In a study, a large group of male runners walk on a treadmill for 6 minutes. Their heart rates vary according to the Normal distribution N(104, 12.5). However, the heart rates for non-runners is N(130, 17). Answer the following questions providing all the details.
1. What percent of the runners have heart rates above 140?
2. What percent of the non-runners have heart rates above 140? what do you conclude?
3. Find the median, first and third quartiles of the distribution of runner’s heart rates.
4. What range of non-runner’s heart rates covers the middle 68% of their Normal distribution?
In: Statistics and Probability
Cultured liver hepatocytes are convenient for studying both exocytosis and receptor-mediated, clathrin-dependent endocytosis. As part of an advanced laboratory in cell biology, students are required to perform mutation studies on cultured liver hepatocytes to generate data that supports the proposed mechanism of receptor-mediated, clathrin-dependent endocytosis. Liver hepatocytes are cultured, mutagenized, and screened for defective receptor-mediated endocytosis. In order to distinguish unique mutants from one another, the students must design a series of experiments to distinguish between mutants that have the following mutations:
a). Cellular adaptor proteins are mutated to be non-functional
b). Clathrin is mutated to be non-functional
c). Dynamin is mutated to be non-functional
In: Biology
Reliable Non-Authoritative Sources
In June 2009, the FASB issued SFAS No. 168, “The FASB Accounting Standards Codification and Hierarchy of Generally Accepted Accounting Principles, a replacement of FASB Statement No. 162” (“SFAS 168”). SFAS 168 established the FASB Standards Accounting Codification (“Codification”) as the source of authoritative U.S. generally accepted accounting principles (“GAAP”) recognized by the FASB to be applied to nongovernmental entities and rules and interpretive releases of the SEC as authoritative GAAP for SEC registrants.
For discussion: What are some non-authoritative sources of information and how could management of a company utilize information obtained from non-authoritative sources in preparing GAAP financial statements?
In: Accounting
A non-profit program for youths sends students to summer camp. The price of the program is $800 per student, and there are 8 students that can participate in each program. Each program runs for 11 days. The price for all food and equipment is $100 per student per day. Also, the two program guides cost $150 a day to hire.
a. What is the profit margin for the program?
b.The non-profit was able to get a grant to cover $200 per student per day. Will this be enough to cover the full cost of the program?
c. Given the cost of the program, if the non-profit secured the grant, would you recommend they continue to operate the program based on the economics?
In: Finance
A study investigated bladder disease and laxative use in men between 80 and 89 years old. There were 3000 current laxative users and 7000 laxative non-users at baseline. Within 7 years, 12 of the laxative users and 6 of the laxative non-users developed bladder disease
1. What kind of study is this?
2. What if you want to test the hypothesis that the odds ratio is equal to one. The 95% CI is (1.27, 8.56). What is the conclusion?
3. Now the hypothesis is tested that the risk of bladder disease is 1 in each group (laxatives and non laxatives). Write alternative&null hypothesis (please also define parameters).
In: Statistics and Probability
One issue concerning Enron’s collapse centered on the amount of non-audit fees paid by Enron to its external auditor, Arthur Andersen. For each of the following items, discuss the potential ethical issues between the firm and its auditor. For each item, list at least one reason why the statement might be viewed as a threat to the auditor’s independence, and at least one reason why it might not be viewed as such a threat.
1. The firm’s auditor is heavily involved in non-audit services.
2. The audit partner’s compensation depends on both audit and non-audit fees from the same client.
3. In 1995, Congress passed the Private Securities Litigation Reform Act.
In: Accounting
How do firms measure the value of the shares issued in a non-monetary exchange?
A. Typically, firms do not measure the value of the shares issued in a non-monetary exchange. They are not required to report that value.
B. Firms measure the value of the shares issued in a non-monetary exchange at their market rate, plus a percentage markup determined by the issuing company.
C. The fair value of the shares issued is the cost of the goods and services received in exchange, less a discount determined by the recipient of the shares. D. The fair value of the shares issued is the cost of the goods and services received in exchange. Therefore, the corporation records the noncash assets or services at the fair value of the stock issued in the exchange.
In: Accounting
The outstanding share capital of Marginal Utility Corporation consists of 6,000 preferred shares with a book value of $420,000 and 22,000 common shares with a book value of $220,000. The preferred shares carry a dividend of $6 per share and have a $70 stated value.
Required:
Assuming that the company has retained earnings of $340,000 that is to be entirely paid out in dividends and that preferred dividends were not paid during the two years preceding the current year, state how much each class of shares should receive under each of the following conditions:
In: Accounting
Tree Traversals It should be noted that, in class, all traversal
methods were written as recursive algorithm (i.e. at some point,
the method called itself). It is possible to implement
non-recursive versions of preorder, inorder, and postorder
traversal methods mentioned in class. One intuitive way is by using
a stack.
1) Give written pseudocode/explanation of :
a) How to build the tree such that a given non-recursive traversal
method can be used.
b) Your algorithm for a non-recursive preorder, inorder, OR
postorder traversal method (You only have to pick one)
2) Implement the above mentioned algorithms. Traversals should
print out nodes in their required order.
In: Computer Science
Toll-Like Receptors (TLR) are essential for the internalization of pathogenic (E. coli K1) and non-pathogenic (E. coli DH5a) bacteria. Wnt5a, a cell differentiation, and immune response factor helps TLRs for internalization of both classes of bacteria. However, Wnt5a promotes the killing of only pathogenic bacteria but not non-pathogenic bacteria. Wnt5a is a secreted protein, which interacts with Frizzled (FZD) receptor FZD5. A specific locus in the genome of K1 is responsible for its pathogenicity and if this genomic segment is transferred to the genome of DH5a, DH5a becomes pathogenic and when this transformed DH5a strain infects human cells in the presence of Wnt5a, it gets internalized and killed. This ‘pathogenic genomic’ segment codes for a protein and non-coding RNA. Electron microscopy experiments at different times after infection following Wnt5a treatment show that after 1 hour of infection the two classes of bacteria reside in two types of intracellular vesicles.
Propose a model of how Wnt5a triggers pathogen killing (but not non-pathogen killing) and how to test that model.
In: Biology