Questions
For the following half reaction: N2(g) + 5H+(aq)+4e-   ----> N2H5+   Calculate the amount of time required...

For the following half reaction: N2(g) + 5H+(aq)+4e-   ----> N2H5+  

Calculate the amount of time required to produce 7.86 (g) of N2 while using a 15.0 A current.

In: Chemistry

Which of the Generic Strategies for Creating a Competitive Advantage do you feel is best, and...

Which of the Generic Strategies for Creating a Competitive Advantage do you feel is best, and why? Please provide examples or other evidence

In: Operations Management

You have been tasked to write a C# application that will go through the first step...

You have been tasked to write a C# application that will go through the first step of encrypting an input file and writing the encrypted contents to an output file.

For this first step in encryption, read each letter in from the input file, add 3 letters to the value of the input letter. If the input letter is an A then the encrypted letter would be a D. If the input letter from the input file is an X then the encrypted letter would be an A.
All spaces, digits, punctuation, and special characters do not need to be encrypted at this level.   Simply write the space, punctuation, or special character to the output file as is.
If a letter is uppercase in the input file, it should remain as an uppercase character in the output file. If a letter is lowercase in the input file, it should remain as a lowercase character in the output file.

Since this program runs each month, the input file will be of various lengths; therefore, the program will read until end of file.

The input file is found in the current directory and is named October20.txt.   The output file will be written to the current directory and named EncryptOct20.txt.

An example:

If the contents of the input file is

Live long and prosper.



The output file would be:

Olyh orqj dqg survshu.



What the user should see when the program executes:


When the program begins, the statement "Encryption Level 1" should be displayed.
The focus should be set to the "Begin Encryption" button.
When the user clicks the "Begin Encryption" button, the program opens the input file, the statement "Opening input file...." should be displayed. The "Begin Encryption" button should be disabled.
When the program begins reading through the input file encrypting the contents, the statement "Encrypting input file...." should be displayed.
When the program closes the input and output files, the statement "Encryption complete...." should be displayed.
When the program is complete, the statement "End of process" should be displayed.

In: Computer Science

course: IT Data Mining and Data Warehousing There are several typical cube computation methods such as...

course: IT Data Mining and Data Warehousing

There are several typical cube computation methods such as Multi-Way, BUC, and Star-cubing. Briefly describe each one of these methods outlining the key points.

note: need a unique answer and no handwriting please.

In: Computer Science

If you were running Coca Cola, would you acquire La Croix to capture market share or...

If you were running Coca Cola, would you acquire La Croix to capture market share or grow organically?

In: Operations Management

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have...

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be under Australian Government control.

You are to provide a report to DoH that:

  1. Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe app.
  2. Discusses the possible threats to the privacy of a user's data, location and activities from the use of the CovidSafe app.
  3. Discusses the issues of data sovereignty that may apply to the storage of CovidSafe data in U.S. based Cloud storage.
  4. You are to recommend that DoH adopt:
    1. Possible security controls that would prevent the loss or breach of user data, while still enabling effective tracking for COVID-19, and the reasons these controls will be effective.
    2. Possible privacy controls to protect user privacy, particularly of data, location and activity, while still enabling effective tracking of COVID-19, and the reasons these controls will be effective.
    3. Possible controls to ensure that the CovidSafe data remains under Australian data sovereignty and control, and the reasons these controls will be effective.

In: Computer Science

First, you will need to conduct research to identify two public organizations that have recently, or...

First, you will need to conduct research to identify two public organizations that have recently, or are currently, negotiating a conflict. Be sure there are newspaper articles or other resources that sufficiently document both sides of the conflict. Remember that when generating alternative solutions, the parties to a negotiation must both actively participate in the conflict resolution, so make sure you are able to identify documentation related to the efforts of negotiation coming from both sides the conflict. Watch for emotions, personality, and bias that may result in a party’s inability or unwillingness to listen or accept alternative solutions to a problem.

After sufficiently researching the conflict you will need to choose one side of the conflict you would like to represent. You will then need to create an Integrative Negotiation Planning Strategy for the party you are representing based on the facts of the conflict identified.

After you have completed your Integrative Negotiation Planning Strategy, summarize the conflict and proposed alternate solution. Be sure to describe the conflict.

  1. Identify the side that you have chosen.  
  2. What would be be your BATNA if the negotiation breaks down?
  3. What are your most important interests, ranked in order?
  4. What is the other side’s BATNA and what is its interests?
  5. Does each side have any interests that may be mutual?
  6. What value may be created for resolving the conflict?
  7. Identify any emotions, personality, and bias you observed in the conflict and how that affected negotiation.

In: Operations Management

Organizational Analysis Paper Instructions Each student will write an 8-10-page paper on an organization of his...

Organizational Analysis Paper Instructions

Each student will write an 8-10-page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections:

  • Introduction of the organization, including history and background.
  • Organizational strategy.
  • Organizational design and your assessment of effectiveness.
  • Organizational culture.
  • Conclusion and what you would change about the selected organization for improvement.

In: Operations Management

Mention any three reconnaissance techniques. Briefly explain each of them (just one or two sentences). Why...

Mention any three reconnaissance techniques. Briefly explain each of them (just one or two sentences). Why reconnaissance is a threat to network security?

In: Computer Science

According to the EPA’s prospective analysis of the 1990 to 2010 period, total social benefits (TSB)...

According to the EPA’s prospective analysis of the 1990 to 2010 period, total social benefits (TSB) associated with the CAAA of 1990 are estimated at $690 billion and the comparable total social cost (TSC) estimates are $180 billion (both in $1990).

a. Explain why these data do not communicate whether the regulations outlined by the CAAA of 1990 are efficient.

b. Using three separately labeled graphs of conventionally-shaped TSB and TSC functions show that these values indicate that the regulations outlined in the CAAA of 1990 are (i) efficient; (ii) too lenient; and (iii) too stringent.

In: Economics

What are the advantages of filtering using Slicers over using filtering in Excel?

What are the advantages of filtering using Slicers over using filtering in Excel?

In: Computer Science

write me an  email message with at minimum of 3-paragraphs (opening/body/close) providing a summary and highlighting your...

write me an  email message with at minimum of 3-paragraphs (opening/body/close) providing a summary and highlighting your thoughts on the speech by Steve Jobs .(video title is how to live before you die at Stanford university)

In: Operations Management

Will the brand equity of Coca Cola be a competitive advantage versus a private label (such...

Will the brand equity of Coca Cola be a competitive advantage versus a private label (such as a large grocery store chain)?

Please answer.

In: Operations Management

1. Discuss the link between a brand image and pricing strategy. 2. Discuss the advantages and...

1. Discuss the link between a brand image and pricing strategy.

2. Discuss the advantages and disadvantages of using social networks as part of a promotional campaign.

3. Discuss the advantages and disadvantages of celebrity endorsement in the promotion of fashion brands.

In: Operations Management

(a) Apply Maxwell relation and Gibb’s first equation (du=TdS-Pdv) to find the (∂u/∂P)_Trelation in terms of...

(a) Apply Maxwell relation and Gibb’s first equation (du=TdS-Pdv) to find the (∂u/∂P)_Trelation in terms of directly measurable properties (P, V and T). For an ideal gas, what will be the value of that partial derivative?

(b) Illustrate physical meaning of Inversion line with the help of T-P diagram.

(C) Assume that carbon dioxide (CO2) is collected from bacterial decomposition of organic matter at 5℃, and atmospheric pressure (100 kPa), and is required to be used in a process at -30℃, 40 bar. Apply theory of real gas behavior to calculate how much actual minimum work input and heat transfer is required to reach this state. Also, suggest some devices that can be used to obtain this state change

In: Mechanical Engineering