For the following half reaction: N2(g) + 5H+(aq)+4e- ----> N2H5+
Calculate the amount of time required to produce 7.86 (g) of N2 while using a 15.0 A current.
In: Chemistry
Which of the Generic Strategies for Creating a Competitive Advantage do you feel is best, and why? Please provide examples or other evidence
In: Operations Management
You have been tasked to write a C# application that will go
through the first step of encrypting an input file and writing the
encrypted contents to an output file.
For this first step in encryption, read each letter in from the
input file, add 3 letters to the value of the input letter. If the
input letter is an A then the encrypted letter would be a D. If the
input letter from the input file is an X then the encrypted letter
would be an A.
All spaces, digits, punctuation, and special characters do not need
to be encrypted at this level. Simply write the space,
punctuation, or special character to the output file as is.
If a letter is uppercase in the input file, it should remain as an
uppercase character in the output file. If a letter is lowercase in
the input file, it should remain as a lowercase character in the
output file.
Since this program runs each month, the input file will be of
various lengths; therefore, the program will read until end of
file.
The input file is found in the current directory and is named
October20.txt. The output
file will be written to the current directory and named
EncryptOct20.txt.
An example:
If the contents of the input file is
Live long and prosper. |
The output file would be:
Olyh orqj dqg survshu. |
What the user should see when the program executes:
When the program begins, the statement "Encryption Level 1" should
be displayed.
The focus should be set to the "Begin Encryption" button.
When the user clicks the "Begin Encryption" button, the program
opens the input file, the statement "Opening input file...." should
be displayed. The "Begin Encryption" button should be
disabled.
When the program begins reading through the input file encrypting
the contents, the statement "Encrypting input file...." should be
displayed.
When the program closes the input and output files, the statement
"Encryption complete...." should be displayed.
When the program is complete, the statement "End of process" should
be displayed.
In: Computer Science
course: IT Data Mining and Data Warehousing
There are several typical cube computation methods such as Multi-Way, BUC, and Star-cubing. Briefly describe each one of these methods outlining the key points.
note: need a unique answer and no handwriting please.
In: Computer Science
If you were running Coca Cola, would you acquire La Croix to capture market share or grow organically?
In: Operations Management
After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be under Australian Government control.
You are to provide a report to DoH that:
In: Computer Science
First, you will need to conduct research to identify two public organizations that have recently, or are currently, negotiating a conflict. Be sure there are newspaper articles or other resources that sufficiently document both sides of the conflict. Remember that when generating alternative solutions, the parties to a negotiation must both actively participate in the conflict resolution, so make sure you are able to identify documentation related to the efforts of negotiation coming from both sides the conflict. Watch for emotions, personality, and bias that may result in a party’s inability or unwillingness to listen or accept alternative solutions to a problem.
After sufficiently researching the conflict you will need to choose one side of the conflict you would like to represent. You will then need to create an Integrative Negotiation Planning Strategy for the party you are representing based on the facts of the conflict identified.
After you have completed your Integrative Negotiation Planning Strategy, summarize the conflict and proposed alternate solution. Be sure to describe the conflict.
In: Operations Management
Organizational Analysis Paper Instructions
Each student will write an 8-10-page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections:
In: Operations Management
Mention any three reconnaissance techniques. Briefly explain each of them (just one or two sentences). Why reconnaissance is a threat to network security?
In: Computer Science
According to the EPA’s prospective analysis of the 1990 to 2010 period, total social benefits (TSB) associated with the CAAA of 1990 are estimated at $690 billion and the comparable total social cost (TSC) estimates are $180 billion (both in $1990).
a. Explain why these data do not communicate whether the regulations outlined by the CAAA of 1990 are efficient.
b. Using three separately labeled graphs of conventionally-shaped TSB and TSC functions show that these values indicate that the regulations outlined in the CAAA of 1990 are (i) efficient; (ii) too lenient; and (iii) too stringent.
In: Economics
In: Computer Science
write me an email message with at minimum of 3-paragraphs (opening/body/close) providing a summary and highlighting your thoughts on the speech by Steve Jobs .(video title is how to live before you die at Stanford university)
In: Operations Management
Will the brand equity of Coca Cola be a competitive advantage versus a private label (such as a large grocery store chain)?
Please answer.
In: Operations Management
1. Discuss the link between a brand image and pricing strategy.
2. Discuss the advantages and disadvantages of using social networks as part of a promotional campaign.
3. Discuss the advantages and disadvantages of celebrity endorsement in the promotion of fashion brands.
In: Operations Management
(a) Apply Maxwell relation and Gibb’s first equation (du=TdS-Pdv) to find the (∂u/∂P)_Trelation in terms of directly measurable properties (P, V and T). For an ideal gas, what will be the value of that partial derivative?
(b) Illustrate physical meaning of Inversion line with the help of T-P diagram.
(C) Assume that carbon dioxide (CO2) is collected from bacterial decomposition of organic matter at 5℃, and atmospheric pressure (100 kPa), and is required to be used in a process at -30℃, 40 bar. Apply theory of real gas behavior to calculate how much actual minimum work input and heat transfer is required to reach this state. Also, suggest some devices that can be used to obtain this state change
In: Mechanical Engineering