Assume a cell with: [cl-]in = 10 mm; [cl-]out = 100 mm; 37 degrees c, and the cell membrane is permeable to cl- (pick the correct statement)

Answers

Answer 1

If a cell with: [Cl-]IN = 10 mM; [Cl-]OUT = 100 mM; 37 degrees C, and the cell membrane is permeable to Cl- , The Nernst potential for Cl- (ECl) would be -61 mV.

What is meant by the term Nernst potential?

In regards to a biological membrane, the term is known to be a kind of a reversal ability and that is why it is often called Nernst potential or equilibrium potential.

This is said to be the potential of an ion which is seen as the membrane potential that can be seen at the point where there is no net (total) flow of that specific ion from one side of a given membrane to the another side.

Based on the constant, If a cell with: [Cl-]IN = 10 mM; [Cl-]OUT = 100 mM; 37 degrees C, and the cell membrane is permeable to Cl- , The Nernst potential for Cl- (ECl) would be -61 mV.

Learn more about Nernst potential from

https://brainly.com/question/17215191
#SPJ1

See full question below

ASSUME a cell with: [Cl-]IN = 10 mM; [Cl-]OUT = 100 mM; 37 degrees C, and the cell membrane is permeable to Cl- (pick the correct statement):

The Nernst potential for Cl- (ECl) would be -61 mV.

The Nernst potential for Cl- (ECl) would be 61 mV.

If the cell becomes less permeable to Cl-, the Nernst potential for Cl- (ECl) would become less negative.

If the cell becomes impermeable to Cl-, the Nernst potential for Cl- (ECl) would become 0 mV.


Related Questions

What are two reasons to tie cables up and out of the way inside a computer case?

Answers

There are 4 reasons why we have to tie the cable and get out of the computer case. This reason is very important to take care of our computers, namely

It keeps the cable from blocking the moving partsIt stops the cable from moving, preventing a short circuit if the cable wears out.This keeps cables away from thermal hotspots such as CPU or GPU heatsinks, which can reach very high temperatures, making cable insulation brittleIt keeps cables from blocking airflow, which is necessary to reach the heatsink and hard drive.

Hardware is best defined as any physical component of a computer system that contains circuit boards, ICs, or other electronics. An example of hardware is the screen on which you are viewing this page. Whether it's a monitor, tablet or smartphone, it's hardware.

Hardware is also a very important component, without any hardware, a computer would not exist, and software would be unusable. Images such as the computer screen are examples of external hardware. This hardware allows users to take videos or pictures, and send them over the Internet.

You can learn more about Hardware here https://brainly.com/question/15232088

#SPJ4

The president of darts is convinced that the processor on his windows vista system is overloaded. how can you help him determine if there is a problem with the processor?

Answers

To determine if there is a problem with a processor that seems to be overloaded, the best step to take is to Open the Task Manager and view the running processes and end the ones that are overclocking the processor.

What is a Processor?

This refers to the heart and mind of a computer that executes tasks and commands.

Hence, we can see that To determine if there is a problem with a processor that seems to be overloaded, the best step to take is to Open the Task Manager and view the running processes and end the ones that are overclocking the processor.

Read more about processors here:

https://brainly.com/question/614196

#SPJ1

The ability to present an effective message with useful content is obviously important to a good _____ presentation.

Answers

A successful oral presentation depends on your ability to communicate your ideas clearly and with relevant content.

What is an oral expression? Oral presentations, often known as public speaking or just presentations, involve one or more speakers discussing a particular topic with an audience.This seeks to provide information, amuse, educate, and/or make a point.When the author speaks in front of other students, coworkers, or other interested groups to convey the results of years of expertise and research while outlining essential elements to success, the book is referred to as an example of oral presentation.An oral presentation is one of the best venues for fusing verbal prowess with powerful nonverbal indicators to extend your communication.It enables people to speak in front of a live audience with assurance about their thoughts and opinions.

To learn more about Oral presentation, refer to:

https://brainly.com/question/27326303

#SPJ4

Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.

Answers

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

What are DFS and BFS?

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

https://brainly.com/question/13014003

#SPJ4

When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out onto other wires.

Answers

Answer:

crosstalk

Explanation:

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?.

Answers

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

What is a spreadsheet application?

A spreadsheet application can be defined as a type of software program which is typically designed and develop with cells that are arranged in a tabulated format in rows and columns, so as to do the following on a data set:

GenerateSortCalculateFormatArrange

What is the What-if analysis?

The What-if analysis can be defined as a feature of Microsoft Excel and it can be defined as a process that is designed and developed for changing the values in cells, so as to see how these changes will affect the outcome of Excel formulas on the spreadsheet.

Read more on What-if analysis here: https://brainly.com/question/24843744

#SPJ1

Question 1 of 10
Which statement best describes database support personnel?
A. They must be proficient in multiple computer languages.
B. They must understand how microprocessors work.
C. They must have knowledge of network security.
D. They must have excellent organizational skills.
SUBMIT

Answers

The statement that best describes database support personnel is as follows:

They must be proficient in multiple computer languages.

Thus, the correct option for this question is A.

What is database support personnel?

Database support personnel may be characterized as a type of database assistant that significantly delivers database along with record-keeping support. They also perform numerous administrative responsibilities in multiple fields like business, academics, institutions, organizations, etc.

According to the context of this question, database support personnel may have a variety of uses in multiple sectors. So, they have the efficiency to control all sorts of administrative responsibilities because they must be proficient in multiple computer languages.

Therefore, the correct option for this question is A.

To learn more about Database support, refer to the link:

https://brainly.com/question/24594493

#SPJ1

Universal containers (uc) is concerned that data is being corrupted daily either through negligence or maliciousness. they want to implement a backup strategy to help recover any corrupted data or data mistakenly changed or even deleted. what should the data architect consider when designing a field -level audit and recovery plan?

a. reduce data storage by purging old data.
b. implement an appexchange package.
c. review projected data storage needs.
d. schedule a weekly export file.

Answers

The thing that the data architect need to consider when designing a field -level audit and recovery plan is option a. reduce data storage by purging old data.

What is a data architect?

Data architects are known to be people who are said to be IT professionals.

They are known to be people who leverage their computer science and design skills to be able to examine and analyze the data infrastructure of any kind of organization.

They are able to plan future databases, as well as implement solutions to save and handle data for firms and their users.

Therefore, based on the above, one can say that the thing that the data architect need to consider when designing a field -level audit and recovery plan is option a. reduce data storage by purging old data.

Learn more about data architect from

https://brainly.com/question/25385643

#SPJ1

System software is usually divided into two categories: operating systems and ____ programs.

Answers

Answer:

Utility

Explanation:

which of the data roles is responsible for extracting, integrating, and organizing data into data repositories?

Answers

The data engineer is responsible for collecting data through data pipelines, cleaning and transforming the data, and aggregating the data into a database or data source. They must also deliver the data back to the stakeholders. A successful data engineer must determine which tools and programs are best for their data environment.

What is normally disabled by default on most Linux servers?
O TUI
O laas
O GUI
O Embedded Linux

Answers

The Option that is normally disabled by default on most Linux servers is GUI.

Is Linux an embedded OS?

Embedded Linux is known to be a kind of Linux operating system as well as a kernel that is set up to be place or installed and known to be used inside embedded devices as well as other appliances.

It is seen as a kind of compact type of Linux that gives features and services in line with the operating system.

Therefore, The one that is normally disabled by default on most Linux servers is GUI.

Learn more about GUI from

https://brainly.com/question/3692609

#SPJ1

Write getfirstroot and getsecondroot to return the first and second roots. return a domain_error is there is no first or second root. constant functions

Answers

The square root is represented by the symbol "." The symbol is also known as a radical, and the radicand is the number it designates. Say the radicand in the number 3 is.

The "square root" is the common name for the second root. Typically, the third root of a number is referred to as the "cube root." Thereafter, the roots are referred to as the nth root, for instance, the 5th root, the 7th root, etc.

What is square root?In mathematics, the square root of a number is a factor that, when multiplied by itself, yields the original value. The Babylonians developed efficient techniques for calculating square roots as early as the second millennium bc. The radical symbol for the number's root is shown here. The square of the positive number is represented by multiplying it by itself. The original number is obtained by taking the square root of the square of a positive number. For instance, 3 squared equals 9, 32 squared equals 9, and 9 squared divided by 9 equals 3.

To learn more about  square root, refer to:

https://brainly.com/question/620307

#SPJ4

Inserting an item at the end of a 999-item array requires how many items to be shifted?

Answers

0 things need to be moved. A new item is simply added to the end of the array when it is appended. Existing objects don't need to be moved.

What is an array?

A number of components are organized into an array data structure, sometimes referred to as an array, which is a form of data structure used in computer science. Each component is identified by a distinct array index or key.

A mathematical formula may identify the position of each element in an array given its index tuple. An array is a collection of elements with the same type that are kept in close proximity to one another in memory and may be individually referred to using an index to a unique identifier. Declaring an array of five int values eliminates the need to declare five different variables (each with its own identifier).

To learn more about array, refer to:

https://brainly.com/question/24275089

#SPJ4

Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?

Answers

Younger inexperienced hackers refer to as script kiddies.

What adjective best describes the network effect?

Answers

The adjective best describes the network effect is Exponential.

Are network effects exponential?

If the marketplaces is known to have gotten to the point where it has reach a critical inflection point, network effects is known to often  kick in and growth is said to be in an exponential manner.

Note that These network effects also make a kind of barriers to entry: if a lot of buyers and sellers are inside a marketplace, it becomes quite complex for a rival to lure them away.

The network effect is seen as any scenario in which the value of a product are known to be based  on the number of buyers, sellers, and others.

Therefore, The adjective best describes the network effect is Exponential.

Learn more about network effect from

https://brainly.com/question/28384804
#SPJ1

You can select individual files within a folder to zip only those files into a compressed archive. True or false

Answers

You can select individual files within a folder to zip only those files into a compressed archive: True.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest include the following:

Text (.txt)Picture (.jpeg)Audio (.mp3)Video (.mp4)Compressed files (.zip)

Generally speaking, an end user can select several individual files located within a folder and then zip only those files into a compressed archive.

Read more on zip file extensions here: https://brainly.com/question/11269527

#SPJ1

While verifying windows settings, you discover defragmenting is turned off for the hard drive. what do you do next?

Answers

While verifying windows settings, you discover defragmenting is turned off for the hard drive. The thing to do next is to Check the type of hard drive installed.

Does Windows automatically defrag SSD?

Windows Settings is known to be an aspect or a component of Microsoft Windows.

Note that it is one that gives room for It users to be able to make some changes to their  preferences, configure their operating system, and others.

Note that windows can defragment SSD and the use of Windows versions, such as Windows 10 gives its built-in disk defraggler and with which anyone can be able to preset defrag frequency.

Therefore, While verifying windows settings, you discover defragmenting is turned off for the hard drive. The thing to do next is to Check the type of hard drive installed.

Learn more about windows settings from

https://brainly.com/question/10983800

#SPJ1

While verifying Windows settings, you discover defragmenting is turned off for the hard drive. What do you do next?

Immediately defrag the drive.

Turn on defragmenting.

Analyze the drive for errors.

Check the type of hard drive installed.

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

What is Unicode?

Unicode is known to be a kind of a modern standard that has been laid out from  text depiction that tells each of the letters as well as the symbols commonly used in the digital and print media.

Note that Unicode has been seen at the top as a good standard for identifying characters in any kind of  text in almost any language.

Therefore, The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

Learn more about coding   from

https://brainly.com/question/22654163

#SPJ1

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

What word is used today to refer to network-connected hardware devices?
a. client
b. endpoint
c. device
d. host

Answers

endpoint is the word used today to refer to network-connected hardware devices.

An endpoint is a network-connected hardware device, such as a computer, printer or smartphone. Today, the term endpoint is used to refer to any device that can be connected to a network.

Endpoints are important because they are the devices that users interact with when they access a network. For example, when you log into a website, you are using an endpoint (your computer) to connect to a server.

Endpoints can be either physical or virtual. Physical endpoints are actual hardware devices, while virtual endpoints are software-based and run on top of physical hardware.

Most endpoint security solutions focus on physical devices, but as more and more devices become virtual, it's important to consider security for both physical and virtual endpoints.

Learn more on endpoints here:

https://brainly.com/question/28221902

#SPJ4

Why would a company want to utilize a wildcard certificate for their servers? to increase the certificate's encryption key length to reduce the certificate management burden to secure the certificate's private key to extend the renewal date of the certificate see all questions back next question

Answers

a company would want to utilize a wildcard certificate for their servers to reduce the certificate management burden.

In this case, you're not dealing with multiple installations, various renewal dates, and ongoing certificate additions as your business expands. You only have control over one certificate. Simple!

Similar to how Wildcards are more affordable than securing each sub-domain separately, they are also significantly simpler from a technical and administrative perspective to safeguard your online footprint.

Follow the link below to see other measures for securing a server

https://brainly.com/question/27807243

#SPJ4

Click the _______________________________ button in the css designer panel to create a new css files, or define an existing external css file that should be used for the active page.

Answers

Click the Attach Style Sheet button in the css designer panel to create a new css files, or define an existing external css file that should be used for the active page.

The tag located inside the head element is used by external stylesheets. The link's relationship to our document is explained via the rel property. The value in this case will always be stylesheet , since that is what we're making a link to. The link to our stylesheet is in the href attribute.

There are three techniques to include CSS in HTML documents: Using the style attribute inside HTML elements is known as "inline." Utilizing a "style" element in the "head" section is one internal method. External – by linking to an external CSS file using the link> element.

For HTML publications that have different style requirements from the other documents in your project, embedded style sheets are especially helpful. However, you should link to an external style sheet rather than using distinct embedded style sheets if the styles need to be applied to several publications.

Learn more about panel:

https://brainly.com/question/26715294

#SPJ4

Combining the power of a desktop with a neat, clean, look ____ computers are popular with businesses. their lack of expandability make them less popular with serious gamers though.

Answers

Combining the power of a desktop with a neat, clean, look all in one computers are popular with businesses. their lack of expandability make them less popular with serious gamers though.

What does all-in-one mean computer?

The term known as all-in-one (is known to be often referred to as AiO) computer.

It is known to be seen as a kind of a  common place in regards to modern workspaces and it is seen as a type of computer that have all of the desktop parts in a single enclosed unit, instead of having different computer parts from the display monitor.

Therefore, Combining the power of a desktop with a neat, clean, look all in one computers are popular with businesses. their lack of expandability make them less popular with serious gamers though.

Learn more about all in one computers from

https://brainly.com/question/28458687

#SPJ1

Select all of the TRUE statements about files.
Group of answer choices

Resolution refers to the sharpness and clarity of an image.

A higher resolution will always make an image appear better on a screen.

Images that will be printed require a larger resolution than those that will be presented on a computer monitor.

Optimized files will load slowly and take up large storage space.

Images that will be printed should have a resolution of 150 dpi to 300 dpi.

Answers

The true statements about files include the following:

Resolution refers to the sharpness and clarity of an image.A higher resolution will always make an image appear better on a screen.Images that will be printed should have a resolution of 150 dpi to 300 dpi.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

Note: dpi is an abbreviation for dots per inch.

Read more on resolution here: brainly.com/question/28182244

#SPJ1

In bronfenbrenner's bioecological model of development, which system reflects the dynamic qualities of the other systems?

Answers

In bronfenbrenner's bioecological model of development, then environment  system reflects the dynamic qualities of the other systems.

What is Bronfenbrenner's bioecological model of development?

The bioecological theory of development was known to be a theory that was said to have been set by Urie Bronfenbrenner.

It is one that states that human development is a kind of a transactional process where an individual's development is said to be affected by his or her interactions with a lot of areas and spheres of their environment.

Therefore, In bronfenbrenner's bioecological model of development, then environment  system reflects the dynamic qualities of the other systems.

Learn more about  bronfenbrenner's bioecological model  from

https://brainly.com/question/13212498

#SPJ1

When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?

Answers

When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor. Technicians must recover 80% of the nameplate charge.

Compressor is a mechanical device used in many industries which has the function of increasing gas pressure by reducing its volume. The air compressor is a specific type of gas compressor.

Compressors can be characterized in a number of different ways, but are usually divided into types based on the functional method used to produce compressed air or gas. The following are common compressor types. Types covered include:

PistonsDiaphragmHelical ScrewSlide propellerScrollingRotary LobeCentrifugalAxial

How to use an air compressor

Position the Air CompressorCheck the Oil LevelCheck the Drain ValveSet the PSIPrepare the Air TankConnect the Air HoseConnect the Desired ToolRemove Excess Moisture

You can learn more about compressor here https://brainly.com/question/26581412

#SPJ4

Which of these is system software? check all that apply.1 point
a. cpu
a. windows
b. ostext
d editor
e. bios

Answers

System software includes BIOS and Windows OS. Operating systems like macOS, Linux, Android, and Microsoft Windows are examples of system software.

What is system software?

Programs that serve as a foundation for other programmes are referred to as system software. Operating systems including Microsoft Windows, Linux, Android, and macOS are examples of system software. Additional examples include applications for software as a service, game engines, search engines, industrial automation, and software for computational science.

A subset of computer programmes called "system software" is intended to run a computer's hardware and application software. The system software, if we consider the computer system as a layered model, serves as the interface between the hardware and user applications. The most well-known example of system software is the operating system.

Hence, System software consists of Windows OS and BIOS.

To learn more about system software, refer to:

https://brainly.com/question/24321656

#SPJ4

Write an if/else statement that assigns true to fever if temperature is greater than 98.6; otherwise it assigns false to fever.

Answers

The question requires to write an if/else statement that checks the value of variable temperature and based on this value, true or false to the variable fever.

The given conditions in this question are evaluated as:

If value of the variable temperature is greater than 98.6 18, true is assigned to variable fever. Otherwise, for all the values less than 98.6, false is assigned to variable fever.

Now, the above statements are converted in if-else statement using C++ programming language.

if (temperature > 98.6) /* checks the value of the variable temperature, if the condition in “if” is true then control goes to its body*/

              fever = true; /*assigns true to the variable fever*/

else   /*runs only when condition given in  “if” is false*/

              fever = false;  /*it assigns false to the variable fever*/

You can learn more about if/else statements at

https://brainly.com/question/28430850

#SPJ4

Three of the data bases your textbook includes for scholarly articles and books are?

Answers

Three of the data bases your textbook includes for scholarly articles and books are:

ScienceDirect. Directory of Open Access Journals (DOAJ) JSTOR.

What is a scholarly article example?

The term Scholarly articles are known to be short books that are said to be  published in any kind of scholarly journals.

Note that a lot of these journals are said to be based by discipline. For example if a person study agriculture,  you might want to look in the Journal of agricultural science.

Therefore,  Three of the data bases your textbook includes for scholarly articles and books are:

ScienceDirect. Directory of Open Access Journals (DOAJ) JSTOR.

Learn more about scholarly articles from

https://brainly.com/question/18754197

#SPJ1

From a technical point of view, online databases that are used with web browsers are different from other databases. True or false?.

Answers

False, From a technical point of view, online databases that are used with web browsers are different from other databases.

From a technical point of view, online databases that are used with web browsers are not different from other databases. They are simply databases that are accessed via the internet. However, there are some key differences that make them more suitable for use with web applications.

Online databases are designed to be accessed by multiple users simultaneously. This means that they are generally more scalable than other types of databases. They can also be designed to be more secure, with greater control over who can access and modify data.

Another key difference is that online databases are usually designed to be used with web-based applications. This means that they need to be able to integrate with other web-based technologies, such as server-side scripting languages and web services.

Learn more on online databases here:

https://brainly.com/question/2124494

#SPJ4

Other Questions
The health care provider writes an order for a culture specimen to be collected from a patient with a dog bite wound. what would the nurse do first? Felipe y Jos van de compras porque los dos quieren comprar zapatos. Solve for x when g=x-c/x According to schwartz, _____ create resonance between a message's content and a person's thoughts or feelings, which leads to persuasion. Lucys chocolate bar is 54% cocoa. If the weight of the chocolate bar is 54 grams, how many grams of cocoa does it contain? Round the answer to the nearest tenth A boat travels upstream the Missouri River for 3.5 hours. The return trip takes only 2.5 hours because the boat travel 2 miles per hour faster downstream due to the current. How far does the boat travel downstream? PLEASE HELP PLSPLSPLSPLS Twin oaks uses ________ to communicate to customers the value of the brands it represents because it believes it to be the most important type of marketing. Servant leadership, spiritual leadership, and lmx theory all belong to the relational approach to leadership. true false Pls Help me please!! Although community composition changes during succession, diversity rarely changes. true false Find the next three terms in each sequence What is the significance of the LouisianaPurchase? three Indus Valley civilizations. How were they similar and different? According to the revenue recognition principle, revenue is to be recognized when:____. This pair of molecules are _____. Two ball-and-stick models of molecules. The first molecule consists of five black balls, which form a cyclical structure. Each black ball has two white balls attached. The second molecule has a chain of five black balls connected successively. Each of the two black balls, which are at the ends of the chain, has three white balls attached. Each of the three other black balls has two white balls attached. write a sentence that applies the comma rule about cities and their states What is the scale factor?Answer Choices421.251.4 On a map once 1 cm = 22 miles, find the actual distance between two towns a & b which is 4.7 cm on the map If the wavelength of the photon of light absorbed by a hydrogen atom has a value of 1.0952 x 10-6 m, and the electron starts at level n = 3, what is the level (n) of the final state of the electron? does pie ever end?the question is the 3.14 i know the answer i just want to see if you get it right