Questions
In the body, hemoglobin (Hb) is the substance responsible for transporting oxygen (O2) to tissues. Hemoglobin...

In the body, hemoglobin (Hb) is the substance responsible for transporting oxygen (O2) to tissues. Hemoglobin binds oxygen to produce oxyhemoglobin (HbO2):

Hb + O2 ? HbO2

Carbon monoxide (CO) can also bind to hemoglobin to produce carboxyhemoglobin (HbCO):

Hb + CO ? HbCO

The equilibrium constant for Reaction 2 (KCO) is about 210 times larger than the equilibrium constant for Reaction 1 (KO2). Thus, carbon monoxide binds to hemoglobin much more efficiently than oxygen.

KCO/KO2 = 210

a. Write a balanced equation for the displacement of oxygen from HbO2 by CO to produce HbCO. Write the equilibrium constant expression for your overall reaction.

b. Write an expression that relates the equilibrium constant for the overall reaction (i.e., from Question 1) to the equilibrium constants KCO and KO2.

c. Use your balanced equation from part (a) and your knowledge of equilibrium constants to explain why patients who are experiencing CO poisoning are generally given pure oxygen as a remedy.

In: Chemistry

company Nike Take some time to review the website of the company you’ve selected. What is...

company

Nike

Take some time to review the website of the company you’ve selected. What is the company’s mission? (2 pt)

Customer Focus: Who are your company's customers? What are some of the unique things the company does to provide superb customer service? (2 pt)

List your company’s main competitors (2 pt)

Review Porter’s Strategies for Competitive Advantage. Which of the strategies does your selected company use? Explain why you’ve the selected this strategy. (2 pts)

List at least one way your selected company uses technology? (2 pt)

In: Computer Science

Question 1 A substring of String s is a sequence of k >= 0 characters in...

Question 1

A substring of String s is a sequence of k >= 0 characters in s, in the order in which they occur in s.

The letters in a substring may be either contiguous (next to each other) or non-contiguous in the original String s.

For instance, these are the substrings of String s="abc".

String s All substrings of s

======== ==================================

"abc" "" "a" "b" "ab" "c" "ac" "bc" "abc"

Write a function allSubstrings that returns an ArrayList containing all the substrings (contiguous or non-contiguous) of a String parameter s, and test it on the String "abcde".

// Return all substrings of the String s

public static ArrayList allSubstrings(String s) { ... }

Question 2

Implement a function that reads numbers in from a file with one number per line and outputs all the possible sums that can be formed by subsets of the numbers. For instance, if the numbers in the file are 1 2 4, then the output would be 0, 1, 2, 4, 3, 5, 6, 7. Note that 0 is in the output because it uses none of the numbers, while 7 is the sum of all of the numbers.

// Return all sums that can be formed from subsets of elements in arr

public static ArrayList allSums( ArrayList arr ) { ... }

q1.java

package a1;

/**

* Name:

* Student ID:

* Description of solution:

*/

import static org.junit.Assert.*;

public class Q3 {

// Return the number of ways to choose a subset of k distinct elements from a

set of n elements

public static int C( int n, int k ) {

return 0;

}

public static void main(String[] args) {

System.out.println("Testing...");

assertEquals(C(14,3), 364);

assertEquals(C(14,11), 364);

assertEquals(C(18,8), 43758);

System.out.println("Success!");

}

}

q2.java

package a1;

/**

* Name:

* Student ID:

* Description of solution:

*/

import java.io.BufferedReader;

import java.io.FileReader;

import java.util.ArrayList;

import static org.junit.Assert.*;

public class Q2 {

// Return all sums that can be formed from subsets of elements in arr

public static ArrayList allSums( ArrayList arr ) {

return null;

}

public static void main(String[] args) {

//https://www.baeldung.com/java-file-to-arraylist

ArrayList result = new ArrayList();//=

Files.readAllLines(Paths.get("nums.txt"));

try {

BufferedReader br = new BufferedReader(new

FileReader("nums.txt"));

while (br.ready()) {

result.add(Integer.getInteger(br.readLine()));

}

} catch (Exception e) {

System.out.println(e.getMessage());

}

ArrayList sums = allSums(result);

System.out.println("Testing...");

assertEquals(sums.size(), 8);

assertEquals(sums.contains(0), true);

assertEquals(sums.contains(1), true);

assertEquals(sums.contains(2), true);

assertEquals(sums.contains(4), true);

assertEquals(sums.contains(3), true);

assertEquals(sums.contains(5), true);

assertEquals(sums.contains(6), true);

assertEquals(sums.contains(7), true);

System.out.println("Success!");

}

}

q3.java

package a1;

/**

* Name:

* Student ID:

* Description of solution:

*/

import java.util.ArrayList;

import static org.junit.Assert.*;

public class Q1 {

// Return all substrings of the String s

public static ArrayList allSubstrings(String s){

return null;

}

public static void main(String[] args) {

ArrayList s = allSubstrings("abcde");

System.out.println("Testing...");

assertEquals(s.size(), 32);

assertEquals(s.contains(""), true);

assertEquals(s.contains("abcd"), true);

assertEquals(s.contains("abce"), true);

assertEquals(s.contains("abcde"), true);

System.out.println("Success!");

}

}

nums.txt

1

2

4

In: Computer Science

A particle with an initial linear momentum of 3.72 kg · m/s directed along the positive...

A particle with an initial linear momentum of 3.72 kg · m/s directed along the positive x-axis collides with a second particle, which has an initial linear momentum of 7.44 kg · m/s, directed along the positive y-axis. The final momentum of the first particle is 5.58 kg · m/s, directed 45.0° above the positive x-axis. Find the final momentum of the second particle.

magnitude
direction above the negative x-axis

In: Physics

Give an example of a “general” coaching statement as contrasted to a “pinpointed” coaching statement. Which...

Give an example of a “general” coaching statement as contrasted to a “pinpointed” coaching statement. Which is more effective and why?

In: Operations Management

(Mobile generations & 5G mobile) Mobile communications have been developed from the first generation (1G) to...

(Mobile generations & 5G mobile) Mobile communications have been developed from the first generation (1G) to the fifth generation (5G) now. Explain each mobile generation from 1G to 5G in brief. Describe the differences of each generation from the previous generation. Discuss what 5G mobile is different from the previous generations of mobile. Show your idea how to utilize the 5G mobile for business. (100 points)

In: Computer Science

You have a credit card on which you owe a balance of $3,000. The card carries...

You have a credit card on which you owe a balance of $3,000. The card carries an interest rate of 22% (APR), compounded monthly. You decide to cut up the card, and pay it off by paying the minimum payment due each month, which is a constant $60 (HINT: The amount you owe the credit card company today is a loan).

In: Finance

Write an ASM program that evaluates the following expression, using variables: Z = (-A - B)...

Write an ASM program that evaluates the following expression, using variables: Z = (-A - B) - (-C - D) 1. Declare and initialize the memory variable A to 32-bit signed integer value 543210 and variable B to 16-bit signed integer value -3210. 2. Declare the memory variables C and D and read in their values from the keyboard as 32-bit signed integer value 43210 and 8-bit signed integer values -10, respectively. a. You should display a message asking for the value of the variable, for example: “What is the value of C?” then b. Read in the value of C from the keyboard and then c. Display the value you have read beside (ie, to the right of) the message “What is the value of C?”. Then repeat for variable D in the next line. 3. Variable Z should be declared as a 32-bit signed integer.

4. Display the string “Z = (-A - B) - (-C - D)” alone in a single line. 5. Display the values of all the variables A, B, C, D together in the next line (in the order in which they appear in the expression); each separated by 3 spaces and a semicolumn and 3 spaces again. 6. Display an empty line. 7. Display the final result contained in variable Z, in binary, then in decimal, and then in hexadecimal; each in a separate line.

In: Computer Science

Identify and assess the ways that Pepsi incorporates the market entry options in achieving strategic objectives....

Identify and assess the ways that Pepsi incorporates the market entry options in achieving strategic objectives. Emphasize the challenges, best practices, and applications for Pepsi

In: Operations Management

1.Define the following words: claim (fact, value, or policy) journalists ethical issues shocking events shameful situations...

1.Define the following words:

claim (fact, value, or policy)

journalists

ethical issues

shocking events

shameful situations

embarrassing situations

scandals

aggressor

paparazzi

propaganda

In: Psychology

Can you please explain and show how you would complete the following SQL Injection Attacks tasks...

Can you please explain and show how you would complete the following SQL Injection Attacks tasks using the SEED lab seed Ubuntu 16.04 Virtual Machine:

Task 3.1: Modify your own salary.

As shown in the Edit Profile page, employees can only update their nicknames, emails, addresses, phone numbers, and passwords; they are not authorized to change their salaries. Assume that you (Alice) are a disgruntled employee, and your boss Boby did not increase your salary this year. You want to increase your own salary by exploiting the SQL injection vulnerability in the Edit-Profile page. Please demonstrate how you can achieve that. We assume that you do know that salaries are stored in a column called salary.

Task 3.2: Modify other people’ salary.

After increasing your own salary, you decide to punish your boss Boby. You want to reduce his salary to 1 dollar. Please demonstrate how you can achieve that.

Task 3.3: Modify other people’ password.

After changing Boby’s salary, you are still disgruntled, so you want to change Boby’s password to something that you know, and then you can log into his account and do further damage. Please demonstrate how you can achieve that. You need to demonstrate that you can successfully log into Boby’s account using the new password. One thing worth mentioning here is that the database stores the hash value of passwords instead of the plaintext password string. You can again look at the unsafe edit backend.php code to see how password is being stored. It uses SHA1 hash function to generate the hash value of password. To make sure your injection string does not contain any syntax error, you can test your injection string on MySQL console before launching the real attack on our web application.

Please include screenshots along the way, thank you!

In: Computer Science

1.)Prove that f(n) = O(g(n)), given: F(n) = 2n + 10; g(n) = n 2.)Show that...

1.)Prove that f(n) = O(g(n)), given: F(n) = 2n + 10; g(n) = n

2.)Show that 5n2 – 15n + 100 is Θ(n2 )

3.)Is 5n2 O(n)?

In: Computer Science

The interest rate on a 1-year Canadian security is 12% current exchange rate is C$ =...

The interest rate on a 1-year Canadian security is 12%
current exchange rate is C$ = US 0.8
1-year forward rate is C$ = US 0.82
The return (denominated in U.S. $) that a U.S. investor can earn by investing in the Canadian security is

12.00%

13.24%

14.18%

14.80%

In: Finance

Intro to Rehabilitaion T/F True/False? A.) The rehabilitation act of 1973 was patterned after the civil...

Intro to Rehabilitaion T/F

True/False?

A.) The rehabilitation act of 1973 was patterned after the civil rights act of 1964.

B.) Multicultural counseling is directed at trying to counteract negative trends in the treatment of persons with disabilities from minority cultures.

C.) Multicultural counseling holds value-free counseling to be a myth.

D.) Groups that have more of a heterogeneous make-up tend to be more representative of the outside world.

E.) Rehabilitation counselors should possess counseling, coordinating, and consulting skills.

F.) People with disabilities are handicapped by society's mistaken beliefs about their disabilities.

G.) The therapeutic factor of universality in group work refers to having awareness that others may have similar difficulties around the same issue/problem.

H.) Generally speaking , one of the important end goals in vocational rehabilitation for people with disabilities is placement in competitive employment.

I.) The notion that society persists in protecting the weak (i.e. individuals with disabilities) is known as paternalism.

J.) Respecting an individual with a disabilities choice would be considered an example of the ethical principal of beneficence:

K.) A disability is usually defined as an imposed barrier that restricts a person.

L.) The Americans with Disabilities Act (1990) was designed to require all employers to hire people with disabilities, regardless of their qualifications.

M.) Because of their "deviation from the norm" people with disability are likely to be devalued by the larger society.

N.) Title I of the Americans with Disabilities Act (ADA) is designed to prevent EMPLOYERS from discriminating against people with disabilities.

In: Psychology

What is the age of the charcoal BP if currently living organisms decay at the rate...

What is the age of the charcoal BP if currently living organisms decay at the rate of 15.3 disintegrations/min per gram of carbon?

The half-life of 14C is 5715 years.

In: Chemistry