Ion Exchange Chromatography
Explain how the Cu2+ ions interact with H+ ions in the resin.
Explain how the Mg2+ ions elute the Cu2+ ions from the resin.
In: Chemistry
Which of the following is not a special journal:
- Sales journal.
- Purchases journal.
- Cash receipts journal.
- General journal.
- Cash disbursements journal.
In: Accounting
Select a product that members of a particular nation consumer very lightly. Research the country's culture and geographic location and describe why they are light users of the product selected.
In: Operations Management
Newspapers are struggling to survive as readers increasingly go online to get news and information. Nevertheless, newspapers continue to offer unique benefits to advertisers. Write a report about the state of newspapers and make an argument for what may happen to newspaper advertising during the next decade. Be sure to answer the following questions: Could newspapers go extinct? Do advertisers still need this medium? Can news organizations find a way to make newspapers a viable business again?
In: Operations Management
To automatically insert electronic components in printed circuit boards for a cell phone production line, a $500,000 surface mount placement (SMP) machine is being evaluated by a manufacturing engineer at Motorolla. Over the 10-year planning horizon, it is estimated the SMP machine will produce annual cost savings of $92,500. The engineer estimates the machine will be worth $50,000 at the end of the 10-year period. Based on the firm’s 10% MARR, how long does it take for the new SMP machine to fully recover its initial cost, including the Time Value of Money (TVOM)? (i.e., use discounted payback period).
In: Economics
Perform SVM training and testing using SMS spam data set spam.csv . The objective is the predict the class of a new SMS using SVM classifier. The data set is a collection of a set of SMS tagged messages that have been collected for SMS Spam research. It contains one set of SMS messages in English of 5,574 messages, tagged according being ham (legitimate) or spam. The files contain one message per line. Each line is composed by two columns: v1 contains the label (ham or spam) and v2 contains the raw text.
Data set: The details of learning and testing task is as follows:
1. Understand distribution of classes in the data set using suitable plots.
2. Plot distribution of frequent words under “spam" and “ham" classes.
3. Preprocess the data set if required.
4. Apply SVM classifier.
5. Use Cross validation and Hold-out approaches to learn and evaluate SVM classifier.
6. Discuss results achieved by SVM classifier using confusion matrix, sensitivity, specificity and accuracy.
Question 3 Consider a problem where we are given collection of reviews of a movie by 5 people. Each review is a sentence summarising the comments given by the person. The review is classified as either good or bad.
1. Create example supervised data set on this problem.
2. Formulate Naive Bayes classifier on this data set to predict a new review in defined category
[Hint:- Please refer to the given example Analyzing Textual Data with Natural Language Processing.pdf for solving question 2 & 3.]
In: Computer Science
Can you write code in Java to find the power set of a given set? For example if S={a,b} the power set is P={{},{a},{b},{a,b}} ( you can also choose any of your favorite programming language). Explaning the code in comment please.
In: Computer Science
Write a python program that has:
CivilIdNumber
Name
Telephone#
Address
CivilIdNumber
Name
Telephone#
Address
CivilIdNumber
Name
Telephone#
Address
Etc
A record always consists of 4 lines (civilid, name, telephone and address). You can find a sample input file on last page of this assignment, copy it and past it into a .txt file and save it to the same directory that your python program resides on.
The function then creates a dictionary with the civilIdNuber as the key and the rest of the record as a list with index 0 being the name, index 1 being the telephone# and index 2 being Address.
When finishing reading all records the function then returns the dictionary
CivilId: civilidnumber
Name: name
Address: address
Telephone Number: telephone
CivilId: civilidnumber
Name: name
Address: address
Telephone Number: telephone
Etc…
In: Computer Science
Within the scope of human behavior regarding learning and memorywhat does Cognitive Learning Theory approach stress? (Chapter 4, 120-122) I basicly asked the question for you. Can you hand it over to someone else!!!
In: Psychology
In: Operations Management
I want a summarize from the Article below
Article: A present for Popo by Elizabeth Wong
The child of chinese immigrants, Elizabeth Wong was born in Los Angeles. She has a master's degree in fine arts and has worked as a writer for news papers and television. She has also written several plays. In " A Present for Popo," Wong describes a beloved grandmother.
Before you read this essay, consider these questions:
Are you afraid of growing old ?
Do you think most old people in north America are treated well ?
Are they respected ? ignored ?
Are you close to anyone over sixty-five ?
Did you grow up in the close contact with a grandparent ?
Is there one person who holds your family together ?
When my Popo opened a Christmas gift, she would shake it, smell it, listen to it. She would size it up. She would open it nimbly, with all enthusiasm and delight, and even though the mittens were ugly or the blouse too small or the card obviously homemade, she would coo over it as if it were the baby Jesus.
Despite that, buying a gift for my grandmother was always problematic. Being in her late 80s, Popo didn't seem to need any more sweaters or handbags. No books certainly, as she only knew six words of English. Cosmetics might be a good idea, for she was just a wee bit vain.
But ultimately, nothing worked. "No place to put anything anyway," she used to tell me in Chinese. For in the last few years of her life, Popo had a bed in a room in a house in San Gabriel owned by one of her sons. All her belongings, her money, her very life was now co-opted and controlled by her sons and their wives. Popo's daughters had little power in this matter. This was a traditional Chinese family.
For you see, Popo had begun to forget things. Ask her about
something that happened 20 years ago, and she could recount the
details in the heartbeat of a New York minute. But it was those
niggling little everyday matters that became so troubling. She
would forget to take her heart medicine. She would forget where she
put her handbag. She would forget she talked to you just moments
before. She would count the few dollars in her billfold, over and
over again. She would ask me for the millionth time, "So when are
you going to get married?" For her own good, the family decided she
should give up her beloved one-room Chinatown flat. Popo herself
recognized she might be a danger to herself, "I think your
grandmother is going crazy," she would say.
That little flat was a bothersome place, but Popo loved it. Her
window had a view of several import-export shops below, not to
mention the grotesque plastic hanging lanterns and that nasty
loudspeaker serenading tourists with 18 hours of top-40 popular
hits.
My brother Will and I used to stand under her balcony on Mei Ling Way, shouting up, "Grandmother on the Third Floor! Grandmother on the Third Floor!" Simultaneously, the wrinkled faces of a half-dozen grannies would peek cautiously out their windows. Popo would come to the balcony and proudly claim us: "These are my grandchildren coming to take me to dim sum. " Her neighbors would cluck and sigh, "You have such good grandchildren. Not like mine."
In that cramped room of Popo's, I could see past Christmas presents. A full-wall collage of family photos that my mother and I made together and presented one year with lots of fanfare. Popo had attached additional snapshots by way of paper clips and Scotch tape. And there, on the window sill, a little terrarium to which Popo had tied a small red ribbon. "For good luck," as she gleefully pointed out the sprouting buds. "See, it's having babies."
Also, there were the utility shelves on the wall, groaning from a wide assortment of junk, stuff and whatnot. Popo was fond of salvaging discarded things. After my brother had installed the shelving, she did a little jig, then took a whisk broom and lightly swept away any naughty spirits that might be lurking on the walls. "Shoo, shoo, shoo, away with you, Mischievous Ones!" That apartment was her independence, and her pioneer spirit was everywhere in it.
Popo was my mother's mother, but she was also a second mother to me. Her death was a great blow. The last time I saw her was Christmas, 1990, when she looked hale and hearty. I thought she would live forever. Last October, at 91, she had her final heart attack. The next time I saw her, it was at her funeral.
An open casket, and there she was, with a shiny new penny poised between her lips, a silenced warrior woman. Her sons and daughters placed colorful pieces of cloth in her casket. They burned incense and paper money. A small marching band led a New Orleans-like procession through the streets of Chinatown. Popo's picture, larger than life, in a flatbed truck to survey the world of her adopted country.
This little 4-foot, 9-inch woman had been the glue of our
family. She wasn't perfect; she wasn't always even nice, but she
learned from her mistakes, and, ultimately, she forgave herself for
being human. It is a lesson of forgiveness that seems to have
eluded her own sons and daughters.
And now she is gone. And with her--the tenuous, cohesive ties of
blood and duty that bound us to family. My mother predicted that
once the distribution of what was left of Popo's estate took place,
no further words would be exchanged between Popo's children. She
was right.
But this year, six of the 27 grandchildren and two of the 18 great-grandchildren came together for a holiday feast of honey-baked ham and mashed potatoes. Not a gigantic family reunion. But I think, for now, it's the one yuletide present my grandmother might have truly enjoyed.
Merry Christmas, Popo!
In: Psychology
The Application Analyst (AA) department manager, Lori Williams,
called the training department and asked to sit down and discuss
the new product they were rolling out to all the company's AAs,
worldwide, and what training could be offered starting on August 11
and ongoing as they were looking to roll out Document Manager on
October 2. This product would affect 2500 people.
Lori Williams met with two trainers, Sarah Ward and Caroline Smith.
Lori explained that all of the AAs were creating the same
documentation over and over again, but had to save it to their own
desktops and were unable to share the information because they
didn't have a document repository. Document Manager was going to
fix this problem. All of the AAs could then share documentation.
Document Manager too would have a template in it for the AAs to
use. Document Manager would make the AA's work much easier and
quicker. The AAs were asked by upper management to be more
effective with their documentation. Lori wanted to train all 2500
employees worldwide before Document Manger went out to the company
on October 2.
Sarah and Caroline asked Lori what the AAs were using now to type
up their documentation and what would be different with Document
Manager. Lori explained that now AAs used Word Perfect, however
Document Manager would use Microsoft Word. Due to this huge change
Lori believes every employee effected needs to come to a training
class that should last at least two hours, if not longer. Since the
training would have to be on a computer, the training departments
computer classroom's only hold 15 people per class. Lori also said
that she would like to see each employee pass a test using Word and
Document Manager before attaining access to the new programs. She
went on to explain that she would also like to have online training
for Document Manager and Word available for all employees via their
intranet site. Lori also told Sarah and Caroline that upper
management had not yet decided how to reach the global employees
for this training. Times were tight and they didn't want to pay for
the employees to travel or for Sarah and Caroline to travel. Lori
said that she trusted Sarah and Caroline would have the right
answer for upper management.
Lori also gave Sarah and Caroline some background on the AAs. She
told them that for the most part the AA department's abilities and
familiarity with computers and software was exceptional. Lori had
taken over that department only two years ago, but she explained
how she weeded out the non-performing employees and replaced them
with hard working, smart, efficient ones. Sarah and Caroline were
excited about working with this audience.
assume that your trainers, Sarah and Caroline, are new to their
jobs. Assume further that you are their direct supervisor. Describe
how you would prepare Sarah and Caroline for their first assignment
before they meet with the department manager, Lori Williams.
Be certain to include in your paper a value chain, a logic map, and
a process map for their first assignment. Also include learning
transfer system inventory. Provide detailed explanations of each
component of the maps and the inventory as they apply to the
situation above
In: Operations Management
Code an application program that keeps tracks of
srudent information at your college:names, identification numbers,
and grade point averages in a fully encapsulated (homogenous)
sorted array-based data structure. When launched, the user will be
asked to input the maximum size of data set, the initial number of
students, and the initial data set. once this is complete, the user
will be presented with the following menu:
Enter:1 to insert a new student's info
2 to fetch and out put a student's info
3 to delete student info
4 to update student info
5 to output all the student info in sorted order
6 to exit program
note: please use Java language to create this program and please
write comments for each statement that what is happening. i know
there are same questions solution posted in chegg, but i want some
unique from others
In: Computer Science
Problem 9 - PYTHON
There is a CSV-formatted file called olympics2.csv. Write code that creates a dictionary named country_olympians where the keys are country names and the values are lists of unique olympians from that country (no olympian's name should appear more than once for a given country).
Name,Sex,Age,Team,Event,Medal
A Dijiang,M,24,China,Basketball,NA
A Lamusi,M,23,China,Judo,NA
Gunnar Nielsen Aaby,M,24,Denmark,Football,NA
Edgar Lindenau Aabye,M,34,Sweden,Tug-Of-War,Gold
Christine Jacoba Aaftink,F,21,Netherlands,Speed Skating,NA
Christine Jacoba Aaftink,F,21,Netherlands,Speed Skating,NA
Christine Jacoba Aaftink,F,25,Netherlands,Speed Skating,NA
Christine Jacoba Aaftink,F,25,Netherlands,Speed Skating,NA
Christine Jacoba Aaftink,F,27,Netherlands,Speed Skating,NA
Christine Jacoba Aaftink,F,27,Netherlands,Speed Skating,NA
Per Knut Aaland,M,31,United States,Cross Country Skiing,NA
Per Knut Aaland,M,31,United States,Cross Country Skiing,NA
Per Knut Aaland,M,31,United States,Cross Country Skiing,NA
Per Knut Aaland,M,31,United States,Cross Country Skiing,NA
Per Knut Aaland,M,33,United States,Cross Country Skiing,NA
Per Knut Aaland,M,33,United States,Cross Country Skiing,NA
Per Knut Aaland,M,33,United States,Cross Country Skiing,NA
Per Knut Aaland,M,33,United States,Cross Country Skiing,NA
John Aalberg,M,31,United States,Cross Country Skiing,NA
John Aalberg,M,31,United States,Cross Country Skiing,NA
John Aalberg,M,31,United States,Cross Country Skiing,NA
John Aalberg,M,31,United States,Cross Country Skiing,NA
John Aalberg,M,33,United States,Cross Country Skiing,NA
John Aalberg,M,33,United States,Cross Country Skiing,NA
John Aalberg,M,33,United States,Cross Country Skiing,NA
John Aalberg,M,33,United States,Cross Country Skiing,NA
"Cornelia ""Cor"" Aalten
(-Strannood)",F,18,Netherlands,Athletics,NA
"Cornelia ""Cor"" Aalten
(-Strannood)",F,18,Netherlands,Athletics,NA
Antti Sami Aalto,M,26,Finland,Ice Hockey,NA
"Einar Ferdinand ""Einari"" Aalto",M,26,Finland,Swimming,NA
Jorma Ilmari Aalto,M,22,Finland,Cross Country Skiing,NA
Jyri Tapani Aalto,M,31,Finland,Badminton,NA
Minna Maarit Aalto,F,30,Finland,Sailing,NA
Minna Maarit Aalto,F,34,Finland,Sailing,NA
Pirjo Hannele Aalto (Mattila-),F,32,Finland,Biathlon,NA
Arvo Ossian Aaltonen,M,22,Finland,Swimming,NA
Arvo Ossian Aaltonen,M,22,Finland,Swimming,NA
Arvo Ossian Aaltonen,M,30,Finland,Swimming,Bronze
Arvo Ossian Aaltonen,M,30,Finland,Swimming,Bronze
Arvo Ossian Aaltonen,M,34,Finland,Swimming,NA
Juhamatti Tapio Aaltonen,M,28,Finland,Ice Hockey,Bronze
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,Bronze
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,Gold
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,Gold
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,28,Finland,Gymnastics,Gold
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,Bronze
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Paavo Johannes Aaltonen,M,32,Finland,Gymnastics,NA
Timo Antero Aaltonen,M,31,Finland,Athletics,NA
Win Valdemar Aaltonen,M,54,Finland,Art Competitions,NA
In: Computer Science
Henry Magruder made a mistake—he left a CD at the coffee station. Later, when Iris Majwubu was topping off her mug with fresh tea, hoping to wrap up her work on the current SQL code module before it was time to go home, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who’d left it behind.
Expecting to find perhaps the latest device drivers, or
someone’s work from the development team’s office, Iris slipped the
disk into the drive of her computer and ran a virus scan on its
contents before opening the file explorer program. She had been
correct in assuming the CD contained data files, and lots of them.
She opened a file at random: names, addresses, and Social Security
numbers appeared on her screen. These were not the test records she
expected; they looked more like critical payroll data. Concerned,
she found a readme.txt file
and opened it. It read:
Jill, see files on this disc. Hope they meet your expectations. Wire money to account as arranged. Rest of data sent on payment.
Iris realized that someone was selling sensitive company data to
an outside information
broker. She looked back at the directory listing and saw that the
files spanned the range of every department at Sequential Label and
Supply—everything from customer lists to shipping invoices. She saw
one file that appeared to contain the credit card numbers of every
Web customer the company supplied. She opened another file and saw
that it only contained about half of the relevant data. Whoever did
this had split the data into two parts.
That made sense: payment on delivery of the first half. Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as “hmagruder.” That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.
Iris called the company security hotline. The hotline was an
anonymous way to report any
suspicious activity or abuse of company policy, although Iris chose
to identify herself. The
next morning, she was called to a meeting with an investigator from
corporate security,
which led to more meetings with others in corporate security, and
then finally a meeting with
the director of human resources and Gladys Williams, the CIO of
SLS.
Questions:
1. Why was Iris justified in determining who the owner of the CD
was?
2. Should Iris have approached Henry directly, or was the hotline
the most effective way
to take action? Why do you think so?
3. Should Iris have placed the CD back at the coffee station and
forgotten the whole
thing? Explain why that action would have been ethical or
unethical.
In: Computer Science