Monday, December 26, 2016

Biltz Company uses a predetermined overhead rate based on direct labor hours to allocate manufacturing overhead to jobs. – Homeworkmade


Directions: Your assignment this week is to answer the three questions below. Please note that Question #3 has 2 parts, Part A and Part B. Please show your work for full credit and use the box provided. Please add more rows or columns to the box if needed.
1. Biltz Company uses a predetermined overhead rate based on direct labor hours to allocate manufacturing overhead to jobs. During the year, the company actually incurred manufacturing overhead costs of $582,000 and 135,000 direct labor hours were worked. The company estimated that it would incur $525,000 of manufacturing overhead during the year and that 150,000 direct labor hours would be worked.
By how much was manufacturing overhead overallocated or underallocated for the year?
2. The following account balances at the beginning of January were selected from the general ledger of Ocean City Manufacturing Company:
Work-in-process inventory
Raw materials inventory
Finished goods inventory
Additional data:
1) Actual manufacturing overhead for January amounted to $62,000.
2) Total direct labor cost for January was $63,000.
3) The predetermined manufacturing overhead rate is based on direct labor cost. The budget for the year called for $250,000 of direct labor cost and $350,000 of manufacturing overhead costs.
4) The only job unfinished on January 31 was Job No. 151, for which total direct labor charges were $5,200 (800 direct labor hours) and total direct material charges were $14,000.
5) Cost of direct materials placed in production during January totaled $123,000. There were no indirect material requisitions during January.
6) January 31 balance in raw materials inventory was $35,000.
7) Finished goods inventory balance on January 31 was $34,500.
What is the cost of goods manufactured for January? Show your work for full credit.

3. Vintage Fun reproduces old-fashioned style roller skates and skateboards. The annual production and sales of roller skates is 950 units, while 1,750

BIOL 302 Bacteria, Viruses, and Health Module 2 Quiz Peripherals Answers – Homeworkmade


BIOL 302 Module 2 Quiz Peripherals Module

  1. In a situation where a handicapped person can only input data into the computer using a stylus or light pen, which keyboard configuration might be the solution?
  2. Which device would not be appropriate for holding data, instructions, and information for future use?
  3. Which of the following can be considered an output device?
  4. What is one of the major advantages of installing a wireless network?
  5. If you are going to network two computers together using cable connections, what must each computer have?
  6. How is data entered into the computer?

BIOL 302 Bacteria, Viruses, and Health Module 3 Quiz Ethics Answers – Homeworkmade


BIOL 302 MODULE 3 QUIZ Ethics

  1. Would the following be considered a violation of a user access agreement?knowingly uploading or distributing files that contain viruses, spyware, or any other similar software or programs that may damage the operation of
  2. Would the following be considered a violation of a user access agreement? In order to perform assigned job duties, accepting operating system updates daily after logging in to the company network.
  3. Would the following be considered a violation of user access agreement?
  4. What is the purpose of a user access agreement?
  5. For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.
  6. An employee Code of Conduct will list illegal behaviors, but it will not list unethical behaviors.
  7. Which aspect of social networking poses the most risk?
  8. Which of the following factors determine whether a specific instance of file sharing is legal?
  9. The Digital Millennium Copyright Act…
  10. Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?
  11. In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
  12. Which of the following statements is true?

BIOL 302 Bacteria, Viruses, and Health Module 4 Quiz Answers – Homeworkmade


BIOL 302 MODULE 4 QUIZ

  1. Would the following be considered a violation of user access agreement? Visiting social networking sites during lunch breaks
  2. For the following scenario, indicate whether the activity would likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.
  3. You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?
  4. Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?
  5. True or false? Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.
  6. Which of the following statements is true?

BIOL 302 Bacteria, Viruses, and Health Module 5 Quiz Answers – Homeworkmade


BIOL 302 MODULE 5 QUIZ

  1. State the correct response to the following questions about computer IDomises. Can messages be sent from your e-mail account without your knowledge or permission?
  2. Would this incident be an example of social engineering?
    You receive a phone call from the technical support department of a software maker alerting you to a bug in the company’s software, which you have purchased. The tech offers to walk you through the steps required to fix the software on your computer.
  3. Would this incident be an example of social engineering?
    Receiving a request by phone for your date of birth, home address, and social security number to verify your pharmacy’s prescription files
  4. Would this incident be an example of social engineering?
    You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
  5. Would this incident be an example of social engineering?
    Finding a music CD on the subway and playing it on your computer
  6. Which of the following is generally not considered PII?
  7. Which of the following measures is least to help you protect your PII?
  8. If messages are being sent from your email account without your knowledge, this is a sign that your computer is infected with
  9. Which of the following email scenarios is more likely than the others to involve phishing?
  10. Which of the following is not characteristic of a phishing email?
  11. Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
    Clicking on a provided link instead of typing the known web address into a web browser. It’s faster and more reliable.
  12. Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing attacks.
    Replying to an e-mail requesting your user ID and password
  13. For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.
    Dale uses his first name as a password.
  14. For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.
    Sierra uses a long pass phrase such as “A stitch in time saves 9” with special characters between the words for her bank account password.
  15. For the following scenario, indicate whether the actions are good practices or bad practices to safeguard your personally identifiable information.
    Terry uses the same password on most of his online accounts so that he can easily remember his login information.

BIOL 302 MODULE 6 QUIZ Basics of Databases Module


BIOL 302 MODULE 6 QUIZ Basics of Databases Module
  • True or false? Spreadsheets provide more options for graphical representation of the data than databases

  1. In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?
  2. True or false? Data warehousing is the process of extracting data from a data warehouse.
  3. A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?
  4. True or false? The largest component of a database is a field.
  5. What are procedures that help keep a database current?
  6. A savvy hacker uses a poorly secured vendor’s website to obtain all the information needed to access the main database of a large chain store, including the store’s database password. Which threat best describes this database breach?
  7. You are annoyed by receiving identical marketing messages from an online shopping site you have used. If the company wishes to maintain a good relationship with you, which of the following CRM components needs to be addressed to improve customer satisfaction?
  8. Which of the following would be an example of a loss of record confidentialityin a database?
  9. Are the following examples of increasing brand awareness through groups or fans? Select Yes or No for each option.
  10. True or false? Not all of the top database breaches in 2013 involved U.S. companies.
  11. True or false? Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.
  12. What is one advantage of using a relational database over a spreadsheet or flat file to store data?
  13. True or false? It is just too challenging to have different passwords for every device you use and every online site that requires an ID and password. It would be OK to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site.

BIS 155 Data Analysis with Spreadsheets w/Lab Week 1 Quiz Answers (Excel Fundamentals and Charting) – Homeworkmade


BIS 155 Week 1 Quiz  (Excel Fundamentals and Charting)

  1. (TCO 1) Which of the following describes the function of the Formula Bar (as it applies to Excel 2010)? (Points : 2) 
  2. (TCO 1) Which of the following best describes a cell address? (Points : 2
  3. (TCO 1) If you wanted to insert the current date into an active cell, which of the following would you use? (Points : 2) 
  4. (TCO 1) In Excel a Formula is _______. (Points : 2)
  5. (TCO 1) Which of the following describes the Auto Fill in Excel 2010? (Points : 2)
  6. (TCO 1) Ribbon Commands with arrows indicate_____.
  7. (TCO 1) The three types of data that can be entered in a cell in an Excel worksheet are ________________.
  8. (TCO1) In Excel, a border ________.
  9. (TCO 3) A data series is a group of related ____________
  10. (TCO 3) A __________ is usually the most effective way to display proportional relationships, such as market share data, where the individual data values represent parts of a whole. (Points : 2)
  11. (TCO 3) When creating a chart in Excel, a single data series _____.
  12. . (TCO 3) To display similar data in a single column, with each series of data distinguished by a different color, use a:
  13. (TCO 3) To provide your viewers with an explanation of the representations of the colors utilized in the data series in your chart, provide a:
  14. (TCO 3) Which of the following best describes the X Y (scatter) chart?
  15. (TCO 3) Which of the following best describes a trendline?