Entries by Student

write my assignment 11864

Please help me the discussion questions. Please explain to me. Thank you so much.

  • Attachment 1
  • Attachment 2
  • Attachment 3

Table for Excel Zero-, Second-, and First-order Kinetic PlotsTime (seconds)[103-]1/[103-]In [IO3-]It . 3S sO .O10 w190-4.6012.9 0 4.o,0cq M- 4. H13 .6890: 008 M- 4. 8314. t950,007 M14 2 , 86-4.962 0 .8946,006 M16 6, 6 6- S. I10, 005 M200- $. 29d8 32501 00 4 M250- S. 52Discussion Questions: As part of your first, second, and zero order kinetic plots, you willneed to incorporate the following in your lab discussion. (NB: Use complete typedsentences when answering discussion questions.)1. How would an increase, or decrease in temperature affect the rate of reaction?2. What effect does adding a catalyst have on the rate of reaction?3. How did decreasing the 103- concentration effect the reaction time?4. Give the order of reaction and rate constant obtained from the excel plot of yourexperimental data, and write a rate law expression for this reaction.5. Given the experimental determined rate law expression and rate constant, whatwould be the rate if the concentration of 103- ion increases to 0.050 M?

 

"Not answered?"


Get the Answer

write my assignment 30254

The communication and processing functions of a computer network are done via several cooperating computing processes. The architectural model that defines the classes of functions or protocols involved in this cooperation is based on the concept of layering. So, the whole system is viewed as a hierarchy of functional layers. Every layer adds to the system a series of functions based on the services supplied by the below subordinate level. The functions are accomplished by the action of some entities or modules that belong to different nodes of the network. The entities on the same level coordinate their actions by transmitting a control information according to a certain protocol. Such a network with a perfect layering of its functions may be a reference model for open systems interconnection.

When a resource is shared among multiple independent stations or users, the need exists for a mechanism to control access to the resource, or in the absence of such a mechanism there must exist a course of action to be taken when two or more users attempt to acquire the resource at the same time. One solution would be to allow stations to transmit whenever they have data to send. A node transmits at random (i.e. there is no priory coordination among nodes) at the full rate of the channel. If two or more nodes collide, they retransmit at random times. Contention among users (or collisions of transmissions) limits network throughput and increase time delay. Thus, some protocols must be employed to exercise control over the access method of users. Random Access Protocols address this situation. The random access MAC protocol specifies how to detect collisions and how to recover from them (for instance, via delayed retransmissions). There are a number of MAC protocols which have been developed for various communications networks. Depending upon the type and limitations of the network, each protocol has its advantages and disadvantages as well as unique performance limitations.

Some protocols have became “de facto” standards due to their widespread by a large product selling. Thus, two of the early ARPA’s protocols have proliferated due to their inclusion in the UNIX Berkeley operating system. These are the network protocol IP (Internetwork Protocol) and the transport protocol TCP (Transmission Control Protocol). However, these protocols that are the foundation of the TCP/IP architecture are not unanimously accepted by the networks manufacturers. In order to exist a unitary way of conceiving the functions performed at every level, the International Organization for Standardization (ISO) has designed a reference model of protocol levels with 7 layers, called Open System Interconnection (OSI). This model serves as a basis for the design and standardization of ISO’s own protocols.

An alternative to circuit-switching, where the communication lines are dedicated to passing messages from the source to the destination is packet-switching. Packet switching originates in message switching, where each message can travel from the source to destination independently. In order to know how to arrive at destination, the message must contain the destination address and also the source address for message identification. The message is transmitted in its entirety from one node to another. When messages are broken into smaller units called packets, the message switching becomes packet switching. The idea is to ensure that the packets size are more convenient for the network transmission. At the destination the packets are reassembled into the original message.

Read through the related OERs. The purpose of this section is to discuss the networking fundamentals starting from the above mentioned architectures.Due May 31th3 pagesOERs:

  • CISCO. (n.d.).ICND1 100-101. Functions of Networking. Retrieved from: http://
  • CISCO. (n.d.). ICND1 100-101. Securing Network. Retrieved from: http://
  • CISCO. (n.d.). ICND1 100-101. Layering in Host-to-Host Communications. Retrieved from:http://
  • CISCO. (n.d.). ICND1 100-101.Understanding the IP Layer & Internal IP Addressing. Retrieved from:http://
  • CISCO. (n.d.). ICND1 100-101.Understanding The TCP (Transport) Layer. Retrieved from:http:// free to read subsequent chapters in this CISCO resource; but reading them is not required.)

    • OmniSecu.com. (n.d.). TCP/IP Encapsulation and Decapsulation. Retrieved from: http://
    • IETF. (1981). INTERNET PROTOCOL. DARPA INTERNET PROGRAM. PROTOCOL SPECIFICATION.RFC 791. Retrieved from: https://tools.ietf.org/html/rfc791
    • IETF (1981). TRANSMISSION CONTROLPROTOCOL. DARPA INTERNET PROGRAM. PROTOCOL SPECIFICATION. RFC 793. Retrieved from: https://
    • Arora H. The Geek Stuff. (2013). Hubs vs Switches vs Routers – Networking Device Fundamentals. Retrieved from: http://
    • Mitchell B. (2020). Introduction to LANs, WANs, and Other Kinds of Area Networks. Retrieved from: https://

 

"Not answered?"


Get the Answer

write my assignment 27794

Which of the following types of organizational initiatives focuses on job design and system change?  A. Interpersonal  B. Work process  C. Structural  D.Organizational

What budgeting method is based on how much it costs to perform different enterprise activities and allocates funding according to the strategic significance of the activities?  A. Formula  B. Activity-based  C. Zero-based  D. Incremental

When is knowledge management most productive?  A. When it develops new procedures and creates organizational policies  B. When it focuses on acquiring knowledge from outside sources and solving problems  C. When the organization implements change and commits to employee development  D. When it focuses on sharing organizational learning and reducing knowledge loss

A scientist is hired to perform research at a pharmaceutical company. Which of the following is the most critical to include in the employment contract  A. Protections for trade secrets and confidential information  B. Noncompete requirements

An HR manager has been told by senior management that no new programs can be added this year. However, the department just received its third complaint related to a supervisor’s lack of awareness about diversity. How can the manager best justify including a diversity training program in the business plan for the coming year?  A. Postpone this objective until the next business planning cycle  B. Don’t list the program in the HR plan and fund it through other plan areas  C. Compare the cost of the program with possible avoided cost and present this information to management  

D. Make a management decision to include the program for compliance reasons

What characterizes a learning organization?  A. It takes responsibility for the learning of its employees  B. It advocates internal rather than external networking  D. It manages change and adapts to its environment  D. It,encourages each department to function independently  

Senior management has determined that a reduction in force (RIF) is the only way it can address financial difficulties. Which action would best minimize the impact of the downsizing on the organization and employee morale?  

A. Constructively discharge the least-productive employees  B. Treat separation volunteers as terminations  C. Imply a chance that terminated employees might be called back  D. Allow employees to volunteer to be separated

What approach is most characteristic of succession planning?  A. Local requirements are given the highest priority

B. It is initiated as soon as it is clear a senior executive is leaving  C. It focuses on issues likely to occur in the short term of approximately one to three years  D. It focuses on long-term global issues

A multinational organization allows its labor relationship to be managed entirely by the local subsidiary. This relationship is referred to as?  A. Standardized  B. Laissez-faire  C. Centralized  D. Hands-off 

 

"Not answered?"


Get the Answer

write my assignment 7559

Consider the following information:Stock C.45.20.11-.11Requirement 1:Your portfolio is invested 20 percent each in A and C, and 60 percent in B. What is the expected return of the portfolio? (Do not round your intermediate calculations.)Requirement 2:(a) What is the variance of this portfolio? (Do not round your intermediate calculations.)HINT: It is best if you first calculate the return on the portfolio in all 4 states. You will need those numbers in the next part of the problem.(b) What is the standard deviation? (Do not round your intermediate calculations.)NOTE: The standard deviation is the square root of the variance. It tells us on average, how far away the return will be from the expected return.”

Consider the following information:Probability Stock A Stock B Stock CBoom .30 .30 .39 .45Good .40 .15 .12 .20Poor .12 .08 .06 .11Bust .18 ­.03 ­.07 ­.11Requirement 1:Your portfolio is…

 

"Not answered?"


Get the Answer