Know the different types of viruses which have a dsRNA genome A type of infection caused by
bacteriophages which involves a transition from a lytic to a lysogenic stage. What is the defense
mechanism employed by the T4 phage to prevent excision of its DNA by restriction enzymes?
Know the viruses that use RNA/DNA genomes. Describe in general terms how bacteriophage
lambda regulates the switch between the lytic and lysogenic cycles. Proteins involved? What
factors may influence the transition from a lytic to lysogenic state in lambda phage? Describe in
general terms how bacteriophage lambda regulates the switch between the lytic and lysogenic
cycles. Other Proteins involved? Describe in general terms the strategy used by the ssDNA virus
phiX174 to synthesize its nucleic acids and proteins. Function of the replicative form? Know the
different viruses which have a ssDNA genome Outline the major events involved in plus-strand
RNA viruses and the specific mechanisms used to accomplish each step. Type of template used?
Describe in general terms the strategy used by minus and plus strand RNA viruses to synthesize
their nucleic acids and proteins. Propose how a retrovirus with a single RNA molecule as its
genome might generate multiple proteins from that molecule. Intermediate molecule? What are
cytokines? Roles in immunity? What is the alternate complement pathway? Roles? What are
the functions and locations (blood, tissue etc) of the different immune cells? Mechanisms
employed by the lungs to help protect it from infection What are dendritic cells? Roles they play
in the immune response? Specific vs non-specific Function of lysozyme? Know the different
body areas which act as physical barriers to infection. Know the different physical and
biological defense mechanisms? Examples?
Solution
As per the rule i have answered your first question:
Reoviridae: Reoviridae are currently classified into nine genera. The genomes of these viruses
consist of 10 to 12 segments of dsRNA, each generally encoding one protein. The mature virions
are non-enveloped. Their capsids, formed by multiple proteins, have icosahedral symmetry and
are arranged generally in concentric layers. A distinguishing feature of the dsRNA viruses,
irrespective of their family association, is their ability to carry out transcription of the dsRNA
segments, under appropriate conditions, within the capsid. In all these viruses, the enzymes
required for endogenous transcription are thus part of the virion structure.
Orthoreoviruses: The orthoreoviruses (reoviruses) are the prototypic members of the virus
Reoviridae family and representative of the turreted members, which comprise about half the
genera. Like other members of the family, the reoviruses are non-enveloped and characterized by
concentric capsid shells that encapsidate a segmented dsRNA genome. In particular, reovirus has
eight structural proteins and ten segments of dsRNA. A series of uncoating steps and
conformational changes accom.
Know the different types of viruses which have a dsRNA genome A type .pdfformicreation
Know the different types of viruses which have a dsRNA genome A type of infection caused by
bacteriophages which involves a transition from a lytic to a lysogenic stage. What is the defense
mechanism employed by the T4 phage to prevent excision of its DNA by restriction enzymes?
Know the viruses that use RNA/DNA genomes. Describe in general terms how bacteriophage
lambda regulates the switch between the lytic and lysogenic cycles. Proteins involved? What
factors may influence the transition from a lytic to lysogenic state in lambda phage? Describe in
general terms how bacteriophage lambda regulates the switch between the lytic and lysogenic
cycles. Other Proteins involved? Describe in general terms the strategy used by the ssDNA virus
phi X 174 to synthesize its nucleic acids and proteins. Function of the replicative form? Know
the different viruses which have a ssDNA genome Outline the major events involved in plus-
strand RNA viruses and the specific mechanisms used to accomplish each step. Type of template
used? Describe in general terms the strategy used by minus and plus strand RNA viruses to
synthesize their nucleic acids and proteins. Propose how a retrovirus with a single RNA
molecule as its genome might generate multiple proteins from that molecule. Intermediate
molecule? What are cytokines? Roles in immunity? What is the alternate complement pathway?
Roles? What are the functions and locations (blood, tissue etc.) of the different immune cells?
Mechanisms employed by the lungs to help protect it from infection What are dendritic cells?
Roles they play in the immune response? Specific vs non-specific Function of lysozyme? Know
the different body areas which act as physical barriers to infection. Know the different physical
and biological defense mechanisms? Examples?
Solution
1. Pox virus, herpes group of virus , adenovirus, papova virus have double stranded DNA
2. Infection caused bacteriophages example is corynebacterium diphtheria, bordrtella pertussis,
campylobacter jejuni
4 . Viruses which use DNA are pox, herpes, papova virus, adenovirus virus..
Viruses which use RNA are hiv , rhabdovirus, influenza, respiratory syncitial virus
9.viruses having ss DNA genome are -parvo virus
13.cytokines are chemical mediators which play a role in immunity and inflammation... Eg..
TNF-alpha, TGF- Beta, gamma interferon..,interleukins..And all which play important role in
inflammation and immunity...For cells recruitment, activation, reland action
17.dendritic cells are the primary antigen presenting cells which act non specificaly on any
antigen .Help in mounting an immune response.
18.lysozyme is inflammatory mediator present in granules in the macrophages ...These are
microbicidal in action.which kills the consumed microbe
19..Skin, mucus lining of respiratory tract, cervical mucus plugs, vaginal acidic pH, lymph nodes.
introduction to viruses, classification and structure.kanchan sharma
introduction to viruses. structure of viruses.
classification of viruses.
structure of plant, animal and bacterial viruses.
satellite virus, viroids, virions, their structure and function
examples of animal and plant viruses.
Morphology, Classification, Cultivation and Replication of VirusKrutika Pardeshi
This presentation is Useful for B. Pharmacy SEM III Students to study the Topic Fungi According to PCI Syllabus.
It Consist of Morpholoy of Fungi, Cultivation , Replication and Classification of Virud
You are asked with writing a program in C that manages contact infor.pdfFOREVERPRODUCTCHD
You are asked with writing a program in C that manages contact information for a group of
people. The program should save the first name, last name, and telephone number for up to 12
people. The program should have options to add a person, delete a person, update the
information for a person, and display all information for all current entries. How could you go
about breaking up the programming work into a set of subproblems that could be implemented
separately?
Solution
Whenever we asked about these type of problems.we just go to data structures.i.e,Data structures
that are suitable to our problem whether it may be linked lists,arrays,trees.Here we are taking
about a person information that to it is not about a single person information.
1)Identify data structure.Here i think linked list data structure can be used because array cannot
store all information about a person.and arrays cannot support delete operation like that.
2)1st sub problem:creating a structure to a single person
3)2nd sub problem:add a person:inserting data in linked list by creating a single node
3)updating information:modifying node information in single linked list
4)delete the information of a person:delete a single node information in single linked list
5)display all information for all current entries:traversing a single linked list.
each step is considered to subproblem or function in \'C\' language..
Write a short paragraph explaining what the exploit does in Assembly.pdfFOREVERPRODUCTCHD
Write a short paragraph explaining what the exploit does in Assembly , and how it works. How
could the
programmer of vecho have prevented this from happening?
Solution
Exploit in assembly allows us to gain unauthorized root priviledge by using buffer overflow. It
allows hackers to gain access to addresses beyond the eip register. Exploits are generally used in
developing virus. The command vecho, which is similar to the echo command is vulnerable and
used in exploits.
The programmers of vecho should have checked for the address in the eip register and any
attempt to access addresses beyond it should have thrown an error..
More Related Content
Similar to Know the different types of viruses which have a dsRNA genome A type.pdf
Know the different types of viruses which have a dsRNA genome A type .pdfformicreation
Know the different types of viruses which have a dsRNA genome A type of infection caused by
bacteriophages which involves a transition from a lytic to a lysogenic stage. What is the defense
mechanism employed by the T4 phage to prevent excision of its DNA by restriction enzymes?
Know the viruses that use RNA/DNA genomes. Describe in general terms how bacteriophage
lambda regulates the switch between the lytic and lysogenic cycles. Proteins involved? What
factors may influence the transition from a lytic to lysogenic state in lambda phage? Describe in
general terms how bacteriophage lambda regulates the switch between the lytic and lysogenic
cycles. Other Proteins involved? Describe in general terms the strategy used by the ssDNA virus
phi X 174 to synthesize its nucleic acids and proteins. Function of the replicative form? Know
the different viruses which have a ssDNA genome Outline the major events involved in plus-
strand RNA viruses and the specific mechanisms used to accomplish each step. Type of template
used? Describe in general terms the strategy used by minus and plus strand RNA viruses to
synthesize their nucleic acids and proteins. Propose how a retrovirus with a single RNA
molecule as its genome might generate multiple proteins from that molecule. Intermediate
molecule? What are cytokines? Roles in immunity? What is the alternate complement pathway?
Roles? What are the functions and locations (blood, tissue etc.) of the different immune cells?
Mechanisms employed by the lungs to help protect it from infection What are dendritic cells?
Roles they play in the immune response? Specific vs non-specific Function of lysozyme? Know
the different body areas which act as physical barriers to infection. Know the different physical
and biological defense mechanisms? Examples?
Solution
1. Pox virus, herpes group of virus , adenovirus, papova virus have double stranded DNA
2. Infection caused bacteriophages example is corynebacterium diphtheria, bordrtella pertussis,
campylobacter jejuni
4 . Viruses which use DNA are pox, herpes, papova virus, adenovirus virus..
Viruses which use RNA are hiv , rhabdovirus, influenza, respiratory syncitial virus
9.viruses having ss DNA genome are -parvo virus
13.cytokines are chemical mediators which play a role in immunity and inflammation... Eg..
TNF-alpha, TGF- Beta, gamma interferon..,interleukins..And all which play important role in
inflammation and immunity...For cells recruitment, activation, reland action
17.dendritic cells are the primary antigen presenting cells which act non specificaly on any
antigen .Help in mounting an immune response.
18.lysozyme is inflammatory mediator present in granules in the macrophages ...These are
microbicidal in action.which kills the consumed microbe
19..Skin, mucus lining of respiratory tract, cervical mucus plugs, vaginal acidic pH, lymph nodes.
introduction to viruses, classification and structure.kanchan sharma
introduction to viruses. structure of viruses.
classification of viruses.
structure of plant, animal and bacterial viruses.
satellite virus, viroids, virions, their structure and function
examples of animal and plant viruses.
Morphology, Classification, Cultivation and Replication of VirusKrutika Pardeshi
This presentation is Useful for B. Pharmacy SEM III Students to study the Topic Fungi According to PCI Syllabus.
It Consist of Morpholoy of Fungi, Cultivation , Replication and Classification of Virud
You are asked with writing a program in C that manages contact infor.pdfFOREVERPRODUCTCHD
You are asked with writing a program in C that manages contact information for a group of
people. The program should save the first name, last name, and telephone number for up to 12
people. The program should have options to add a person, delete a person, update the
information for a person, and display all information for all current entries. How could you go
about breaking up the programming work into a set of subproblems that could be implemented
separately?
Solution
Whenever we asked about these type of problems.we just go to data structures.i.e,Data structures
that are suitable to our problem whether it may be linked lists,arrays,trees.Here we are taking
about a person information that to it is not about a single person information.
1)Identify data structure.Here i think linked list data structure can be used because array cannot
store all information about a person.and arrays cannot support delete operation like that.
2)1st sub problem:creating a structure to a single person
3)2nd sub problem:add a person:inserting data in linked list by creating a single node
3)updating information:modifying node information in single linked list
4)delete the information of a person:delete a single node information in single linked list
5)display all information for all current entries:traversing a single linked list.
each step is considered to subproblem or function in \'C\' language..
Write a short paragraph explaining what the exploit does in Assembly.pdfFOREVERPRODUCTCHD
Write a short paragraph explaining what the exploit does in Assembly , and how it works. How
could the
programmer of vecho have prevented this from happening?
Solution
Exploit in assembly allows us to gain unauthorized root priviledge by using buffer overflow. It
allows hackers to gain access to addresses beyond the eip register. Exploits are generally used in
developing virus. The command vecho, which is similar to the echo command is vulnerable and
used in exploits.
The programmers of vecho should have checked for the address in the eip register and any
attempt to access addresses beyond it should have thrown an error..
Write a program to convert a given INFIX into POSTFIX. Make sure .pdfFOREVERPRODUCTCHD
Write a program to convert a given INFIX into POSTFIX. Make sure the program checks for \"(
)\", and check the balances of parentheses.
Write a program to convert a given INFIX into POSTFIX. Make sure the program checks for \"(
)\", and check the balances of parentheses.
Solution
#include
#include
#include
#define size 100
using namespace std;
char s[size];
int top=-1;
push(char z)
{ /*PUSH Function*/
s[++top]=z;
}
char pop()
{ /*POP Function*/
return(s[top--]);
}
int pr(char z)
{
switch(z)
{
case \'#\': return 0;
case \'(\': return 1;
case \'+\':
case \'-\': return 2;
case \'*\':
case \'/\': return 3;
}
}
int main()
{
char in[100],post[100],c,z;
int i=0,k=0;
printf(\"\ \ Enter your Infix Expression : \");
scanf(\"%s\",in);
push(\'#\');
while( (c=in[i++]) != \'\\0\')
{
if( c == \'(\') push(c);
else
if(isalnum(c)) post[k++]=c;
else
if( c == \')\')
{
while( s[top] != \'(\')
post[k++]=pop();
z=pop(); /* Remove ( */
}
else
{ /* Operator */
while( pr(s[top]) >= pr(c) )
post[k++]=pop();
push(c);
}
}
while( s[top] != \'#\') /* Popping from stack */
post[k++]=pop();
post[k]=\'\\0\';
printf(\"\ \ Infix Expression: %s \ \ Postfix Expression: %s\ \",in,post);
}.
What quality control mechanisms should major accounting firms have i.pdfFOREVERPRODUCTCHD
What quality control mechanisms should major accounting firms have in place to ensure that
audit partners have the proper training and experience to supervise audit engagements?
Solution
Quality control measures the major Accounting firm have in place in order to ensure that
auditors have proper training and experience to supervise audit engagements are
(1) Integrity, objectivity and independence: The auditor should be straight forward, honest and
sincere in his approach to his professional work. He should maintain an impartial
attitude and both be and appear to be free of any interest which might be regarded, whatever is
actual effect, as being incompatible with integrity and objectivity.
(2) Confidentiality: The auditor should respect the confidentiality of information acquired in the
course of his work and should not disclose any such information to a third party without The
specific authority or unless there is a legal or professional duty to disclose.
(3) Skills and Competence: The audit should be performed and the report prepared with due
professional care by persons who have adequate training, experience and competence in
auditing. The auditor requires specialised skills and competence along with a continuing
awareness of developments including pronouncements of the accounting body on accounting and
auditing matters, and relevant regulations and statutory requirements.
(4) Work performed by others: When the auditor delegates work to assistants or uses work
performed by other auditors and experts, he continues to be responsible for forming and
expressing his opinion on the financial information.
These are the some of the measures to have proper training and experience to supervise audit
engagements
I WOULD LIKE TO SHARE YOU ABOUT LETTER OF ENGAGEMENT IN SHORT
Letter of Engagement: The legal requirement to get the accounts audited so far extends only to
companies, co-operative societies, and registered societies. In these cases, the respective law
governs the appointment of auditors and their duties. In all other cases, it is a matter of contract.
Thank you hope you might feel it helpfull.
What are three basic ethical principles for journalism Why are ethi.pdfFOREVERPRODUCTCHD
What are three basic ethical principles for journalism? Why are ethics so important for a writer?
Solution
Three major ethical principles are
Truth and Accuracy
Journalists cannot always guarantee ‘truth’, but getting the facts right is the cardinal principle of
journalism. We should always strive for accuracy, give all the relevant facts we have and ensure
that they have been checked. When we cannot corroborate information we should say so.
Independence
Journalists must be independent voices; we should not act, formally or informally, on behalf of
special interests whether political, corporate or cultural. We should declare to our editors – or the
audience – any of our political affiliations, financial arrangements or other personal information
that might constitute a conflict of interest.
Fairness and Impartiality
Most stories have at least two sides. While there is no obligation to present every side in every
piece, stories should be balanced and add context. Objectivity is not always possible, and may
not always be desirable (in the face for example of brutality or inhumanity), but impartial
reporting builds trust and confidence..
What are some of the different versions of UNIX® Why is it importan.pdfFOREVERPRODUCTCHD
What are some of the different versions of UNIX®? Why is it important to have different
versions of UNIX®?
Solution
Versions of UNIX
Many versions of UNIX, including System V Release 4, merge earlier AT&T releases with BSD
features. In last few years ago, there were two main versions:
[1] The line of UNIX releases that started at AT&T (the latest is System V Release 4)
[2] The University of California at Berkeley (the latest version is BSD 4.4).
Some more commercial versions include Solaris, SCO UNIX , SunOS, AIX, HP/UX, and
ULTRIX. The recent POSIX standard for UNIX-like operating systems defines a single interface
to UNIX..
Type in your own words In details, discuss the following questions.pdfFOREVERPRODUCTCHD
Type in your own words
In details, discuss the following questions in three to four pages: 1- Give one of your own
experiences in which your intrinsic motivation changed into extrinsic [LO31| 10 Marks]
motivation as through competition, or rewards. What are some activities you do because you get
external rewards, or because you are avoiding some punishment? 2- LO41[10 Marks]
Solution
Extrinsic motivation refers to behavior that is driven by external rewards such as money, fame,
grades, and praise. This type of motivation arises from outside the individual, as opposed to
intrinsic motivation, which originates inside of the individual.”
? Intrinsic motivation refers to behavior that is driven by internal rewards. In other words, the
motivation to engage in a behavior arises from within the individual because it is intrinsically
rewarding.”
Example of Coversion of intricsic motivation into extrinsic motivation
My personel life experiance is to become CA ....... i want to become CA because i m intrested in
accountancy field from start of 10th class when i solve one problem based on account field very
easily and with intrest taking in solving that problem .... then i decided to take commerce an
choose CA field ..when i came in this field then discussion with the person around me were CA
.....then i knwe All about their struggle and theri popularity after become CA .....that all thing
also motivates us .
We think that is disputable, and in some way, outrageous proposal to withhold reward in school
setting that is based in the studies of motivation involved in Deci\' s and his associates meta-
analysis. From the 70\'s and onwards there was a significant endeavor in the research agendas.
Behavioral model of learning through rigid control of external reward is no longer the dominant
paradigm. Researcher\'s attention has been placed on the contribution of valuable learning that
comes from personal effort and \"inner senses\". Therefore, maybe it is time to move the agenda
to the orientation of the synthesis of external and internal motivation that will engage students,
especially adolescents, within the accepted teaching skills and competencies necessary for
creative and productive future. And we should not forget the fact that in most cases the
researchers were successful in identifying factors that reduce interest than factors that reinforce
them. Only recently, researchers have begun to portray interventions that may enhance the
interest and therefore the value, importance and meaning of the activities or polishing of the
structure of
Activites done for reward.
Twice a first number decreased by a second number is 11. The first nu.pdfFOREVERPRODUCTCHD
Twice a first number decreased by a second number is 11. The first number increased by twice
the second number is 18. Find the numbers. The numbers are (Use a comma to separate answers
as needed.)
Solution
Let x be the first number and
y be the second number
2x-y=11
x+2y=18
4x-2y=22
x+2y=18
Adding abive equations
5x=40
x=8
8+2y=18
y=5.
the largest drum ever constructed was played at the Rotal festival H.pdfFOREVERPRODUCTCHD
the largest drum ever constructed was played at the Rotal festival Hall in london in 1987. it had a
diameter of 13 ft . what was the area of the circular face of the drum?
Solution
diameter of the drum = 13ft
area of circular face of drum = upper circular area + lower circular area
circular area = pi*r^2
r = 13/2 = 6.5 ft
therefore, area =2* pi* 6.5^2 = 265.33 square feet.
Suppose that the material that you are recrystallizing fails to perc.pdfFOREVERPRODUCTCHD
Suppose that the material that you are recrystallizing fails to percipiate out of the cold solvent.
What would you do to recover the material from the solution? Experiment 4: Synthesis of
Salicylic Acid
Solution
You can get back your product, by concentrating the solvent, by evaporating the solvent under
vacuum, at temperature around 40 degreed celcius in rota evaporator..
Summarize the purpose of a WAN and define what makes up a WAN connec.pdfFOREVERPRODUCTCHD
Summarize the purpose of a WAN and define what makes up a WAN connection.
Detail the types of devices used to establish and maintain a WAN connection and list some of the
more common WAN connection methods.
Discuss the differences between WAN and LAN connections, and who is responsible for
providing WAN connections.
Discuss how a modem handles digital information over analog signals.
Describe how to configure and setup remote access protocols.
What factors need careful consideration?
Solution
Remote Access Protocols
Remote access protocols square measure accustomed management the institution of connections
and therefore the transmission of information over WAN links. 3 varieties of remote access
protocols square measure supported by Windows Server 2003 remote access:
Point-to-Point Protocol (PPP): AN industry-standard set of protocols providing the most
effective security, multi-protocol support and ability.
Serial Line net Protocol (SLIP): employed by older remote access servers. A Windows Server
2003 RAS server doesn\'t support SLIP dial-up connections.
Microsoft remote access protocol: additionally called Asynchronous NetBEUI (AsyBEUI) and is
employed by inheritance remote access purchasers, like Windows NT three.1, Windows for
Workgroups, DOS and computer network Manager purchasers.
LAN may be a electronic network that connects computers in tiny areas. WAN may be a network
that covers a broad space victimization personal or public network transports.
The terms {lan|local square measurea network|LAN|computer network} and WAN are usually
confusing for those that aren’t that school savvy. These square measure each connections that
permit users to attach their laptop to a network, as well as the web. computer network is brief for
native space Network, whereas WAN is brief for Wide space Network. These 2 disagree from
one another in distinct ways that. computer network may be a electronic network that connects
computers in tiny areas like home, office, school, corporation, etc. employing a network media.
it\'s helpful for sharing resources like printers, files, games, etc. A computer network network
includes a few of laptop systems connected to every alternative, with one system connected to a
router, electronic equipment or AN outlet for net access. The computer network network is made
victimization cheap technologies like local area network cables, network adapters and hubs.
However, alternative wireless technologies are obtainable to attach the pc through a wireless
access. so as to put together a computer network network, an individual might also need
specialised software system software system. the foremost widespread software system includes
the Microsoft Windows’ net affiliation Sharing (ICS), that permits users to make computer
network. distinction between computer network and WAN
Key Difference: computer network may be a electronic network that connects computers in tiny
areas. WAN may be a network that covers a broad space victimizat.
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! .pdfFOREVERPRODUCTCHD
SOS Please please please help on this problem!!!!!!!!!!!!!!!!!!!!!! :) Closing Entries and the
Postclosing Trial Balance 192 CHAPTER 6 Mini-Practice Set 1 Service Business Accounting
Cycle Eli\'s Consulting Services ing principles and This project will give you an opportunity to
apply your knowledge of accounting principles and procedures by handling all the accounting
work of Eli\'s Consulting Services for the month o January 2020. Assume that you are the chief
accountant for Eli\'s Consulting Services, During January, the busi ness will use the same types
of records and procedures that you learned about in Chapters 1 through 6. The chart of accounts
for Eli\'s Consulting Services has been expanded to include a few new accounts. Follow the
instructions to complete the accounting records for the month of January. INTRODUCTION
Eli\'s Consulting Services Chart of Accounts Revenue 401 Fees Income Assets 101 Cash 111
Accounts Receivable 121 Supplies 134 Prepaid Insurance 137 Prepaid Rent 141 Equipment 142
Accumulated Depreciation Equipment Liabilities 202 Accounts Payable Expenses 511 Salaries
Expense 514 Utilities Expense 517 Supplies Expense 520 Rent Expense 523 Depreciation
Expense-Equipment 526 Advertising Expense 529 Maintenance Expense 532 Telephone
Expense 535 Insurance Expense Owner\'s Equity 301 Trayton Eli, Capital 302 Trayton Eli,
Drawing 309 Income Summary INSTRUCTIONS 1. Open the general ledger accounts and enter
the balances for January 1, 2020. Obtain the necessary figures from the postclosing trial balance
prepared on December 31, 2019, which appears in Figure 6.3. 2. Analyze each transaction and
record it in the general journal. Use page 3 to begin January\'s transactions. 3. Post the
transactions to the general ledger accounts. 4. Prepare the Trial Balance section of the worksheet.
5. Prepare the Adjustments section of the worksheet. a. Compute and record the adjustment for
supplies used during the month. An inventory taken on January 31 showed supplies of $5,200 on
hand. b. Compute and record the adjustment for expired insurance for the month. c. Record the
adjustment for one month of expired rent of $4,000. d. Record the adjustment for depreciation of
$183 on the old equipment for the month. The first adjustment for depreciation for the new
equipment will be recorded in February, 6. Complete the worksheet. 7. Prepare an income
statement for the month. 8. Prepare a statement of owner\'s equity.
Solution
Journal Entries
Date
Account Title
Debit
Credit
2-Jan
Supplies
7000
Cash
7000
7-Jan
Cash
20000
Accounts receivable
5000
Fees Income
25000
2-Jan
Insurance expense
8400
Cash
8400
12-Jan
Cash
4000
Accounts receivable
4000
Advertising expense
3600
Cash
3600
Cash
20700
Accounts receivable
2300
Fees Income
23000
13-Jan
Cash
4500
Accounts receivable
4500
14-Jan
Cash
750
Supplies
750
20-Jan
Supplies
5000
Accounts Payable
5000
20-Jan
Cash
12500
Accounts receivable
3500
Fees Income
16000
20-Jan
Cash
5600
Accounts receivable
5600
21-Jan
Ma.
Step 12 The task is complete when the quota can be verified. Take a.pdfFOREVERPRODUCTCHD
Step 12 The task is complete when the quota can be verified. Take a Screenshot of file(s), and
submit a print out. Step 13 Set up a static IP address for your eth2 interface on any installation
with following guidelines: The IP address should be 192.168.1.9 The netmask should be
255.255.255.0 The gateway should be set to 192.168.1.1 Step 14 The task is complete when all
interfaces can be pinged successfully. Take a Screenshot of file(s), and submit a print out.
Solution
Linux network interface names start with ethX. First Ethernet network interface name is eth0,
second is eth1,eth2 and so on.
Login as a root user, use su – command:
$ su –
To list or display more information about network interface type command:
# ifconfig | less
To assign an IP address type following command:
# ifconfig eth2 192.168.1.9 up
To take down network interface type following command:
# ifconfig eth2 down
To configure network card using GUI tool type command:
# redhat-config-network
You can also type command setup and select network configuration from menu:
# setup
If you wish to configure network interface eth2 manually then you need to edit files stored in
/etc/sysconfig/network-scripts/ directory. For example here is my sample /etc/sysconfig/network-
scripts/ifcfg-eth2 file for eth2 network interface:
DEVICE=eth2
BOOTPROTO=static
BROADCAST=192.168.1.255
HWADDR=00:0F:EA:91:04:07
IPADDR=192.168.1.9
NETMASK=255.255.255.0
NETWORK=192.168.1.1
ONBOOT=yes
TYPE=Ethernet
Save your changes and exit the text editor.
Restart the network service type following command.
QUESTIONDiscuss how has Web 2.0 changed the behavior of Internet .pdfFOREVERPRODUCTCHD
QUESTION:
Discuss how has Web 2.0 changed the behavior of Internet users? What are the basic tools or
applications that characterize Web 2.0?
While IT provides the platform for this phenomenon, the changing behavior of users represents
the biggest challenge and opportunity for businesses today. Web 2.0 also represents opportunities
for those who understand and master the new way of doing things. Managers who invest the time
to understand and become proficient in new approaches to identifying, communicating and
building relationships with customers online will have a tremendous advantage over managers
who limit themselves to traditional methods.
Blog is short for “Web Log” and is a Web site where users regularly post information for others
to read. Blogs allow readers to comment on each posting. Blogs are a key tool for organizations
that practice content marketing, where valuable information is shared with current or prospective
customers. Bloggers can establish a lot of credibility for themselves and their organizations by
providing helpful information to people who are part of their target market.
Solution
Wikis: Websites that empower clients to contribute, work together and alter webpage content.
Wikipedia is one of the most seasoned and best-known wiki-based locales.
The expanding pervasiveness of Software as a Service (SaaS), web applications and distributed
computing as opposed to privately introduced projects and administrations.
Portable registering, otherwise called nomadicity, the pattern toward clients associating from
wherever they might be. That pattern is empowered by the multiplication of cell phones, tablets
and other cell phones in conjunction with promptly available Wi-Fi systems.
Concoction: Web pages or applications that coordinate reciprocal components from at least two
sources.
Interpersonal interaction: The act of growing the quantity of one\'s business and additionally
social contacts by making associations through people. Interpersonal interaction destinations
incorporate Facebook, Twitter, LinkedIn and Google+.
Communitarian endeavors in view of the capacity to achieve vast quantities of members and
their aggregate assets, for example, crowdsourcing, crowdfunding and crowdsource testing..
Python program with functions that extracts specific characters from.pdfFOREVERPRODUCTCHD
Python program with functions that extracts specific characters from a text file. (e.g. .,#!?)
Solution
data=[] flag=False with open(\'/tmp/myFile.txt\',\'r\') as f: for line in f: if
line.startswith(\'&\'): flag=True if flag: data.append(line) if
line.strip().endswith(\'#!?\'): flag=False print \'\'.join(data).
Please answer the following question and all its parts. Please exp.pdfFOREVERPRODUCTCHD
Please answer the following question and all it\'s parts. Please explain your answer as well!
Thank you in advance for your hardwork! 2) For a 7-way B-tree, answer the following questions
(1 point each) Assignment 4 Heap, Huffman Coding Tree, Multiway Trees Due Date: 9:30am,
Dec. 1 (Hard and E-copy) a) How many keys should each node be able to hold at maximum? b)
What is the minimum number of children an internal node, other than the root, have? c) What is
the maximum number of children can an internal node have?
Solution
In an n-way binary B-tree each node has n children and n-1 keys
each node other than root and leaf nodes have atmost m non empty children and atleast [m/2]
non empty children.
a) 6 keys should each node be able to hold at maximum
b) minimum 4 children can an internal node must have
c) maximum 7 children.
Please help, I cant figure out what I did wrong. Problem 11-2A (Pa.pdfFOREVERPRODUCTCHD
Please help, I can\'t figure out what I did wrong. Problem 11-2A (Part Level Submission) The
stockholders\' equity accounts of Cheyenne Corp. on January 1, 2017, were as follows. Preferred
Stock (7%, $100 par noncumulative, 4,400 shares authorized) Common Stock ($4 stated value,
310,000 shares authorized) Paid-in Capital in Excess of Par Value-Preferred Stock Paid-in
Capital in Excess of Stated Value-Common Stoclk Retained Earnings Treasury Stock (4,400
common shares) $264,000 1,033,33:3 13,200 496,000 683,500 35,200 During 2017, the
corporation had the following transactions and events pertaining to its stockholders equity Feb. 1
Issued 4,620 shares of common stock for $32,340 Mar 20 Purchased 1,250 additional shares of
common treasury stock at $8 per share Oct. 1 Declared a 7% cash dividend on preferred stock,
payable November 1 Nov. 1 Paid the dividend declared on October 1 Dec. Declared a $0.85 per
share cash dividend to common stockholders of record on December 15, payable December 31,
2017 Dec. 31 Determined that net income for the year was $278,200. Paid the dividend declared
on December 1
Solution
I have only corrected the journal entries marked in red
Calculation of cash dividends on Dec1:
No of common stock shares outstanding: (1033,333/4) + 4620 - 4400 - 1250 = 257303.25
<4620 is additional shares issued; 4400 is treasury stock; 1250 is additional treasury stock>
Cash dividend declared = 0.85 per share
Hence, total cash dividend = 257303.25 x 0.85 = $218708
Calculation of cash dividends on Dec 31:
Oct 1 cash dividend (as per journal entry): 18480
Dec 1 cash dividend (as per journal entry): 218708
Total cash dividend: 237188DateAccount titlesDebitCreditFeb
1Cash32340Common stock18480Paid-in Capital in excess of stated value-common
stock13860Dec 1Cash dividends218708Dividends payable218708Dec 31Retained
earnings237188Cash dividends237188Dec 31Dividends payable218708Cash218708.
In what ways do the experts foresee the use of both virtualization a.pdfFOREVERPRODUCTCHD
In what ways do the experts foresee the use of both virtualization and cloud computing evolving
in the future?
Solution
Use ofVirtualization and cloud computing security :
• Self-defending VM security
• Layered coordinated defenses
• Security optimized for virtual and cloud environments
• Visibility, reporting, and auditing
• Encryption for virtual and cloud environments
• Security that travels with data
Security solutions should offer both agent-less and agent-based security options to provide
flexible deployment alternatives and close security gaps unique to virtualized and cloud
environments.
Encryption addresses a range of security challenges related to virtualization and cloud
computing. Standard 128-, 192-, or 256-bit encryption of storage volumes deters hackers from
prying and thieving, and reduces the risk that the cloud storage devices could be sold or reused
while they still contain confidential or private information. Encryption also greatly reduces the
risk of malicious VM attacks; as long as the encryption key for the data stores have not been
provided, even if rogue VMs reach data stores, volumes are unmountable and unreadable.
Encryption with enterprise-controlled key management enables IT to comply with security best
practices, internal governance, and external regulation. Data is kept secure, and the key
management solution can provide monitoring, reporting, and auditing capabilities that provide
visibility into data access. As a result, enterprises realize a significant reduction in the scope of
compliance audits.
Encryption for virtual and cloud environments:
In summary, best practices for encryption for virtual and cloud data protection include: •
Integration with leading cloud service providers and virtual environments. • Policy-based key
management that determines where and when encrypted data can be accessed. • Identity-based
and integrity-based server validation to determine which servers can access secure storage
volumes and whether security is up-to-date on those servers prior to data access. • Business
control of encryption keys, either on-site or through a separate SaaS service, to maintain a strict
separation of duties between the business and cloud service provider..
In the Meselson Stahl experiment, E. coli was grown for many generati.pdfFOREVERPRODUCTCHD
In the Meselson Stahl experiment, E. coli was grown for many generations in a medium
\"heavy\" nitrogen^15 N. Once the bacterial DNA was uniformly labeled, the bacteria were
transferred to a medium containing the \"light\" nitrogen, ^14N. After ONE round of replication,
DNA was extracted and subjected to density gradient centrifugation in cesium chloride. Upon
inspection, there was only a single band of intermediate density DNA in the gradient. This
proved that DNA replication CANNOT be conservative dispersive semiconservative
conservative of dispersive continuous.
Solution
Answer is Dispersive replication.
Dispersive replication would result in double-stranded DNA with both strands having mixtures
of 15N and 14N DNA, either of which would have appeared as DNA of an intermediate density..
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Know the different types of viruses which have a dsRNA genome A type.pdf
1. Know the different types of viruses which have a dsRNA genome A type of infection caused by
bacteriophages which involves a transition from a lytic to a lysogenic stage. What is the defense
mechanism employed by the T4 phage to prevent excision of its DNA by restriction enzymes?
Know the viruses that use RNA/DNA genomes. Describe in general terms how bacteriophage
lambda regulates the switch between the lytic and lysogenic cycles. Proteins involved? What
factors may influence the transition from a lytic to lysogenic state in lambda phage? Describe in
general terms how bacteriophage lambda regulates the switch between the lytic and lysogenic
cycles. Other Proteins involved? Describe in general terms the strategy used by the ssDNA virus
phiX174 to synthesize its nucleic acids and proteins. Function of the replicative form? Know the
different viruses which have a ssDNA genome Outline the major events involved in plus-strand
RNA viruses and the specific mechanisms used to accomplish each step. Type of template used?
Describe in general terms the strategy used by minus and plus strand RNA viruses to synthesize
their nucleic acids and proteins. Propose how a retrovirus with a single RNA molecule as its
genome might generate multiple proteins from that molecule. Intermediate molecule? What are
cytokines? Roles in immunity? What is the alternate complement pathway? Roles? What are
the functions and locations (blood, tissue etc) of the different immune cells? Mechanisms
employed by the lungs to help protect it from infection What are dendritic cells? Roles they play
in the immune response? Specific vs non-specific Function of lysozyme? Know the different
body areas which act as physical barriers to infection. Know the different physical and
biological defense mechanisms? Examples?
Solution
As per the rule i have answered your first question:
Reoviridae: Reoviridae are currently classified into nine genera. The genomes of these viruses
consist of 10 to 12 segments of dsRNA, each generally encoding one protein. The mature virions
are non-enveloped. Their capsids, formed by multiple proteins, have icosahedral symmetry and
are arranged generally in concentric layers. A distinguishing feature of the dsRNA viruses,
irrespective of their family association, is their ability to carry out transcription of the dsRNA
segments, under appropriate conditions, within the capsid. In all these viruses, the enzymes
required for endogenous transcription are thus part of the virion structure.
Orthoreoviruses: The orthoreoviruses (reoviruses) are the prototypic members of the virus
Reoviridae family and representative of the turreted members, which comprise about half the
genera. Like other members of the family, the reoviruses are non-enveloped and characterized by
concentric capsid shells that encapsidate a segmented dsRNA genome. In particular, reovirus has
eight structural proteins and ten segments of dsRNA. A series of uncoating steps and
2. conformational changes accompany cell entry and replication. High-resolution structures are
known for almost all of the proteins of mammalian reovirus (MRV), which is the best-studied
genotype. Electron cryo-microscopy (cryoEM) and X-ray crystallography have provided a
wealth of structural information about two specific MRV strains, type 1 Lang (T1L) and type 3
Dearing (T3D).
Cypovirus: The cytoplasmic polyhedrosis viruses (CPVs) form the genus Cypovirus of the
family Reoviridae. CPVs are classified into 14 species based on the electrophoretic migration
profiles of their genome segments. Cypovirus has only a single capsid shell, which is similar to
the orthoreovirus inner core. CPV exhibits striking capsid stability and is fully capable of
endogenous RNA transcription and processing. The overall folds of CPV proteins are similar to
those of other reoviruses. However, CPV proteins have insertional domains and unique structures
that contribute to their extensive intermolecular interactions. The CPV turret protein contains
two methylase domains with a highly conserved helix-pair/-sheet/helix-pair sandwich fold but
lacks the -barrel flap present in orthoreovirus 2. The stacking of turret protein functional domains
and the presence of constrictions and A spikes along the mRNA release pathway indicate a
mechanism that uses pores and channels to regulate the highly coordinated steps of RNA
transcripti on, processing, and release.
Rotavirus: Rotavirus is the most common cause of acute gastroenteritis in infants and young
children worldwide. This virus contains a dsRNA genome and is a member of the Reoviridae
family. The genome of rotavirus consists of eleven segments of dsRNA. Each genome segment
codes for one protein with the exception of segment 11, which codes for two proteins. Among
the twelve proteins, six are structural and six are non-structural proteins. It is a double-stranded
RNA non-enveloped virus
Bluetongue virus: The members of genus Orbivirus within the Reoviridae family are arthropod
borne viruses and are responsible for high morbidity and mortality in ruminants. Bluetongue
virus (BTV) which causes disease in livestock (sheep, goat, cattle) has been in the forefront of
molecular studies for the last three decades and now represents the best understood orbivirus at
the molecular and structural levels. BTV, like other members of the family, is a complex non-
enveloped virus with seven structural proteins and a RNA genome consisting of 10 variously
sized dsRNA segments.
Phytoreoviruses: Phytoreoviruses are non-turreted reoviruses that are major agricultural
pathogens, particularly in Asia. One member of this family, Rice Dwarf Virus (RDV), has been
extensively studied by electron cryomicroscopy and x-ray crystallography. From these analyses,
atomic models of the capsid proteins and a plausible model for capsid assembly have been
derived. While the structural proteins of RDV share no sequence similarity to other proteins,
their folds and the overall capsid structure are similar to those of other Reoviridae.