.

Two issues: (1) Are management’s projections reasonable? (2) If outside sources are needed, are they available?

DECISION CHECKPOINTS TOOL TO USE FOR DECISION HOW TO EVALUATE RESULTSINFO NEEDED FOR DECISION

DECISION TOOLKIT A SUMMARY

The operation of a petty cash fund involves (1) establishing the fund, (2) mak- ing payments from the fund, and (3) replenishing the fund.

appendix 7A

Operation of the Petty Cash Fund study objective 9 Explain the operation of a petty cash fund.

c07Fraud,InternalControl,andCash.qxd 8/16/10 2:19 PM Page 366

Ethics Note Petty cash funds are authorized and legitimate. In contrast, “slush” funds are unauthorized and hidden (under the table).

Helpful Hint From the standpoint of internal control, the receipt satisfies two principles: (1) establishing responsibility (signature of custodian), and (2) documentation procedures.

Helpful Hint Replenishing involves three internal control pro- cedures: segregation of duties, documentation procedures, and independent internal verification.

Appendix 7A: Operation of the Petty Cash Fund 367

ESTABLISHING THE PETTY CASH FUND

Two essential steps in establishing a petty cash fund are: (1) appointing a petty cash custodian who will be responsible for the fund, and (2) determining the size of the fund. Ordinarily, a company expects the amount in the fund to cover anticipated disbursements for a three- to four-week period.

When the company establishes the petty cash fund, it issues a check payable to the petty cash custodian for the stipulated amount. If Laird Com- pany decides to establish a $100 fund on March 1, the entry in general jour- nal form is:

Mar. 1 Petty Cash 100 Cash 100

(To establish a petty cash fund)

The fund custodian cashes the check and places the proceeds in a locked petty cash box or drawer. Most petty cash funds are established on a fixed-amount basis. Moreover, the company will make no additional entries to the Petty Cash account unless the stipulated amount of the fund is changed. For example, if Laird Company decides on July 1 to increase the size of the fund to $250, it would debit Petty Cash $150 and credit Cash $150.

MAKING PAYMENTS FROM PETTY CASH

The custodian of the petty cash fund has the authority to make payments from the fund that conform to prescribed management policies. Usually, management limits the size of expenditures that come from petty cash and does not permit use of the fund for certain types of transactions (such as making short-term loans to employees).

Each payment from the fund must be documented on a prenumbered petty cash receipt (or petty cash voucher). The signatures of both the custodian and the individual receiving payment are required on the receipt. If other support- ing documents such as a freight bill or invoice are available, they should be at- tached to the petty cash receipt.

The custodian keeps the receipts in the petty cash box until the fund is re- plenished. As a result, the sum of the petty cash receipts and money in the fund should equal the established total at all times. This means that management can make surprise counts at any time by an independent person, such as an inter- nal auditor, to determine the correctness of the fund.

The company does not make an accounting entry to record a payment at the time it is taken from petty cash. It is considered both inexpedient and unneces- sary to do so. Instead, the company recognizes the accounting effects of each payment when the fund is replenished.

REPLENISHING THE PETTY CASH FUND

When the money in the petty cash fund reaches a minimum level, the company replenishes the fund. The petty cash custodian initiates a request for reimburse- ment. This individual prepares a schedule (or summary) of the payments that have been made and sends the schedule, supported by petty cash receipts and other documentation, to the treasurer’s office. The receipts and supporting documents are examined in the treasurer’s office to verify that they were proper payments from the fund. The treasurer then approves the request, and a check is prepared to restore the fund to its established amount. At the same time, all supporting documentation is stamped “paid” so that it cannot be submitted again for payment.

Categories
essay writing service how to write an admission essay professional essay writers

as a first step in the accounting cycle, _________ involves the recording of business transactions.

Financial Accounting

JAN R. WILLIAMS University of Tennessee

SUSAN F. HAKA Michigan State University

MARK S. BETTNER Bucknell University

JOSEPH V. CARCELLO University of Tennessee

16TH EDITION

wil62384_fm_i-xxxiii.indd iwil62384_fm_i-xxxiii.indd i 11/26/13 9:52 PM11/26/13 9:52 PM

Final PDF to printer

FINANCIAL ACCOUNTING, SIXTEENTH EDITION

Published by McGraw-Hill Education, 2 Penn Plaza, New York, NY 10121. Copyright © 2015 by McGraw-Hill Education. All rights reserved. Printed in the United States of America. Previous editions © 2012, 2010, and 2008. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning.

Some ancillaries, including electronic and print components, may not be available to customers outside the United States.

This book is printed on acid-free paper.

1 2 3 4 5 6 7 8 9 0 DOW/DOW 1 0 9 8 7 6 5 4

ISBN 978-0-07-786238-1 MHID 0-07-786238-4

Senior Vice President, Products & Markets: Kurt L. Strand Vice President, Content Production & Technology Services: Kimberly Meriwether David Managing Director: Tim Vertovec Executive Brand Manager: Steve Schuetz Executive Director of Development: Ann Torbert Development Editor: Rebecca Mann Director of Digital Content: Patricia Plumb Digital Development Editor: Julie Hankins Senior Marketing Manager: Kathleen Klehr Director, Content Production: Terri Schiesl Content Project Manager: Angela Norris Content Project Manager: Brian Nacik Senior Buyer: Michael R. McCormick Design: Srdjan Savanovic Cover Image: © Giorgio Fochesato/Getty Images Icon Images: © Tom Grill/Getty Images (Internet); © Tom Grill/Getty Images (Financial Analysis and Decision Making); © Solomonkein/Shutterstock (International Case in Point); © Maksim Kabakou/Shutterstock (marginal notes icon) Content Licensing Specialist: Joanne Mennemeier Typeface: 10/12 Times Roman Compositor: Laserwords Private Limited Printer: R. R. Donnelley

All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.

Library of Congress Cataloging-in-Publication Data

Williams, Jan R. Financial accounting / Jan R. Williams, University of Tennessee, Susan F. Haka, Michigan State University, Mark S. Bettner, Bucknell University, Joseph V. Carcello, University of Tennessee. —16th edition. pages cm Revised edition of: Financial accounting / Jan R. Williams . . . [et al.]. 15th ed. ISBN 978-0-07-786238-1 (alk. paper)—ISBN 0-07-786238-4 (alk. paper) 1. Accounting. I. Title. HF5636.W7254 2015 657—dc23 2013041567

The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website does not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not guarantee the accuracy of the information presented at these sites.

www.mhhe.com

wil62384_fm_i-xxxiii.indd iiwil62384_fm_i-xxxiii.indd ii 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

iii

To Ben and Meg Wishart and Asher, Lainey, and Lucy Hunt, who have taught me the joys of being a grandfather.

— Jan R. Williams

For Cliff, Abi, and my mother, Fran.

— Susan F. Haka

To my parents, Fred and Marjorie.

— Mark S. Bettner

To Terri, Stephen, Karen, and Sarah, whose sacrifices enabled me to participate in writing this book. Thank you—I love you!

— Joseph V. Carcello

wil62384_fm_i-xxxiii.indd iiiwil62384_fm_i-xxxiii.indd iii 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

iv

Meet the Authors

Jan R. Williams is Dean and Professor Emeritus of the College of Business Administration at the University of Tennessee— Knoxville, where he has been a faculty member since 1977. He received a BS degree from George Peabody College, an MBA from Baylor University, and a PhD from the University of Arkansas. He previously served on the faculties at the Univer- sity of Georgia and Texas Tech University. A CPA in Tennessee and Arkansas, Dr. Williams is also the coauthor of three books and has published over 70 articles on issues of corporate financial reporting and accounting education.

He served as president of the American Accounting Association in 1999–2000 and has been actively involved in Beta Alpha Psi, the Tennessee Society of CPAs, the American Institute of CPAs, and AACSB International—the Association to Advance Collegiate Schools of Business—the accrediting organization for business schools and accounting programs worldwide. He served as chair of the Board of Directors of AACSB International in 2011 through 2012. He retired from the University of Tennessee in 2013, and remains active in several business and accounting profes- sional organizations.

Susan F. Haka is the Senior Associate Dean for Academic Affairs and Research in the Broad College of Business and the EY Professor of Accounting in the Department of Accounting and Information Systems at Michigan State University. Dr. Haka received her PhD from the University of Kansas and a master’s degree in accounting from the University of Illinois. She served as president of the American Accounting Association in 2008–2009 and has pre- viously served as president of the Management Accounting Section. Dr. Haka is active in editorial processes and has been editor of Behavioral Research

in Accounting and an associate editor of Journal of Management Accounting Research, Accounting Horizons, The International Journal of Accounting, and Contemporary Accounting Research. Dr. Haka has been honored by Michigan State University with several teaching and research awards, including both the university-wide Teacher- Scholar and Distinguished Faculty awards. In 2012, Dr. Haka was honored with the Outstanding Accounting Educator Award from the American Accounting Association.

wil62384_fm_i-xxxiii.indd ivwil62384_fm_i-xxxiii.indd iv 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

v

Mark S. Bettner is the Christian R. Lindback Chair of Accounting & Financial Management at Bucknell University. Dr. Bettner received his PhD in business administration from Texas Tech University and his MS in accounting from Virginia Tech University. In addition to his work on Financial Accounting and Financial & Managerial Accounting, he has written many ancillary materi- als, published in scholarly journals, and presented at academic and practitio- ner conferences. Professor Bettner is also on the editorial advisory boards of several academic journals, including the International Journal of Accounting and Business Society and the International Journal of Business and Accounting, and has served as a reviewer for several journals, including Advances in Public Interest Accounting, Essays in Economics and Business History, Critical Perspectives on Accounting, and International Journal on Critical Accounting. Professor Bettner also offers professional development courses for the Pennsylvania Bankers Association.

Joseph V. Carcello is the EY and Business Alumni Professor in the Department of Accounting and Information Management at the University of Tennessee. He also is the cofounder and executive director for UT’s Corporate Governance Center. Dr. Carcello received his PhD from Georgia State Univer- sity, his MAcc from the University of Georgia, and his BS from the State Uni- versity of New York College at Plattsburgh. Dr. Carcello is currently the author or coauthor of three books, more than 60 journal articles, and five monographs. Dr. Carcello serves on the Public Company Accounting Oversight Board’s (PCAOB) Investor Advisory Group, and he previously served three terms on the PCAOB’s Standing Advisory Group. He has testified before committees and working groups of the U.S. Department of the Treasury on the future of the auditing profes- sion and on the JOBS Act. Dr. Carcello has also testified before a subcommittee of the U.S. House of Representatives Financial Services Committee on accounting and auditing regulation. He served as a member of the COSO task force that developed guidance on applying COSO’s internal control framework for smaller public com- panies. Dr. Carcello is active in the academic community—he serves as an editor of Contemporary Accounting Research, and serves on the editorial boards of The Accounting Review, Auditing: A Journal of Practice & Theory, Accounting Horizons, and Contemporary Issues in Auditing. Dr. Carcello has taught professional develop- ment programs for two of the Big Four accounting firms and for state CPA societies; conducted funded research for another Big Four firm, the AICPA, and the Center for Audit Quality; and served as an expert for the U.S. Securities and Exchange Commis- sion and for private attorneys.

wil62384_fm_i-xxxiii.indd vwil62384_fm_i-xxxiii.indd v 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

vi

As our eyes are drawn upward to the skyline of great cities, it’s important

to remember that these impressive constructions are able to reach such

heights only because their foundations are strong. In much the same way,

being successful in the business world begins with fundamental courses like

financial accounting. It is only when students have a firm grasp of concepts

like the accounting cycle that they have a base on which to stand, a strong

foundation on which to grow.

In this edition, as before, the Williams team has revised the text with a keen

eye toward the principle of helping students establish the foundation they will

need for future success in business. However, through new coverage of Inter-

national Financial Reporting Standards and a revised globalization chapter, the

Williams book also introduces students to larger themes and evolving con-

cerns. This dual emphasis allows students to keep their eyes trained upward

even as they become solidly grounded in accounting fundamentals.

REACHING

GREAT HEIGHTS BEGINS WITH A

SOLID BASE

wil62384_fm_i-xxxiii.indd viwil62384_fm_i-xxxiii.indd vi 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

The Williams book continues to rest on a bedrock of four key components:

Balanced Coverage. The 16th edition of Williams provides the most balanced coverage of financial topics on the market. By giving equal weight to financial topics, the authors emphasize the need for a strong foundation in accounting.

Clear Accounting Cycle Presentation. In the first five chapters of Financial Accounting, the authors present the Accounting Cycle in a clear, graphically interesting four-step process. Central to this presentation is the dedication of three successive chapters to three key components of the cycle: recording entries (Chapter 3), adjusting entries (Chapter 4), and closing entries (Chapter 5). The Williams team places easy-to-read margin notes explaining each equation used in particular journal entries.

Student Motivation. The Williams team has put together a market-leading student package that will not only motivate your stu- dents, but help you see greater retention rates in your accounting courses. Vital pieces of technology supplement the core curriculum covered in the book: McGraw-Hill Connect Accounting uses end-of- chapter material pulled directly from the textbook to create static and algorithmic questions that can be used for homework and prac- tice tests; and the Online Learning Center provides supplemental tools for both students and instructors.

Problem-Solving Skills. Financial Accounting challenges your students to think about real-world situations and put themselves in the role of the decision maker through Case in Point, Your Turn, and Ethics, Fraud, & Corporate Governance boxes. Students refer- ence the Home Depot Financial Statements—included in the text as an appendix—to further hone problem-solving skills by evaluat- ing real world financial data. The authors show a keen attention to detail when creating high-quality end-of-chapter material, such as the Critical Thinking Cases and Problems, ensuring that all home- work is tied directly back to chapter learning objectives.

ur

es By he

ng Cycle Presentation In the first five

“This is a well balanced text- book that encompasses many

issues, yet provides them in a pre- cise, readable, and orderly fashion

to students. The extent of the real- world examples makes this edition

clearly a superior choice.”

Hossein Noorian, Wentworth Institute

Cl ccha CCyc tthis tthr aadj WWi equ

“Excellent book! Explains diffi- cult subjects in easy-to-understand

terms.”

Naser Kamleh, Wallace Community College

cular journal entries.

a – g

m – c – l

g Skills. Financial Accounting challenges your g

“This textbook is current and very interactive. It brings in excellent “real-world” applications for the students to use in applying the

concepts. It has excellent student and instruc-

tor resources. Some of the resources would be especially

valuable for instructors teaching online.”

Karen Mozingo, Pitt Community College

Pr sstu tthe aand eenc aas ing det the

“The text is excellent. I wish the texts had been this well written

when I was a student!”

Mark Anderson, Bob Jones University

vii

wil62384_fm_i-xxxiii.indd viiwil62384_fm_i-xxxiii.indd vii 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

Recording Balance Sheet Transactions: An Illustration 93

its balance sheet. The revenue and expense transactions that took place on January 31 will be addressed later in the chapter.

Each transaction from January 20 through January 27 is analyzed first in terms of increases in assets, liabilities, and owners’ equity. Second, we follow the debit and credit rules for enter- ing these increases and decreases in specific accounts. Asset ledger accounts are shown on the left side of the analysis; liability and owners’ equity ledger accounts are shown on the right side. For convenience in the following transactions, both the debit and credit figures for the transaction under discussion are shown in red. Figures relating to earlier transactions appear in black.

Jan. 20 Michael McBryan and family invested $80,000 cash in exchange for capital stock.

Jan. 20 Cash . . . . . . . . . . . . . . . . . . . . . 80,000

Capital Stock . . . . . . . . . . . . . . . . . . . 80,000

JOURNAL ENTRY

ANALYSIS The asset Cash is increased by $80,000, and owners’ equity (Capital Stock) is increased by the same amount.

Increases in assets are recorded by debits; debit Cash $80,000.

Increases in owners’ equity are recorded by credits; credit Capital Stock $80,000.

DEBIT–CREDIT RULES

ENTRIES IN LEDGER

ACCOUNTS

Capital Stock

1/20 80,000

Cash

1/20 80,000

DEBIT–CREDIT RULES

Increases in assets are recorded by debits; debit Land $52,000.

Decreases in assets are recorded by credits; credit Cash $52,000.

ENTRIES IN LEDGER

ACCOUNTS

Land

1/21 52,000

Cash

1/20 80,000 1/21 52,000

The asset Land is increased $52,000, and the asset Cash is decreased $52,000.

ANALYSIS

JOURNAL ENTRY

Jan. 21 Land. . . . . . . . . . . . . . . . . . . . . . 52,000 Cash . . . . . . . . . . . . . . . . . . . . . . . . . . 52,000

Jan. 21 Representing Overnight, McBryan negotiated with both the City of Santa Teresa and Metropolitan Transit Authority (MTA) to purchase an abandoned bus garage. (The city owned the land, but the MTA owned the building.) On January 21, Overnight Auto Service purchased the land from the city for $52,000 cash.

Owners invest cash in the business

Owners’ Assets 5 Liabilities 1 Equity

1$80,000 1$80,000

Purchase of an asset for cash

Owners’ Assets 5 Liabilities 1 Equity

1$52,000 2$52,000

wil2577X_ch03_086-139.indd 93 8/23/13 7:56 AM

Financial Accounting was the FIRST text to illustrate Balance Sheet and Income Statement transactions using the four-step process described below. This hallmark coverage has been further revised and refined in the 16th edition.

The Williams team breaks down the Accounting Cycle into three full chapters to help students absorb and understand this material: recording entries (Chapter 3), adjusting entries (Chapter 4), and closing entries (Chapter 5). Transactions are demonstrated visually to help students conquer recording transactions by showing the four steps in the process:

How Does Williams Help Students

Analysis—shows which accounts are recorded with an increase/ decrease.

Debit/Credit Rules—helps students to remember whether the account should be debited/ credited.

Journal Entry—shows the result of the two previous steps.

Ledger T-Accounts—shows students what was recorded and where.

The Williams team puts the Accounting Equation (A 5 L 1 OE) in the margin by transaction illustrations to show students the big picture!

AA ar

1

D st

2

JoJ o

3

L st

4

viii

Step-by-Step Process for the Accounting Cycle

wil62384_fm_i-xxxiii.indd viiiwil62384_fm_i-xxxiii.indd viii 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

Brief Exercises Listed below in random order are the eight s teps comprising a complete accounting cycle:

Prepare a trial balance. Journalize and post the closing entries. Prepare financial statements. Post transaction data to the ledger. Prepare an adjusted trial balance. Make end-of-period adjustments. Journalize transactions. Prepare an after-closing trial balance.

a. List these steps in the sequence in which they would normally be performed. (A detailed under- standing of these eight steps is not required until Chapters 4 and 5.)

b. Describe ways in which the information produced through the accounting cycle is used by a company’s management and employees.

Record the following selected transactions in general journal form for Q uantum Clinic, Inc. Include a brief explanation of the transaction as part of each journal entry.

LO3-1, LO3-2, LO3-5, LO3-9, LO3-10 BRIEF EXERCISE 3.1 The Accounting Cycle

LO3-3 through LO3-5 BRIEF EXERCISE 3.2 Recording Transactions in a Journal

Oct. 1 The clinic issued 5,000 additional shares of capital stock to Doctor Soges at $60 per share

wil2577X_ch03_086-139.indd 119 8/23/13 7:56 AM

Smithfield Hotel recently purchased new exercise equipment for its exercise room. The following information refers to the purchase and installation of this equipment: 1. The list price of the equipment was $42,000; however, Smithfield qualified for a “special dis-

count” of $5,000. It paid $10,000 cash, and issued a three-month, 12 percent note payable for the remaining balance. The note, plus accrued interest charges of $750, was paid promptly at the maturity date.

2. In addition to the amounts described in 1, Smithfield paid sales taxes of $2,100 at the date of purchase.

3. Freight charges for delivery of the equipment totaled $600. 4. Installation and training costs related to the equipment amounted to $900.

LO9-1 through LO9-3 PROBLEM 9.1B Determining the Cost of Plant Assets and Depreciation

Problem Set B

wil2577X_ch09_386-429.indd 423 9/5/13 2:42 PM

1 COMPREHENSIVE PROBLEM

A COMPREHENSIVE ACCOUNTING CYCLE PROBLEM On December 1, 2015, John and Patty Driver formed a corporation called Susquehanna Equipment Rentals. The new corporation was able to begin operations immediately by pur- chasing the assets and taking over the location of Rent-It, an equipment rental company that was going out of business. The newly formed company uses the following accounts:

Susquehanna Equipment Rentals

wil2577X_ch05_192-245.indd 243 8/23/13 7:54 AM

Self-Test Questions The answers to these questions appear on page 339.

1. In general terms, financial assets appear in the balance sheet at:

a. Face value. b. Current value. c. Cost. d. Estimated future sales value.

2 Which of the following practices contributes to efficient

shows a balance of $12,890 at the same date. The only reconcil- ing items are the following: • Deposit in transit, $890. • Bank service charge, $24. • NSF check from customer Greg Denton in the amount of

$426. • Error in recording check no. 389 for rent: check was written

in the amount of $1,320, but was recorded improperly in the

wil2577X_ch07_288-339.indd 317 8/23/13 9:44 AM

Discussion Questions 1. In broad general terms, what is the purpose of accounting? 2. Why is a knowledge of accounting terms and concepts use-

ful to persons other than professional accountants? 3. In general terms, what are revenues and expenses? How

are they related in the determination of an enterprise’s net income or net loss?

4. Why is the statement of financial position, or balance sheet, a logical place to begin a discussion of financial statements?

5. What is the basic accounting equation? Briefly define the three primary elements in the equation.

9. What is meant by the terms positive cash flows and negative cash flows? How do they relate to revenues and expenses?

10. What are the three categories commonly found in a state- ment of cash flows, and what is included in each category?

11. What is meant by the statement that the financial statements articulate?

12. What is meant by the term adequate disclosure, and how do accountants fulfill this requirement in the preparation of financial statements?

13. What is meant by the term window dressing when referring t fi i l t t t ?

ASSIGNMENT MATERIAL

wil2577X_ch02_038-085.indd 66 8/23/13 7:50 AM

Accounts Payable . . . . . . . . . $14,000 Land . . . . . . . . . . . . . . . . . . . . . . $68,000

Accounts Receivable . . . . . . . 800 Machinery & Equipment . . . . . . . 65,000

Buildings. . . . . . . . . . . . . . . . . 52,000 Notes Payable (due in

Cash . . . . . . . . . . . . . . . . . . . . 9,200 30 days) . . . . . . . . . . . . . . . . . 29,000

Capital Stock . . . . . . . . . . . . . 100,000 Salaries Payable . . . . . . . . . . . . . 3,000

Retained Earnings . . . . . . . . . ? Supplies . . . . . . . . . . . . . . . . . . . 400

Demonstration Problem Account balances for Crystal Auto Wash at September 30, 2015, are shown below. The figure for retained earnings is not given, but it can be determined when all the available information is assembled in the form of a balance sheet.

wil2577X_ch02_038-085.indd 64 8/23/13 7:50 AM

In each of the situations described below, indicate the accounting principles or concepts, if any, that have been violated and explain briefly the nature of the violation. If you believe the practice is in accord with generally accepted accounting principles, state this as your position and defend it.

a. A small business in which credit sales fluctuate greatly from year to year uses the direct write- off method both for income tax purposes and in its financial statements.

b. Computer Systems often sells merchandise in exchange for interest-bearing notes receivable, maturing in 6, 12, or 24 months. The company records these sales transactions by debiting Notes Receivable for the maturity value of the notes, crediting Sales for the sales price of the merchandise, and crediting Interest Revenue for the balance of the maturity value of the note. The cost of goods sold also is recorded.

LO7-1, LO7-6, LO7-7 CASE 7.1 Accounting Principles

Critical Thinking Cases

wil2577X_ch07_288-339.indd 337 8/23/13 9:44 AM

Affections manufactures candy and sells only to retailers. It is not a publicly owned company and its financial statements are not audited. But the company frequently must borrow money. Its creditors insist that the company provide them with unaudited financial statements at the end of each quarter.

In October, management met to discuss the fiscal year ending next December 31. Due to a sluggish economy, Affections was having difficulty collecting its accounts receivable, and its cash position was unusually low. Management knew that if the December 31 balance sheet did not look good, the company would have difficulty borrowing the money it would need to boost production for Valentine’s Day.

Thus the purpose of the meeting was to explore ways in which Affections might improve its December 31 balance sheet. Some of the ideas discussed are as follows:

LO7-1 through LO7-6, LO7-8

CASE 7.3 “Improving” the Balance Sheet

wil2577X_ch07_288-339.indd 338 8/23/13 9:44 AM

To answer the following questions use the financial statements for Home Depot, Inc. , in Appendix A at the end of the textbook: a. Compute the company’s current ratio and quick ratio for the most recent year reported. Do these

ratios provide support that Home Depot is able to repay its current liabilities as they come due? Explain.

b. Compute the company’s debt ratio. Does Home Depot appear to have excessive debt? Explain. c. Examine the company’s statement of cash flows. Does Home Depot ’s cash flow from operat-

ing activities appear adequate to cover its current liabilities as they come due? Explain.

EXERCISE 10.15 Examining Home Depot ’s Capital Structure

LO10-8

Problem Set A

wil2577X_ch10_430-483.indd 472 9/5/13 2:45 PM

Brief Exercises supplement the exercises with shorter, single-concept exercises that test the basic concepts of each chapter. These brief exercises give instructors more flexibility in their homework assignments.

An Alternate Problem Set provides students with even more practice on impor- tant concepts.

Six Comprehensive Problems, ranging from two to five pages in length, present students with real-world scenarios and challenge them to apply what they’ve learned in the chapters leading up to them.

Defined Key Terms and Self-Test Questions review and reinforce chapter material.

Demonstration Problems and their solutions allow students to test their knowledge of key points in the chapters.

Critical Thinking Cases and Problems put students’ analytical skills to the test by having them think critically about key concepts from the chapter and apply them to business decisions. TWO sets of Problems and a full set of Exercises in EACH chapter give Financial Accounting the edge in homework materials.

Ethics Cases in each chapter challenge students to explore the ethical impact of decisions made in business.

The 2012 Home Depot Financial Statements are included in Appendix A. Stu- dents are referred to key aspects of the 10-K in the text material and in end-of-chapter material to illustrate actual business applications of chap- ter concepts.

Build a Strong Foundation? Robust End-of-Chapter Material

ix

Connect Accounting System

InternetWritingGroup Activities

Ethical International

wil62384_fm_i-xxxiii.indd ixwil62384_fm_i-xxxiii.indd ix 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

x

The Williams Pedagogy Helps

LO2-1 Explain the nature and general purposes of financial statements.

LO2-2 Explain certain accounting principles that are important for an understanding of financial statements and how professional judgment by accountants may affect the application of those principles.

LO2-3 Demonstrate how certain business transactions affect the elements of the accounting equation: Assets  5  Liabilities  1  Owners’ Equity.

LO2-4 Explain how the statement of financial position, often referred to as the balance sheet, is an expansion of the basic accounting equation.

LO2-5 Explain how the income statement reports an enterprise’s financial performance for a period of time in terms of the relationship of revenues and expenses.

LO2-6 Explain how the statement of cash flows presents the change in cash for a period of time in terms of the company’s operating, investing, and financing activities.

LO2-7 Explain how the statement of financial position (balance sheet), income statement, and statement of cash flows relate to each other.

LO2-8 Explain common forms of business ownership—sole proprietorship, partnership, and corporation—and demonstrate how they differ in terms of their statements of financial position.

LO2-9 Discuss the importance of financial statements to a company and its investors and creditors and why management may take steps to improve the appearance of the company in its financial statements.

CHAPTER 2

Basic Financial Statements

Learning Objectives AFTER STUDYING THIS CHAPTER, YOU SHOULD BE ABLE TO:

wil2577X_ch02_038-085.indd 38 8/23/13 7:50 AM wil2577X_ch02_038-085.indd 39 8/23/13 7:50 AM

High-profile companies frame each chapter discussion

through the use of dynamic CHAPTER OPENER

vignettes. Students learn to frame the chapter’s topic in

a real-world scenario.

“Lots of eye appeal and in-depth coverage. Students will love it.”

James Specht, Concordia College

EXHIBITS illustrate key

concepts in the text.

YOUR TURN boxes challenge students with ethically

demanding situations. They must apply what they’ve

learned in the text to situations faced by investors, cred-

itors, and managers in the real world.

YOUR TURN

Assume that you are the financial advisor for a recently retired investor. Your client wants to invest her savings in such a way as to receive a stable stream of cash flow every year throughout her retirement. She has expressed concern to you regarding the volatility of long-term bond prices when interest rates fluctuate.

If your client invests her savings in a variety of long-term bonds and holds these bonds until maturity, will interest rate fluctuations affect her annual cash flow during

?sraey tnemeriter reh ).etisbew retneC gninraeL enilnO eht no stnemmoc ruo eeS(

rosivdA laicnaniF a sa uoY

Balance Sheet

Assets Cash Accounts Receivable Property, Plant & Equip

Statement of Cash Flows

Operating Activities Investing Activities Financing Activities

Change in Cash Beginning Cash Balance

Ending Cash Balance

$ 800

80,000

$ 16,600 0

$ 16,600

Liabilities Notes Payable Accounts Payable

Owners’ Equity Capital Stock Retained Earnings

$ 16,600 1,200

100,000 $117,800

$2,200

1,400

$ 800

$ 30,000 7,000

$ 80,000 800

$117,800 Net Income

Revenues

Expenses

Income Statement

(64,200)

wil62384_fm_i-xxxiii.indd xwil62384_fm_i-xxxiii.indd x 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

xi

Students Reach Great Heights

wil2577X_ch02_038-085.indd 38 8/23/13 7:50 AM

Intel was created in 1968 with a vision of providing semi-

conductor memory products. By 1971, the company

introduced the world’s first microprocessor. Today Intel

supplies the computing and communications industries

with chips, boards, and systems building blocks that

are the ingredients of computers and servers as well

as networking and communications products. These

industries use Intel ’s products to create advanced

computing and communications systems. Intel states

that its mission is to be the preeminent building block

supplier in the worldwide Internet economy.

Technology-based companies like Intel operate in

highly competitive markets and continuously intro-

duce new products. In a recent corporate information

communication on the company’s website, manage-

ment explains the importance of meeting the needs of

customers: “Our goal is to be the preeminent provider

of semiconductor chips and platforms for the world-

wide digital economy . . . We offer products at various

levels of integration, to allow our customers flexibility

in creating computing and communications systems.

The substantial majority of our revenue is from the sale

of microprocessors and chipsets.”

Modern-day historians agree that we have moved

from the industrial age to the information age. Compa-

nies like Intel, Microsoft, and Cisco Systems are major

players in this transformation of business. Information-

age companies rely more heavily on intellectual capital,

research and development, and other intangibles that

were less important for companies whose focus was

heavy manufacturing or, even earlier in our history, pri-

marily agricultural. ■

INTEL

© T

on y

Av el

ar /B

lo om

be rg

v ia

G et

ty Im

ag es

wil2577X_ch02_038-085.indd 39 8/23/13 7:50 AM

ETHICS, FRAUD, & CORPORATE GOVER-

NANCE boxes discuss the accounting scandals of

recent years that have sparked such comprehensive legis-

lation as Sarbanes-Oxley. The inclusion of EFCG boxes in

each chapter offers instructors the opportunity to bring

complex accounting and ethical issues into

the classroom.

CASE IN POINT boxes link accounting concepts

in the chapter to their use in the real world. These

examples often present an international scenario to

expose students to accounting practices around

the world.

“Williams is a great text overall. It provides excellent and accurate coverage of the accounting principles

curriculum. Students like it better than any other text I have used. A few years ago I was in a situation where I had to use a different text, since I took over a class for another teacher at the last

minute. Students were getting the Williams text on their own and I saw immediate improvement in their understanding and grades across the

board. Williams comes through again and again, where other texts fall hopelessly short.”

Malcolm E White, Columbia College

Ethics, Fraud, & Corporate Governance

A major outgrowth from the business failures amid allega- tions of fraudulent financial reporting discussed in the last chapter was the passage of the Sarbanes-Oxley Act of 2002. This Act was signed into law by President George W. Bush on July 30, 2002. The Sarbanes-Oxley Act (hereafter SOX or the Act) is generally viewed as the most far-reaching piece of securities legislation since the original Securities Acts were passed in the 1930s.

One of the major requirements of this legislation is for CEOs and CFOs to certify the accuracy of their company’s financial statements. The CEOs and CFOs of all public com- panies must certify on an annual and quarterly basis that they (1) have reviewed their company’s financial statements, (2) are not aware of any error or omission that would make the financial statements misleading, and (3) believe that the financial statements fairly present in all material respects the company’s financial condition (balance sheet) and results of operations (income statement). There is some evidence that this certification requirement is affecting corporate behavior. For example, a former CFO of HealthSouth (Weston Smith, shown to the right) contacted federal authorities about the

massive (alleged) accounting fraud at that company because he was not willing to certify that HealthSouth ’s financial statements were materially accurate.

© Gary Tramontina/Bloomberg via Getty Images

wil2577X_ch02_038-085.indd 61 8/23/13 7:50 AM

How long does a building last? For pur- poses of computing depreciation expense, most companies estimate about 30 or

was built in 1931, and it’s not likely to be torn down anytime soon. As you might guess, it often is difficult to estimate in advance just how long depreciable assets may remain in use.

CASE IN POINT

© Digital Vision/Alamy

wil62384_fm_i-xxxiii.indd xiwil62384_fm_i-xxxiii.indd xi 11/18/13 11:47 AM11/18/13 11:47 AM

Final PDF to printer

xii

MCGRAW-HILL CONNECT ACCOUNTING

Get Connect Accounting. Get Results. McGraw-Hill Connect Accounting is a digital teach- ing and learning environment that gives students the means to better connect with their coursework, with their instructors, and with the important concepts that they will need to know for success now and in the future. With Connect Accounting, instructors can deliver assignments, quizzes, and tests easily online. Students can practice important skills at their own pace and on their own schedule.

Online Assignments Connect Accounting helps students learn more efficiently by providing feedback and practice mate- rial when they need it, where they need it. Connect Accounting grades homework automatically and gives immediate feedback on any questions students may have missed.

Intelligent Response Technology (IRT) IRT is a redesigned student interface for our end- of-chapter assessment content. The benefits include improved answer acceptance to reduce students’ frustration with formatting issues (such as rounding); and a general journal application that looks and feels more like you would find in a general ledger software package.

Student Library The Connect Accounting Student Library gives students access to additional resources such as recorded lec- tures, online practice materials, an eBook, and more.

Leading Technology Extends Learning

wil62384_fm_i-xxxiii.indd xiiwil62384_fm_i-xxxiii.indd xii 11/18/13 11:48 AM11/18/13 11:48 AM

Final PDF to printer

xiii

Beyond the Classroom

Connect Accounting offers a number of powerful tools and features to make managing assignments easier, so faculty can spend more time teaching.

Simple Assignment Management and Smart Grading With Connect Accounting, creating assignments is easier than ever, so instructors can spend more time teaching and less time managing.

• Create and deliver assignments easily with selectable end-of-chapter questions and Test Bank items.

• Go paperless with the eBook and online submission and grading of student assignments.

• Have assignments scored automatically, giving students immediate feedback on their work and side-by-side comparisons with correct answers.

• Access and review each response; manually change grades or leave comments for students to review.

• Reinforce classroom concepts with practice tests and instant quizzes.

Student Reporting Connect Accounting keeps instructors informed about how each student, section, and class is performing, allowing for more productive use of lecture and office hours. The pro- gress-tracking function enables you to:

• View scored work immediately and track individual or group performance with assignment and grade reports.

• Access an instant view of student or class performance relative to learning objectives.

• Collect data and generate reports required by many accreditation organizations, such as AACSB and AICPA.

Instructor Library The Connect Accounting Instructor Library is a repository for additional resources to improve student engagement in and out of class. You can select and use any asset that enhances your lecture. The Connect Accounting Instructor Library includes access to the eBook version of the text, slide presentations, Solutions Manual, Instructor’s Manual, and Test Bank. The Connect Accounting Instructor Library also allows you to upload your own files.

MCGRAW-HILL CONNECT ACCOUNTING FEATURES

wil62384_fm_i-xxxiii.indd xiiiwil62384_fm_i-xxxiii.indd xiii 11/18/13 11:48 AM11/18/13 11:48 AM

Final PDF to printer

xiv

MCGRAW-HILL CONNECT PLUS ACCOUNTING

McGraw-Hill reinvents the textbook learning experience

for the modern student with Connect Plus Account- ing. A seamless integration of an eBook and Connect Accounting, Connect Plus Accounting provides all of the Connect Accounting features plus the following:

• An integrated eBook, allowing for anytime, anywhere access to the textbook.

• Media-rich capabilities like highlighting and sharing notes.

• Dynamic links between the problems or questions you assign to your students and the location in the eBook where that concept is covered.

• A powerful search function to pinpoint key concepts for review.

In short, Connect Plus Accounting offers students powerful tools and features that optimize their time and energy, enabling them to focus on learning.

For more information about Connect Plus Accounting, go to www.mcgrawhillconnect.com , or contact your local McGraw-Hill sales representative.

TEGRITY CAMPUS: LECTURES 24/7

Tegrity Campus is a service that makes class time available 24/7 by automatically capturing every lecture. With a simple one-click start-and-stop process, you capture all computer screens and corresponding audio in a format that is easily searchable, frame by frame. Stu-

dents can replay any part of any class with easy-to-use browser-based viewing on a PC, Mac, iPod, or other mobile device.

Educators know that the more students can see, hear, and experience class resources, the better they learn. In fact, studies prove it. Tegrity Campus’s unique search feature helps students efficiently find what they need, when they need it, across an entire semester of class recordings. Help turn your students’ study time into learn- ing moments immediately supported by your lecture. With Tegrity Campus, you also increase intent listening and class participation by easing students’ concerns about note-taking. Tegrity Campus will make it more likely you will see students’ faces, not the tops of their heads.

To learn more about Tegrity, watch a 2-minute Flash demo at http://tegritycampus.mhhe.com .

Students like the flexibility that Connect offers . . . They can complete their work and catch up on lectures anytime and anywhere.

—Professor Lisa McKinney , M.T.A., CPA, University of Alabama

wil62384_fm_i-xxxiii.indd xivwil62384_fm_i-xxxiii.indd xiv 11/18/13 11:48 AM11/18/13 11:48 AM

Final PDF to printer

xv

MCGRAW-HILL CAMPUS

McGraw-Hill Campus™ is a new one-stop teaching and learning experience available to users of any learning management system. This institutional service allows faculty and students to enjoy

single sign-on (SSO) access to all McGraw-Hill Higher Education materials, including the award-winning McGraw-Hill Connect platform, directly from within the institution’s website. McGraw-Hill Campus provides faculty with instant access to teaching materials (e.g., eTextbooks, Test Banks, PowerPoint slides, animations, and learning objects), allow- ing them to browse, search, and use any ancillary content in our vast library. Students enjoy SSO access to a variety of free products (e.g., quizzes, flash cards, and presentations) and subscription-based products (e.g., McGraw-Hill Con- nect ). With McGraw-Hill Campus, faculty and students will never need to create another account to access McGraw- Hill products and services.

Custom Publishing through Create

McGraw-Hill Create™ is a self-service website that allows instructors to create custom course materials by drawing upon McGraw-Hill’s comprehensive cross-disciplinary content. Instructors can add their own content quickly and easily and tap into other rights-secured third party sources as well, then arrange the content in a way that makes the most sense for their course. Instructors can even personalize their book with the course name and information and choose the best format for their students—color print, black-and-white print, or an eBook.

Through Create, instructors can • Select and arrange the content in a way that makes the most sense for their course.

• Combine material from different sources and even upload their own content.

• Choose the best format for their students—print or eBook.

• Edit and update their course materials as often as they’d like.

Begin creating now at www.mcgrawhillcreate.com .

COURSESMART Learn Smart. Choose Smart.

CourseSmart is a way for faculty to find and review eTextbooks. It’s also a great option for students who are interested in accessing their course materials digitally and saving money.

CourseSmart offers thousands of the most commonly adopted textbooks across hundreds of courses from a wide variety of higher education publishers. It is the only place for faculty to review and compare the full text of a textbook online, providing immediate access without the environmental impact of requesting a print exam copy.

With the CourseSmart eTextbook, students can save up to 45 percent off the cost of a print book, reduce their impact on the environment, and access powerful web tools for learning. CourseSmart is an online eTextbook, which means users access and view their textbook online when connected to the Internet. Students can also print sections of the book for maximum portability. CourseSmart eTextbooks are available in one standard online reader with full text search, notes and highlighting, and e-mail tools for sharing notes between classmates. For more information on CourseSmart, go to www.coursesmart.com .

wil62384_fm_i-xxxiii.indd xvwil62384_fm_i-xxxiii.indd xv 11/18/13 11:48 AM11/18/13 11:48 AM

Final PDF to printer

xvi

Supplements for Financial Accounting

INSTRUCTOR SUPPLEMENTS

A strong foundation needs support.

Financial Accounting authors Williams, Haka, Bettner, and Carcello know that every component of the learning package must be integrated and supported by strong ancillaries. Instructors and students have a wealth of material at their fingertips to help make the most of a challenging course in accounting.

Online Learning Center (OLC) www.mhhe.com/williamsfinancial16e

The Online Learning Center (OLC) that accompanies Financial Accounting provides a wealth of extra material for both instructors and students. With content specific to each chapter of the book, the Williams OLC doesn’t require any building or maintenance on your part.

A secure Instructor Resource Center stores your essential course materials to save you prep time before class. The Instructor’s Manual, Solutions Manual, PowerPoint presentations, and Testbank are now just a couple of clicks away.

The OLC website also serves as a doorway to McGraw-Hill’s other technology solutions.

Instructor’s Resource Manual Available on the OLC

This manual provides for each chapter: (1) a chapter summary detailing what has changed, new problems that have been added, and author suggestions on how

to incorporate new material; (2) brief topical outline; (3) sample “10- minute quizzes” designed to test the basic concepts in each chapter; and (4) suggestions for group, Internet, and other class exercises to supple- ment the material in the book.

Solutions Manual Available on the OLC

The Solutions Manual includes detailed solutions for every question, exercise, problem, and case in the text.

Testbank Available on the OLC

This comprehensive Testbank contains over 3,000 problems and true/false, multiple-choice, and essay questions. Included in this edition are written expla- nations to the solutions—making it easier than ever for you to see where students have gone wrong in their calculations.

wil62384_fm_i-xxxiii.indd xviwil62384_fm_i-xxxiii.indd xvi 11/18/13 11:48 AM11/18/13 11:48 AM

Final PDF to printer

xvii

Assurance of Learning Ready

Many educational institutions today are focused on the notion of assurance of learning, an important element of some accreditation standards. Financial Accounting, 16e, is designed specifically to support your assurance of learning initiatives with a simple, yet powerful, solution.

Each testbank question for Financial Accounting, 16e, maps to a specific chapter learning outcome/ objective listed in the text. You can use our test- bank software, EZ Test, and EZ Test Online, or in Connect Accounting to easily query for learning out- comes/objectives that directly relate to the learning objectives for your course. You can then use the reporting features of EZ Test or in Connect Accounting to aggregate student results similar fashion, making the collection and presentation of assurance of learning data simple and easy.

AACSB Statement

McGraw-Hill Education is a proud corporate member of AACSB International. Understanding the importance and value of AACSB accreditation, Finan- cial Accounting, 16e, recognizes the curricula guide- lines detailed in AACSB standards for business accreditation by connecting selected questions in the text and testbank to six of the general knowledge and skill guidelines found in the AACSB standards.

The statements contained in Financial Accounting, 16e, are provided only as a guide for the users of this text. The AACSB leaves content coverage and assess- ment within the purview of individual schools, the mission of the school, and the faculty. While Finan- cial Accounting, 16e, and its teaching package make no claim of any specific AACSB qualification or evalua- tion, we have, within Financial Accounting, 16e, labeled selected questions according to six of the general knowledge and skills areas.

Categories
essay writing service how to write an admission essay professional essay writers

if accumulation exceeds ablation in a glacial budget, which of the following will happen?

Assignment 2.Please review the course web site for access dates: Click on the begin button to access the assignment and submit your answers. This covers Unit II Sculpting Earth’s Surface in the textbook (Chapters 3 and 4).

Multiple choice. Choose the one alternative that best completes the statement or answers the question. (2 points each)

1) Plants consume water during photosynthesis. They also release it to the atmosphere during ________.

A) transpiration B) infiltration C) evaporation D) degassing

2) ________ make up the suspended loads of most rivers and streams.

A) Silt and clay-sized detrital grains

B) Dissolved ions such as calcium and sodium

C) Sand and gravel that move along the bottom during floods

D) Point bars

3) 

Examine the sketch of a bend in a river. The arrows show the water flow direction. In which of the four lettered locations is deposition most likely to occur?

A) A B) B C) C D) D

4) Groundwater is the largest reservoir of ________.

A) glacial ice on Earth B) seawater on Earth

C) water on Earth D) freshwater that is readily available to humans

5) Which of the following is not a form of mass wasting?

A) rockslide B) slump C) debris flow D) transpiration

6) Groundwater may be ________.

A) pumped out faster than natural processes can replenish it

B) contaminated

C) extracted in such high quantities that the soil packs together and reduces pore space, resulting in subsidence of the land surface

D) all of the above

7) Groundwater tends to flow through bodies of rock or sediment that ________.

A) have a high permeability B) are composed of dark silicate minerals

C) have a high porosity D) are aquitards

8) A rainshadow desert forms ________.

A) in cold, polar regions

B) near the equator, where moist air rises (because it is hot and less dense) up, away from Earth’s surface

C) when dry air descends from high in the atmosphere between 20° and 30° latitude

D) in places where mountain ranges act as barriers to the movement of water vapor

9) If accumulation exceeds ablation in a glacial budget, which of the following will happen?

A) The glacier will melt away due to climate change.

B) The terminus will shift uphill (“retreat”).

C) The glacier will begin to flow uphill.

D) The terminus will move downhill (“advance”).

10) 

This cobble shows prominent scratches because ________.

A) it was blasted by wind

B) it was tumbled in a stream

C) this was its shape when it was mechanically weathered from its source rock

D) it was scraped against other rocks in a glacier

11) Where are drumlins formed?

A) in areas of ground moraine B) in areas of glacial plucking

C) in fiords D) in areas of alpine glaciation

12) When a valley glacier leaves the mountains and enters the relative flat lands below, it may spread out to form ________.

A) an ice shelf B) an ice cap

C) a piedmont glacier D) a lateral moraine

Fill in the blank. Write the word or phrase that best completes each statement or answers the question. (1 point each)

13) 

The river depicted in this drawing shows prominent ________.

14) 

What is the specific form of mass wasting illustrated here?

15) Old Faithful, a(n) ________ in Yellowstone National Park, erupts steam and hot water.

16) ________ is a measure of the volume of open space in rocks and unconsolidated, geological materials like alluvium and soils.

17) The maze of steep-sided limestone hills in the Guilin District of southern China is a celebrated example of ________.

18) ________ are formed when groundwater dissolves cavities into limestone.

19) Drawdown of groundwater due to heavy pumping from a well may result in a(n) ________, a “dimple” in the water table.

20) 

The ________ period of geologic time is depicted in this image.

21) A sinuous ridge composed of sand and gravel is a(n) ________; It is a deposit made by streams flowing in tunnels within or beneath glacial ice.

22) 

The ________ region of the United States is depicted in this image (above).

23) ________ form from the coalescence of multiple alluvial fans.

24) A hazard people face when crossing a glacier is falling into a(n) ________, a large crack that extends through the zone of fracture.

25) A landscape dominated by U-shaped valleys and pyramid-shaped mountains is most likely formed due to ________.

26) Lifting and removal of loose material like soil or sediment by the wind is called __________ , this process results in __________, a layer of coarse pebbles and cobbles that are too large to be moved by the wind overlying finer-grained sediment in desert regions.

27) Wind-deposited sand that forms mounds or ridges are called __________and ________ are preserved slip-faces that accumulate as a dune migrates.

28) Shallow depressions where soil or sediment has been stripped away by the wind are called _________.

#13-28 Vocabulary (extra words and/or phrases are included, not all will be used)

volcano

cinder cone

inflation

upwelling

deflation

rift valley

dunes

blowouts

chert

cross-bedding

striations

desert pavement

desert rose

oasis

meanders (or meandering)

point bars

cut banks

rockslide

frost wedging

luster

magma plume

geyser

waterfall

hanging valley

porosity

lithification

liquifaction

precambrian

quaternary

jurrasic

crevasse

horn

esker

sorted till

kettle

basin and range

bajadas

tower karst

limestone

caverns

cone of depression

exfoliation dome

sand and silt

gravel (pebbles and cobbles)

glaciation