F. Supererogatory actions are optional actions where one pays more than what is required, not actions that a person must engage in. They are nonobligatory actions done according to one's wish beyond what is demanded or required.
Complete the implementation of the Weighted Graph that we began in t.pdfmarketing413921
Complete the implementation of the Weighted Graph that we began in this chapter by provide
bodies for the methods isEmpty, isFull, hasVertex, clearMarks, markVertex, isMarked, and
getUnmarked in the WeightedGraph.java file. Test the completed implementation using the
UseGraph class. When implementing hasVertex, dont forget to use the equals mehtod to
compare vertices. Java Code.
// Incomplete version
//----------------------------------------------------------------------------
// WeightedGraph.java by Dale/Joyce/Weems Chapter 9
//
// Implements a directed graph with weighted edges.
// Vertices are objects of class T and can be marked as having been visited.
// Edge weights are integers.
// Equivalence of vertices is determined by the vertices\' equals method.
//
// General precondition: Except for the addVertex and hasVertex methods,
// any vertex passed as an argument to a method is in this graph.
//----------------------------------------------------------------------------
package ch09.graphs;
import ch05.queues.*;
public class WeightedGraph implements WeightedGraphInterface
{
public static final int NULL_EDGE = 0;
private static final int DEFCAP = 50; // default capacity
private int numVertices;
private int maxVertices;
private T[] vertices;
private int[][] edges;
private boolean[] marks; // marks[i] is mark for vertices[i]
public WeightedGraph()
// Instantiates a graph with capacity DEFCAP vertices.
{
numVertices = 0;
maxVertices = DEFCAP;
vertices = (T[]) new Object[DEFCAP];
marks = new boolean[DEFCAP];
edges = new int[DEFCAP][DEFCAP];
}
public WeightedGraph(int maxV)
// Instantiates a graph with capacity maxV.
{
numVertices = 0;
maxVertices = maxV;
vertices = (T[]) new Object[maxV];
marks = new boolean[maxV];
edges = new int[maxV][maxV];
}
public boolean isEmpty()
// Returns true if this graph is empty; otherwise, returns false.
{
}
public boolean isFull()
// Returns true if this graph is full; otherwise, returns false.
{
}
public void addVertex(T vertex)
// Preconditions: This graph is not full.
// Vertex is not already in this graph.
// Vertex is not null.
//
// Adds vertex to this graph.
{
vertices[numVertices] = vertex;
for (int index = 0; index < numVertices; index++)
{
edges[numVertices][index] = NULL_EDGE;
edges[index][numVertices] = NULL_EDGE;
}
numVertices++;
}
public boolean hasVertex(T vertex)
// Returns true if this graph contains vertex; otherwise, returns false.
{
}
private int indexIs(T vertex)
// Returns the index of vertex in vertices.
{
int index = 0;
while (!vertex.equals(vertices[index]))
index++;
return index;
}
public void addEdge(T fromVertex, T toVertex, int weight)
// Adds an edge with the specified weight from fromVertex to toVertex.
{
int row;
int column;
row = indexIs(fromVertex);
column = indexIs(toVertex);
edges[row][column] = weight;
}
public int weightIs(T fromVertex, T toVertex)
// If edge from fromVertex to toVertex exists, returns the weight of edge;
// otherwise, returns a special “null-edge” value..
Can someone help me please I need help writing this code using Java.pdfmarketing413921
Can someone help me please? I need help writing this code using Java language. Step 1 The
Char Type Create a complex type called Char that models the primitive type char. In your class
you are going to want to have the following constructors: Java Description Charo Char0 Default
constructor that sets the data section of the class to null (binary 0) overloaded constructor that
takes a primitive char as an argument. It should set the data Char (char c) Char(char c) section of
the class to the argument. overloaded constructor that takes a primitive int as a parameter. The
data section of the Char(int co Char(int c) class should be set as a character from the argument.
Chan(const Char(inal Overloaded constructor that takes the complex Char type as a parameter,
The data section Char &c;) Char c) of the class should be set with the data section of the
argument Char(string Char (String overloaded Constructor that takes a string type as a parameter.
The data section of the class should be set to the first character in the string. Your class should
have the following mutators
Solution
Contains:
1. Custom classes - Char.java and BigDecimal.java
2. Exception classes - CharException.java and BigDecimalException.java
3. Test Classes - CharTest.java and BigDecimalTest.java
Char.java
**
* Custom Char class
* @author Anonymous
*
*/
public class Char {
private char value;
public Char(){
this.value = \'\\0\';
}
public Char(char c){
this.value = c;
}
public Char(int c){
this.value = (char)c;
}
public Char(final Char c){
this.value = c.getValue();
}
public Char(String s){
this.value = s.charAt(0);
}
public char getValue(){
return this.value;
}
public void equals(final Char c){
this.value = c.getValue();
}
public void equals(char c){
this.value = c;
}
public void equals(int c) throws CharException{
if(c<32 || c>127)
throw new CharException(\"Invalid Character\");
this.value = (char) c;
}
public char toChar(){
return this.value;
}
public int toInt(){
return (int)this.value;
}
public String toString(){
return String.valueOf(this.value);
}
/**
* To convert char to Hex string
* @return
*/
public String toHexString(){
return String.format(\"%04x\", (int)this.value);
}
public String add(char c){
return toString().concat(String.valueOf(c));
}
public String add(Char c){
return toString().concat(String.valueOf(c.getValue()));
}
}
BigDecimal.java
import java.util.ArrayList;
import java.util.List;
/**
* Custom BigDecimal class
* @author Anonymous
*
*/
public class BigDecimal {
List list;
/**
* Overloaded Constructors
*/
public BigDecimal(){
list = new ArrayList();
list.add(new Char(\'0\'));
list.add(new Char(\'.\'));
list.add(new Char(\'0\'));
}
public BigDecimal(String value) throws BigDecimalException{
list = new ArrayList();
//For numbers like .99
if(value.startsWith(\".\")){
list.add(new Char(\'0\'));
}
validateString(value);
for(int i=0;i();
List valList = value.getValue();
for(int i=0;i getValue(){
return this.list;
}
/**
* Add Method
* @param other
* @return
* @throw.
C++ in XcodePass the values by reference to complete the programmi.pdfmarketing413921
C++ in Xcode
Pass the values by reference to complete the programming tasks.
Using multiple functions and receiving user input.
In your main function use a switch case to create a menu for the user.
Create a program that converts user input in Dollars to Euro, Yen, or Peso.
Prompt the user to enter $ amount.
If user input is less than or equal to zero prompt the user and stop the program.
Create 4 Functions:
1) Converts and outputs conversion in Yen
2) Converts and outputs conversion in Euro
3) Converts and outputs conversion in Peso
4) Converts and outputs all 3 currencies.
Update the program to accept user input for dollar amount to be converted.
Attach Snipping photos of all 4 methods being executed.
(Place snipping photo below.)
Solution
#include
using namespace std;
void convertToYen(int n)
{
cout<<\"The amount in yen is \"<>op;
if(op>4)
{
cout<<\"Invalid option.\"<>n;
if(op==1)
{
convertToYen(n);
}
else if(op==2)
{
convertToEuro(n);
}
else if(op==3)
{
convertToPeso(n);
}
else
{
convertToAll(n);
}
}
return 0;
}.
Assume an infix expression can only contain five operators, + .pdfmarketing413921
Assume an infix expression can only contain five operators, * / % + -, left and right parenthesis,
and variables or numbers (can be negative). Operators and operands are separated by white
spaces, and there is no space between negative sign and its following operand. Implement this
java method, public static String infixToPostFix(String infixExp), using the following algorithm:
Use a stack to store operators. If an item is popped from the stack, it will be appended to the
output if it is not a parenthesis. When an operand is read, append it to the output When a right
parenthesis is read, pop entries from the stack until a (corresponding) left parenthesis is reached,
which is then popped but not appended to the output. If any other symbol is read, pop entries
from the stack until an entry of lower priority is reached, then the new operator is pushed on the
to stack. Left parenthesis has the highest priority. If it is the end of input, pop entries from the
stack until it is empty.
Solution
// Program to convert infix expression to postfix expression
import java.io.IOException; // imporing ioexception pacakeage
public class infixtopostfix { // main class
// variable declarations
private Stack St; // stack varibale
private String infix; // i/p string
private String postfix = \"\"; // o/p variable, initially empty
public infixtopostfix(String in) { // constructor
infix = in; // initalising i/p with the value passed through in variable
int insize = infix.length(); // finding its length and storing in insize variable
St = new Stack(insize); // creating object for stack, st with size of the i/p expression lenghth
}
public String infixToPostFix(String infixExp) { // method for converting infix to postfix
for (int j = 0; j < infixExp.length(); j++) { // reading each character in the expression
char ch = infixExp.charAt(j); // stroing every time in variable ch
switch (ch) { // checking weather it is operand, operator or paranthesis
case \'+\': // if it is + or -
case \'-\':
Operpre(ch, 1); // assinging it preference as 1 and calling Operpre function passing the character
and its preference
break;
case \'*\':
case \'/\':
Operpre(ch, 2); // if * or / assigning its preference as 2 and calling Operpre function passing the
character and its preference
break;
case \'(\':
St.push(ch); // if it is open parenthesis push it into stack
break;
case \')\':
Parenpar(); // if it is closed parenthesis call function Prenpar to pop untill open parenthesis
break;
default:
postfix = postfix + ch; // or if it is operand add to output
break;
}
}
while (!St.isEmpty()) { // after reading all the characters in input pop all elements and add to
stack untill stack becomes empty
postfix = postfix + St.pop();
}
return postfix; // return that postfix expression
}
public void Operpre(char currop, int prec1) { // function to push operators into stack with
arguments currop (current operator) and prec1 (its precedence)
while (!St.isEmpty()) { // untill stack is empty
char top = St.pop().
appropriate nursing interventions/management -COPD -Crackles, wheezing, stridor
Solution
COPD.Chronic obstructive pulmonary disease .there are so many reasons to develop copd like
,SMOKING .ASTHMA.And some genetic reasons also.copd is managed majorlly by two drugs
like corticosteriods and beta2 antagonist.these steriods reduceses the inflammanation in air
ways.some other drugs like prednisolone ,mometasone.and others.
CRACKLES.This is an abnormal condation in this condation patient suffers from severe caugh
with mucas.there are several reasons for this condation one of them is flu
viruses.pneumonia.MANAGEMENT..steriods to reduce the inflammanation.and some
bronchodilators these compounds increases the air flow in bronchioles by dialating the
bronchioles.
WHEEZING.This is aiso an abnormal condation in this condation patient makes a whistling like
sounds while he is breathing.there are so many reasons for this condation like
asthma,copd,inflammanation in air ways ,fever,and ect......,
MANAGEMENT.Wheezing is mainly managed by bronchodilators to dialate the air ways.and
with corticosteroids to reduce the inflamanation in air ways.oxygen treatment.some times
combination of corticosteriods and bronchodilators are also used.
STRIDOR. This is also an abnormal condation in which patient makes wheezing sound whith
high pitch.this condation is also due to the abnormal airflow .this distrubance in air flow is
caused by the so many reasons most of them are i have already explained above.
MANAGEMENT. This condation is also due to the blokage of air flow .this condation is
managed my the use of corticosteriods and bronchodilators.
These all abnormal condations are related because they are due to the one reasons that is blockeg
of air ways so the treatment is mostly same .treatment depends upon the reason that is causing
the blokage of the air ways , like asthma, inflammanation,pneumonia,bronchitis,.
Arrange the following event in chronological order. The Roman Republi.pdfmarketing413921
Arrange the following event in chronological order. The Roman Republic was founded. The
Egyptians began using hieroglyphic numerals. Rome fell to Odoacer, ending the Roman Empire.
The Babylonians began using cuneiform numerals. Columbus discovered America. The first
universities were- established in Europe. Alexander the Great conquest much of the Near East
Charlemagne ruled the Frankish Empire in Europe. The first European printing press was
develop The Arabs formed the Hindu-Arabic numeration system.
Solution
Chronological order will be as follows:
b). The Egyptians began using hieroglyphic numerals.
d). The Babylonians began using cuneiform numerals.
a). The Roman Republic was founded.
c). Rome fell to Odoacer, ending the Roman Empire.
g). Alexander the Great conquered much of the Near East.
j). The Arabs formed the Hindu-Arabic numeration system.
h). Charlemagne ruled the Frankish Empire in Europe.
f). The first universities were established in Europe.
i). The first European printing press was developed.
e). Columbus discovered America.
Why do we need internal control in an organization What is its purp.pdfmarketing413921
Why do we need internal control in an organization? What is its purpose, and what are its
objectives (not components)? Can you explain with examples?
Solution
INTERNAL CONTROL - The process designed, implemented and maintained by those charged
with governance, management and other personnel to provide reasonable assurance about the
achievement of an entity’s
objectives with regard to reliability of financial reporting,
effectiveness and efficiency of operations, safeguarding of assets, and compliance with
applicable laws and regulations. The term \"controls\" refers to any aspects of one or more of the
components of the internal control
WE NEED INTERNAL CONTROL SYSTEM IN THE ORGANISATION TO REDUCE THE
RISK OF FRAUD AND ERRORS
MAIN OBJECTIVES OF THE INTERNAL CONTROL SYSTEM IN THE ORGANISATION
ARE
Aims of Internal Control in relation to Financial and Accounting Aspects: Internal
controls relating to financial and accounting aspects are concerned with achieving the
following objectives -
(1) transactions are executed in accordance with management’s general or specific authorisation;
(2) all transactions and other events are promptly recorded in the correct amount, in the
appropriate accounts and in the proper accounting period so as to permit preparation of
financial statements in accordance with the applicable accounting standards, other recognised
accounting policies and practices and relevant statutory requirements, if any,
and to maintain accountability for assets;
(3) assets and records are safeguarded from unauthorised access, use or disposition; and
(4) the recorded assets are compared with the existing assets at reasonable intervals and
appropriate action is taken with regard to any differences.
For example : an auditor may perform a \"walk-through\" test that is, tracing a few transactions
through the accounting system. When the transactions selected are typical of those
transactions that pass through the system, this procedure may be treated as part of the tests of
control. The nature and extent of walk through tests performed by the auditor are such that they
alone would not provide sufficient appropriate audit evidence to support a control risk
assessment which is less than high.
Thank you hope this usefull.
Why Diamond and semiconductor material like Silicon are used in elect.pdfmarketing413921
Why Diamond and semiconductor material like Silicon are used in electronic industry as heat
sink. What make them so special?
Solution
In electronic industry diamond is used as heat sink material, due to its high thermal conductivity
of 2000 W/mK.
Heat is conducted by lattice vibrations in diamond,which provides very high thermal
conductivity.
In electronic industry, silicon is widely used as material for thermal grease, due to its high
electrically insulating property but thermally conductive in nature.It acts as heat transfer medium
from component to heat sink. Silicon also provides excellent protection against moisture.
Silicon is non-setting in nature, it facilitates easy replacement of component, without damaging
component and heat sink..
Complete the implementation of the Weighted Graph that we began in t.pdfmarketing413921
Complete the implementation of the Weighted Graph that we began in this chapter by provide
bodies for the methods isEmpty, isFull, hasVertex, clearMarks, markVertex, isMarked, and
getUnmarked in the WeightedGraph.java file. Test the completed implementation using the
UseGraph class. When implementing hasVertex, dont forget to use the equals mehtod to
compare vertices. Java Code.
// Incomplete version
//----------------------------------------------------------------------------
// WeightedGraph.java by Dale/Joyce/Weems Chapter 9
//
// Implements a directed graph with weighted edges.
// Vertices are objects of class T and can be marked as having been visited.
// Edge weights are integers.
// Equivalence of vertices is determined by the vertices\' equals method.
//
// General precondition: Except for the addVertex and hasVertex methods,
// any vertex passed as an argument to a method is in this graph.
//----------------------------------------------------------------------------
package ch09.graphs;
import ch05.queues.*;
public class WeightedGraph implements WeightedGraphInterface
{
public static final int NULL_EDGE = 0;
private static final int DEFCAP = 50; // default capacity
private int numVertices;
private int maxVertices;
private T[] vertices;
private int[][] edges;
private boolean[] marks; // marks[i] is mark for vertices[i]
public WeightedGraph()
// Instantiates a graph with capacity DEFCAP vertices.
{
numVertices = 0;
maxVertices = DEFCAP;
vertices = (T[]) new Object[DEFCAP];
marks = new boolean[DEFCAP];
edges = new int[DEFCAP][DEFCAP];
}
public WeightedGraph(int maxV)
// Instantiates a graph with capacity maxV.
{
numVertices = 0;
maxVertices = maxV;
vertices = (T[]) new Object[maxV];
marks = new boolean[maxV];
edges = new int[maxV][maxV];
}
public boolean isEmpty()
// Returns true if this graph is empty; otherwise, returns false.
{
}
public boolean isFull()
// Returns true if this graph is full; otherwise, returns false.
{
}
public void addVertex(T vertex)
// Preconditions: This graph is not full.
// Vertex is not already in this graph.
// Vertex is not null.
//
// Adds vertex to this graph.
{
vertices[numVertices] = vertex;
for (int index = 0; index < numVertices; index++)
{
edges[numVertices][index] = NULL_EDGE;
edges[index][numVertices] = NULL_EDGE;
}
numVertices++;
}
public boolean hasVertex(T vertex)
// Returns true if this graph contains vertex; otherwise, returns false.
{
}
private int indexIs(T vertex)
// Returns the index of vertex in vertices.
{
int index = 0;
while (!vertex.equals(vertices[index]))
index++;
return index;
}
public void addEdge(T fromVertex, T toVertex, int weight)
// Adds an edge with the specified weight from fromVertex to toVertex.
{
int row;
int column;
row = indexIs(fromVertex);
column = indexIs(toVertex);
edges[row][column] = weight;
}
public int weightIs(T fromVertex, T toVertex)
// If edge from fromVertex to toVertex exists, returns the weight of edge;
// otherwise, returns a special “null-edge” value..
Can someone help me please I need help writing this code using Java.pdfmarketing413921
Can someone help me please? I need help writing this code using Java language. Step 1 The
Char Type Create a complex type called Char that models the primitive type char. In your class
you are going to want to have the following constructors: Java Description Charo Char0 Default
constructor that sets the data section of the class to null (binary 0) overloaded constructor that
takes a primitive char as an argument. It should set the data Char (char c) Char(char c) section of
the class to the argument. overloaded constructor that takes a primitive int as a parameter. The
data section of the Char(int co Char(int c) class should be set as a character from the argument.
Chan(const Char(inal Overloaded constructor that takes the complex Char type as a parameter,
The data section Char &c;) Char c) of the class should be set with the data section of the
argument Char(string Char (String overloaded Constructor that takes a string type as a parameter.
The data section of the class should be set to the first character in the string. Your class should
have the following mutators
Solution
Contains:
1. Custom classes - Char.java and BigDecimal.java
2. Exception classes - CharException.java and BigDecimalException.java
3. Test Classes - CharTest.java and BigDecimalTest.java
Char.java
**
* Custom Char class
* @author Anonymous
*
*/
public class Char {
private char value;
public Char(){
this.value = \'\\0\';
}
public Char(char c){
this.value = c;
}
public Char(int c){
this.value = (char)c;
}
public Char(final Char c){
this.value = c.getValue();
}
public Char(String s){
this.value = s.charAt(0);
}
public char getValue(){
return this.value;
}
public void equals(final Char c){
this.value = c.getValue();
}
public void equals(char c){
this.value = c;
}
public void equals(int c) throws CharException{
if(c<32 || c>127)
throw new CharException(\"Invalid Character\");
this.value = (char) c;
}
public char toChar(){
return this.value;
}
public int toInt(){
return (int)this.value;
}
public String toString(){
return String.valueOf(this.value);
}
/**
* To convert char to Hex string
* @return
*/
public String toHexString(){
return String.format(\"%04x\", (int)this.value);
}
public String add(char c){
return toString().concat(String.valueOf(c));
}
public String add(Char c){
return toString().concat(String.valueOf(c.getValue()));
}
}
BigDecimal.java
import java.util.ArrayList;
import java.util.List;
/**
* Custom BigDecimal class
* @author Anonymous
*
*/
public class BigDecimal {
List list;
/**
* Overloaded Constructors
*/
public BigDecimal(){
list = new ArrayList();
list.add(new Char(\'0\'));
list.add(new Char(\'.\'));
list.add(new Char(\'0\'));
}
public BigDecimal(String value) throws BigDecimalException{
list = new ArrayList();
//For numbers like .99
if(value.startsWith(\".\")){
list.add(new Char(\'0\'));
}
validateString(value);
for(int i=0;i();
List valList = value.getValue();
for(int i=0;i getValue(){
return this.list;
}
/**
* Add Method
* @param other
* @return
* @throw.
C++ in XcodePass the values by reference to complete the programmi.pdfmarketing413921
C++ in Xcode
Pass the values by reference to complete the programming tasks.
Using multiple functions and receiving user input.
In your main function use a switch case to create a menu for the user.
Create a program that converts user input in Dollars to Euro, Yen, or Peso.
Prompt the user to enter $ amount.
If user input is less than or equal to zero prompt the user and stop the program.
Create 4 Functions:
1) Converts and outputs conversion in Yen
2) Converts and outputs conversion in Euro
3) Converts and outputs conversion in Peso
4) Converts and outputs all 3 currencies.
Update the program to accept user input for dollar amount to be converted.
Attach Snipping photos of all 4 methods being executed.
(Place snipping photo below.)
Solution
#include
using namespace std;
void convertToYen(int n)
{
cout<<\"The amount in yen is \"<>op;
if(op>4)
{
cout<<\"Invalid option.\"<>n;
if(op==1)
{
convertToYen(n);
}
else if(op==2)
{
convertToEuro(n);
}
else if(op==3)
{
convertToPeso(n);
}
else
{
convertToAll(n);
}
}
return 0;
}.
Assume an infix expression can only contain five operators, + .pdfmarketing413921
Assume an infix expression can only contain five operators, * / % + -, left and right parenthesis,
and variables or numbers (can be negative). Operators and operands are separated by white
spaces, and there is no space between negative sign and its following operand. Implement this
java method, public static String infixToPostFix(String infixExp), using the following algorithm:
Use a stack to store operators. If an item is popped from the stack, it will be appended to the
output if it is not a parenthesis. When an operand is read, append it to the output When a right
parenthesis is read, pop entries from the stack until a (corresponding) left parenthesis is reached,
which is then popped but not appended to the output. If any other symbol is read, pop entries
from the stack until an entry of lower priority is reached, then the new operator is pushed on the
to stack. Left parenthesis has the highest priority. If it is the end of input, pop entries from the
stack until it is empty.
Solution
// Program to convert infix expression to postfix expression
import java.io.IOException; // imporing ioexception pacakeage
public class infixtopostfix { // main class
// variable declarations
private Stack St; // stack varibale
private String infix; // i/p string
private String postfix = \"\"; // o/p variable, initially empty
public infixtopostfix(String in) { // constructor
infix = in; // initalising i/p with the value passed through in variable
int insize = infix.length(); // finding its length and storing in insize variable
St = new Stack(insize); // creating object for stack, st with size of the i/p expression lenghth
}
public String infixToPostFix(String infixExp) { // method for converting infix to postfix
for (int j = 0; j < infixExp.length(); j++) { // reading each character in the expression
char ch = infixExp.charAt(j); // stroing every time in variable ch
switch (ch) { // checking weather it is operand, operator or paranthesis
case \'+\': // if it is + or -
case \'-\':
Operpre(ch, 1); // assinging it preference as 1 and calling Operpre function passing the character
and its preference
break;
case \'*\':
case \'/\':
Operpre(ch, 2); // if * or / assigning its preference as 2 and calling Operpre function passing the
character and its preference
break;
case \'(\':
St.push(ch); // if it is open parenthesis push it into stack
break;
case \')\':
Parenpar(); // if it is closed parenthesis call function Prenpar to pop untill open parenthesis
break;
default:
postfix = postfix + ch; // or if it is operand add to output
break;
}
}
while (!St.isEmpty()) { // after reading all the characters in input pop all elements and add to
stack untill stack becomes empty
postfix = postfix + St.pop();
}
return postfix; // return that postfix expression
}
public void Operpre(char currop, int prec1) { // function to push operators into stack with
arguments currop (current operator) and prec1 (its precedence)
while (!St.isEmpty()) { // untill stack is empty
char top = St.pop().
appropriate nursing interventions/management -COPD -Crackles, wheezing, stridor
Solution
COPD.Chronic obstructive pulmonary disease .there are so many reasons to develop copd like
,SMOKING .ASTHMA.And some genetic reasons also.copd is managed majorlly by two drugs
like corticosteriods and beta2 antagonist.these steriods reduceses the inflammanation in air
ways.some other drugs like prednisolone ,mometasone.and others.
CRACKLES.This is an abnormal condation in this condation patient suffers from severe caugh
with mucas.there are several reasons for this condation one of them is flu
viruses.pneumonia.MANAGEMENT..steriods to reduce the inflammanation.and some
bronchodilators these compounds increases the air flow in bronchioles by dialating the
bronchioles.
WHEEZING.This is aiso an abnormal condation in this condation patient makes a whistling like
sounds while he is breathing.there are so many reasons for this condation like
asthma,copd,inflammanation in air ways ,fever,and ect......,
MANAGEMENT.Wheezing is mainly managed by bronchodilators to dialate the air ways.and
with corticosteroids to reduce the inflamanation in air ways.oxygen treatment.some times
combination of corticosteriods and bronchodilators are also used.
STRIDOR. This is also an abnormal condation in which patient makes wheezing sound whith
high pitch.this condation is also due to the abnormal airflow .this distrubance in air flow is
caused by the so many reasons most of them are i have already explained above.
MANAGEMENT. This condation is also due to the blokage of air flow .this condation is
managed my the use of corticosteriods and bronchodilators.
These all abnormal condations are related because they are due to the one reasons that is blockeg
of air ways so the treatment is mostly same .treatment depends upon the reason that is causing
the blokage of the air ways , like asthma, inflammanation,pneumonia,bronchitis,.
Arrange the following event in chronological order. The Roman Republi.pdfmarketing413921
Arrange the following event in chronological order. The Roman Republic was founded. The
Egyptians began using hieroglyphic numerals. Rome fell to Odoacer, ending the Roman Empire.
The Babylonians began using cuneiform numerals. Columbus discovered America. The first
universities were- established in Europe. Alexander the Great conquest much of the Near East
Charlemagne ruled the Frankish Empire in Europe. The first European printing press was
develop The Arabs formed the Hindu-Arabic numeration system.
Solution
Chronological order will be as follows:
b). The Egyptians began using hieroglyphic numerals.
d). The Babylonians began using cuneiform numerals.
a). The Roman Republic was founded.
c). Rome fell to Odoacer, ending the Roman Empire.
g). Alexander the Great conquered much of the Near East.
j). The Arabs formed the Hindu-Arabic numeration system.
h). Charlemagne ruled the Frankish Empire in Europe.
f). The first universities were established in Europe.
i). The first European printing press was developed.
e). Columbus discovered America.
Why do we need internal control in an organization What is its purp.pdfmarketing413921
Why do we need internal control in an organization? What is its purpose, and what are its
objectives (not components)? Can you explain with examples?
Solution
INTERNAL CONTROL - The process designed, implemented and maintained by those charged
with governance, management and other personnel to provide reasonable assurance about the
achievement of an entity’s
objectives with regard to reliability of financial reporting,
effectiveness and efficiency of operations, safeguarding of assets, and compliance with
applicable laws and regulations. The term \"controls\" refers to any aspects of one or more of the
components of the internal control
WE NEED INTERNAL CONTROL SYSTEM IN THE ORGANISATION TO REDUCE THE
RISK OF FRAUD AND ERRORS
MAIN OBJECTIVES OF THE INTERNAL CONTROL SYSTEM IN THE ORGANISATION
ARE
Aims of Internal Control in relation to Financial and Accounting Aspects: Internal
controls relating to financial and accounting aspects are concerned with achieving the
following objectives -
(1) transactions are executed in accordance with management’s general or specific authorisation;
(2) all transactions and other events are promptly recorded in the correct amount, in the
appropriate accounts and in the proper accounting period so as to permit preparation of
financial statements in accordance with the applicable accounting standards, other recognised
accounting policies and practices and relevant statutory requirements, if any,
and to maintain accountability for assets;
(3) assets and records are safeguarded from unauthorised access, use or disposition; and
(4) the recorded assets are compared with the existing assets at reasonable intervals and
appropriate action is taken with regard to any differences.
For example : an auditor may perform a \"walk-through\" test that is, tracing a few transactions
through the accounting system. When the transactions selected are typical of those
transactions that pass through the system, this procedure may be treated as part of the tests of
control. The nature and extent of walk through tests performed by the auditor are such that they
alone would not provide sufficient appropriate audit evidence to support a control risk
assessment which is less than high.
Thank you hope this usefull.
Why Diamond and semiconductor material like Silicon are used in elect.pdfmarketing413921
Why Diamond and semiconductor material like Silicon are used in electronic industry as heat
sink. What make them so special?
Solution
In electronic industry diamond is used as heat sink material, due to its high thermal conductivity
of 2000 W/mK.
Heat is conducted by lattice vibrations in diamond,which provides very high thermal
conductivity.
In electronic industry, silicon is widely used as material for thermal grease, due to its high
electrically insulating property but thermally conductive in nature.It acts as heat transfer medium
from component to heat sink. Silicon also provides excellent protection against moisture.
Silicon is non-setting in nature, it facilitates easy replacement of component, without damaging
component and heat sink..
Which of the following was NOT a goal of Titchener’s psychologyA..pdfmarketing413921
Which of the following was NOT a goal of Titchener’s psychology?
A. Discover how these elements are grouped.
B. Discover the purposes of the various elements.
C. Determine the causes of the element groupings.
D. Identify the elements of consciousness.
Solution
The below paragraph describes the idealogy of Titcher.
Titchener\'s ideas on how the mind worked were heavily influenced by Wundt\'s theory of
voluntarism and his ideas of Association and Apperception (the passive and active combinations
of elements of consciousness respectively). Titchener attempted to classify the structures of the
mind in the way a chemist breaks down chemicals into their component parts—water into
hydrogen and oxygen, for example. Thus, for Titchener, just as hydrogen and oxygen were
structures, so were sensations and thoughts. He conceived of hydrogen and oxygen as structures
of a chemical compound, and sensations and thoughts as structures of the mind. A sensation,
according to Titchener,[2] had four distinct properties: intensity, quality, duration, and extent.
Each of these related to some corresponding quality of stimulus, although some stimuli were
insufficient to provoke their relevant aspect of sensation. He further differentiated particular
types of sensations: auditory sensation, for example, he divided into \"tones\" and \"noises.\"[3]
Ideas and perceptions he considered to be formed from sensations; \"ideational type\" was related
to the type of sensation on which an idea was based, e.g., sound or vision, a spoken conversation
or words on a page.[4]
Titchener believed that if the basic components of the mind could be defined and categorised that
the structure of mental processes and higher thinking could be determined. What each element of
the mind is, how those elements interact with each other and why they interact in the ways that
they do was the basis of reasoning that Titchener used in trying to find structure to the mind.
As per his ideology the only factor NOT valid is B..
You discover a new kind of fungus with large, square-shaped spores. .pdfmarketing413921
You discover a new kind of fungus with large, square-shaped spores. What can you conclude
about dispersal in this species?
Question 5 options:
The spores are composed of diploid cells
The spores likely get propelled through the air
The spores may require animals to disperse them
The spores likely swim through the wate
The spores are composed of diploid cells
The spores likely get propelled through the air
The spores may require animals to disperse them
The spores likely swim through the wate
Solution
(Ans) ......The spores likely get propelled through the air.
There are several different mechanisms by which fungi release their spores into the air which
then allows them to be dispersed by wind,other mechanisms that serve the same functions of
initially ejecting the spores into the air so that they may be picked up by air currents.The
ascospores are forcibly ejected through the top of the asci and are then carried away by wind.
Spores are initially ejected into the air is the mechanism used by certain puffballs,puffballs are
also members of the Basidiomycota the basidium does not forcibly eject the basidiospores into
the air to be carried away with the wind..
Write 1-2 pages of the definitions of the followings (Use APA forma.pdfmarketing413921
Write 1-2 pages of the definitions of the followings: (Use APA format)
-Discovery.
-Elimination.
-Negligence.
-Modeling.
-Refinement.
-Viewpoint.
A5OO
Solution
1)
the process of finding information, a place, or an object,especially for the first time, or the thing
that is found:
the discovery of electricity
Leonardo made many scientific discoveries.
a journey/voyage of discovery
The discovery of a body in the undergrowth started a murder enquiry.
More examples
Scientists are on the brink of a major new discovery.
The discovery of oil brought many benefits to the town.
Various ecological issues have come to the fore since the discovery of the hole in the ozone
layer.
The two scientists both made the same discovery independently, at roughly the same time.
Word of the discovery caused a stir among astronomers.
2)
to remove or take away someone or something:
A move towards healthy eating could help eliminate heart disease.
We eliminated the possibility that it could have been an accident.
The police eliminated him from their enquiries.
to defeat someone so that they cannot continue in acompetition:
He was eliminated in the third round of the competition.
slang to murder someone:
A police officer was accused of helping a drug gang eliminate rivals.
More examples
Water helps eliminate toxins from your system.
Police have eliminated him from their enquiries.
The virus can never be entirely eliminated from the body.
The programme will minimize, though not eliminate, the problem.
She hired an assassin to eliminate her rival.
3)
not being careful or giving enough attention to people or things that are your responsibility:
The judge said that the teacher had been negligent in allowing the children to swim in dangerous
water.
4)
something that a copy can be based on because it is an extremelygood example of its type:
The educational system was a model for those of many other countries.
The developer plans to build a model community on the site.
They created an education system on the European model.
Even Chris, the very model of calmness (= someone who is usually extremelycalm), was angered
by having to work such long hours.
She really is a model (= perfect) student.
More examples
Throughout the ordeal of her husband\'s funeral, Mrs Kennedy was a model of deportment .
He was the very model of a gentleman - he behaved perfectly.
She seems to think that my niece is a model child, unlike my kids!
The team decided to set up a sixth form college on the same model, except smaller.
Jack was a superb manager and his department soon became a model for all the others to
emulate.
5)
the process of making a substance pure:
The refinement of raw opium yields other drugs, such as morphine.
a small change that improves something:
These refinements have increased the machine\'s accuracy by 25 percent.
Clearly, the hypothesis does need some refinement, in the light of these surprisingresults.
6)
a place from where a person can look at something,especially at an area of n.
Which cell type does not move materials Which of the following cell .pdfmarketing413921
Which cell type does not move materials Which of the following cell types does not move
materials through the body of the plant? tracheids sieve cells sieve tube members
sclerenchyma xylem vessel members
Solution
sclerenchyma does not move materials throgh the body parts and it provides strenght to the plant
as it formed from cells with thickened, typically lignified, walls..
What is the practical relevanceirrelevance of different digital med.pdfmarketing413921
What is the practical relevance/irrelevance of different digital media for the target?
Solution
Digital media is an essential task for each and every organisation to create and maintain Public
Relations as well as creating the sales management and marketing for an organisational products.
By having a specific support for each and every team for social media and having an access over
the platform can readily increase the overall compatibility level of the company towards the
social media at work process. While having a control over the social media platform from
different aspect of the company tools, one can easily increase its overall implementation level
over the social media for providing better support for the organisation while maintaining
customer relationships as well as marketing a product on the daily basis. Social media directly
reduces the overall cost of advertisement hands providing login support to marketing sales
department of your organisation could directly benefit the overall strategic implementation of
advertisements over the social media in very less cost then the traditional advertisement methods.
It also provides huge customer base and targeted customers for advertisement and providing the
login to marketing sales department can be very beneficial for an organisation to sell its products
and advertise the products over the social media in a cost effective method. Hi number of
availability as well as efficiency directly increases the overall level of implementation for an
organisation in social media.
Public Relations team can develop better relationships with the help of the social media has
provision of the social media login to the public relationship team could be very beneficial for an
organisation as it provides the basic support for overall implementation of the different Public
Relations strategies. These specific strategies work directly towards creating an ethical
environment for the customer as well as better Customer Service Management System. Social
media presence of a marketing team can increase the level of satisfaction of the customer and
directly increases the feedback which is reflected in the company\'s sales.
By implementing social media in sales team, level of sales could be increased by broadcasting
different sales strategies over the social media campaign ings. Increase number of social media
campaigns over the sales strategies could directly affect the overall sales of the company by
maintaining proper sales flow over different social media mediums.
Integration of traditional media as well as digital media which is considered as new media type is
very essential for any organisation to survive into the market. Integration of new and old
platforms are very essential to create an equilibrium between operation who prefers new media
and old medium for the marketing Communications.
Media Agencies are the finest examples of media integration of new mediums and old mediums.
They have successfully integrated.
using MATLABplease write down the code to compute these functions.pdfmarketing413921
using MATLAB:
please write down the code to compute these functions (they are very simple,i\'m just not
familiar with coding) 3. Compute each of the following: x-20 x d sinx C. e. t. J (so compute the
V1+x\'dx (Also compute the numerical value)
Solution
a. syms x
limit(1/x, x, 0, \'right\')
b. syms x
limit(1/x, x, 0, \'left\')
c. syms x
f(x) = (sin(x)/x);
df = diff(f,x)
d. fun = @(x) exp(-2.*x). * sin(x);
q = integral (fun,0,inf)
e. fun = @(x) exp(-x.^2);
q = integral(fun,-Inf,Inf)
f. fun = @(x) ((1.+x.^4).^0.5)
q = integral (fun,0,1).
What are the main duties of the Canadian Engineering Accreditation B.pdfmarketing413921
What are the main duties of the Canadian Engineering Accreditation Board and the Canadian
Information Processing Society?
Solution
The Accreditation Board provides undergraduate engineering programs which helps in getting a
person licensing as professional engineer in Canada.
Main Duties:
Canadian Information Processing Society (CIPS) is the professional association ,aims at
advancing the information technology (IT) fiel.
It heps in brining up the interests of information technology professionals across Canada.
CIPS is also accredited to award the internationally recognized Information Technology
Certified Professional (ITCP) .
It duties include
maintaing and ensuring developing in IT fields.
It recently implemented a new designation for graduates from CIPS accredited programs..
The purpose of specialized lacunae are to provide structure to th.pdfmarketing413921
The purpose of specialized lacunae are to: provide structure to the rhizomes. carry oxygen to
plant parts provide buoyancy to the blade. both b and c In seagrasses the process of water-
insoluble fertilization is called hydroponic pollination. hygrophilous pollination. sperm
pollination. aquatic insemination. clonal growth. Salt marsh plants differ from seagrasses in
that they: are not fully marine plants. require freshwater to reproduce. are intolerant of full
strength seawater. are found throughout the world. have roots, while seagrasses do not. Salt
marsh plants play an important ecological role in recycling nutrients. stabilizing sediments.
filtering run-off from coastal areas. habitat for small animals. all of the above A mechanism in
many salt plants to control osmotic pressure is: to remain as some conformers. to have
succulent parts. to dry out. to go dormant during periods of high salinity. to drop leaves.
Mangroves typically occur in/on: tropical and subtropical areas. temperature areas. polar areas.
open coasts. sandy beaches. Mangrove trees have specialized to stabilize the plant in roots,
mud holdfast, rocks roots, rocks holdfast, mud roots, sand
Solution
7. The purpose of specialized lacunae are to carry oxygen to plant parts and provide buoyancy to
the blade.
8. In seagrasses, the process of water- insoluble fertilization is called hydrophilous pollination
9. Salt marsh plants differ from seagrasses in that they are not fully marine plants.
10.Salt marsh plants play an important ecological role in habitat for small animals
11.A mechanism in many salt plants to control osmotic pressure is to have succulent parts
12.Mangroves typically occur in/on tropical and subtropical areas.
13.Mangrove trees have specialized roots to stabilize the plant in mud..
The following code is an implementation of the producer consumer pro.pdfmarketing413921
The following code is an implementation of the producer consumer problem using a software
locking mechanism. Your tasks here require you to debug the code with the intent of achieving
the following tasks:
Task 1: Identifying the critical section
Task 2: Identify the software locks and replace them with a simplified mutex lock and unlock.
HINT: The code provided relies heavily on the in and out pointers of the buffer. You should
make the code run on a single count variable.
#include
#include
#include
#include
#define MAXSIZE 100
#define ITERATIONS 1000
int buffer[MAXSIZE]; // buffer
int nextp, nextc; // temporary storage
int count=0;
void printfunction(void * ptr)
{
int count = *(int *) ptr;
if (count==0)
{
printf(\"All items produced are consumed by the consumer \ \");
}
else
{
for (int i=0; i<=count; i=i+1)
{
printf(\"%d, \\t\",buffer[i]);
}
printf(\"\ \");
}
}
void *producer(void *ptr)
{
int item, flag=0;
int in = *(int *) ptr;
do
{
item = (rand()%7)%10;
flag=flag+1;
nextp=item;
buffer[in]=nextp;
in=((in+1)%MAXSIZE);
while(count <= MAXSIZE)
{
count=count+1;
printf(\"Count = %d - incremented at producer\ \", count);
}
} while (flag<=ITERATIONS);
pthread_exit(NULL);
}
void *consumer(void *ptr)
{
int item, flag=ITERATIONS;
int out = *(int *) ptr;
do
{
while (count >0)
{
nextc = buffer[out];
out=(out+1)%MAXSIZE;
printf(\"\\tCount = %d - decremented at consumer\ \", count, flag);
count = count-1;
flag=flag-1;
}
if (count <= 0)
{
printf(\"consumer made to wait...faster than producer.\ \");
}
}while (flag>=0);
pthread_exit(NULL);
}
int main(void)
{
int in=0, out=0; //pointers
pthread_t pro, con;
// Spawn threads
pthread_create(&pro, NULL, producer, &count);
pthread_create(&con, NULL, consumer, &count);
if (rc1)
{
printf(\"ERROR; return code from pthread_create() is %d\ \", rc1);
exit(-1);
}
if (rc2)
{
printf(\"ERROR; return code from pthread_create() is %d\ \", rc2);
exit(-1);
}
// Wait for the threads to finish
// Otherwise main might run to the end
// and kill the entire process when it exits.
pthread_join(pro, NULL);
pthread_join(con, NULL);
printfunction(&count);
}
Solution
#include
#include
#include
#include
#define MAXSIZE 100
#define ITERATIONS 1000
int buffer[MAXSIZE]; // buffer
int nextp, nextc; // temporary storage
int count=0;
void printfunction(void * ptr)
{
int count = *(int *) ptr;
if (count==0)
{
printf(\"All items produced are consumed by the consumer \ \");
}
else
{
for (int i=0; i<=count; i=i+1)
{
printf(\"%d, \\t\",buffer[i]);
}
printf(\"\ \");
}
}
void *producer(void *ptr)
{
int item, flag=0;
int in = *(int *) ptr;
do
{
item = (rand()%7)%10;
flag=flag+1;
nextp=item;
buffer[in]=nextp;
in=((in+1)%MAXSIZE);
while(count <= MAXSIZE)
{
count=count+1;
printf(\"Count = %d - incremented at producer\ \", count);
}
} while (flag<=ITERATIONS);
pthread_exit(NULL);
}
void *consumer(void *ptr)
{
int item, flag=ITERATIONS;
int out = *(int *) ptr;
do
{
while (count >0)
{
nextc = buffer[out];
out=(out+1)%MAXSIZE;
printf(\"\\tCount = %d - decreme.
Prerequisites — Classes or Knowledge Required for this Course.pdfmarketing413921
Prerequisites — Classes or Knowledge Required for this Course
Successful completion of Introduction to Project Management Principles and Practices Coursera
Specialization courses: Initiating and Planning Projects, Budgeting and Scheduling Projects, and
Managing Project Risks and Changes.
Course Objectives
Upon completing this series, you should be able to:
• Write a narrative charter statement
• Create a work breakdown structure
• Sequence project activities
• Build a project schedule
• Create a project budget
• Create a responsibility assignment matrix
• Identify project risks and define responses for those risks
*>Sample Projects for Use
If a student does not have access to a viable project to use for this capstone, then any one of the
ideas below may be used. Please note that students are meant to take these ideas and build upon
them. Each student is to take the idea and come up with his or her own full project scope and
boundaries.
1) A new CEO has arrived. She believes that the current company structure is ineffective. You
are to be the project manager who leads her executive team in a company-wide reorganization.
This reorganization includes some work to determine how the new structure will be identified,
the work to gain support for this new structure at the executive level, the communications about
the new structure to the entire company and a transition plan to take the company from the
current structure to the new one.
2) Your company is celebrating 50 years in business. The executive team would like to take an
opportunity to recognize this milestone. Their purpose is to reward employees, build morale and
also let customers; future customers and competitors know about the longevity of the company
and adopt a ‘we are here to stay’ type of campaign. This milestone is definitely a marketing
event. The celebration should include customers and employees. Definitely there should be a big
celebration, but the executive team wants more than that. They want events and announcements
and campaigns going throughout the entire year. You will project manage this effort.
3) You have joined a start up company whose goal is to create an iPhone knockoff or copy. The
idea is to out ‘iPhone’ the iPhone, but at 50% of the cost to the customer. You are the project
manager of the team who will identify what features will go into this iPhone copy, determine
how to manufacture the phones for less than the real iPhone and determine how to market this
new copy. The project ends once the idea has either been abandoned or the new copy phone has
been available for sale for 45 days..............
#1 Narrative Charter Statement (13 Points)
Description and Directions
Develop a narrative charter that includes the following sections:
a. Project purpose or justification – A good project purpose or justification statement explains
why this project is important and why resources should be spent on this project. What critical
problem will this project solve or what will b.
Please dont answer if you cannot complete all the requirements. Th.pdfmarketing413921
Please don\'t answer if you cannot complete all the requirements. This question has been
answered but it was incorrect!!!
You are to write the following PersonalCalendar, Event and Appointment classes and other
interfaces or classes as necessary. Note that there is no main method required in this assignment;
a JUnit test will be used instead.
Some details of the implementation are left to you. Other details are implied, but not stated
directly, in the description. (That said, don\'t over think this; do the minimum required to
perform the specified function.)
You are to write a class PersonalCalendar. Entries in a PersonalCalendar can be either an Event
or an Appointment. Entries can be added to, returned from and removed from the
PersonalCalendar.
An Event has a date consisting of ints for year, month, dayOfMonth, hour and minute. It also
has a String description, a String location and an int duration in minutes. Events do not have
attendees. Two Event objects are equal if their dates and descriptions are equal.
An Appointment has a date consisting of ints for year, month, dayOfMonth, hour and minute. It
has an int duration in minutes and a String description. An Appointment also has an ArrayList of
Strings for attendees. Attendees can be added to an Appointment. An Appointment does not have
a location--that\'s assumed to be my office. Appointment has an equals method that compares
dates and descriptions to determine equality.
A PersonalCalendar maintains its entries sorted by date, not the order the entries were inserted.
Thus the first element of a PersonalCalendar is always the fist element chronologically,
regardless of the order the elements were added. If two elements have exactly the same date and
time, description is used to break the tie. (Hint: GregorianCalendar and Collections.sort. Also let
your IDE help you write commonly used code.)
You are to write a JUnit test to verify that a PersonalCalendar object maintains its entries in the
correct order.
Here are some bullets I will use in grading
PersonalCalendar accepts both Event and Appointment objects
PersonalCalendar does not accept objects such as String
PersonalCalendar keeps its content sorted appropriately
Event implements the specified function
Appointment implements the specified function
JUnit tests verify the following:
A PersonalCalendar with a single Appointment or Event contains the expected object.
A PersonalCalendar returns its objects sorted first by date and then description, regardless of the
order the objects were added, and regardless of whether the items were all Events, or all
Appointments, or a mixture.
My JUnit test class was long, but that was mostly because I did a lot of copy/paste for test setup.
None my other components were more than 50 lines of code.
Solution
import java.util.GregorianCalendar;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Set;
import java.util.Iterator;
//Personal Calendar
class PersonalCalendar {
HashMap > cal.
Part 1 Select a controversial current topic and describe the litera.pdfmarketing413921
Part 1: Select a controversial current topic and describe the literal audience and the rhetorical
audience for speeches addressing each audience. What would be the focus for both speeches?
Part 2: Then give feedback to another student about his or her focus. What was useful? What
would you add to either the literal audience or the rhetorical audience speech?
Solution
Literal audiences refer to those who heard the message by being there.
Rhetorical audience refers to intended audience under an optimistic goal.
A controversial topic these days is the move of the trump to move the US Embassy to the
Jerusalem (A controversial area). On Wednesday 6th December 2017 1:20 PM,
Available at: https://www.cnbc.com/2017/12/06/trump-announces-u-s-will-recognize-jerusalem-
as-israels-capital.html
The literal audience in the speech was the press reporters and the public who was watching live
speech.
The Rhetorical audience in this case was the world leaders..
Not yet answered Marked out of 1.00 Flag question Which of the follo.pdfmarketing413921
Not yet answered Marked out of 1.00 Flag question Which of the following are advantages of
XML over JSON XML is more compact than JSON It is faster to extract information from an
XML document than from a JSON one It is easier to extract information from an XML
document than from a JSON one It is easier to encode binary data in XML than in JSON
provides a stronger typing and syntax structure through Schema and DTD than is available in
JSON
Solution
Option E is the answer
In all other cases JSON is advantageous
And json is advanced format of data representation that overcame tue disadvantages of XML.
Need help for this essay. Questions 1–4 Answer the following essay .pdfmarketing413921
Need help for this essay. Questions 1–4: Answer the following essay questions in one to two
short paragraphs. 1. Explain how human activities can cause an imbalance in biogeochemical
cycling and lead to problems such as cultural eutrophication and fish kills. 2. Compare and
contrast the traits and growth patterns of opportunistic versus equilibrium populations. Provide
one example of each. 3. Compare and contrast indirect versus direct values of biodiversity, and
provide examples. 4. Describe two traits that represent a sustainable society and two traits of a
nonsustainable society.
Solution
1.The global pressure of the human population is significantly altering the natural course of
many of biogeochemical cycles of our earth leading to imbalance nutrients and compounds with
the usual climatic and biological feedback mechanisms. These imbalances contribute to marine
dead zones, climate change, ocean acidification, and many other environmental
problems.Cultural eutrophication and fish kills are mainly caused due to the lack of oxygen also
known as anoxia. Although eutrophication is naturally occurring, slow and inevitable process.
When humans speed up that process by adding pollutants into our ecosystem, this will cause the
death and premature aging of bodies of water due to the contamination with sewage, chemicals,
and fertilizers. It will also cause cause the slow death of that body of water due to anoxia killing
all living things within it.
2Opportunistic species use the r-strategy. They produce millions of eggs and sperm since only a
small percent will
actually meet, join, and become offspring. Opportunistic species are often the first to colonize a
new environment with a \"boom and burst\" growth pattern, with a short life cycle. They tend to
“crash” when they run out of food, space. oxygen, sunlight, or whatever the limiting factor is in
that environment. Examples are most insects. and corals. barnacles, clams. scallops and oysters.
who spawn and fertilize their eggs in the water.
Equilibrium species use the K-strategy. The carrying capacity ofthe environment. These species
produce much fewer offspring and usually brood them andlor take care of them in other ways.
The populations of these species may rst grow exponentially. but the growth levels off when they
reach the carrying capacity ofthe environment. They prefer a stable predictable environment and
have along life cycle. Most birds and mammals use this strategy. as well as some live-bearing sh
like dogsh sharks .
3.Biodiversity is the degree of variation of life. This can refer to genetic variation, species
variation, or ecosystem
variation within an area, biome, or planet.Maintaining biodiversity has a direct economic value
to humans, as well as indirect economic value because our ecosystem is affected by any
imbalances in the environment. For example. a lack of trees will mean we don’t have enough
oxygen to breath. A lack of sh will mean many animals that feed of sea creatures wil.
Military time and Standard time, JavaOne of the assignments given .pdfmarketing413921
Military time and Standard time, Java
One of the assignments given is to create a program that will essentially test Military time and
Standard time. The Guidlines to the problem are as follows:
Each class should be in a separate file. All related classes should be in a package. The main class
should not be in the package.
Create a Time class (abstract) that includes the following members:
* hour
* minutes
* seconds
* Include overloaded constructor and accessor/mutator functions
Create a MilTime class derived from Time that includes the following members
* milHours
- stores military time as an integer
- 1:00 PM would be stored as 1300
- 4:30 PM would be stored as 1630
* accessor for MilHour
- override frombaseclass
- return milHours
* Mutator for milHour
* Overloaded constructor
- accept milHours and seconds
- convert milHours to hours and minutes and store in class variables
* setTime
- same asconstructor
* getStandHr
- return hour instandardformat
- call base class accessor
Create a TimeClock class derived from MilTime that includes:
* another milHours and seconds variables
- these hours represent an ending time
- the variables inherited from MilTime represent a starting time
* overloaded constructor
- accept start time and end time
- usebaseclass constructor to storestarttime
* accessor and mutator for new class variables
* TimeDifference
- calculate the number of hours betweenstarttime and end time
Create a main program that uses a MilTIme object and a TimeClock object
* Test that all class member functions work properly
* Create the objects based on user input
The MilTime and TimeClock classes should validate that the data entered is within the proper
ranges
* seconds should be between 0 and 59 (inclusive)
* military time should be between 0 and 2359 (inclusive)
- the last two digits should never be between 60 and 99 (inclusive)
* numbers outside the range should be set to the closest valid number
=====================================================================
==================
I have created a total of 4 .java files so far; main.java, Time.java, MilTime.java, and
TimeClock.java
My I decided to work on this problem from top to bottom, starting with Time.java.
/* Time.java */
package demo
abstract public class Time
{
private int hour, minute, second;
// Default constructor.
public Time()
{
hour = 0;
minute = 0;
second = 0;
}
// Overloaded constructor.
public Time(int getHour, int getMinute, int getSecond)
{
hour = getHour;
minute = getMinute;
second = getSecond;
}
// Accessor/Mutator functions.
public int getHour()
{
return hour;
}
public int getMinute()
{
return minute;
}
public int getSecond()
{
return second;
}
public void setHour(int hour)
{
this.hour = hour;
}
public void setMinute(int minute)
{
this.minute = minute;
}
public void setSecond(int second)
{
this.second = second;
}
}
This class I believe I have correct according to the assignment guide. However after this I am
completely stuck.
/* MilTime.java */
package demo
publ.
Local government expenditure is dominated bySolutionThe expen.pdfmarketing413921
Local government expenditure is dominated by:
Solution
The expenditures of the local government are dominated by the current expenditures on
consumable which is almost 4/5th of local expenditures while the remaining expenditures are
related to the capital expenditures. The current expenditures are dominated by education
spending and wages and salaries to be paid..
Instructions Use the Java API (htt docs.oracle.comjavase8docslapil.pdfmarketing413921
Instructions Use the Java API (htt docs.oracle.com/javase/8/docslapil) to answer the questions
below 1. In the list of classes on the lower left of the API, how can you identify
Solution
7)
void addFirst(E e)
Inserts the specified element at the front of this deque if it is possible to do so immediately
without violating capacity restrictions, throwing an IllegalStateException if no space is currently
available.
8)
programmer must override the set(int, E) method in subclasses..
In the subject of cryptographySuppose a system uses a Public-Key I.pdfmarketing413921
In the subject of cryptography
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device
in that system is asked to verify a certificate but cannot access the Certificate Revocation List
database because of a denial-of-service attack. What are the possible courses of action for the
device, and what are the advantages and disadvantages of each course of action?
Solution
Answer:-
Cryptography :
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography
includes techniques such as microdots, merging words with images, and other ways to hide
information in storage or transit. However, in today\'s computer-centric world, cryptography is
most often associated with scrambling plaintext (ordinary text, sometimes referred to as
cleartext) into ciphertext (a process called encryption), then back again (known as decryption).
Individuals who practice this field are known as cryptographers.
Modern cryptography concerns itself with the following four objectives:
1) Confidentiality (the information cannot be understood by anyone for whom it was unintended)
2) Integrity (the information cannot be altered in storage or transit between sender and intended
receiver without the alteration being detected)
3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her
intentions in the creation or transmission of the information)
4) Authentication (the sender and receiver can confirm each other?s identity and the
origin/destination of the information)
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems.
Cryptosystems are often thought to refer only to mathematical procedures and computer
programs; however, they also include the regulation of human behavior, such as choosing hard-
to-guess passwords, logging off unused systems, and not discussing sensitive procedures with
outsiders.
The word is derived from the Greek kryptos, meaning hidden. The origin of cryptography is
usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics. These consisted
of complex pictograms, the full meaning of which was only known to an elite few. The first
known use of a modern cipher was by Julius Caesar (100 BC to 44 BC), who did not trust his
messengers when communicating with his governors and officers. For this reason, he created a
system in which each character in his messages was replaced by a character three positions ahead
of it in the Roman alphabet.
In recent times, cryptography has turned into a battleground of some of the world\'s best
mathematicians and computer scientists. The ability to securely store and transfer sensitive
information has proved a critical factor in success in war and business.
Because governments do not wish certain entities in and out of their countries to have access to
ways to receive and send hidden information that may be a threat to national interests,
cryptography has been su.
Identify a critical business requirement for a small healthcare prov.pdfmarketing413921
Identify a critical business requirement for a small healthcare provider located in rural Florida.
Also explain why you think this requirement is critical.
Solution
Accesss to healthcare services in every nook and corner of the world is important, especially in
rural areas it is quite critical. Ideally, the residents of the area must have convenient and
affordable access to the services such as primary care, behavioral heath, emergency, dental, and
public health services. Each individual’s ability to access health services has a profound effect on
every aspect of his or her health, yet at the start of the decade, almost 1 in 4 Americans do not
have a primary care provider (PCP) or health center where they can receive regular medical
services.
When we talk about providing healthcare services in rural areas, there are many issues which a
small heathcare provider might face and one such critical business requirement is lack of funds
and quality of service compared to urban healthcare. Rural residents tend to be older, have lower
incomes and are more likely to be uninsured than residents of metropolitan areas.Rural residents
also are more likely to suffer from chronic illnesses than their urban and suburban counterparts.
Nearly half of rural residents report having at least one major chronic illness, and chronic
diseases such as hypertension, cancer, and chronic bronchitis are up to 1.4 times more prevalent
in rural than in large urban areas.
Due to reluctance of people to pay more for the medical services, the business of a small
heathcare can severly get affected as only a handful of people will be willing to spend any part of
their income on costly health services be it primary health care, mental or any other service. If
there will be no funding, the business cannot flourish and the healthcare cannot invest in costly
equipment which might be helpful for treatment of chronic diseases.
Another critical business requirement is manpower. It is a little difficult to find efficient and
skilled workforce in rural areas as most of the people are into small scale businesses or jobs such
as farming, labourers etc. So it is a critical task to find the adequate workforce in rural areas..
13-20 Recording Revenue and Related Expense Transactions. The Shanno.pdfmarketing413921
13-20 Recording Revenue and Related Expense Transactions. The Shannon Community Kitchen
provides hot meals to homeless and low-income individuals and families; it is the organization\'s
only program. It is the policy of the community kitchen to use temporarily restricted resources
for which the purpose has been met before unrestricted resources. The Kitchen had the following
revenue and expense transactions during the 2017 fiscal year.
1. Unrestricted cash donations of $25,000 we\'re received. A local philanthropist also contributed
$3000, which was to be used for the purchase of Thanksgiving dinner foodstuffs.
2. A local grocery store provided fresh produce with a fair value of $100. The produce was
immediately used.
3. Volunteers from the local university contributed 100 hours to preparation and serving of
meals. The estimated fair value of their labor was $750.
4. The Kitchen received a $5000 federal grant for the purchase of institutional kitchen
appliances.
5. At Thanksgiving time, the Kitchen spent $4,100 on foodstuffs for preparation of the
Thanksgiving dinner.
REQUIRED
Make all the necessary journal entries to record these transactions.
Solution
Answer:-
THE SHANNON COMMUNITY
KITCHEN GENERAL JOURNAL
Particulars Debits Credits
1.CASH DEBIT 28,000
CONTRIBUTIONS—UNRESTRICTED Credit 25,000
CONTRIBUTIONS—TEMPORARILY RESTRICTED Credit 3,000
2.PROGRAM EXPENSES Debit 100
CONTRIBUTIONS—UNRESTRICTED Credit 100
3.NO TRANSACTION IS RECORDED – MEAL SERVICE AND PREPARATION DOES
NOT REQUIRE A SPECIALIZED SKILL
4.CASH Debit 5,000
CONTRIBUTIONS—TEMPORARILY RESTRICTED Credit 5,000
5.PROGRAM EXPENSES Debit 4,100
CASH Credit 4,100.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Which of the following was NOT a goal of Titchener’s psychologyA..pdfmarketing413921
Which of the following was NOT a goal of Titchener’s psychology?
A. Discover how these elements are grouped.
B. Discover the purposes of the various elements.
C. Determine the causes of the element groupings.
D. Identify the elements of consciousness.
Solution
The below paragraph describes the idealogy of Titcher.
Titchener\'s ideas on how the mind worked were heavily influenced by Wundt\'s theory of
voluntarism and his ideas of Association and Apperception (the passive and active combinations
of elements of consciousness respectively). Titchener attempted to classify the structures of the
mind in the way a chemist breaks down chemicals into their component parts—water into
hydrogen and oxygen, for example. Thus, for Titchener, just as hydrogen and oxygen were
structures, so were sensations and thoughts. He conceived of hydrogen and oxygen as structures
of a chemical compound, and sensations and thoughts as structures of the mind. A sensation,
according to Titchener,[2] had four distinct properties: intensity, quality, duration, and extent.
Each of these related to some corresponding quality of stimulus, although some stimuli were
insufficient to provoke their relevant aspect of sensation. He further differentiated particular
types of sensations: auditory sensation, for example, he divided into \"tones\" and \"noises.\"[3]
Ideas and perceptions he considered to be formed from sensations; \"ideational type\" was related
to the type of sensation on which an idea was based, e.g., sound or vision, a spoken conversation
or words on a page.[4]
Titchener believed that if the basic components of the mind could be defined and categorised that
the structure of mental processes and higher thinking could be determined. What each element of
the mind is, how those elements interact with each other and why they interact in the ways that
they do was the basis of reasoning that Titchener used in trying to find structure to the mind.
As per his ideology the only factor NOT valid is B..
You discover a new kind of fungus with large, square-shaped spores. .pdfmarketing413921
You discover a new kind of fungus with large, square-shaped spores. What can you conclude
about dispersal in this species?
Question 5 options:
The spores are composed of diploid cells
The spores likely get propelled through the air
The spores may require animals to disperse them
The spores likely swim through the wate
The spores are composed of diploid cells
The spores likely get propelled through the air
The spores may require animals to disperse them
The spores likely swim through the wate
Solution
(Ans) ......The spores likely get propelled through the air.
There are several different mechanisms by which fungi release their spores into the air which
then allows them to be dispersed by wind,other mechanisms that serve the same functions of
initially ejecting the spores into the air so that they may be picked up by air currents.The
ascospores are forcibly ejected through the top of the asci and are then carried away by wind.
Spores are initially ejected into the air is the mechanism used by certain puffballs,puffballs are
also members of the Basidiomycota the basidium does not forcibly eject the basidiospores into
the air to be carried away with the wind..
Write 1-2 pages of the definitions of the followings (Use APA forma.pdfmarketing413921
Write 1-2 pages of the definitions of the followings: (Use APA format)
-Discovery.
-Elimination.
-Negligence.
-Modeling.
-Refinement.
-Viewpoint.
A5OO
Solution
1)
the process of finding information, a place, or an object,especially for the first time, or the thing
that is found:
the discovery of electricity
Leonardo made many scientific discoveries.
a journey/voyage of discovery
The discovery of a body in the undergrowth started a murder enquiry.
More examples
Scientists are on the brink of a major new discovery.
The discovery of oil brought many benefits to the town.
Various ecological issues have come to the fore since the discovery of the hole in the ozone
layer.
The two scientists both made the same discovery independently, at roughly the same time.
Word of the discovery caused a stir among astronomers.
2)
to remove or take away someone or something:
A move towards healthy eating could help eliminate heart disease.
We eliminated the possibility that it could have been an accident.
The police eliminated him from their enquiries.
to defeat someone so that they cannot continue in acompetition:
He was eliminated in the third round of the competition.
slang to murder someone:
A police officer was accused of helping a drug gang eliminate rivals.
More examples
Water helps eliminate toxins from your system.
Police have eliminated him from their enquiries.
The virus can never be entirely eliminated from the body.
The programme will minimize, though not eliminate, the problem.
She hired an assassin to eliminate her rival.
3)
not being careful or giving enough attention to people or things that are your responsibility:
The judge said that the teacher had been negligent in allowing the children to swim in dangerous
water.
4)
something that a copy can be based on because it is an extremelygood example of its type:
The educational system was a model for those of many other countries.
The developer plans to build a model community on the site.
They created an education system on the European model.
Even Chris, the very model of calmness (= someone who is usually extremelycalm), was angered
by having to work such long hours.
She really is a model (= perfect) student.
More examples
Throughout the ordeal of her husband\'s funeral, Mrs Kennedy was a model of deportment .
He was the very model of a gentleman - he behaved perfectly.
She seems to think that my niece is a model child, unlike my kids!
The team decided to set up a sixth form college on the same model, except smaller.
Jack was a superb manager and his department soon became a model for all the others to
emulate.
5)
the process of making a substance pure:
The refinement of raw opium yields other drugs, such as morphine.
a small change that improves something:
These refinements have increased the machine\'s accuracy by 25 percent.
Clearly, the hypothesis does need some refinement, in the light of these surprisingresults.
6)
a place from where a person can look at something,especially at an area of n.
Which cell type does not move materials Which of the following cell .pdfmarketing413921
Which cell type does not move materials Which of the following cell types does not move
materials through the body of the plant? tracheids sieve cells sieve tube members
sclerenchyma xylem vessel members
Solution
sclerenchyma does not move materials throgh the body parts and it provides strenght to the plant
as it formed from cells with thickened, typically lignified, walls..
What is the practical relevanceirrelevance of different digital med.pdfmarketing413921
What is the practical relevance/irrelevance of different digital media for the target?
Solution
Digital media is an essential task for each and every organisation to create and maintain Public
Relations as well as creating the sales management and marketing for an organisational products.
By having a specific support for each and every team for social media and having an access over
the platform can readily increase the overall compatibility level of the company towards the
social media at work process. While having a control over the social media platform from
different aspect of the company tools, one can easily increase its overall implementation level
over the social media for providing better support for the organisation while maintaining
customer relationships as well as marketing a product on the daily basis. Social media directly
reduces the overall cost of advertisement hands providing login support to marketing sales
department of your organisation could directly benefit the overall strategic implementation of
advertisements over the social media in very less cost then the traditional advertisement methods.
It also provides huge customer base and targeted customers for advertisement and providing the
login to marketing sales department can be very beneficial for an organisation to sell its products
and advertise the products over the social media in a cost effective method. Hi number of
availability as well as efficiency directly increases the overall level of implementation for an
organisation in social media.
Public Relations team can develop better relationships with the help of the social media has
provision of the social media login to the public relationship team could be very beneficial for an
organisation as it provides the basic support for overall implementation of the different Public
Relations strategies. These specific strategies work directly towards creating an ethical
environment for the customer as well as better Customer Service Management System. Social
media presence of a marketing team can increase the level of satisfaction of the customer and
directly increases the feedback which is reflected in the company\'s sales.
By implementing social media in sales team, level of sales could be increased by broadcasting
different sales strategies over the social media campaign ings. Increase number of social media
campaigns over the sales strategies could directly affect the overall sales of the company by
maintaining proper sales flow over different social media mediums.
Integration of traditional media as well as digital media which is considered as new media type is
very essential for any organisation to survive into the market. Integration of new and old
platforms are very essential to create an equilibrium between operation who prefers new media
and old medium for the marketing Communications.
Media Agencies are the finest examples of media integration of new mediums and old mediums.
They have successfully integrated.
using MATLABplease write down the code to compute these functions.pdfmarketing413921
using MATLAB:
please write down the code to compute these functions (they are very simple,i\'m just not
familiar with coding) 3. Compute each of the following: x-20 x d sinx C. e. t. J (so compute the
V1+x\'dx (Also compute the numerical value)
Solution
a. syms x
limit(1/x, x, 0, \'right\')
b. syms x
limit(1/x, x, 0, \'left\')
c. syms x
f(x) = (sin(x)/x);
df = diff(f,x)
d. fun = @(x) exp(-2.*x). * sin(x);
q = integral (fun,0,inf)
e. fun = @(x) exp(-x.^2);
q = integral(fun,-Inf,Inf)
f. fun = @(x) ((1.+x.^4).^0.5)
q = integral (fun,0,1).
What are the main duties of the Canadian Engineering Accreditation B.pdfmarketing413921
What are the main duties of the Canadian Engineering Accreditation Board and the Canadian
Information Processing Society?
Solution
The Accreditation Board provides undergraduate engineering programs which helps in getting a
person licensing as professional engineer in Canada.
Main Duties:
Canadian Information Processing Society (CIPS) is the professional association ,aims at
advancing the information technology (IT) fiel.
It heps in brining up the interests of information technology professionals across Canada.
CIPS is also accredited to award the internationally recognized Information Technology
Certified Professional (ITCP) .
It duties include
maintaing and ensuring developing in IT fields.
It recently implemented a new designation for graduates from CIPS accredited programs..
The purpose of specialized lacunae are to provide structure to th.pdfmarketing413921
The purpose of specialized lacunae are to: provide structure to the rhizomes. carry oxygen to
plant parts provide buoyancy to the blade. both b and c In seagrasses the process of water-
insoluble fertilization is called hydroponic pollination. hygrophilous pollination. sperm
pollination. aquatic insemination. clonal growth. Salt marsh plants differ from seagrasses in
that they: are not fully marine plants. require freshwater to reproduce. are intolerant of full
strength seawater. are found throughout the world. have roots, while seagrasses do not. Salt
marsh plants play an important ecological role in recycling nutrients. stabilizing sediments.
filtering run-off from coastal areas. habitat for small animals. all of the above A mechanism in
many salt plants to control osmotic pressure is: to remain as some conformers. to have
succulent parts. to dry out. to go dormant during periods of high salinity. to drop leaves.
Mangroves typically occur in/on: tropical and subtropical areas. temperature areas. polar areas.
open coasts. sandy beaches. Mangrove trees have specialized to stabilize the plant in roots,
mud holdfast, rocks roots, rocks holdfast, mud roots, sand
Solution
7. The purpose of specialized lacunae are to carry oxygen to plant parts and provide buoyancy to
the blade.
8. In seagrasses, the process of water- insoluble fertilization is called hydrophilous pollination
9. Salt marsh plants differ from seagrasses in that they are not fully marine plants.
10.Salt marsh plants play an important ecological role in habitat for small animals
11.A mechanism in many salt plants to control osmotic pressure is to have succulent parts
12.Mangroves typically occur in/on tropical and subtropical areas.
13.Mangrove trees have specialized roots to stabilize the plant in mud..
The following code is an implementation of the producer consumer pro.pdfmarketing413921
The following code is an implementation of the producer consumer problem using a software
locking mechanism. Your tasks here require you to debug the code with the intent of achieving
the following tasks:
Task 1: Identifying the critical section
Task 2: Identify the software locks and replace them with a simplified mutex lock and unlock.
HINT: The code provided relies heavily on the in and out pointers of the buffer. You should
make the code run on a single count variable.
#include
#include
#include
#include
#define MAXSIZE 100
#define ITERATIONS 1000
int buffer[MAXSIZE]; // buffer
int nextp, nextc; // temporary storage
int count=0;
void printfunction(void * ptr)
{
int count = *(int *) ptr;
if (count==0)
{
printf(\"All items produced are consumed by the consumer \ \");
}
else
{
for (int i=0; i<=count; i=i+1)
{
printf(\"%d, \\t\",buffer[i]);
}
printf(\"\ \");
}
}
void *producer(void *ptr)
{
int item, flag=0;
int in = *(int *) ptr;
do
{
item = (rand()%7)%10;
flag=flag+1;
nextp=item;
buffer[in]=nextp;
in=((in+1)%MAXSIZE);
while(count <= MAXSIZE)
{
count=count+1;
printf(\"Count = %d - incremented at producer\ \", count);
}
} while (flag<=ITERATIONS);
pthread_exit(NULL);
}
void *consumer(void *ptr)
{
int item, flag=ITERATIONS;
int out = *(int *) ptr;
do
{
while (count >0)
{
nextc = buffer[out];
out=(out+1)%MAXSIZE;
printf(\"\\tCount = %d - decremented at consumer\ \", count, flag);
count = count-1;
flag=flag-1;
}
if (count <= 0)
{
printf(\"consumer made to wait...faster than producer.\ \");
}
}while (flag>=0);
pthread_exit(NULL);
}
int main(void)
{
int in=0, out=0; //pointers
pthread_t pro, con;
// Spawn threads
pthread_create(&pro, NULL, producer, &count);
pthread_create(&con, NULL, consumer, &count);
if (rc1)
{
printf(\"ERROR; return code from pthread_create() is %d\ \", rc1);
exit(-1);
}
if (rc2)
{
printf(\"ERROR; return code from pthread_create() is %d\ \", rc2);
exit(-1);
}
// Wait for the threads to finish
// Otherwise main might run to the end
// and kill the entire process when it exits.
pthread_join(pro, NULL);
pthread_join(con, NULL);
printfunction(&count);
}
Solution
#include
#include
#include
#include
#define MAXSIZE 100
#define ITERATIONS 1000
int buffer[MAXSIZE]; // buffer
int nextp, nextc; // temporary storage
int count=0;
void printfunction(void * ptr)
{
int count = *(int *) ptr;
if (count==0)
{
printf(\"All items produced are consumed by the consumer \ \");
}
else
{
for (int i=0; i<=count; i=i+1)
{
printf(\"%d, \\t\",buffer[i]);
}
printf(\"\ \");
}
}
void *producer(void *ptr)
{
int item, flag=0;
int in = *(int *) ptr;
do
{
item = (rand()%7)%10;
flag=flag+1;
nextp=item;
buffer[in]=nextp;
in=((in+1)%MAXSIZE);
while(count <= MAXSIZE)
{
count=count+1;
printf(\"Count = %d - incremented at producer\ \", count);
}
} while (flag<=ITERATIONS);
pthread_exit(NULL);
}
void *consumer(void *ptr)
{
int item, flag=ITERATIONS;
int out = *(int *) ptr;
do
{
while (count >0)
{
nextc = buffer[out];
out=(out+1)%MAXSIZE;
printf(\"\\tCount = %d - decreme.
Prerequisites — Classes or Knowledge Required for this Course.pdfmarketing413921
Prerequisites — Classes or Knowledge Required for this Course
Successful completion of Introduction to Project Management Principles and Practices Coursera
Specialization courses: Initiating and Planning Projects, Budgeting and Scheduling Projects, and
Managing Project Risks and Changes.
Course Objectives
Upon completing this series, you should be able to:
• Write a narrative charter statement
• Create a work breakdown structure
• Sequence project activities
• Build a project schedule
• Create a project budget
• Create a responsibility assignment matrix
• Identify project risks and define responses for those risks
*>Sample Projects for Use
If a student does not have access to a viable project to use for this capstone, then any one of the
ideas below may be used. Please note that students are meant to take these ideas and build upon
them. Each student is to take the idea and come up with his or her own full project scope and
boundaries.
1) A new CEO has arrived. She believes that the current company structure is ineffective. You
are to be the project manager who leads her executive team in a company-wide reorganization.
This reorganization includes some work to determine how the new structure will be identified,
the work to gain support for this new structure at the executive level, the communications about
the new structure to the entire company and a transition plan to take the company from the
current structure to the new one.
2) Your company is celebrating 50 years in business. The executive team would like to take an
opportunity to recognize this milestone. Their purpose is to reward employees, build morale and
also let customers; future customers and competitors know about the longevity of the company
and adopt a ‘we are here to stay’ type of campaign. This milestone is definitely a marketing
event. The celebration should include customers and employees. Definitely there should be a big
celebration, but the executive team wants more than that. They want events and announcements
and campaigns going throughout the entire year. You will project manage this effort.
3) You have joined a start up company whose goal is to create an iPhone knockoff or copy. The
idea is to out ‘iPhone’ the iPhone, but at 50% of the cost to the customer. You are the project
manager of the team who will identify what features will go into this iPhone copy, determine
how to manufacture the phones for less than the real iPhone and determine how to market this
new copy. The project ends once the idea has either been abandoned or the new copy phone has
been available for sale for 45 days..............
#1 Narrative Charter Statement (13 Points)
Description and Directions
Develop a narrative charter that includes the following sections:
a. Project purpose or justification – A good project purpose or justification statement explains
why this project is important and why resources should be spent on this project. What critical
problem will this project solve or what will b.
Please dont answer if you cannot complete all the requirements. Th.pdfmarketing413921
Please don\'t answer if you cannot complete all the requirements. This question has been
answered but it was incorrect!!!
You are to write the following PersonalCalendar, Event and Appointment classes and other
interfaces or classes as necessary. Note that there is no main method required in this assignment;
a JUnit test will be used instead.
Some details of the implementation are left to you. Other details are implied, but not stated
directly, in the description. (That said, don\'t over think this; do the minimum required to
perform the specified function.)
You are to write a class PersonalCalendar. Entries in a PersonalCalendar can be either an Event
or an Appointment. Entries can be added to, returned from and removed from the
PersonalCalendar.
An Event has a date consisting of ints for year, month, dayOfMonth, hour and minute. It also
has a String description, a String location and an int duration in minutes. Events do not have
attendees. Two Event objects are equal if their dates and descriptions are equal.
An Appointment has a date consisting of ints for year, month, dayOfMonth, hour and minute. It
has an int duration in minutes and a String description. An Appointment also has an ArrayList of
Strings for attendees. Attendees can be added to an Appointment. An Appointment does not have
a location--that\'s assumed to be my office. Appointment has an equals method that compares
dates and descriptions to determine equality.
A PersonalCalendar maintains its entries sorted by date, not the order the entries were inserted.
Thus the first element of a PersonalCalendar is always the fist element chronologically,
regardless of the order the elements were added. If two elements have exactly the same date and
time, description is used to break the tie. (Hint: GregorianCalendar and Collections.sort. Also let
your IDE help you write commonly used code.)
You are to write a JUnit test to verify that a PersonalCalendar object maintains its entries in the
correct order.
Here are some bullets I will use in grading
PersonalCalendar accepts both Event and Appointment objects
PersonalCalendar does not accept objects such as String
PersonalCalendar keeps its content sorted appropriately
Event implements the specified function
Appointment implements the specified function
JUnit tests verify the following:
A PersonalCalendar with a single Appointment or Event contains the expected object.
A PersonalCalendar returns its objects sorted first by date and then description, regardless of the
order the objects were added, and regardless of whether the items were all Events, or all
Appointments, or a mixture.
My JUnit test class was long, but that was mostly because I did a lot of copy/paste for test setup.
None my other components were more than 50 lines of code.
Solution
import java.util.GregorianCalendar;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.Set;
import java.util.Iterator;
//Personal Calendar
class PersonalCalendar {
HashMap > cal.
Part 1 Select a controversial current topic and describe the litera.pdfmarketing413921
Part 1: Select a controversial current topic and describe the literal audience and the rhetorical
audience for speeches addressing each audience. What would be the focus for both speeches?
Part 2: Then give feedback to another student about his or her focus. What was useful? What
would you add to either the literal audience or the rhetorical audience speech?
Solution
Literal audiences refer to those who heard the message by being there.
Rhetorical audience refers to intended audience under an optimistic goal.
A controversial topic these days is the move of the trump to move the US Embassy to the
Jerusalem (A controversial area). On Wednesday 6th December 2017 1:20 PM,
Available at: https://www.cnbc.com/2017/12/06/trump-announces-u-s-will-recognize-jerusalem-
as-israels-capital.html
The literal audience in the speech was the press reporters and the public who was watching live
speech.
The Rhetorical audience in this case was the world leaders..
Not yet answered Marked out of 1.00 Flag question Which of the follo.pdfmarketing413921
Not yet answered Marked out of 1.00 Flag question Which of the following are advantages of
XML over JSON XML is more compact than JSON It is faster to extract information from an
XML document than from a JSON one It is easier to extract information from an XML
document than from a JSON one It is easier to encode binary data in XML than in JSON
provides a stronger typing and syntax structure through Schema and DTD than is available in
JSON
Solution
Option E is the answer
In all other cases JSON is advantageous
And json is advanced format of data representation that overcame tue disadvantages of XML.
Need help for this essay. Questions 1–4 Answer the following essay .pdfmarketing413921
Need help for this essay. Questions 1–4: Answer the following essay questions in one to two
short paragraphs. 1. Explain how human activities can cause an imbalance in biogeochemical
cycling and lead to problems such as cultural eutrophication and fish kills. 2. Compare and
contrast the traits and growth patterns of opportunistic versus equilibrium populations. Provide
one example of each. 3. Compare and contrast indirect versus direct values of biodiversity, and
provide examples. 4. Describe two traits that represent a sustainable society and two traits of a
nonsustainable society.
Solution
1.The global pressure of the human population is significantly altering the natural course of
many of biogeochemical cycles of our earth leading to imbalance nutrients and compounds with
the usual climatic and biological feedback mechanisms. These imbalances contribute to marine
dead zones, climate change, ocean acidification, and many other environmental
problems.Cultural eutrophication and fish kills are mainly caused due to the lack of oxygen also
known as anoxia. Although eutrophication is naturally occurring, slow and inevitable process.
When humans speed up that process by adding pollutants into our ecosystem, this will cause the
death and premature aging of bodies of water due to the contamination with sewage, chemicals,
and fertilizers. It will also cause cause the slow death of that body of water due to anoxia killing
all living things within it.
2Opportunistic species use the r-strategy. They produce millions of eggs and sperm since only a
small percent will
actually meet, join, and become offspring. Opportunistic species are often the first to colonize a
new environment with a \"boom and burst\" growth pattern, with a short life cycle. They tend to
“crash” when they run out of food, space. oxygen, sunlight, or whatever the limiting factor is in
that environment. Examples are most insects. and corals. barnacles, clams. scallops and oysters.
who spawn and fertilize their eggs in the water.
Equilibrium species use the K-strategy. The carrying capacity ofthe environment. These species
produce much fewer offspring and usually brood them andlor take care of them in other ways.
The populations of these species may rst grow exponentially. but the growth levels off when they
reach the carrying capacity ofthe environment. They prefer a stable predictable environment and
have along life cycle. Most birds and mammals use this strategy. as well as some live-bearing sh
like dogsh sharks .
3.Biodiversity is the degree of variation of life. This can refer to genetic variation, species
variation, or ecosystem
variation within an area, biome, or planet.Maintaining biodiversity has a direct economic value
to humans, as well as indirect economic value because our ecosystem is affected by any
imbalances in the environment. For example. a lack of trees will mean we don’t have enough
oxygen to breath. A lack of sh will mean many animals that feed of sea creatures wil.
Military time and Standard time, JavaOne of the assignments given .pdfmarketing413921
Military time and Standard time, Java
One of the assignments given is to create a program that will essentially test Military time and
Standard time. The Guidlines to the problem are as follows:
Each class should be in a separate file. All related classes should be in a package. The main class
should not be in the package.
Create a Time class (abstract) that includes the following members:
* hour
* minutes
* seconds
* Include overloaded constructor and accessor/mutator functions
Create a MilTime class derived from Time that includes the following members
* milHours
- stores military time as an integer
- 1:00 PM would be stored as 1300
- 4:30 PM would be stored as 1630
* accessor for MilHour
- override frombaseclass
- return milHours
* Mutator for milHour
* Overloaded constructor
- accept milHours and seconds
- convert milHours to hours and minutes and store in class variables
* setTime
- same asconstructor
* getStandHr
- return hour instandardformat
- call base class accessor
Create a TimeClock class derived from MilTime that includes:
* another milHours and seconds variables
- these hours represent an ending time
- the variables inherited from MilTime represent a starting time
* overloaded constructor
- accept start time and end time
- usebaseclass constructor to storestarttime
* accessor and mutator for new class variables
* TimeDifference
- calculate the number of hours betweenstarttime and end time
Create a main program that uses a MilTIme object and a TimeClock object
* Test that all class member functions work properly
* Create the objects based on user input
The MilTime and TimeClock classes should validate that the data entered is within the proper
ranges
* seconds should be between 0 and 59 (inclusive)
* military time should be between 0 and 2359 (inclusive)
- the last two digits should never be between 60 and 99 (inclusive)
* numbers outside the range should be set to the closest valid number
=====================================================================
==================
I have created a total of 4 .java files so far; main.java, Time.java, MilTime.java, and
TimeClock.java
My I decided to work on this problem from top to bottom, starting with Time.java.
/* Time.java */
package demo
abstract public class Time
{
private int hour, minute, second;
// Default constructor.
public Time()
{
hour = 0;
minute = 0;
second = 0;
}
// Overloaded constructor.
public Time(int getHour, int getMinute, int getSecond)
{
hour = getHour;
minute = getMinute;
second = getSecond;
}
// Accessor/Mutator functions.
public int getHour()
{
return hour;
}
public int getMinute()
{
return minute;
}
public int getSecond()
{
return second;
}
public void setHour(int hour)
{
this.hour = hour;
}
public void setMinute(int minute)
{
this.minute = minute;
}
public void setSecond(int second)
{
this.second = second;
}
}
This class I believe I have correct according to the assignment guide. However after this I am
completely stuck.
/* MilTime.java */
package demo
publ.
Local government expenditure is dominated bySolutionThe expen.pdfmarketing413921
Local government expenditure is dominated by:
Solution
The expenditures of the local government are dominated by the current expenditures on
consumable which is almost 4/5th of local expenditures while the remaining expenditures are
related to the capital expenditures. The current expenditures are dominated by education
spending and wages and salaries to be paid..
Instructions Use the Java API (htt docs.oracle.comjavase8docslapil.pdfmarketing413921
Instructions Use the Java API (htt docs.oracle.com/javase/8/docslapil) to answer the questions
below 1. In the list of classes on the lower left of the API, how can you identify
Solution
7)
void addFirst(E e)
Inserts the specified element at the front of this deque if it is possible to do so immediately
without violating capacity restrictions, throwing an IllegalStateException if no space is currently
available.
8)
programmer must override the set(int, E) method in subclasses..
In the subject of cryptographySuppose a system uses a Public-Key I.pdfmarketing413921
In the subject of cryptography
Suppose a system uses a Public-Key Infrastructure with a Certificate Revocation List. A device
in that system is asked to verify a certificate but cannot access the Certificate Revocation List
database because of a denial-of-service attack. What are the possible courses of action for the
device, and what are the advantages and disadvantages of each course of action?
Solution
Answer:-
Cryptography :
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography
includes techniques such as microdots, merging words with images, and other ways to hide
information in storage or transit. However, in today\'s computer-centric world, cryptography is
most often associated with scrambling plaintext (ordinary text, sometimes referred to as
cleartext) into ciphertext (a process called encryption), then back again (known as decryption).
Individuals who practice this field are known as cryptographers.
Modern cryptography concerns itself with the following four objectives:
1) Confidentiality (the information cannot be understood by anyone for whom it was unintended)
2) Integrity (the information cannot be altered in storage or transit between sender and intended
receiver without the alteration being detected)
3) Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her
intentions in the creation or transmission of the information)
4) Authentication (the sender and receiver can confirm each other?s identity and the
origin/destination of the information)
Procedures and protocols that meet some or all of the above criteria are known as cryptosystems.
Cryptosystems are often thought to refer only to mathematical procedures and computer
programs; however, they also include the regulation of human behavior, such as choosing hard-
to-guess passwords, logging off unused systems, and not discussing sensitive procedures with
outsiders.
The word is derived from the Greek kryptos, meaning hidden. The origin of cryptography is
usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics. These consisted
of complex pictograms, the full meaning of which was only known to an elite few. The first
known use of a modern cipher was by Julius Caesar (100 BC to 44 BC), who did not trust his
messengers when communicating with his governors and officers. For this reason, he created a
system in which each character in his messages was replaced by a character three positions ahead
of it in the Roman alphabet.
In recent times, cryptography has turned into a battleground of some of the world\'s best
mathematicians and computer scientists. The ability to securely store and transfer sensitive
information has proved a critical factor in success in war and business.
Because governments do not wish certain entities in and out of their countries to have access to
ways to receive and send hidden information that may be a threat to national interests,
cryptography has been su.
Identify a critical business requirement for a small healthcare prov.pdfmarketing413921
Identify a critical business requirement for a small healthcare provider located in rural Florida.
Also explain why you think this requirement is critical.
Solution
Accesss to healthcare services in every nook and corner of the world is important, especially in
rural areas it is quite critical. Ideally, the residents of the area must have convenient and
affordable access to the services such as primary care, behavioral heath, emergency, dental, and
public health services. Each individual’s ability to access health services has a profound effect on
every aspect of his or her health, yet at the start of the decade, almost 1 in 4 Americans do not
have a primary care provider (PCP) or health center where they can receive regular medical
services.
When we talk about providing healthcare services in rural areas, there are many issues which a
small heathcare provider might face and one such critical business requirement is lack of funds
and quality of service compared to urban healthcare. Rural residents tend to be older, have lower
incomes and are more likely to be uninsured than residents of metropolitan areas.Rural residents
also are more likely to suffer from chronic illnesses than their urban and suburban counterparts.
Nearly half of rural residents report having at least one major chronic illness, and chronic
diseases such as hypertension, cancer, and chronic bronchitis are up to 1.4 times more prevalent
in rural than in large urban areas.
Due to reluctance of people to pay more for the medical services, the business of a small
heathcare can severly get affected as only a handful of people will be willing to spend any part of
their income on costly health services be it primary health care, mental or any other service. If
there will be no funding, the business cannot flourish and the healthcare cannot invest in costly
equipment which might be helpful for treatment of chronic diseases.
Another critical business requirement is manpower. It is a little difficult to find efficient and
skilled workforce in rural areas as most of the people are into small scale businesses or jobs such
as farming, labourers etc. So it is a critical task to find the adequate workforce in rural areas..
13-20 Recording Revenue and Related Expense Transactions. The Shanno.pdfmarketing413921
13-20 Recording Revenue and Related Expense Transactions. The Shannon Community Kitchen
provides hot meals to homeless and low-income individuals and families; it is the organization\'s
only program. It is the policy of the community kitchen to use temporarily restricted resources
for which the purpose has been met before unrestricted resources. The Kitchen had the following
revenue and expense transactions during the 2017 fiscal year.
1. Unrestricted cash donations of $25,000 we\'re received. A local philanthropist also contributed
$3000, which was to be used for the purchase of Thanksgiving dinner foodstuffs.
2. A local grocery store provided fresh produce with a fair value of $100. The produce was
immediately used.
3. Volunteers from the local university contributed 100 hours to preparation and serving of
meals. The estimated fair value of their labor was $750.
4. The Kitchen received a $5000 federal grant for the purchase of institutional kitchen
appliances.
5. At Thanksgiving time, the Kitchen spent $4,100 on foodstuffs for preparation of the
Thanksgiving dinner.
REQUIRED
Make all the necessary journal entries to record these transactions.
Solution
Answer:-
THE SHANNON COMMUNITY
KITCHEN GENERAL JOURNAL
Particulars Debits Credits
1.CASH DEBIT 28,000
CONTRIBUTIONS—UNRESTRICTED Credit 25,000
CONTRIBUTIONS—TEMPORARILY RESTRICTED Credit 3,000
2.PROGRAM EXPENSES Debit 100
CONTRIBUTIONS—UNRESTRICTED Credit 100
3.NO TRANSACTION IS RECORDED – MEAL SERVICE AND PREPARATION DOES
NOT REQUIRE A SPECIALIZED SKILL
4.CASH Debit 5,000
CONTRIBUTIONS—TEMPORARILY RESTRICTED Credit 5,000
5.PROGRAM EXPENSES Debit 4,100
CASH Credit 4,100.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
A supererogatory action is one in which a person must engage. T or F.pdf
1. A supererogatory action is one in which a person must engage. T or F?
Solution
It is not necessary that in supererogatory action a person must engage. Because supererogatory
actions are those kind of actions where one pays more than what is required or demanded
according to his/her wish. So supererogatory actions are optional or nonobligatory. Hence the
above is false(F).