1
Phylogenetic Analysis Homework assignment
This assignment will be completed on your own and turned in the week of 11/8-11/10.
Introduction
Molecular evolution is the study of how proteins and nucleic acids evolve. Included in this
field are studies of mutations and chromosomal rearrangements, the evolutionary process,
the identification of sequence patterns conferring function in proteins and nucleic acids,
and the reconstruction of the evolutionary history of organisms and the molecules that
they make. All of these studies rely on comparisons of nucleotide or amino acid sequences.
In this tutorial, you will be introduced to some of the fundamental principles of molecular
evolution and the types of bioinformatics tools that are used in evolutionary studies. We
will begin by carrying out a manual sequence comparison, so that the basic concepts can
be introduced, and the remainder of the project will be carried out at The Biology
Workbench, a set of bioinformatics analysis programs managed by The San Diego
Supercomputing Center at the University of California, San Diego.
Objectives
• To introduce the principles of molecular evolution
• To acquaint you with the tools that are available to compare nucleotide and
amino acid sequences
• To learn about the use of protein sequences in reconstructions of evolutionary history
Project
Branching evolution occurs when one ancestral species gives rise to two or more progeny
species. However, speciation events don't involve the vast majority of the genes in a
genome. That is, for most genes, both of the progeny species inherit identical genes from
the ancestor. Following speciation, these genes evolve independently in the separate
lineages. Studies of molecular evolution therefore rely heavily on comparisons of related
sequences from different organisms.
Shown below is an alignment of two homologous sequences that we will use as a starting
place. Homologous sequences are sequences that have descended from a common
ancestral sequence. You can't meaningfully compare sequences unless they are
homologous. This alignment uses the single letter amino acid code, in which G represents
glycine, Q represents glutamine, etc. The aligned proteins have been shown to be involved
in the metabolism of similar, but different, toxic compounds. As you can see, these amino
acid sequences are very similar and it is easy to recognize that they are related by common
descent.
2
dntAc: KMGVDDEVIVSRQNDGSVR
nahAc: KMGIDDEVIVSRQSDGSIR
An expanded version of this alignment is shown below. In this expanded alignment, both
the amino acids and the corresponding DNA nucleotides are shown. For ease of analysis,
the codons have been broken into separate entries in a table.
Alignment of nahAc and dntAc sequences.
K M G V D E V I V
dntAc AAA ATG GGC GTC GAT GAA GTC ATC GTC
nahAc ...
DNA and Genes Lab ActivityComplete your answers in the spaces .docxjacksnathalie
DNA and Genes Lab Activity
Complete your answers in the spaces provided. USE YOUR OWN WORDS – Yes even for definitions! Remember to add your last name and first initial to the file name prior to saving and submitting your completed assignment through Canvas.
Use your textbook, notes and these websites to answer the pre lab questions. http://learn.genetics.utah.edu/units/basics/transcribe/http://www.vcbio.science.ru.nl/en/virtuallessons/cellcycle/trans/
Pre Lab Questions:
1. What is the product of transcription?
2. What is the region of DNA called where transcription begins?
3. What is the product of translation?
4. In your own words define each of the following: Silent mutation
Missense mutation Nonsense mutation Frame shift mutation
5. Where in the cell does translation take place?
Click on the link below to access the online lab.
http://www.mhhe.com/biosci/genbio/virtual_labs_2K8/pages/DNA_And_Genes.html
Download and print the instructions for reference as you work through the lab. As you work through the lab fill in the table below. Use this information to answer the questions that follow contained in this document.
First read through the mutation guide. Once you close the guide you will see the buttons to begin the simulation. Note, you will be translating the mRNA strand into a protein.
As you work through each of the mutations fill in the charts below. You must complete 4 mutations for this lab activity. It’s good practice working with the codon table .
– Aris labs calls the codon table the ‘Genetic Code Chart’. Use the amino acid abbreviation for the protein sequence. For example the amino acid proline is abbreviated as pro.
You have to fill in all the letters AND the resulting amino acid sequence by dragging and dropping before you click the [check] button. Abrieviate STOP as either STP or END.
For each of the three mutations you will complete, fill in the table in this lab document with the original mRNA and amino acid sequence and the mRNA sequence and the resulting amino acid sequence RESULTING FROM the mutation as outlined in the mutation rule.
The various mutations represent missense, nonsense, silent and frame shift mutations. You must complete one of each. The lab will not necessarily present the mutations in this order. You must do the mutation and identify which type it is and make sure you do one of each.
6. Frame Shift Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
7. Missense Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
8. Nonsense Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
9. Silent Mutation example:
Pr ...
INTRODUCTION
DEFINITION OF BIOINFORMATICS
HISTORY
OBJECTIVE OF BIOINFORMATIC
TOOLS OF BIOINFORMATICS
PROCEDURE AND TOOLS OF BIOINFORMATIC
BIOLOGICAL DATABASES
HOMOLOGY AND SIMILARITY TOOLS (SEQUENCE ALIGNMENT)
PROTEIN FUNCTION ANALYSIS TOOLS
STRUCTURAL ANALYSIS TOOLS
SEQUENCE MANIPULATION TOOLS
SEQUENCE ANALYSIS TOOLS
APPLICATION
CONCLUSION
REFERENCES
DNA and Genes Lab ActivityComplete your answers in the spaces .docxjacksnathalie
DNA and Genes Lab Activity
Complete your answers in the spaces provided. USE YOUR OWN WORDS – Yes even for definitions! Remember to add your last name and first initial to the file name prior to saving and submitting your completed assignment through Canvas.
Use your textbook, notes and these websites to answer the pre lab questions. http://learn.genetics.utah.edu/units/basics/transcribe/http://www.vcbio.science.ru.nl/en/virtuallessons/cellcycle/trans/
Pre Lab Questions:
1. What is the product of transcription?
2. What is the region of DNA called where transcription begins?
3. What is the product of translation?
4. In your own words define each of the following: Silent mutation
Missense mutation Nonsense mutation Frame shift mutation
5. Where in the cell does translation take place?
Click on the link below to access the online lab.
http://www.mhhe.com/biosci/genbio/virtual_labs_2K8/pages/DNA_And_Genes.html
Download and print the instructions for reference as you work through the lab. As you work through the lab fill in the table below. Use this information to answer the questions that follow contained in this document.
First read through the mutation guide. Once you close the guide you will see the buttons to begin the simulation. Note, you will be translating the mRNA strand into a protein.
As you work through each of the mutations fill in the charts below. You must complete 4 mutations for this lab activity. It’s good practice working with the codon table .
– Aris labs calls the codon table the ‘Genetic Code Chart’. Use the amino acid abbreviation for the protein sequence. For example the amino acid proline is abbreviated as pro.
You have to fill in all the letters AND the resulting amino acid sequence by dragging and dropping before you click the [check] button. Abrieviate STOP as either STP or END.
For each of the three mutations you will complete, fill in the table in this lab document with the original mRNA and amino acid sequence and the mRNA sequence and the resulting amino acid sequence RESULTING FROM the mutation as outlined in the mutation rule.
The various mutations represent missense, nonsense, silent and frame shift mutations. You must complete one of each. The lab will not necessarily present the mutations in this order. You must do the mutation and identify which type it is and make sure you do one of each.
6. Frame Shift Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
7. Missense Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
8. Nonsense Mutation example:
Provide the mutation rule you are following.
Original
A. Acids
Original
mRNA
Mutated
mRNA
Mutated
A. Acids
9. Silent Mutation example:
Pr ...
INTRODUCTION
DEFINITION OF BIOINFORMATICS
HISTORY
OBJECTIVE OF BIOINFORMATIC
TOOLS OF BIOINFORMATICS
PROCEDURE AND TOOLS OF BIOINFORMATIC
BIOLOGICAL DATABASES
HOMOLOGY AND SIMILARITY TOOLS (SEQUENCE ALIGNMENT)
PROTEIN FUNCTION ANALYSIS TOOLS
STRUCTURAL ANALYSIS TOOLS
SEQUENCE MANIPULATION TOOLS
SEQUENCE ANALYSIS TOOLS
APPLICATION
CONCLUSION
REFERENCES
Introduction to Gene Mining: Part B: How similar are plant and animal version...adcobb
In this lesson, students will navigate BLASTp and www.Araport.org to determine whether plant and animal versions of genes and proteins are homologous. Student handout and teacher resources are available at www.Araport.org, teacher resources page (under Community). Suitable for grades 9-12 or first year undergraduate students.
Apollo annotation guidelines for i5k projects Diaphorina citriMonica Munoz-Torres
Apollo is a web-based application that supports and enables collaborative genome curation in real time, allowing teams of curators to improve on existing automated gene models through an intuitive interface. Apollo allows researchers to break down large amounts of data into manageable portions to mobilize groups of researchers with shared interests.
MYSTERY MOLECULE PROJECT, PART II(20 points total)BIO1001.docxdohertyjoetta
MYSTERY MOLECULE PROJECT, PART II
(20 points total)
BIO1001
Fall 2020
To complete the remainder of this project and prepare for your presentation, follow the instructions below. Your presentation should include the answers to all questions indicated below. For your final
presentation, you are expected to
organize your research and
present a rehearsed, 10-12
minute presentation using the rubric at the end of this document as a guideline for preparation.
Learning Objectives
At the conclusion of this phase of the mystery molecule project, students will be able to
1. Effectively navigate sequence databases of the NCBI website
a. BLAST DNA sequence against the human genome
b. Analyze alignment data from genomic
databases
c. Identify an unknown gene based on DNA sequence
2. Use
the scientific literature (primary and secondary resources)
to analyze gene products, and research the cellular and molecular basis of a disease gene.
3. Organize scientific content into a coherent presentation.
4. Communicate research results to a group of peers.
Step 1: BLAST your DNA sequence
1. Go to:
http://www.ncbi.nlm.nih.gov/
2. Click on BLAST (under “popular resources” at the right side of the screen)
3. Choose the nucleotide blast program (under “Web BLAST”)
4. In the “blastn” tab (on left) enter your DNA sequence into the “enter query sequence” box (obtain your mystery DNA sequences in the Mystery Molecule content area in D2L).
a. In “choose search set” click the “genomic + transcript databases”
b. From the drop down menu below, select “Human genomic + transcript (Human G + T)”
c. Under “program selection” in the next section down, optimize for highly similar sequences (megablast)
5. Submit query (click on “BLAST” at the bottom of the screen) and wait– this may take up to a few minutes.
6. A colorized map of sequence alignment scores will appear. Red indicates very good sequence alignment.
7. Scroll down to descriptions of sequences that produced statistically significant alignments. You should see options for genomic alignments and transcripts. An e-value close to zero, and maximum sequence identity close to 100% are optimal.
8. Identify your mystery gene/transcript from the description, e-value, and % sequence identity.
Step 2: Analysis of gene product
Click on the reference number (left, in the column labeled, “Accession”) for the mRNA transcript or genomic sequence of your mystery gene. Scroll down; you will see many references (titles, authors, years of publication) describing your gene. Clicking on any one of the PubMed reference numbers will link you directly to the original publication. You will need these publications to characterize your gene for your presentation. Bookmark this page—all your references must be from primary or secondary sources (no google, wikipedia, textbooks, blogs, etc.).
You must use a minimum of 7 references that can be found by searching NCBI.
Project report: Investigating the effect of cellular objectives on genome-sca...Jarle Pahr
Report from a half-semester master-level project carried out at the department of biotechnology, Norwegian University of Science and Technology. Describes a MATLAB-based framework for comparing experimental metabolic flux data with model predictions and evaluating objective functions.
LamiaFinal data ( results).docx1- label all lanes, label ma.docxDIPESH30
Lamia/Final data ( results).docx
1- label all lanes, label marker sizes, and indicate which three lanes, containing at least one BSA sample and one E. coli sample, you are writing about.
2- lanes 2, 5, 6, 9, and 11 are BSA, lanes 14 and 15 are empty, and lanes 3, 4, 7, 8, 10, 12, and 13 are E. coli.
Lamia/Graphing page.pdf
Lamia/Guidelines.doc
Biology 105 Laboratory Fall 2013
Instructor: Ayça Akal-Strader
Guidelines for Lab Report
Lab 2: Quantification of Protein (Bradford Assay)
Your report for Lab 2: Quantification of Protein (Bradford Assay) is due the week of October 7/8/9/10. Please include the following information in your report:
Hypothesis: as usual
Introduction:
• Background/theory of Bradford Assay
• Purpose of the experiment
Results:
In addition to the specific data discussed below, your Results section should always include one or more paragraphs of text that provide:
• A brief description of the procedure
• Explanations of any charts, graphs, figures, or calculations that are included
• Statements about the most interesting/noteworthy data
Data:
1. Table of measured absorbances (like Table 2 on p. 31).
2. Table showing protein concentrations of unknowns (like Table 3 on p. 31). Say which unknowns—1, 2, or both—you used.
**Please re-make the tables for your report. DO NOT simply tear out p. 31 from your lab manual and staple it to your report.
3. Standard Curve:
• Label with title and caption
• Label axes: x-axis = Concentration (μg/ml); y-axis = Absorbance at 595 nm. Be sure to include units on Concentration. Remember that absorbance (optical density; OD) has no units.
• Plot points, leaving room to plug in your unknown absorbances to find their concentrations
• Connect the dots
(Note: Do NOT draw a straight line—unless your data really looks like a straight line. The samples we measured did not fall into the “linear range” of the spectrophotometer, and everyone’s data that I saw flattened out a lot at the high concentration end of the range. Connect your data points with a curve.)
• Indicate by drawing horizontal and vertical lines how you found the concentration of your unknowns.
Discussion:
• Did your results match your expectations? If not, why not?
• Did you have any difficulty finding the concentration of any of your unknowns?
• Do you think your measurement of protein concentration was accurate? Did your duplicates agree well? For your standards, did your absorbances increase as your protein concentrations increased?
Conclusion: as usual
Lab Report Rewrites
You may rewrite TWO of your first FIVE lab reports in an effort to improve your grade.
You do not need to rewrite the entire report; just fix the problems that caused you to lose points the first time around.
You MUST hand in the original version of your report along with your corrected version. If you do not have the original attached, we will not accept your rewrite.
Your final grade on the rewritten report will be ...
Business UseWeek 1 Assignment #1Instructions1. Plea.docxfelicidaddinwoodie
Business Use
Week 1: Assignment #1
Instructions
1. Please read these two articles:
· Using forensics against a fitbit device to solve a murder: https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/
· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data
2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.
3. Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note - do not count your computer or mobile device. Those are obvious!
4. I expect at least one paragraph answer for each device.
Why did I assign this?
The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation!
Due Date
This is due by Sunday, May 10th at 11:59PM
Surname 6
Informative speech on George Stinney Jr.
A. Info research analysis
The general purpose of the speech was to inform people about the civil injustice being done against the African American community in the United States. The specific purpose of the speech was to portray to the audience how an innocent 14-year old black boy suffered in the hands of the South Carolina State law enforcing officers. He was falsely accused of killing two white girls and electrocuted within two months after conviction.
I decided the topic of my speech after perusing through all the suggested topics ad found that the story of George Stinney Jr. was touching and emotional entirely.
This topic benefits the audience and the society in general by giving them an insight of the cruelty that the American law system has against the African American community. The audience gets to know how the shady investigations were done with claims that George had pleaded guilty to the charges of murder when there was no real evidence tying him to the crime or a signed plea agreement.
The alternative view that I found in the research was the version of the investigating officer of the case who claimed that the 14-year old boy managed to kill two girls aged 11 and 7 with a blunt object and ditch them in a nearby trench. This alternative point of view did not make sense because it is hard for a 14-year old boy to use the force that was reported by postmortem results to kill the girls. Therefore, I knew everything was a lie and I had to take the point of view of George’s innocence.
B. informative outline
Introduction:
George Stinney Jr. was an African American boy born on October 21, 1929 in Pinewood, South Carolina, U.S. He is considered as the youngest person to be executed by the United State government in 20th century.
Main body
Investigations of the alleged crimes (Bickford, 05)
The investigations concerning the alleged crimes of George S.
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxfelicidaddinwoodie
Business Use
PALADIN ASSIGNMENT
Scenario:
You are given a PC and you are faced with this scenario: you don’t know the password to the PC which means you can’t login so you can use a forensic tool like FTK IMAGER to capture the hard drive as a bit-for-bit forensic image AND/OR
1. The hard drive is either soldiered onto the motherboard (there are some new hard drives like this!) or cannot be removed because the screws are stripped (this has happened to me);
2. Even if you figured out the password or got an admin password the PC may have its USB ports blocked via a GPO policy (this is very common in corporations now);
3. Even if you can get the GPO policy overridden you may have some concerns about putting it on the network (which is true especially if you are dealing with malware).
So what you can you do? The best solution is to boot the PC up into forensically sound environment that lets you bypass the password aspect; GPO policy; etc and take a bit-for-bit image. One software that has done the job very well for me is Paladin.
How to get points
If you can send me a screenshot showing me that you had installed Paladin .ISO and made your USB device a bootable device with Paladin using Rufus then you get 10 points.
If you can send me a screenshot showing that you had a chance to boot your computer into Paladin then you will earn an extra 10 points. It is not necessary for you to take a forensic image of your PC but I have included generic instructions here.
Assumptions:
1. You have downloaded Rufus on your computer
2. You have downloaded Paladin on your computer.
Instructions:
1. Make sure you have at least one USB drive.
2. If not down already, download Rufus from https://rufus.ie/.
3. If not done already, download the Paladin ISO image from this website: https://sumuri.com/product/paladin-64-bit-version-7/ which is free. It’s suggested price is $25.00 but you can adjust the price to $0 then order. To be clear – do not pay anything.
4. Insert the USB device in your computer.
5. Run Rufus where you install the Paladin .ISO file on the USB device and make it bootable. Now I could provide you step by step instructions, but this is a Masters class so I want you to explore a bit and figure this out. One good video is this: https://www.youtube.com/watch?v=V6JehM0WDTI.
6. After you are done using Rufus where you have installed Paladin.ISO on the USB device and made it bootable then make sure the USB device is in the PC.
7. Restart your PC. Press F9(HP) laptop) or F12 (Dell laptop) so you can be taken into the BIOS bootup menu.
8. This is where things get a bit tricky e.g. your compute may be configured differently where you have to adjust your BIOS settings. If you do not feel comfortable doing this then stop here. I do not want you to mess up your computer. You have already earned ten extra points!
9. If you still proceed then you will see a list of bootable devices. You may, for example, see a list of devices. Pick the device .
More Related Content
Similar to 1PhylogeneticAnalysisHomeworkassignmentThisa.docx
Introduction to Gene Mining: Part B: How similar are plant and animal version...adcobb
In this lesson, students will navigate BLASTp and www.Araport.org to determine whether plant and animal versions of genes and proteins are homologous. Student handout and teacher resources are available at www.Araport.org, teacher resources page (under Community). Suitable for grades 9-12 or first year undergraduate students.
Apollo annotation guidelines for i5k projects Diaphorina citriMonica Munoz-Torres
Apollo is a web-based application that supports and enables collaborative genome curation in real time, allowing teams of curators to improve on existing automated gene models through an intuitive interface. Apollo allows researchers to break down large amounts of data into manageable portions to mobilize groups of researchers with shared interests.
MYSTERY MOLECULE PROJECT, PART II(20 points total)BIO1001.docxdohertyjoetta
MYSTERY MOLECULE PROJECT, PART II
(20 points total)
BIO1001
Fall 2020
To complete the remainder of this project and prepare for your presentation, follow the instructions below. Your presentation should include the answers to all questions indicated below. For your final
presentation, you are expected to
organize your research and
present a rehearsed, 10-12
minute presentation using the rubric at the end of this document as a guideline for preparation.
Learning Objectives
At the conclusion of this phase of the mystery molecule project, students will be able to
1. Effectively navigate sequence databases of the NCBI website
a. BLAST DNA sequence against the human genome
b. Analyze alignment data from genomic
databases
c. Identify an unknown gene based on DNA sequence
2. Use
the scientific literature (primary and secondary resources)
to analyze gene products, and research the cellular and molecular basis of a disease gene.
3. Organize scientific content into a coherent presentation.
4. Communicate research results to a group of peers.
Step 1: BLAST your DNA sequence
1. Go to:
http://www.ncbi.nlm.nih.gov/
2. Click on BLAST (under “popular resources” at the right side of the screen)
3. Choose the nucleotide blast program (under “Web BLAST”)
4. In the “blastn” tab (on left) enter your DNA sequence into the “enter query sequence” box (obtain your mystery DNA sequences in the Mystery Molecule content area in D2L).
a. In “choose search set” click the “genomic + transcript databases”
b. From the drop down menu below, select “Human genomic + transcript (Human G + T)”
c. Under “program selection” in the next section down, optimize for highly similar sequences (megablast)
5. Submit query (click on “BLAST” at the bottom of the screen) and wait– this may take up to a few minutes.
6. A colorized map of sequence alignment scores will appear. Red indicates very good sequence alignment.
7. Scroll down to descriptions of sequences that produced statistically significant alignments. You should see options for genomic alignments and transcripts. An e-value close to zero, and maximum sequence identity close to 100% are optimal.
8. Identify your mystery gene/transcript from the description, e-value, and % sequence identity.
Step 2: Analysis of gene product
Click on the reference number (left, in the column labeled, “Accession”) for the mRNA transcript or genomic sequence of your mystery gene. Scroll down; you will see many references (titles, authors, years of publication) describing your gene. Clicking on any one of the PubMed reference numbers will link you directly to the original publication. You will need these publications to characterize your gene for your presentation. Bookmark this page—all your references must be from primary or secondary sources (no google, wikipedia, textbooks, blogs, etc.).
You must use a minimum of 7 references that can be found by searching NCBI.
Project report: Investigating the effect of cellular objectives on genome-sca...Jarle Pahr
Report from a half-semester master-level project carried out at the department of biotechnology, Norwegian University of Science and Technology. Describes a MATLAB-based framework for comparing experimental metabolic flux data with model predictions and evaluating objective functions.
LamiaFinal data ( results).docx1- label all lanes, label ma.docxDIPESH30
Lamia/Final data ( results).docx
1- label all lanes, label marker sizes, and indicate which three lanes, containing at least one BSA sample and one E. coli sample, you are writing about.
2- lanes 2, 5, 6, 9, and 11 are BSA, lanes 14 and 15 are empty, and lanes 3, 4, 7, 8, 10, 12, and 13 are E. coli.
Lamia/Graphing page.pdf
Lamia/Guidelines.doc
Biology 105 Laboratory Fall 2013
Instructor: Ayça Akal-Strader
Guidelines for Lab Report
Lab 2: Quantification of Protein (Bradford Assay)
Your report for Lab 2: Quantification of Protein (Bradford Assay) is due the week of October 7/8/9/10. Please include the following information in your report:
Hypothesis: as usual
Introduction:
• Background/theory of Bradford Assay
• Purpose of the experiment
Results:
In addition to the specific data discussed below, your Results section should always include one or more paragraphs of text that provide:
• A brief description of the procedure
• Explanations of any charts, graphs, figures, or calculations that are included
• Statements about the most interesting/noteworthy data
Data:
1. Table of measured absorbances (like Table 2 on p. 31).
2. Table showing protein concentrations of unknowns (like Table 3 on p. 31). Say which unknowns—1, 2, or both—you used.
**Please re-make the tables for your report. DO NOT simply tear out p. 31 from your lab manual and staple it to your report.
3. Standard Curve:
• Label with title and caption
• Label axes: x-axis = Concentration (μg/ml); y-axis = Absorbance at 595 nm. Be sure to include units on Concentration. Remember that absorbance (optical density; OD) has no units.
• Plot points, leaving room to plug in your unknown absorbances to find their concentrations
• Connect the dots
(Note: Do NOT draw a straight line—unless your data really looks like a straight line. The samples we measured did not fall into the “linear range” of the spectrophotometer, and everyone’s data that I saw flattened out a lot at the high concentration end of the range. Connect your data points with a curve.)
• Indicate by drawing horizontal and vertical lines how you found the concentration of your unknowns.
Discussion:
• Did your results match your expectations? If not, why not?
• Did you have any difficulty finding the concentration of any of your unknowns?
• Do you think your measurement of protein concentration was accurate? Did your duplicates agree well? For your standards, did your absorbances increase as your protein concentrations increased?
Conclusion: as usual
Lab Report Rewrites
You may rewrite TWO of your first FIVE lab reports in an effort to improve your grade.
You do not need to rewrite the entire report; just fix the problems that caused you to lose points the first time around.
You MUST hand in the original version of your report along with your corrected version. If you do not have the original attached, we will not accept your rewrite.
Your final grade on the rewritten report will be ...
Business UseWeek 1 Assignment #1Instructions1. Plea.docxfelicidaddinwoodie
Business Use
Week 1: Assignment #1
Instructions
1. Please read these two articles:
· Using forensics against a fitbit device to solve a murder: https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/
· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data
2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.
3. Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note - do not count your computer or mobile device. Those are obvious!
4. I expect at least one paragraph answer for each device.
Why did I assign this?
The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation!
Due Date
This is due by Sunday, May 10th at 11:59PM
Surname 6
Informative speech on George Stinney Jr.
A. Info research analysis
The general purpose of the speech was to inform people about the civil injustice being done against the African American community in the United States. The specific purpose of the speech was to portray to the audience how an innocent 14-year old black boy suffered in the hands of the South Carolina State law enforcing officers. He was falsely accused of killing two white girls and electrocuted within two months after conviction.
I decided the topic of my speech after perusing through all the suggested topics ad found that the story of George Stinney Jr. was touching and emotional entirely.
This topic benefits the audience and the society in general by giving them an insight of the cruelty that the American law system has against the African American community. The audience gets to know how the shady investigations were done with claims that George had pleaded guilty to the charges of murder when there was no real evidence tying him to the crime or a signed plea agreement.
The alternative view that I found in the research was the version of the investigating officer of the case who claimed that the 14-year old boy managed to kill two girls aged 11 and 7 with a blunt object and ditch them in a nearby trench. This alternative point of view did not make sense because it is hard for a 14-year old boy to use the force that was reported by postmortem results to kill the girls. Therefore, I knew everything was a lie and I had to take the point of view of George’s innocence.
B. informative outline
Introduction:
George Stinney Jr. was an African American boy born on October 21, 1929 in Pinewood, South Carolina, U.S. He is considered as the youngest person to be executed by the United State government in 20th century.
Main body
Investigations of the alleged crimes (Bickford, 05)
The investigations concerning the alleged crimes of George S.
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxfelicidaddinwoodie
Business Use
PALADIN ASSIGNMENT
Scenario:
You are given a PC and you are faced with this scenario: you don’t know the password to the PC which means you can’t login so you can use a forensic tool like FTK IMAGER to capture the hard drive as a bit-for-bit forensic image AND/OR
1. The hard drive is either soldiered onto the motherboard (there are some new hard drives like this!) or cannot be removed because the screws are stripped (this has happened to me);
2. Even if you figured out the password or got an admin password the PC may have its USB ports blocked via a GPO policy (this is very common in corporations now);
3. Even if you can get the GPO policy overridden you may have some concerns about putting it on the network (which is true especially if you are dealing with malware).
So what you can you do? The best solution is to boot the PC up into forensically sound environment that lets you bypass the password aspect; GPO policy; etc and take a bit-for-bit image. One software that has done the job very well for me is Paladin.
How to get points
If you can send me a screenshot showing me that you had installed Paladin .ISO and made your USB device a bootable device with Paladin using Rufus then you get 10 points.
If you can send me a screenshot showing that you had a chance to boot your computer into Paladin then you will earn an extra 10 points. It is not necessary for you to take a forensic image of your PC but I have included generic instructions here.
Assumptions:
1. You have downloaded Rufus on your computer
2. You have downloaded Paladin on your computer.
Instructions:
1. Make sure you have at least one USB drive.
2. If not down already, download Rufus from https://rufus.ie/.
3. If not done already, download the Paladin ISO image from this website: https://sumuri.com/product/paladin-64-bit-version-7/ which is free. It’s suggested price is $25.00 but you can adjust the price to $0 then order. To be clear – do not pay anything.
4. Insert the USB device in your computer.
5. Run Rufus where you install the Paladin .ISO file on the USB device and make it bootable. Now I could provide you step by step instructions, but this is a Masters class so I want you to explore a bit and figure this out. One good video is this: https://www.youtube.com/watch?v=V6JehM0WDTI.
6. After you are done using Rufus where you have installed Paladin.ISO on the USB device and made it bootable then make sure the USB device is in the PC.
7. Restart your PC. Press F9(HP) laptop) or F12 (Dell laptop) so you can be taken into the BIOS bootup menu.
8. This is where things get a bit tricky e.g. your compute may be configured differently where you have to adjust your BIOS settings. If you do not feel comfortable doing this then stop here. I do not want you to mess up your computer. You have already earned ten extra points!
9. If you still proceed then you will see a list of bootable devices. You may, for example, see a list of devices. Pick the device .
Business UsePractical Connection WorkThis work is a writte.docxfelicidaddinwoodie
Business Use
Practical Connection Work
This work is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course, to date, have been applied, or could be applied, in a practical manner to your current work environment.
If you are not currently working, then this is where you can be creative and identify how you THINK this could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
You should NOT provide an overview of the assignments given in the course. Reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
// Pediatric depressionTherapy for Pediatric Clients with Mood Disorders
An African American Child Suffering From Depression
BACKGROUND INFORMATION
The client is an 8-year-old African American male who arrives at the ER with his mother. He is exhibiting signs of depression.
Client complained of feeling “sad” Mother reports that teacher said child is withdrawn from peers in class Mother notes decreased appetite and occasional periods of irritation Client reached all developmental landmarks at appropriate ages Physical exam unremarkable Laboratory studies WNL Child referred to psychiatry for evaluation Client seen by Psychiatric Nurse Practitioner
MENTAL STATUS EXAM
Alert & oriented X 3, speech clear, coherent, goal directed, spontaneous. Self-reported mood is “sad”. Affect somewhat blunted, but child smiled appropriately at various points throughout the clinical interview. He denies visual or auditory hallucinations. No delusional or paranoid thought processes noted. Judgment and insight appear to be age-appropriate. He is not endorsing active suicidal ideation, but does admit that he often thinks about himself being dead and what it would be like to be dead.
The PMHNP administers the Children's Depression Rating Scale, obtaining a score of 30 (indicating significant depression)
RESOURCES
§ Poznanski, E., & Mokros, H. (1996). Child Depression Rating Scale--Revised. Los Angeles, CA: Western Psychological Services.
Decision Point OneSelect what the PMHNP should do:Begin Zoloft 25 mg orally daily
Begin Paxil 10 mg orally daily
Begin Wellbutrin 75 mg orally BID
.
Business System Analyst
SUMMARY:
· Cognos Business In experience intelligence with expertise in Software Design, Development, and Analysis, Teradata, Testing, Data Warehouse and Business Intelligence tools.
· Expertise in Cognos 11/10.2, 10.1, 8.x (Query Studio, Report Studio, Analysis Studio, Business Insight/Workspace, Business Insight/Workspace Advanced, Metric Studio (Score carding), Framework Manager, Cognos Connection)
· Expertise in Installation and Configuration of Cognos BI Products in Distributed environment on Windows
· Expertise with Framework Manager Modeling (Physical Layer, Business Layer, Packages) and Complex Report building with Report Studio.
· Expertise developing complex reports using drill-through reports, prompts, dashboards, master-detail, burst-reports, dynamic filtering in Cognos.
· Expertise in creating Dashboard reports using Java Script in Report studio.
· Expertise in building scorecard reports and dashboard reports using metric studio.
· Expertise with Transformer models and cubes that were used in Power play analysis and also these cubes were used in various Analysis Studio reports.
· Expertise with MDX Functions in Report Studio using Multi-dimensional Sources.
· Expertise with Cognos security (LDAP, Active Directory, Access manager, object level security, data security).
· Expertise with Tabbed Inter-phases and with Interactive Behavior of value based chart highlighting.
· Sound Skills in developing SQL Scripts, PL/SQL Stored Procedures, functions, packages.
· Expertise on production support and troubleshoot/test issues with existing reports and cubes.
· Experienced with MS SQL Server BI Tools like SSIS, SSRS and SSAS.
· Expertise in creation of packages, Data and Control tasks, Reports and Cubes using MS SQL Server BI Tools.
· Ability to translate business requirements into technical specifications and interact with end users to gather requirements for reporting.
· Good understanding of business process in Financial, Insurance and Healthcare areas.
· Expertise in infrastructure design for the cognos environment and security setup for different groups as per business requirement.
· Creating training material on all the Ad-Hoc training
· Expertise in all the basic administrative tasks like deployments, routing rule setup’s , user group setup , folder level securities etc.
· Have deployment knowledge of IBM Cognos report in Application servers like WAS.
· Have knowledge on handling securities and administration functionalities on IBM Cognos 10.x
· Good work ethics, detail oriented, fast learner, team oriented, flexible and adaptable to all kinds of stressful environments. Possess excellent communication and interpersonal skills.
Technical Skills:
BI Platform
Cognos 11,10.2, 10.1, 8.x (Query Studio, Report Studio, Analysis Studio, Business Insight/Workspace, Business Insight/Workspace Advanced, Metric Studio (Score carding), Framework Manager, Cognos Connection)
Data Base
MS Access, MS SQL Server, Orac.
Business StrategyOrganizations have to develop an international .docxfelicidaddinwoodie
Business Strategy
Organizations have to develop an international Human Resources Management Strategy, when they expand globally. Which do you think is more critical for international Human Resource Management:
Understanding the cultural environment, or
Understanding the political and legal environment?
Please choose 1 position and give a rationale; examples are also a way to demonstrate your understanding of the learning concepts.
.
Business StrategyGroup BCase Study- KFC Business Analysis.docxfelicidaddinwoodie
Business Strategy
Group B
Case Study- KFC Business Analysis
Abstract
Introduced in 1952 by Colonel Sanders
Second largest restaurant chain today in terms of popularity
Annual revenue of $23 billion
Diversified its menu to suit cultural needs of people across different countries
Hindering factors in KFC’s growth are growing consumer health consciousness, animal welfare criticism, environmental criticism
Introduction
KFC was born in 1952 and its founder was Colonel Sanders
First franchise to grow globally over international market
By the 1960s – 1980s the market was booming in countries like England, Mexico, China
Management and ownership transferred over the years to Heublin, Yum Brands and PepsiCo.
Annual revenue of $23 billion in 2013
KFC had expanded its menu to suit cultural needs of people across different countries
Hindering factors in KFC’s growth are growing consumer health consciousness, animal welfare criticism, environmental criticism, logistic management issue in UK, cultural differences in Asian countries towards accepting the fried chicken menu.
Factors contributing to KFC’s global success
The core reason for KFCs success is it’s mandate to follow strict franchise protocols that have continuously satisfied customers demands:
The quality of the chicken cooked in KFC has certain specific guidelines
The size of the restaurant should be 24x60 feet.
The restaurant washrooms and ktichen has certain cleanliness standards
Food that is not sold off needs to be trashed
The workers need to have a specific clothing and uniform.
A certain % of the gross earnings should be used for advertisement and R&D
Air conditioning is mandatory in the outlets
Global number of KFC restaurants in the past decade
Importance of cultural factors to KFC’s sales success in India and China
Culture is the collective programming of the human mind that distinguishes the members of one human group from those of another. Culture in this sense is a system of collectively held values
“Culture is everything that people have, think, and do as members of their society”, which demonstrating that culture is made up of (1) material objects; (2) ideas, values, attitudes and beliefs; and (3) specified, or expected behavior.
Many scholars have theorized and studied the notion of cross-cultural adaptation, which tends to move from one culture to another one, by learning the elements such as rules, norms, customs, and language of the new culture (Oberg 1960, Keefe and Padilla 1987, Kealey 1989). According to Ady (1995),
“Cultural adaptation is the evolutionary process by which an individual modifies his personal habits and customs to fit into a particular culture. It can also refer to gradual changes within a culture or society that occur as people from different backgrounds participating in the culture and sharing their perspectives and practices.”
Cultural factors in India that go against KFC’s original recipe.
.
Business Strategy Differentiation, Cost Leadership, a.docxfelicidaddinwoodie
Business Strategy:
Differentiation, Cost Leadership,
and Integration
Lina Deng
Business Strategy and Competitive Advantage
• A business-level strategy is an integrated and
coordinated set of commitments and actions designed
to provide value to customers and to gain a competitive
advantage by utilizing core competencies in specific
individual product markets.
6–2
Business-Level Strategy:
How to Compete for Advantage?
• Answer the “Who, What, Why, and How”
Ø Who - which customer segments to serve?
Ø What needs, wishes, desires will we satisfy?
Ø Why do we want to satisfy them?
Ø How will we satisfy customers’ needs?
• Details actions that managers take in the quest
for competitive advantage
Ø Single product or group of similar products
6–3
Industry and Firm Effects Jointly Determine
Competitive Advantage
6–4
Business Strategy and Competitive Advantage
• Two fundamental questions:
Ø How do you generate advantage?
Ø How do you sustain advantage?
• Key idea for sustainability is “barriers to imitation.”
Ø How long will it be before the first rival
imitates the first mover?
Ø How fast does new imitation occur
once it starts?
v These two factors determine appropriability.
6–5
Business Strategy and Competitive Advantage
• Does market share generate competitive advantage?
Ø The computer industry is an excellent example of the lack
of correspondence between market share and profit rates.
IBM was a clear market leader in terms of market share
but had only mediocre economic performance relative to its
rivals. High market share is no guarantee of high rates
of profitability.
6–6
Business Strategy and Competitive Advantage
• Does market share generate competitive advantage?
Ø Perhaps high market share causes high profit rates.
Ø But it could equally well be that there is a third factor
(e.g., good service capabilities, such as those of
Caterpillar), either not considered or unobserved by us,
that causes both high profitability and high market share.
v In this case, we would see a correlation
between profitability and market share
but there is no causal explanation.
Business Strategy and Competitive Advantage
• When can market share work to generate and sustain
an advantage?
Ø Scale economies (to generate cost leadership advantage)
combined with high exit costs (to sustain the advantage)
may make market share a defensible advantage.
6–8
Business Strategy and Competitive Advantage
• An organization’s knowledge or expertise can lead to
sustainable advantage if:
Ø The knowledg.
Business RequirementsReference number Document Control.docxfelicidaddinwoodie
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project.
Applications
In order to meet the target production date, only these applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of the project.
5
A working structure is the fundamental programming that bargains with all the mechanical social affair and other programming on a PC. It other than pulls in us to visit with the PC without perceiving how to talk the piece PC programs language's. A working structure is inside theory of programming on a contraption that keeps everything together. Working systems visit with the's contraption. They handle everything from your solace and mice to the Wi-Fi radio, gathering contraptions, and show. Symbolically, a worki.
Business ProposalThe Business Proposal is the major writing .docxfelicidaddinwoodie
Business Proposal
The Business Proposal is the major writing assignment in the course. You are to create and submit a formal proposal that suggests how to change something within an organization. This organization can be large or small, a place of employment now or in the past, or an organization to which the students belong. From past experiences, it is best to use a business with fewer than 200 employees, and one with which you have personal experience. It could be a place where you currently work or a place you have worked or volunteered in the past.
The change can be specific to a unit or can apply to the whole organization; it can relate to how important information is distributed, who has access to important information, how information is accessed, or any other change in practices the students see as having a benefit. The proposal should be directed to the person or committee with the power to authorize the change. However, if you are working within a large organization, and asking for a small organizational change, communicating with a CEO or president may not make the most sense. You need to think about who within the organization might be the best person for the type of change suggested.
For the submission, you are to follow the guidelines for formal proposals available in Chapter 10 of the text. You can review 10.1, 10.4, and 10.19 for more information about specific components for a well-written formal business proposal. A complete proposal must have all required sections of a formal report excluding the copy of an RFP and the Authorization. The final draft of the proposal should be 1500–2000 words, and include the following necessary formal proposal components:
Letter of transmittal
Executive summary
Title page
Table of contents
List of illustrations
Introduction
Background: Purpose/problem
Proposal: plan, schedule, details
Staffing
Budget
Appendix
Formatting does matter for this assignment, and you are to check the text for details about how to format and draft the different proposal segments. Proposals don't just have text; graphics and charts are necessary, too. In addition, research is important, and footnotes and references must be included. All content should be concise, clear, and detailed. The proposal should be well-written with appropriate grammar, spelling, and punctuation.
This is a scaffolded writing project that consists of four assignments.
.
Business ProjectProject Progress Evaluation Feedback Form .docxfelicidaddinwoodie
Business Project
Project Progress Evaluation
Feedback Form Week 3
Date:
__________________________________________________
Student Name:
__________________________________________________
__________________________________________________
Project Title: Effect Of Increasing Training Budget
Project Type: Business Research
Researchers:
Has a topic been chosen and a problem statement created?
Yes { } NO { }
Was the problem statement submitted in a 1-4 page paper that includes an introduction to the topic with appropriate documentation?
Yes { } No { }
Specifically, if any, needs additional content or rewriting to create more clarity? What specific recommendations do you have to help in this process?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
What is your workable timetable that states specific objectives and target completion dates for completing the final draft of the plan? Write the timetable below:
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Feedback Form #3 – Project Proposal and Plan
▼
THE UK’S LEADING PROVIDER OF EXPERT SERVICES FOR IT PROFESSIONALS
NATIONAL COMPUTING CENTRE
IT Governance
Developing a successful governance strategy
A Best Practice guide for decision makers in IT
IT Governance
Developing a successful governance strategy
A Best Practice guide for decision makers in IT
The effective use of information technology is now an accepted organisational imperative - for
all businesses, across all sectors - and the primary motivation; improved communications and
commercial effectiveness. The swift pace of change in these technologies has consigned many
established best practice approaches to the past. Today's IT decision makers and business
managers face uncertainty - characterised by a lack of relevant, practical, advice and standards
to guide them through this new business revolution.
Recognising the lack of available best practice guidance, the National Computing Centre has
created the Best Practice Series to capture and define best practice across the key aspects of
successful business.
Other Titles in the NCC Best Practice series:
IT Skills - Recruitment and Retention ISBN 0-85012-867-6
The New UK Data Protection Law ISBN 0-85012-868-4
Open Source - the UK opportunity ISBN 0-85012-874-9
Intellectual Property Rights - protecting your intellectual assets ISBN 0-85012-872-2
Aligning IT with Business Strategy ISBN 0-85012-889-7
Enterprise Architecture - underst.
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxfelicidaddinwoodie
BUSINESS PROCESSES IN THE FUNCTION OF COST
MANAGEMENT IN HEALTHCARE INSTITUTIONS
1
1
st
IVANA DRAŽIĆ LUTILSKY
Departement of Accounting
Faculty of Economics and Business
University of Zagreb
Croatia
[email protected]
2
nd
LUCIJA JUROŠ
Faculty of Economics and Business
[email protected]
Abstract: This paper is dealing with the importance of business processes regarding costs
tracking and cost management in healthcare institutions. Various changes within the health
care system and funding of hospitals require the introduction of management information
systems and cost accounting. The introduction of cost accounting in public hospitals would
allow the planning and control of costs, monitoring of costs per patient or service and the
calculation of indicators for the analysis and assessment of the economic performance of the
business of public hospitals and lead to the transparency of budget spending. A model that
would be suited to the introduction in the public hospital is full cost allocation model based on
activities or processes that occur, known as the ABC method. Given that this is a calculation
of cost of services provided through various internal business processes, it is important to
identify all business processes in order to be able to calculate the costs incurred by services.
Although the hospital does not do business with the aim to make a profit, they must follow all
the costs (direct and indirect) to be able to calculate the full costs i.e. the price of the service
provided. In addition, the long-term sustainability of business activities in terms of funding
difficulties and the continuous growth of cost of services provided, hospitals must control and
reduce the cost of the program and specific activities. Therefore, the objective of this paper is
to point out the importance of business processes while introducing ABC method.
Keywords: Business Processes, Cost management, ABC method, Healthcare Institutions
1
This work has been fully supported by University of Zagreb funding the project “Business processes in the
implementation of cost management in healthcare system”, Any opinions, findings, and conclusions or
recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of
University of Zagreb.
mailto:[email protected]
1 Introduction
In recent years, the efficiency of the management in health care services and the system of
quality in health care institutions significantly increased. Patients expect more from
healthcare providers and higher standards of care. At the same time, those who pay for
health services are increasingly concerned about the rising costs of health care services, but
also the potential ineffectiveness of the health care system. Consequently, there is a broad
interest in understanding the ways of efficient work of health care management and .
Business Process Management JournalBusiness process manageme.docxfelicidaddinwoodie
Business Process Management Journal
Business process management: a maturity assessment of Saudi Arabian
organizations
Omar AlShathry,
Article information:
To cite this document:
Omar AlShathry, (2016) "Business process management: a maturity assessment of Saudi Arabian
organizations", Business Process Management Journal, Vol. 22 Issue: 3, pp.507-521, https://
doi.org/10.1108/BPMJ-07-2015-0101
Permanent link to this document:
https://doi.org/10.1108/BPMJ-07-2015-0101
Downloaded on: 04 September 2018, At: 00:11 (PT)
References: this document contains references to 26 other documents.
To copy this document: [email protected]
The fulltext of this document has been downloaded 1083 times since 2016*
Users who downloaded this article also downloaded:
(2016),"Process improvement for professionalizing non-profit organizations: BPM approach",
Business Process Management Journal, Vol. 22 Iss 3 pp. 634-658 <a href="https://doi.org/10.1108/
BPMJ-08-2015-0114">https://doi.org/10.1108/BPMJ-08-2015-0114</a>
(2016),"Ownership relevance in aspect-oriented business process models", Business
Process Management Journal, Vol. 22 Iss 3 pp. 566-593 <a href="https://doi.org/10.1108/
BPMJ-01-2015-0006">https://doi.org/10.1108/BPMJ-01-2015-0006</a>
Access to this document was granted through an Emerald subscription provided by emerald-
srm:586319 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald
for Authors service information about how to choose which publication to write for and submission
guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company
manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as
well as providing an extensive range of online products and additional customer resources and
services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the
Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for
digital archive preservation.
D
ow
nl
oa
de
d
by
S
A
U
D
I
D
IG
IT
A
L
L
IB
R
A
R
Y
(
S
D
L
)
A
t
00
:1
1
04
S
ep
te
m
be
r
20
18
(
P
T
)
https://doi.org/10.1108/BPMJ-07-2015-0101
https://doi.org/10.1108/BPMJ-07-2015-0101
https://doi.org/10.1108/BPMJ-07-2015-0101
*Related content and download information correct at time of download.
D
ow
nl
oa
de
d
by
S
A
U
D
I
D
IG
IT
A
L
L
IB
R
A
R
Y
(
S
D
L
)
A
t
00
:1
1
04
S
ep
te
m
be
r
20
18
(
P
T
)
Business process management:
a maturity assessment of Saudi
Arabian organizations
Omar AlShathry
Department of Information Systems,
Imam Mohammed Bin Saud University, Riyadh, Saudi Arabia
Abstract
Purpose – Business Process Management (BPM) has become increasingly common among organizations
in d.
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxfelicidaddinwoodie
Business Plan[Your Name], Owner
Purdue Global
BUSINESS PLAN
Date
1. EXECUTIVE SUMMARY
1.1 Product
1.2 Customers
1.3 What Drives Us
2. COMPANY DESCRIPTION
2.1 Mission and Vision Statements
2.2 Principal Members at Startup (In Unit 7 you will expand on this section to include medium and long term personnel plans for all team members, including the line staff.)
2.2.1 Using chapter 10 of your text, write the plan, using the section in Chapter 10 that shows how to introduce each team member and describe their background and responsibilities. You will start with the leaders and managers, then discuss other employees as needed for your company to grow.
2.2.2 Use this spreadsheet to show the planning
Leaders/managers (unit 1)
When needed (number of months/years after opening)
Outside Services Needed
Key Functions
Add line staff (Unit 7)
2.3 Legal Structure
3. MARKET RESEARCH
3.1 Industry (from SBA, Business Guides by Industry, and Bureau of Labor Statistics)
3.1.1 Industry description
3.2.1 Resources used
3.2 Customers (from SBA site fill in worksheet, then use text for spreadsheets and follow-up explanations)
Add SBA part here:
Then, fill in spreadsheet using this example from the text:
Housewife:
Married Couple:
Age:
35–65
Age:
35–55
Income:
Fixed
Income:
Medium to high
Sex:
Female
Sex:
Male or Female
Family:
Children living at home
Family:
0 to 2 children
Geographic:
Suburban
Geographic:
Suburban
Occupation:
Housewife
Occupation:
Varies
Attitude:
Security minded
Attitude:
Security minded, energy conscious
Older Couple:
Elderly:
Age:
55–75
Age:
70+
Income:
High or fixed
Income:
Fixed
Sex:
Male or Female
Sex:
Male or Female
Family:
Empty nest
Family:
Empty nest
Geographic:
Suburban
Geographic:
Suburban
Occupation:
White-collar or retired
Occupation:
Retired
Attitude:
Security minded, energy conscious
Attitude:
Security minded, energy conscious
Explain who you are targeting and where they are located. Insert information here using these guidelines:
Information About Your Target Market – Narrow your target market to a manageable size. Many businesses make the mistake of trying to appeal to too many target markets. Research and include the following information about your market:
Distinguishing characteristics – What are the critical needs of your potential customers? Are those needs being met? What are the demographics of the group and where are they located? Are there any seasonal or cyclical purchasing trends that may impact your business?
Size of the primary target market – In addition to the size of your market, what data can you include about the annual purchases your market makes in your industry? What is the forecasted market growth for this group? For more information, see the market research guide for tips and free government resources that can help you build a market profile.
How much market share can you gain? – What is the market share.
Business PlanCover Page Name of Project, Contact Info, Da.docxfelicidaddinwoodie
Business Plan
Cover Page
Name of Project, Contact Info, Date
Picture/graphics
Table of Contents
Executive Summary
The Company
The Project
The Industry
The Market
Distribution
Risk Factors
Financing
Sources
List of sources, specific articles, and websites
I WILL PROVIDE MORE INFORMATION IN CHAT TO COMPLETE PROPOSAL.
.
Business Planning and Program Planning A strategic plan.docxfelicidaddinwoodie
Business Planning and Program Planning
A strategic plan specifies how a particular program will realize its objectives. With a strategic plan, it is possible to focus efforts on the accomplishment of a program's goals. A strategic plan provides a link between what a program seeks to accomplish and the required actions for successful program implementation (Kettner, Moroney & Martin, 2017). A business plan, on the contrary, defines the path of business. It includes a company's organizational structure, marketing plan as well as financial projections (Kettner et al., 2017).
Impact of Business Plan on a Program’s Strategic Plan
The logic model can help understand the impact of a business plan on a program’s strategic plan. The logic model comprises five major elements such as inputs, activities, outputs, outcomes, and impacts. The inputs are the resources such as funding, facilities, staff and volunteers needed for a given program. The activities are the events or actions of a program such as running the program and data collection. Outputs are the direct products and the desired effects of a program. Impact recalls the goals of a program (Hodges & Videto, 2011).
The financial projection element of a business plan can impact the strategic planning process of a program. This medium is because the allocated budget, as well as its parameters, must be assessed to ascertain if the funds available are enough to perform the tasks and activities of a program, which is what amounts to strategic planning. Hodges and Videto (2011) asserted that the resources required to implement a program, including those available and those needed, should be reviewed to determine if there are enough resources to achieve the goals of a program. The budget must include allocations for facilities and space, staff, supplies and materials, marketing resources as well as other operational expenses. An accurate budget is vital for the success of a program, and it is critical to consider all the possible expenses plus income.
The relationship between Business Planning and Program Planning
Programs usually face resource constraints, including the difficulty to attract funding streams. Business planning, according to the United States Small Business Administration (n.d.) is a methodology that can be used to address the challenge of financial constraints systematically. A business plan can demonstrate the link or association between a proposed program and social return. Through a funded plan, it is possible for a program to secure funding sources. As such a program plan must include a budget that specifies the number of revenues needed to achieve the program's goals and objectives. From this medium perspective, a budget is considered as an integral component rather than a stand-alone activity of program planning process (Kettner, Moroney and Martin, 2017).
The program planning process must include areas that require add.
Business Plan In your assigned journal, describe the entity you wil.docxfelicidaddinwoodie
Business Plan: In your assigned journal, describe the entity you will utilize and explain your decision.
Must be:
At required length or longer
Written in American English at graduate level
Received on or before the deadline
Must pass turn it in
Written in APA with references
.
Business Plan Part IVPart IV of the Business PlanPart IV of .docxfelicidaddinwoodie
Business Plan Part IV
Part IV of the Business Plan
Part IV of the business plan is due in week 7. Together with this part, you must show to your instructor that you have implemented the necessary corrections based on the part I feedback.
Part IV Requirements
1. Financials Plan
a. Present an in-depth narrative to demonstrate the viability of your business to justify the need for funding.
b. In this section describe financial estimates and rationale which include financial statements and forms that document the viability of your proposed business and its soundness as an investment.
c. Tables and figures must be introduced in the narrative.
i. Describe the form of business (sole-proprietor, LLC, or Corporation).
ii. Prepare three-year projections for income, expenses, and sources of funds.
iii. Base predictions on industry and historical trends.
iv. Make realistic assumptions.
v. Allow for funding changes at different stages of your company’s growth.
vi. Present a written rationale for your projections.
vii. Indicate your startup costs.
viii. Detail how startup funds will be used to advance your proposed business
ix. List current capital and any other sources of funding you may have
x. Document your calculations.
xi. Use reasonable estimates or actual data (where possible).
2. Continuous Improvement System
a. Present a brief summary of the continuous improvement processes that you will utilize for quality management (Six sigma, TQM, etc).
.
BUSINESS PLAN FORMAT Whether you plan to apply for a bu.docxfelicidaddinwoodie
BUSINESS PLAN FORMAT
Whether you plan to apply for a business loan or not, you need to have a roadmap or plan to get you from where you are to the successful operation of your business. The pages that follow demonstrate the content of a simple business plan which has been found to be successful in obtaining startup funds from banks. You are encouraged to use all or whatever portions of this fit your business.
Please DO NOT write page after page of drivel or copy from someone else’s plan or one of those templates you can find on the Internet. In most cases this will not “sound" like you, nor will it be short and to the point. Those who read these things are busy people and will not be inclined to spend time reading irrelevant paperwork.
Throughout this sample, there are
italicized
comments which are meant to guide you in preparation. If you follow this format it is reasonable to expect a finished document with 15-20 pages plus the supporting documents in the last section.
If you have good quality pictures of your space, products or other items, you might include them as another way to convey just what you plan to do. A map of your location, diagram of floor space, or other illustration is also sometimes helpful. On the other hand, do not add materials simply to “bulk-up” the report.
While content is critical, it is also important to make this presentation look as good as possible. For this course, you will create the business plan in Word and submit the plan and all attachments through the Assignment drop box. That means all attachments have to be in digital form. For a bank loan or an investor, you would normally provide them with a print version. Print the pages in black ink on a high quality tinted letterhead paper. Color is not necessary but would add some interest in headlines, etc. Bind the document in a presentation folder or with a spiral binding. Don’t simply punch a staple in the upper left corner.
If your were going to pursue a bank loan or an investor, it would be normal to take this business plan to your SCORE counselor for a review and critique.
NOTE: Before you begin your inspection of the simple plan outline which follows, take a moment to review the Business Plan Checklist on the next page.
BUSINESS PLAN CHECKLIST
By way of review, here is a concise list of the basic requirements for a Business Plan, as recommended by the MIT Enterprise Forum:
·
Appropriate Arrangement
- prepare an executive summary, a table of contents and chapters in the right order.
·
Right Length
- make it not too long and not too short, not too fancy and not too plain.
·
Expectations
- give a sense of what founder(s) and the company expect to accomplish three to seven years in the future.
·
Benefits
- explain in quantitative and qualitative terms the benefit to the consumer of the products and services.
·
Marketability
- present hard evidence of the mar.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
1. 1
Phylogenetic Analysis Homework assignment
This assignment will be completedon your own and
turned in the weekof 11/8-11/10.
Introduction
Molecular evolution is the study of how proteins
and nucleic acidsevolve. Included in this
field are studies of mutations and chromosomal
rearrangements, the evolutionary process,
the identification of sequence patterns conferring
function in proteins and nucleic acids,
and the reconstruction of the evolutionary history of
organisms and the molecules that
they make. All of thesestudies rely on comparisons
of nucleotide or amino acid sequences.
In this tutorial, you will be introduced to someof
the fundamental principles of molecular
evolution and the types of bioinformatics tools that
are used in evolutionary studies. We
will begin by carrying out a manual sequence
comparison, so that the basicconcepts can
be introduced, and the remainder of the project
will be carried out at The Biology
Workbench, a set of bioinformatics analysis
programs managed by The San Diego
Supercomputing Center at the University of
2. California, San Diego.
Objectives
• To introduce the principles of molecular evolution
• To acquaint you with the tools that are available to
compare nucleotide and
amino acid sequences
• To learnabout the use of protein sequences in
reconstructions of evolutionary history
Project
Branchingevolution occurs when one ancestral species
gives rise to two or more progeny
species. However, speciation events don't
involve the vast majority of the genes in a
genome. That is, for most genes, both of the
progeny species inherit identical genes from
the ancestor. Following speciation, these genes
evolve independently in the separate
lineages. Studies of molecular evolution therefore rely
heavily on comparisons of related
sequences from different organisms.
Shown below is an alignment of two homologous
sequences that we will use as a starting
place. Homologous sequences are sequences
that have descended from a common
ancestral sequence. You can't meaningfully
compare sequences unless they are
3. homologous. Thisalignment uses the single letter
amino acid code, in which G represents
glycine, Q represents glutamine, etc. The aligned
proteins have been shown to be involved
in the metabolism of similar, but different, toxic
compounds. As you can see, these amino
acid sequences are very similar and it is easy to
recognize that they are related by common
descent.
2
dntAc: KMGVDDEVIVSRQNDGSVR
nahAc: KMGIDDEVIVSRQSDGSIR
An expanded version of this alignment is shown
below. In this expanded alignment, both
the amino acidsand the corresponding DNAnucleotides
are shown. For ease of analysis,
the codons have been broken into separate entries in
a table.
Alignment of nahAc and dntAc sequences.
K M G V D E V I V
dntAc AAA ATG GGC GTC GAT GAA GTC ATC GTC
nahAc AAA ATG GGT ATT GAC GAG GTC ATC GTC
4. K M G I D E V I V
S R Q N D G S V R
dntAc TCC CGC CAG AAC GAT GGC TCG GTG CGA
nahAc TCT CGG CAG AGC GAC GGT TCG ATT CGT
S R Q S D G S I R
This region was chosen at random to represent
the changes that take place in
nucleotide sequences over time.
Answer the questions below by manually comparing
these sequences (this section is
for your own understanding, you do not need to turn
this in.)
1. Assuming that the dntAc sequence represents the
ancestral sequence, how
many nucleotide changes (mutations) have
occurred in this region to create the
nahAc nucleotide sequence? Remember that in
actuality neither sequence
represents the ancestral sequence.
2. Ofthesenucleotide changes, how many of these
changed the amino acid
encoded by that codon (i.e, how many were
nonsynonymous changes)?
5. 3. How many nucleotide changes were in the
first codon position? How many of
these altered the encoded amino acid?
4. How many nucleotide changes were in the
second codon position? How many
of these altered the encoded amino acid?
5. How many of the nucleotide changes were in
the third codon position? How
many of thesealtered the encoded amino acid?
6. Compare the % identity of thesetwo sequences at
the nucleotide vs protein
3
level. Percent identity is equal to (# of
positions in common / total # positions)
* 100.
Nucleotide % identity
Amino acid % identity
6. 7. Why is therea difference between amino acid %
identity and nucleotide percent
identity?
If needed, a table of the single letter amino
acid code can be found at:
http://umber.sbs.man.ac.uk/dbbrowser/bioactivity/aacodefrm.ht
ml
If needed, a codon table can be found at:
http://www.pangloss.com/seidel/Protocols/codon.html
The manual analysis that you just carried out
introduced you to someof the ways that
molecules evolve. The purpose of that manual
analysis was to get you thinking about
the mechanisms by which genes and proteins
change over time,and the types of forces
that control those changes. For example, when
we do analyses of this type we almost
always see many more changes in the 3rd
position of codons than in the first position.
Why is this? Do you thinkthat thesenucleotides
mutate at a higher rate than
nucleotides in the first position? What else
might be responsible for this
phenomenon?
Several computer tools have been developed that allow
7. you to quickly retrieve, align,
and compare genes and proteins from different
organisms. The remaining portion of
this tutorial will be carried out using The
Biology Workbench, a set of bioinformatics
analysis programs managed by The San Diego
Supercomputing Center at the University
of California, San Diego. The Biology Workbench
integrates a wide variety of different
programs, and this site can be used for many
different kinds of analyses in addition to
molecular evolution studies.
4
Homework Assignment
You are going to retrieve, align, and compare
hemoglobin protein sequences from a variety
of animals. Print out the phylogenetic trees for both b-
hemoglobin & a- and b -hemoglobin.
Don’t forget to writeyour name on the
assignment. Each tree will be worth 10
points. There
are additional questions in the protocol that you should
answer for your lab manuals only.
Bonus points (10):
Do a third separate alignment of a gene of interest
to you from 5 different species, print out
and include the phylogenetic tree.
8. Or
Extend the hemoglobin analysis for 5 additional
species suggested at the end of the
assignment, print out and include the phylogenetic
tree.
Project 1: b-hemoglobin gene alignment
Hemoglobin is a protein in red blood cells
that is involved in oxygen transport. It
belongs to
a family of related globin oxygen-binding
genes that has evolved through a number of
speciation and gene duplication events.
In the instructions below, the actions that you
will need to take on the internet site are
indicated in boldface type.
Computer-Aided Sequence Comparisons
First, you will need to access The Biology Workbench at:
http://workbench.sdsc.edu/
In order to use the site, you need to set up a
free account. To do this, select Register and
follow the instructions.
You will be taken to a new session. You
can carryout several different projects at the
same time using The Biology Workbench, and it
keeps your different projects in different
folders, which are referred to as sessions.
Now, select Protein Tools to begin.
Retrieving protein sequences using The Biology
Workbench.
9. You are going to retrieve, align, and compare
hemoglobin proteins from a variety of
different animals. You will do this using a tool
named Ndjinn. Click on protein tools and
then use the menu to select Ndjinn -
Multiple Database search, then select Run. First,
you need to select the database to use for the
search. In the alphabetical list of
databases select Swissprot database. SWISSPROT is
a protein sequence database that
was begun in 1986 and is maintained
collaboratively by the Swiss Institute for
Bioinformatics and the European Bioinformatics Institute.
This database has recently
been updated, and is now divided into divisions
(human, rodent, mammal, vertebrate,
etc.).Be sure to search the correct division for
each organism.
Secondly, in the search box, enterthe term beta
hemoglobin in order to search for beta
hemoglobin sequences. Change hits per page to 50
Then select Search. A list of
5
sequences will be returned (lots and lots of hemoglobin
sequences are in the databases,
which is one of the reasons why we are using
this protein). You want to select the box
next to the entrylabeled
SWISSPROT:HBB_HUMAN
Hemoglobin subunit beta (Hemoglobin beta chain)
10. (Beta-globin) [Homo sapiens (Human)]
This result won't be at the top of the list.
Make sure that you selected the sequence for
the beta chain, and not the alpha, delta or gamma
sequences.
Now, select Import Sequence from the list of
actions at the bottom of the page.
This will return you to the Protein tools screen,
but now the entryyou just imported will
be underneath the action menu.
For this project, you also want to import 4 more
hemoglobin beta sequences into your
session - from gorilla (Gorilla gorilla), mouse
(Musmusculus), chicken (Gallus gallus),
and bullfrog (Lithobates catesbeiana). The specific
sequences you want are labeled as
follows:
SWISSPROT:HBB1_MOUSE
HEMOGLOBIN BETA-1 CHAIN (B1) (MAJOR) [Mus
musculus (Mouse)]
SWISSPROT:HBB_CHICK
HEMOGLOBIN BETA CHAIN [Gallus gallus
(Chicken)]
SWISSPROT:HBB_LITCT
HEMOGLOBIN BETA CHAIN [Lithobates
catesbeiana (American bullfrog) (Rana
catesbeiana)]
SWISSPROT:HBB_GORGO
(P02024) HEMOGLOBIN BETA CHAIN [Gorilla
11. gorilla]
Note: to get thesesequences quickly, you can use
Ndjinn with the appropriate search
terms. Even faster, you could change the
settings for Ndjinn (so it displayed all hits
instead of 10) and use the 'search in page'
feature of your browser. Select the
sequences, then select Import Sequence from the
list of actions at the bottom of the
page.
This will take you to a page similar to the one
that you were at before, but now there
should be five different hemoglobin sequences listed
on the page. These organisms are
related in a way that should be pretty clear to
you. The human hemoglobin sequence is
identical to that from chimpanzees. Which of the
remaining four amino acid sequences
do you thinkwill be most like the human sequence?
Which sequence will be the next
closest? Which sequence do you thinkwill be the
most different from the human
sequence? Why?
6
Aligning the sequences.
Now we will carryout an alignment of the five
hemoglobin sequences that you have
retrieved. We will use a program called ClustalW to
12. perform the alignment. ClustalW is
a multiple sequence alignment tool that searches out
the best global alignment—that is,
the alignment with the most identity across the entire
range of all of the sequences. The
program is adjustable in that you can give different
weights to different types of
mismatches.
Select the boxes of all five of the hemoglobin
sequences. Then select CLUSTALW
Multiple Sequence Alignment from the action menu,
and select Run. This will take you
to a new page. Change output tree from
'unrooted tree' to 'rooted and unrooted trees',
and Select submit. This will take you to a new
page. Scroll down the page to the section
called ‘Sequencealignment’. Each of the amino
acid sequences that you retrieved is
shown in the alignment.
The alignment is color-coded, so that you can see
different types of changes without
looking at the specific amino acidsin the
sequence. Four different colors are used to
indicate varying levels of sequence conservation.
The bright blue areasare areasthat
are identical across all 5 sequences. The green
and dark blue areasare conserved but
not identical. Thismeans that although different amino
acidsare in this position, the
amino acids are similar to one another--for
example an amino acid with a hydrophobic R
group has been replaced by another amino acid
13. that also has a hydrophobic R group.
The black regions are unconserved--different amino
acidswith different properties are
present in this position in the different proteins.
One thingthat you can see in this alignment is that
thereare someregions in the protein
that are highly conserved, and others that are
only conserved to a lesser extent. This
reflects the fact that someparts of a protein can
and do evolve at different rates than
other parts of a protein. The highly conserved
regions are likely to be directly involved in
the functioning of the protein, which in this
case might be in binding the heme group
or in
interchain interactions. In an enzyme, amino acids
located at the active site are likely to be
highly conserved. The less conserved regions are
unlikely to be directly involved in
the functioning of the protein, for example, they
may have a 'spacer' function to
separate two otherregions.
Mutations happen randomly, however, and occur without
regard to the type of change
in the encoded protein. When changes occur
that produce a nonfunctional protein, the
organisms that have that mutation are likely to be
eliminated via natural selection. The
selection pressure against organisms with nonfunctional or
less-functional hemoglobin is
likely to be high.The highly conserved regions
aren't conserved because mutations never
14. occurred in thesepositions, but rather because natural
selection eliminated those
mutations once they did occur.
7
The Phylogenetic Tree created from the alignment
The ClustalW program also gives you another means
of viewing the information in the
alignment--it also depicts this information in the
form of a phylogenetic tree.
At the bottom of the page is a dendrogram
that depicts the relationships between the
sequences. In this figure, the sequences are
represented at the tips of the lines. A
branchpoint, where two lines diverge, represents a
single ancestor sequence. Two
sequences that have a single branchpoint between
them are more closely related to each
otherthan to the othersequences. The horizontal
length of the branches represents
evolutionary distance (related to amount of
dissimilar sequence), so that two sequences
with a high amount of similarity are connected by a
smaller distance than two sequences
that are less closely related.
This type of diagram can be used to infer the
evolutionary relationships between the
sequences, because you would expect that
sequences which are nearly identical shared a
15. recent common ancestor. Similarly, the evolutionary
relationships between the source
organisms can be inferred from the relationships
between the sequences.
Here, you can see the relationship that you
intuitively expected--the gorilla sequence is
very similar to the human sequence, because these
two organisms are both primates
and therefore shared a common ancestor more
recently than humans and mice did.
Similarly, the mouse, a mammal, shared a
common ancestor with the primates more
recently than it shared a common ancestor with
the chicken or frog.
Different models for evolutionary mechanisms might
produce different evolutionary
distances than those shown here.
• Print out the phylogenetic tree (rooted or
unrooted) and include it in your
homework assignment
The relationship between alpha and beta globin
sequences
Hemoglobin is a tetramer (4 subunits) of two
different polypeptides named alpha and
beta hemoglobin. Alpha and beta hemoglobin are
related to each othervia an ancient
gene duplication event. That is, therewas one gene
(the ancestral globin), and it
16. duplicated to form two genes in the same
organism (alpha and beta globins), and then
thesegenes underwent independent evolution as
the progeny of that organism
replicated. This gene duplication event occurred
before mammals diverged, Therefore,
an alpha globin gene in a mouse is more
closely related to (or, more recently diverged
from) an alpha globin gene from a
chimpanzee than it is to a beta globin
gene from the
same mouse. Gene duplication is a very important
evolutionary process, and it is clear
that it has happened numeroustimes on an
evolutionary timescale.
The alpha and beta sequences arose in an
ancestor common to all of the animals that
we
8
are looking at. That is, this gene duplication
event occurred before the divergence of
the
lineages that led to modern primates, mammals, birds,
and amphibians.
To import the alpha globin sequences into your
session, pressthe gray Return button on
the screen, then deselect the alignment, and then
select Protein Tools. Then use Ndjinn
to import the following sequences. If you
carryout a search for 'hemoglobin alpha' in
17. the
SWISSPROT database using Ndjinn, you will have to
search through several hundred
responses--it may help to use the 'find in page'
feature of your internet browser.
SWISSPROT:HBA_HUMAN
HEMOGLOBIN ALPHA CHAIN [Homo sapiens
(Human), Pan troglodytes
(Chimpanzee), and Pan paniscus (Pygmy chimpanzee)
(Bonobo)]
SWISSPROT:HBA_CHICK
HEMOGLOBIN ALPHA-A CHAIN [Gallus gallus
(Chicken)]
SWISSPROT:HBA_MOUSE
HEMOGLOBIN ALPHA CHAIN [Musmusculus
(Mouse)]
SWISSPROT:HBAB_LITCT
HEMOGLOBIN ALPHA-B CHAIN [Lithobates
catesbeiana (American bull frog)]
SWISSPROT:HBA_GORGO
HEMOGLOBIN ALPHA CHAIN [Gorilla gorilla
gorilla (Lowland gorilla)]
Onceyou have all the sequences imported, select all
ten sequences (your 5 beta
sequences and 5 alpha sequences) and perform
another Clustal W alignment of the
sequences. Make sure that the entire results
page has loaded (this takesa little bit of
time), and then examine the unrooted phylogenetic
18. tree of the sequences.
• Print out the phylogenetic tree (dendrogram) of
alpha and beta globin
sequences from the five organisms. Include it in
your assignment.
Answer thesequestions for your lab manuals:
1 . Do the alpha sequences cluster together
separately from the beta sequences?
2. Is the branching pattern among the alpha
sequences similar to the branching
among the beta sequences?
Independent project: For (10) bonus points you
may do an independent project
where you alignsequences from 5 different species
from a gene you are interested in or
you may extend the beta hemoglobin gene analysis
and complete the project idea below.
Print the phylogenetic tree and include it in your
homework assignment to get the bonus
9
points.
19. Bonus project idea
Estimating relationships between existing mammals.
In the analysis that we carried out, it was fairly
easy to predict the results because we
understand the relationships between humans,
gorillas, mice, chickens, and frogs. The
way in which otheranimals are related can be
difficult to understand. Even among the
mammals, it may be difficult to see how different
organisms are related to each other.
Using beta hemoglobin sequences, investigate
relationships between the organisms
below.
Minke whale Killer
Whale Harbor seal
Indian Elephant
White Rhinoceros
Brazilian Manatee
European River Otter
Polar Bear
Hippopotamus
Before carrying out the analysis, predict the
relationships between the different
organisms.
1. Are whales and seals more closely related to
one another than to any of these
other species?
2. To which organism is the manatee most closely
related?
3. To which organism is the elephant most closely
20. related?
4. To which organism is the otter most closely
related?
After carrying out the analysis:
1. Are whales and seals more closely related to
one another than to any of these
other species?
2. To which organism is the manatee most closely
related?
3. To which organism is the elephant most closely
related?
4. To which organism is the otter most closely
related?
Would you predict that you would see the same
results if you used a different protein for
1
0
the analysis, for example the cytochrome c
protein? Why or why not?
10
21. The following review questions will help to reinforce
what you've learned in this tutorial.
Answer them for your lab manual.
Questions – Review
1. Why was it necessary to carryout an alignment of
the sequences we analyzed?
2. Nucleotide substitutions might lead to changes in
the sequence of amino acidsin a
protein, which can be seen by comparing
homologous positions in a sequence alignment.
How would deletions or insertions appear in a
sequence alignment?
3. Sometimes gene duplications result in the
formation of a pseudogene, a sequence of
nucleotides that is very similar to a gene but
22. isn't expressed. This can occur in a variety
of
ways, for example if the gene is duplicated
but a regulatoryregion or the promoter
region for that gene is not duplicated. Which
would evolve (accumulate nucleotide
substitutions) more rapidly, a pseudogene or a
duplicated gene that was expressed?
Explain.