RainfallTest.java
import java.util.Arrays;
import java.util.Scanner;
public class RainfallTest {
/**
* @param args
*/
static String month[] = {\"January\", \"Fabruary\", \"March\", \"April\", \"May\", \"June\",
\"July\", \"August\", \"September\",\"October\",\"November\",\"December\"};
public static void main(String[] args) {
// TODO Auto-generated method stub
int months[] = new int[12];
Scanner scan = new Scanner(System.in);
for(int i=0; i months[i]){
min = months[i];
minIndex = i;
}
}
System.out.println(\"The minimum rainfall is :\"+min);
System.out.println(\"The minimum rainfall month is :\"+month[minIndex]);
}
public static void updaeRainFallForMonth(int months[]){
Scanner scan = new Scanner(System.in);
System.out.println(\"Enter a month (1-12) for rainfall update:\");
int month = scan.nextInt();
System.out.println(\"Enter rainfall for update:\");
int rainfall = scan.nextInt();
months[month-1] = rainfall;
}
public static void exit(){
System.exit(0);
}
}
Output:
Enter Rainfall for the month 1:
55
Enter Rainfall for the month 2:
66
Enter Rainfall for the month 3:
77
Enter Rainfall for the month 4:
44
Enter Rainfall for the month 5:
33
Enter Rainfall for the month 6:
22
Enter Rainfall for the month 7:
11
Enter Rainfall for the month 8:
99
Enter Rainfall for the month 9:
88
Enter Rainfall for the month 10:
45
Enter Rainfall for the month 11:
56
Enter Rainfall for the month 12:
67
Entered rainfall details [55, 66, 77, 44, 33, 22, 11, 99, 88, 45, 56, 67]
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
1
January: 55
Fabruary: 66
March: 77
April: 44
May: 33
June: 22
July: 11
August: 99
September: 88
October: 45
November: 56
December: 67
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
2
The total rainfall is :663
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
3
The average rainfall is :55.25
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
4
The maximum rainfall is :99
The maximum rainfall month is :August
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rai.
We will be making 4 classes Main - for testing the code Hi.pdfanithareadymade
/*
We will be making 4 classes:
Main - for testing the code
HighscoreManager - to manage the high-scores
HighscoreComparator - I will explain this when we get there
Score - also this I will explain later
all this classes will be in the package \"highscores\"/*
//The Score Class
package highscores;
import java.io.Serializable;
public class Score implements Serializable {
private int score;
private String naam;
public int getScore() {
return score;
}
public String getNaam() {
return naam;
}
public Score(String naam, int score) {
this.score = score;
this.naam = naam;
}
}/*This class makes us able to make an object (an arraylist in our case) of the type Score that
contains the name and score of a player.
We implement serializable to be able to sort this type./*
//The ScoreComparator Class
package highscores;
import java.util.Comparator;
public class ScoreComparator implements Comparator {
public int compare(Score score1, Score score2) {
int sc1 = score1.getScore();
int sc2 = score2.getScore();
if (sc1 > sc2){
return -1;
}else if (sc1 < sc2){
return +1;
}else{
return 0;
}
}
}
/*This class is used to tell Java how it needs to compare 2 objects of the type score.
-1 means the first score is greater than the 2nd one, +1 (or you can just put 1) means it\'s smaller
and 0 means it\'s equal./*
//The HighscoreManager Class
/*First we will be making the HighscoreManager Class, this class will do the most important part
of the high-score system.
We will be using this as our base for the class:/*
package highscores;
import java.util.*;
import java.io.*;
public class HighscoreManager {
// An arraylist of the type \"score\" we will use to work with the scores inside the class
private ArrayList scores;
// The name of the file where the highscores will be saved
private static final String HIGHSCORE_FILE = \"scores.dat\";
//Initialising an in and outputStream for working with the file
ObjectOutputStream outputStream = null;
ObjectInputStream inputStream = null;
public HighscoreManager() {
//initialising the scores-arraylist
scores = new ArrayList();
}
}
/*I have added comments to explain what\'s already in the class.
We will be using a binary file to keep the high-scores in, this will avoid cheating.
To work with the scores we will use an arraylist. An arraylist is one of the great things that java
has and it\'s much better to use in this case than a regular array.
Now we will add some methods and functions./*
public ArrayList getScores() {
loadScoreFile();
sort();
return scores;
}
/*This is a function that will return an arraylist with the scores in it. It contains calls to the
function loadScoreFile() and sort(), these functions will make sure you have the scores from your
high-score file in a sorted order. We will be writing these functions later on./*
private void sort() {
ScoreComparator comparator = new ScoreComparator();
Collections.sort(scores, comparator);
}
/*This function will create a new object \"comparator\" from the class ScoreComparator.
the Colle.
#include stdio.hint main() { int count; FILE myFi.pdfanithareadymade
#include
int main()
{
int count;
FILE *myFile;
myFile = fopen(\"input.txt\",\"r\");
long numbers[8];
int i;
for(i=0;i<8;i++)
{
fscanf(myFile,\"%ld\",&numbers[i]);
}
for (i=0;i<8;i++)
{
printf(\"Number is: %ld\ \ \", numbers[i]);
}
for(i=0;i<8;i++)
{
count=0; //initialize count=0 for every integer
while(numbers[i]!=0)
{
numbers[i] /= 10; // number[i] = number[i]/10
++count;
}
printf(\"Number of digits in numbers[%d] is %d\ \",i,count);
}
return 0;
}
Output
Number is: 7
Number is: 7
Number is: 5
Number is: 6
Number
is:7
Number is:
43
Number is:
444
Number is:
8
Number of digits in numbers[0]
is 1
Number of digits in numbers[1]
is 1
Number of digits in numbers[2]
is 1
Number of digits in numbers[3]
is 1
Number of digits in numbers[4]
is 1
Number of digits in numbers[5]
is 2
Number of digits in numbers[6]
is 3
Number of digits in numbers[7] is 1
Solution
#include
int main()
{
int count;
FILE *myFile;
myFile = fopen(\"input.txt\",\"r\");
long numbers[8];
int i;
for(i=0;i<8;i++)
{
fscanf(myFile,\"%ld\",&numbers[i]);
}
for (i=0;i<8;i++)
{
printf(\"Number is: %ld\ \ \", numbers[i]);
}
for(i=0;i<8;i++)
{
count=0; //initialize count=0 for every integer
while(numbers[i]!=0)
{
numbers[i] /= 10; // number[i] = number[i]/10
++count;
}
printf(\"Number of digits in numbers[%d] is %d\ \",i,count);
}
return 0;
}
Output
Number is: 7
Number is: 7
Number is: 5
Number is: 6
Number
is:7
Number is:
43
Number is:
444
Number is:
8
Number of digits in numbers[0]
is 1
Number of digits in numbers[1]
is 1
Number of digits in numbers[2]
is 1
Number of digits in numbers[3]
is 1
Number of digits in numbers[4]
is 1
Number of digits in numbers[5]
is 2
Number of digits in numbers[6]
is 3
Number of digits in numbers[7] is 1.
ITs both by the way... it depends on the situatio.pdfanithareadymade
ITs both by the way... it depends on the situation... is at +3 oxidation state and can
go to +1 or 0; or to +5.
Solution
ITs both by the way... it depends on the situation... is at +3 oxidation state and can
go to +1 or 0; or to +5..
I believe you are correct. The phase transfer cat.pdfanithareadymade
I believe you are correct. The phase transfer catalyst aids in the solubility of
inorganic layer with organic layer. By adding sodium ions you are \"filling up\" the aqueous
solution with ions which forces the quarternary ammonium salt back into the organic layer.
Solution
I believe you are correct. The phase transfer catalyst aids in the solubility of
inorganic layer with organic layer. By adding sodium ions you are \"filling up\" the aqueous
solution with ions which forces the quarternary ammonium salt back into the organic layer..
There are 7 stages in Software Development LifeCycle. Coming to SDLC.pdfanithareadymade
There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method
to develop software step by step. It serves as a blue print to design software.
The stages help to design a software,the most important thing is to take security measures while
buidling itself because post production if we need to change anything it takes lot of money and
time.
Stage 1: Planning:
It is advised to address common threats and vulnerabilities that can come in the scope of the
project and plan accordingly beforehand. Most important theats to be addressed in this stage are
legal and compliance risks,process gaps etc.
Stage 2: Requirements and analysis:
Taking decisions about the selection of the favourable framworks,softwares.languages is very
crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be
used for your project and select one which has minimum threats. your team must be up-to-date
with software security standards to reduce insecure design and development practices. Business
security executive signs the full document and checks whether all the legal threats are
minimized.
Stage-3: Architecture and Design:
Design flaws if not properly identified beforehand can cause major threats to the whole project
and are very tough to repair. Use architecture risk analysis and other standard modeling
fundamental models to do threat modeling. these two can detect the design flaws. There are
many people working for the project in many roles so a nice technique is to document role
specific security training which can help the project to analyze threats accurately.
Stage-4: Development:
this phase is the most crucial phase of the project because it takes most of our time and
resources.By adhering to standard coding standards we can be safe against common threats. One
most important thing in this phase is the code reviews. Generally code is reviewed from time to
time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie
the code is reviewed constantly because by reviewing the code during long intervals it is difficult
for us to eliminate the problems in the code and the problem is embedded into the code deeply.
Stage-5 :Testing:
In this phase the bugs which the developers have overlooked are targetted. Specific testing tools
are used which subject the code to multiple verifications and look for bugs.Static and dynamic
testing tools are used to check the working of the code is real time scenarios.Penetration tests are
very powerful tests which can identify the authorize attacks,input handling,security posture etc.
Stage-6: Deployment/implementation:
In the deployment phase we need to take care such that the consumer gets all the prerequisite
information he needs.The detail plan of the environment where the product works,configuration
details,launch details must be properly addressed.It is also advised to lauch a standard Q and A
where the standard possible doubts the use.
The correct statements are1. the oxygen atom has a greater attrac.pdfanithareadymade
The correct statements are:
1. the oxygen atom has a greater attraction for electrons than the hydrogen atom does.
2. the electrons of the covalent bond are not shared equally between the hydrogen and oxygen
atoms.
Solution
The correct statements are:
1. the oxygen atom has a greater attraction for electrons than the hydrogen atom does.
2. the electrons of the covalent bond are not shared equally between the hydrogen and oxygen
atoms..
This is a bit complex to answer as we have HCl and NaOH present, the.pdfanithareadymade
This is a bit complex to answer as we have HCl and NaOH present, they will undergo
neutralization reaction to form NaCl and water.
so inevitably water is also in system.
acetyl chloride and water, they will react to form HCl and Acetic acid which is will react with
NaOH to form sodium acetate.
Considering all these cases. I think the answer should be
benzene in CH2Cl2 layer, as benzene only
acetyl chloride in NaOH layer as CH3COO-Na+
AlCl3 will be NaOH layer in the form of AlCl4- ion, reason being NaOH and HCl have reacted
to give Na+ and Cl- ions and AlCl3 in presence of chloride ions gives AlCl4-
HCl will be in NaOH in form of NaCl ... dissociated into Na+ and Cl- ions ultimately
Solution
This is a bit complex to answer as we have HCl and NaOH present, they will undergo
neutralization reaction to form NaCl and water.
so inevitably water is also in system.
acetyl chloride and water, they will react to form HCl and Acetic acid which is will react with
NaOH to form sodium acetate.
Considering all these cases. I think the answer should be
benzene in CH2Cl2 layer, as benzene only
acetyl chloride in NaOH layer as CH3COO-Na+
AlCl3 will be NaOH layer in the form of AlCl4- ion, reason being NaOH and HCl have reacted
to give Na+ and Cl- ions and AlCl3 in presence of chloride ions gives AlCl4-
HCl will be in NaOH in form of NaCl ... dissociated into Na+ and Cl- ions ultimately.
We will be making 4 classes Main - for testing the code Hi.pdfanithareadymade
/*
We will be making 4 classes:
Main - for testing the code
HighscoreManager - to manage the high-scores
HighscoreComparator - I will explain this when we get there
Score - also this I will explain later
all this classes will be in the package \"highscores\"/*
//The Score Class
package highscores;
import java.io.Serializable;
public class Score implements Serializable {
private int score;
private String naam;
public int getScore() {
return score;
}
public String getNaam() {
return naam;
}
public Score(String naam, int score) {
this.score = score;
this.naam = naam;
}
}/*This class makes us able to make an object (an arraylist in our case) of the type Score that
contains the name and score of a player.
We implement serializable to be able to sort this type./*
//The ScoreComparator Class
package highscores;
import java.util.Comparator;
public class ScoreComparator implements Comparator {
public int compare(Score score1, Score score2) {
int sc1 = score1.getScore();
int sc2 = score2.getScore();
if (sc1 > sc2){
return -1;
}else if (sc1 < sc2){
return +1;
}else{
return 0;
}
}
}
/*This class is used to tell Java how it needs to compare 2 objects of the type score.
-1 means the first score is greater than the 2nd one, +1 (or you can just put 1) means it\'s smaller
and 0 means it\'s equal./*
//The HighscoreManager Class
/*First we will be making the HighscoreManager Class, this class will do the most important part
of the high-score system.
We will be using this as our base for the class:/*
package highscores;
import java.util.*;
import java.io.*;
public class HighscoreManager {
// An arraylist of the type \"score\" we will use to work with the scores inside the class
private ArrayList scores;
// The name of the file where the highscores will be saved
private static final String HIGHSCORE_FILE = \"scores.dat\";
//Initialising an in and outputStream for working with the file
ObjectOutputStream outputStream = null;
ObjectInputStream inputStream = null;
public HighscoreManager() {
//initialising the scores-arraylist
scores = new ArrayList();
}
}
/*I have added comments to explain what\'s already in the class.
We will be using a binary file to keep the high-scores in, this will avoid cheating.
To work with the scores we will use an arraylist. An arraylist is one of the great things that java
has and it\'s much better to use in this case than a regular array.
Now we will add some methods and functions./*
public ArrayList getScores() {
loadScoreFile();
sort();
return scores;
}
/*This is a function that will return an arraylist with the scores in it. It contains calls to the
function loadScoreFile() and sort(), these functions will make sure you have the scores from your
high-score file in a sorted order. We will be writing these functions later on./*
private void sort() {
ScoreComparator comparator = new ScoreComparator();
Collections.sort(scores, comparator);
}
/*This function will create a new object \"comparator\" from the class ScoreComparator.
the Colle.
#include stdio.hint main() { int count; FILE myFi.pdfanithareadymade
#include
int main()
{
int count;
FILE *myFile;
myFile = fopen(\"input.txt\",\"r\");
long numbers[8];
int i;
for(i=0;i<8;i++)
{
fscanf(myFile,\"%ld\",&numbers[i]);
}
for (i=0;i<8;i++)
{
printf(\"Number is: %ld\ \ \", numbers[i]);
}
for(i=0;i<8;i++)
{
count=0; //initialize count=0 for every integer
while(numbers[i]!=0)
{
numbers[i] /= 10; // number[i] = number[i]/10
++count;
}
printf(\"Number of digits in numbers[%d] is %d\ \",i,count);
}
return 0;
}
Output
Number is: 7
Number is: 7
Number is: 5
Number is: 6
Number
is:7
Number is:
43
Number is:
444
Number is:
8
Number of digits in numbers[0]
is 1
Number of digits in numbers[1]
is 1
Number of digits in numbers[2]
is 1
Number of digits in numbers[3]
is 1
Number of digits in numbers[4]
is 1
Number of digits in numbers[5]
is 2
Number of digits in numbers[6]
is 3
Number of digits in numbers[7] is 1
Solution
#include
int main()
{
int count;
FILE *myFile;
myFile = fopen(\"input.txt\",\"r\");
long numbers[8];
int i;
for(i=0;i<8;i++)
{
fscanf(myFile,\"%ld\",&numbers[i]);
}
for (i=0;i<8;i++)
{
printf(\"Number is: %ld\ \ \", numbers[i]);
}
for(i=0;i<8;i++)
{
count=0; //initialize count=0 for every integer
while(numbers[i]!=0)
{
numbers[i] /= 10; // number[i] = number[i]/10
++count;
}
printf(\"Number of digits in numbers[%d] is %d\ \",i,count);
}
return 0;
}
Output
Number is: 7
Number is: 7
Number is: 5
Number is: 6
Number
is:7
Number is:
43
Number is:
444
Number is:
8
Number of digits in numbers[0]
is 1
Number of digits in numbers[1]
is 1
Number of digits in numbers[2]
is 1
Number of digits in numbers[3]
is 1
Number of digits in numbers[4]
is 1
Number of digits in numbers[5]
is 2
Number of digits in numbers[6]
is 3
Number of digits in numbers[7] is 1.
ITs both by the way... it depends on the situatio.pdfanithareadymade
ITs both by the way... it depends on the situation... is at +3 oxidation state and can
go to +1 or 0; or to +5.
Solution
ITs both by the way... it depends on the situation... is at +3 oxidation state and can
go to +1 or 0; or to +5..
I believe you are correct. The phase transfer cat.pdfanithareadymade
I believe you are correct. The phase transfer catalyst aids in the solubility of
inorganic layer with organic layer. By adding sodium ions you are \"filling up\" the aqueous
solution with ions which forces the quarternary ammonium salt back into the organic layer.
Solution
I believe you are correct. The phase transfer catalyst aids in the solubility of
inorganic layer with organic layer. By adding sodium ions you are \"filling up\" the aqueous
solution with ions which forces the quarternary ammonium salt back into the organic layer..
There are 7 stages in Software Development LifeCycle. Coming to SDLC.pdfanithareadymade
There are 7 stages in Software Development LifeCycle. Coming to SDLC it is a standaed method
to develop software step by step. It serves as a blue print to design software.
The stages help to design a software,the most important thing is to take security measures while
buidling itself because post production if we need to change anything it takes lot of money and
time.
Stage 1: Planning:
It is advised to address common threats and vulnerabilities that can come in the scope of the
project and plan accordingly beforehand. Most important theats to be addressed in this stage are
legal and compliance risks,process gaps etc.
Stage 2: Requirements and analysis:
Taking decisions about the selection of the favourable framworks,softwares.languages is very
crucial. Carefully analyze the vulnerabilities in the frameworks,languages,softwares that can be
used for your project and select one which has minimum threats. your team must be up-to-date
with software security standards to reduce insecure design and development practices. Business
security executive signs the full document and checks whether all the legal threats are
minimized.
Stage-3: Architecture and Design:
Design flaws if not properly identified beforehand can cause major threats to the whole project
and are very tough to repair. Use architecture risk analysis and other standard modeling
fundamental models to do threat modeling. these two can detect the design flaws. There are
many people working for the project in many roles so a nice technique is to document role
specific security training which can help the project to analyze threats accurately.
Stage-4: Development:
this phase is the most crucial phase of the project because it takes most of our time and
resources.By adhering to standard coding standards we can be safe against common threats. One
most important thing in this phase is the code reviews. Generally code is reviewed from time to
time by trained experts to verify it against all vulnerabilities, but by using ongoing reviewing, ie
the code is reviewed constantly because by reviewing the code during long intervals it is difficult
for us to eliminate the problems in the code and the problem is embedded into the code deeply.
Stage-5 :Testing:
In this phase the bugs which the developers have overlooked are targetted. Specific testing tools
are used which subject the code to multiple verifications and look for bugs.Static and dynamic
testing tools are used to check the working of the code is real time scenarios.Penetration tests are
very powerful tests which can identify the authorize attacks,input handling,security posture etc.
Stage-6: Deployment/implementation:
In the deployment phase we need to take care such that the consumer gets all the prerequisite
information he needs.The detail plan of the environment where the product works,configuration
details,launch details must be properly addressed.It is also advised to lauch a standard Q and A
where the standard possible doubts the use.
The correct statements are1. the oxygen atom has a greater attrac.pdfanithareadymade
The correct statements are:
1. the oxygen atom has a greater attraction for electrons than the hydrogen atom does.
2. the electrons of the covalent bond are not shared equally between the hydrogen and oxygen
atoms.
Solution
The correct statements are:
1. the oxygen atom has a greater attraction for electrons than the hydrogen atom does.
2. the electrons of the covalent bond are not shared equally between the hydrogen and oxygen
atoms..
This is a bit complex to answer as we have HCl and NaOH present, the.pdfanithareadymade
This is a bit complex to answer as we have HCl and NaOH present, they will undergo
neutralization reaction to form NaCl and water.
so inevitably water is also in system.
acetyl chloride and water, they will react to form HCl and Acetic acid which is will react with
NaOH to form sodium acetate.
Considering all these cases. I think the answer should be
benzene in CH2Cl2 layer, as benzene only
acetyl chloride in NaOH layer as CH3COO-Na+
AlCl3 will be NaOH layer in the form of AlCl4- ion, reason being NaOH and HCl have reacted
to give Na+ and Cl- ions and AlCl3 in presence of chloride ions gives AlCl4-
HCl will be in NaOH in form of NaCl ... dissociated into Na+ and Cl- ions ultimately
Solution
This is a bit complex to answer as we have HCl and NaOH present, they will undergo
neutralization reaction to form NaCl and water.
so inevitably water is also in system.
acetyl chloride and water, they will react to form HCl and Acetic acid which is will react with
NaOH to form sodium acetate.
Considering all these cases. I think the answer should be
benzene in CH2Cl2 layer, as benzene only
acetyl chloride in NaOH layer as CH3COO-Na+
AlCl3 will be NaOH layer in the form of AlCl4- ion, reason being NaOH and HCl have reacted
to give Na+ and Cl- ions and AlCl3 in presence of chloride ions gives AlCl4-
HCl will be in NaOH in form of NaCl ... dissociated into Na+ and Cl- ions ultimately.
The possible causative agent is Corynebacterium diptheriaeSore thr.pdfanithareadymade
The possible causative agent is Corynebacterium diptheriae
Sore throat, fever, shaking and chills, difficulty in breathing are all symptoms typically
assocaited with C. diptheriae. The bacterium is Gram positive bacillus, non capsulated, non
motile, toxin producing. They produce exotoxin called diptheria toxin, which is encoded by a
prophage. The bacteria adheres to mucosal epithelium and infect them. The toxtosin released by
endosomes stimulate localized inflammation followed by tissue destruction. Necrosis results
from tissue destruction. The toxin belongs to AB toxin class. The B fragment binds to host cell
and the A fragment toxin is innserted into the membrane and transported. It is proteolytically
activated inside the cell. The toxin binds to a histidine residue of elongation factor 2 or eEF2.
The active A fragment inhibits translocation of growing peptide chain on the ribosome. Thus, it
inhibits protein synthesis. The toxin transfers NAD to dipthamide (elongation factor 2) to
inactivate the elongation factor. Local tissue destruction makes the bacteria gain access into the
circulation, anters the lymphatic and blood stream, to spread to other parts of the body. Systemic
spreading causes diptheria toxin act on vital organs like kidney, myocardium, and nervous
system.
Innate immune responses against the bacterium includes Macrophages as the first line of defense.
They use pattern specific receptors to attach and engulf bacteria. Neutrophils also mediate the
same response. Macrophages further release cytokines to mediate inflammation.
Solution
The possible causative agent is Corynebacterium diptheriae
Sore throat, fever, shaking and chills, difficulty in breathing are all symptoms typically
assocaited with C. diptheriae. The bacterium is Gram positive bacillus, non capsulated, non
motile, toxin producing. They produce exotoxin called diptheria toxin, which is encoded by a
prophage. The bacteria adheres to mucosal epithelium and infect them. The toxtosin released by
endosomes stimulate localized inflammation followed by tissue destruction. Necrosis results
from tissue destruction. The toxin belongs to AB toxin class. The B fragment binds to host cell
and the A fragment toxin is innserted into the membrane and transported. It is proteolytically
activated inside the cell. The toxin binds to a histidine residue of elongation factor 2 or eEF2.
The active A fragment inhibits translocation of growing peptide chain on the ribosome. Thus, it
inhibits protein synthesis. The toxin transfers NAD to dipthamide (elongation factor 2) to
inactivate the elongation factor. Local tissue destruction makes the bacteria gain access into the
circulation, anters the lymphatic and blood stream, to spread to other parts of the body. Systemic
spreading causes diptheria toxin act on vital organs like kidney, myocardium, and nervous
system.
Innate immune responses against the bacterium includes Macrophages as the first line of defense.
They use pattern specific recep.
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdfanithareadymade
The answer is E) 1,2, and 3.
The solubility of a gas in solvents depends on their intermolecular interactions, which is affected
by the nature of gas and the solvent as well as the temperature. So all three factors are relevant.
Solution
The answer is E) 1,2, and 3.
The solubility of a gas in solvents depends on their intermolecular interactions, which is affected
by the nature of gas and the solvent as well as the temperature. So all three factors are relevant..
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdfanithareadymade
by taking p1,p2,p3 as points in cordinate system.. displavement can be found out
Solution
by taking p1,p2,p3 as points in cordinate system.. displavement can be found out.
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdfanithareadymade
Hello!!!!!!! This answer will help you :)
H2Se would occur in a bent formation similar to water, H2O. The asymmetry of this structure
causes the molecule to be polar.
The geometry of BeCl2 is linear with a symmetric charge distribution.
Therefore this molecule is non polar.
NF5 is a non polar.
Co2
It is a non-polar molecule. But it has polar covalent bonds between its atoms.
Solution
Hello!!!!!!! This answer will help you :)
H2Se would occur in a bent formation similar to water, H2O. The asymmetry of this structure
causes the molecule to be polar.
The geometry of BeCl2 is linear with a symmetric charge distribution.
Therefore this molecule is non polar.
NF5 is a non polar.
Co2
It is a non-polar molecule. But it has polar covalent bonds between its atoms.
.
Here is the code for youimport java.util.Scanner; import java.u.pdfanithareadymade
Here is the code for you:
import java.util.Scanner;
import java.util.Random;
public class TicTacToeGame {
static char[] [] board = new char[3][3];
static Scanner input=new Scanner(System.in);
//Object of Stats class to maintain statistics
static Stats stat = new Stats();
/**
* Prints the TicTacToe board
* @param arr: The board so far
*/
public static void printBoard(char [][] arr){
System.out.println();
for (int i=0; i<3; i++)
{
for (int j=0; j<3; j++)
{
System.out.print(arr[i][j]);
if(j!=2)
//Print the | for readable output
System.out.print(\" \" + \"|\" + \" \");
}
System.out.println();
if(i!=2) {
System.out.print(\"_ _ _ \"); // Print _ for readability
System.out.println();;
}
}
}
/**
* Clear the TicTacToe board before starting a new game
* @param arr: The board so far
*/
public static void clearBoard(char [][] arr){
for (int i=0; i<3; i++)
{
for (int j=0; j<3; j++)
{
arr[i][j]=\' \';
}
}
}
/** Determines if the player with the specified token wins
*
* @param symbol: Specifies whether the player is X or O
* @return true if player has won, false otherwise
*/
public static boolean isWon(char symbol) {
for (int i = 0; i < 3; i++) //horizontal
if (board[i][0] == symbol
&& board[i][1] == symbol
&& board[i][2] == symbol) {
return true;
}
//TODO!!! Also check for vertical and the two diagonals
for (int i = 0; i < 3; i++) //vertical
if (board[0][i] == symbol
&& board[1][i] == symbol
&& board[2][i] == symbol) {
return true;
}
//Leading diagonal
if (board[0][0] == symbol
&& board[1][1] == symbol
&& board[2][2] == symbol) {
return true;
}
//Trailing diagonal
if (board[0][2] == symbol
&& board[1][1] == symbol
&& board[2][0] == symbol) {
return true;
}
return false;
}
/** Determines if the cell is occupied
*
* @param row: Row of the cell to be checked
* @param col: Column of the cell to be checked
* @return true if the cell is occupied, false otherwise
*/
public static boolean isOccupied(int row, int col){
if (board[row][col]!=\' \') return false;
else return true;
}
/** Determines who starts the game
*/
public static int whoStarts(){
//TODO: Randomly chooses between 0 and 1 and returns the choice
return (int)(Math.random() + 0.5 );
}
/** takes care of the human\'s move
* 1. Prompt for a cell, then column
* 2. Puts a symbol (X or O) on the board
* 3. Prints the updated board
* 4. If a human wins: prints, updates stats and returns true
* 5. If not a win yet, returns false */
public static boolean humanTurn(char symbol){
//Prompt for a cell. User must enter
//row and column with a space in between.
System.out.print(\"\ \ Enter your move: (row column): \" );
int row = input.nextInt();
int col = input.nextInt();
//TODO!!! Mark user move in the board, print
//the board and check if user has won!
board[row][col] = symbol;
printBoard(board);
if(isWon(symbol))
return true;
return false;
}
/** takes care of the computer\'s move
* 1. Generates numbers until finds an empty cell
* 2. Puts a symbol (X or O) on the board
* 3. Prints the updated board
* 4. If a comp .
Following are the changes mentioned in bold in order to obtain the r.pdfanithareadymade
Following are the changes mentioned in bold in order to obtain the required result and stop
scrolling in the background.
#include \"SDL/SDL.h\"
#include
//The attributes of the screen can be defined as follows
const int SCN_WIDTH = 640;
const int SCN_HEIGHT = 480;
const int SCN_BPP = 32;
//BPP defines bits per pixel
SDL_Surface* Background = NULL;
SDL_Surface* SpriteImage = NULL;
SDL_Surface* Backbuffer = NULL;
int SpriteFrame = 0;
int FrameCounter = 0;
const int MaxSpriteFrame = 12;
const int FrameDelay = 2;
int BackgroundX = 0;
SDL_Surface* LoadImage(char* fileName);
bool LoadFiles();
void FreeFiles();
void DrawImage(SDL_Surface* image, SDL_Surface* destSurface, int x, int y);
void DrawImageFrame(SDL_Surface* image, SDL_Surface* destSurface, int x, int y, int width,
int height, int frame);
bool ProgramIsRunning();
int main(int argc, char* args[])
{
if(SDL_Init(SDL_INIT_EVERYTHING) < 0)
{
printf(\"Failed to initialize SDL!\ \");
return 0;
}
Backbuffer = SDL_SetVideoMode(800, 600, 32, SDL_SWSURFACE);
SDL_WM_SetCaption(\"Image Animation\", NULL);
if(!LoadFiles())
{
printf(\"Failed to load all files!\ \");
FreeFiles();
SDL_Quit();
return 0;
}
while(ProgramIsRunning())
{
//Update\'s the sprites frame
FrameCounter++;
if(FrameCounter > FrameDelay)
{
FrameCounter = 0;
SpriteFrame++;
}
if(SpriteFrame > MaxSpriteFrame)
SpriteFrame = 0;
//Background scrolling can be removed from this position
//Render the scene
DrawImage(Background,Backbuffer, BackgroundX, 0);
DrawImage(Background,Backbuffer, BackgroundX+800, 0);
DrawImageFrame(SpriteImage, Backbuffer, 350,250, 150, 120, SpriteFrame);
SDL_Delay(20);
SDL_Flip(Backbuffer);
}
FreeFiles();
SDL_Quit();
return 0;
}
SDL_Surface* LoadImage(char* fileName)
{
SDL_Surface* imageLoaded = NULL;
SDL_Surface* processedImage = NULL;
imageLoaded = SDL_LoadBMP(fileName);
if(imageLoaded != NULL)
{
processedImage = SDL_DisplayFormat(imageLoaded);
SDL_FreeSurface(imageLoaded);
if(processedImage != NULL)
{
//Here we map the color key
Uint32 colorKey = SDL_MapRGB(processedImage->format, 0, 0xFF, 0xFF);
//Now, set all the pixels of color R 0,G 0*FF,B 0*FF to be transparent
SDL_SetColorKey(processedImage, SDL_SRCCOLORKEY, colorKey);
}
}
return processedImage;
}
bool LoadFiles()
{
Background = LoadImage(\"graphics/background.bmp\");
if(Background == NULL)
return false;
SpriteImage = LoadImage(\"graphics/bat.bmp\");
//The file should be preloaded and linked with the required libraries in SDL
if(SpriteImage == NULL)
return false;
else
return true;
}
void FreeFiles()
{
SDL_FreeSurface(Background);
SDL_FreeSurface(SpriteImage);
}
void DrawImage(SDL_Surface* image, SDL_Surface* destSurface, int x, int y)
//A temporary rectangle is used to hold the offsets
{
SDL_Rect destRect;
//Giving the offsets to the rectangle
destRect.x = x;
destRect.y = y;
//Blit the surface
SDL_BlitSurface(image, NULL, destSurface, &destRect);
}
//Here, we need to start the main function:
int main(int argc,char** args)
//Now, initialize all SDL subsystems
if .
During meiosis, each member of a pair of genes tends to be randomly .pdfanithareadymade
During meiosis, each member of a pair of genes tends to be randomly distributed into gametes
(receive alleles) independently of how other chromosomes are distributed. Genes that are having
their loci nearer to each other are not generally separated during chromosomal crossover and are
inherited together to the offspring. These genes are known as linked genes (two different
chromosomes), and they always have multiple alleles.
Incompletely linked genes undergo crossing over, and the frequency of crossing over depends
upon their distance. In contrast, the completely linked genes do not undergo crossing over at all.
Means, they do not produce recombinant gametes.
If two linked genes are separated by 10 cM (centi morgans or map units), the percent
recombinants produced by this cross is always equal to the 10% and the remaining 90% will be
identical to the parental genotype. And, in case of cross between the linked genes, the highest
percent of offspring indicates (always, equal to or more than 50%) the paretnal and the remaining
are recombinants.
Solution
During meiosis, each member of a pair of genes tends to be randomly distributed into gametes
(receive alleles) independently of how other chromosomes are distributed. Genes that are having
their loci nearer to each other are not generally separated during chromosomal crossover and are
inherited together to the offspring. These genes are known as linked genes (two different
chromosomes), and they always have multiple alleles.
Incompletely linked genes undergo crossing over, and the frequency of crossing over depends
upon their distance. In contrast, the completely linked genes do not undergo crossing over at all.
Means, they do not produce recombinant gametes.
If two linked genes are separated by 10 cM (centi morgans or map units), the percent
recombinants produced by this cross is always equal to the 10% and the remaining 90% will be
identical to the parental genotype. And, in case of cross between the linked genes, the highest
percent of offspring indicates (always, equal to or more than 50%) the paretnal and the remaining
are recombinants..
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdfanithareadymade
ANSWERS
12. B collecting ducts
13. B efferent arteriol
15. juxtaglomerular cells
16. A can be active or passive
17. C loop of Henle
18. D proximal convoluted tubule
19. .C increase the surface area of the mucosa of the small intestine
20. D submucosa of the duodenum
21. E myenteric plexus
22. D secretion - gall bladder epithelial cells
( I AM NOT SURE ABOUT QUESTION NO .14 , )
Solution
ANSWERS
12. B collecting ducts
13. B efferent arteriol
15. juxtaglomerular cells
16. A can be active or passive
17. C loop of Henle
18. D proximal convoluted tubule
19. .C increase the surface area of the mucosa of the small intestine
20. D submucosa of the duodenum
21. E myenteric plexus
22. D secretion - gall bladder epithelial cells
( I AM NOT SURE ABOUT QUESTION NO .14 , ).
Array- Arrays is a collection of data items with same data type and.pdfanithareadymade
Array:- Arrays is a collection of data items with same data type and access using a common
name.
Linked List:-A linked list is a linear data structure where each element is a separate object. Each
element(node) of a list is comprising of two items - the data and a reference to the next node.
Both Arrays and Linked Lists having advantages and disadvantages.
Solution
Array:- Arrays is a collection of data items with same data type and access using a common
name.
Linked List:-A linked list is a linear data structure where each element is a separate object. Each
element(node) of a list is comprising of two items - the data and a reference to the next node.
Both Arrays and Linked Lists having advantages and disadvantages..
Ans. A. During protein folding, the hydrophobic residues are buried .pdfanithareadymade
Ans. A. During protein folding, the hydrophobic residues are buried (placed) towards the core
(center) of the proteins and the polar residues are preferentially exposed at the outer surface
exposed to the aqueous environment of the cell.
The hydrophobic residues interact among each other with hydrophobic interactions and van der
Waals interactions. Hydrophobic interactions also exhibit positive cooperativity, that is, rate of
protein folding increases as one hydrophobic interaction positively increases the occurrence of
next hydrophobic interactions and so on. Moreover, the hydrophobic core stabilized by
hydrophobic interactions in thermodynamically very stable.
Ans. B. Air oxidation results the oxidation of thiol groups (-SH) of cysteine residues by
removing their H-atoms, the resultant cysteine residues (oxidized) form disulfide bonds (-S-S)
with other oxidized cysteine residues.
-SH (of Cys residue 1) + -SH (of Cys residue 2) ---air oxidation--> -S-S- (disulfide bond)
Since, the air oxidation is a random process, a denatured and reduced peptide with 10 Cys
residues may form 5 disulfide bonds irrespective of the initial number of disulfide in the native
protein conformation.
Thus, number of disulfide bonds formed in (i) and (ii) is equal to 5.
Solution
Ans. A. During protein folding, the hydrophobic residues are buried (placed) towards the core
(center) of the proteins and the polar residues are preferentially exposed at the outer surface
exposed to the aqueous environment of the cell.
The hydrophobic residues interact among each other with hydrophobic interactions and van der
Waals interactions. Hydrophobic interactions also exhibit positive cooperativity, that is, rate of
protein folding increases as one hydrophobic interaction positively increases the occurrence of
next hydrophobic interactions and so on. Moreover, the hydrophobic core stabilized by
hydrophobic interactions in thermodynamically very stable.
Ans. B. Air oxidation results the oxidation of thiol groups (-SH) of cysteine residues by
removing their H-atoms, the resultant cysteine residues (oxidized) form disulfide bonds (-S-S)
with other oxidized cysteine residues.
-SH (of Cys residue 1) + -SH (of Cys residue 2) ---air oxidation--> -S-S- (disulfide bond)
Since, the air oxidation is a random process, a denatured and reduced peptide with 10 Cys
residues may form 5 disulfide bonds irrespective of the initial number of disulfide in the native
protein conformation.
Thus, number of disulfide bonds formed in (i) and (ii) is equal to 5..
A)worst case complexityit will compare with all element .pdfanithareadymade
A)
worst case complexity
it will compare with all element of array so worst case time complexity = O(n)
B)
in this algorithm we will always compare the elements so its best and average case complexity is
same as worst case complexity.
Solution
A)
worst case complexity
it will compare with all element of array so worst case time complexity = O(n)
B)
in this algorithm we will always compare the elements so its best and average case complexity is
same as worst case complexity.
.
a) Our lungs are lined with the surfactant which has phospholipid an.pdfanithareadymade
a) Our lungs are lined with the surfactant which has phospholipid and surfactant proteins. So as
soon as the foreign silicon particle enters, it gets coated with the phospholipid and surfactant
proteins. This changes the surface chemistry of silica and then it gets bind to alveolar
macrophage. Macrophages too have certain receptors which play important role in this binding.
b)When cell dies, it gets burst and release silica particles which again enter in endless cycle of
infection.
Solution
a) Our lungs are lined with the surfactant which has phospholipid and surfactant proteins. So as
soon as the foreign silicon particle enters, it gets coated with the phospholipid and surfactant
proteins. This changes the surface chemistry of silica and then it gets bind to alveolar
macrophage. Macrophages too have certain receptors which play important role in this binding.
b)When cell dies, it gets burst and release silica particles which again enter in endless cycle of
infection..
A four dimensional subspace cant be spanned by two vectors only. T.pdfanithareadymade
A four dimensional subspace can\'t be spanned by two vectors only. Therefore the information is
inadequate.
Solution
A four dimensional subspace can\'t be spanned by two vectors only. Therefore the information is
inadequate..
12L has mass 16 grams 22.4L of gas has M mass M= .pdfanithareadymade
12L has mass 16 grams 22.4L of gas has M mass M= molecular weight so M =
22.4/12 *16 = 29.87 grams
Solution
12L has mass 16 grams 22.4L of gas has M mass M= molecular weight so M =
22.4/12 *16 = 29.87 grams.
1.Personal Trainers Inc. is about to expand its’ successful fitnes.pdfanithareadymade
1.
Personal Trainers Inc. is about to expand its’ successful fitness center into a new fitness “Super
Center” in Toronto.
This Super Center will include the necessities of all fitness centers, like a large exercise area with
state of the art equipment, a swimming pool, a sporting goods store, a health food store, and a
snack bar. Along with these, they will offer new aspects like child care, a teen center, and a
computer cafe.
2.
Account Recievable:Business recieves payment from customers for goods or services
Account Payable:Payment that comes from the company to outside sources.
Generel Ledger:This record keeps information on all transaction.
Membership list/word processing:This is the information that will be kept on each member of the
fitness center.
4.
I believe Business Support would be a great asset for Personal Trainer Inc. to consider. For
example, business support systems can keep track of what a company sells when working with at
TP system.
In this case, membership balances can be updated for each month they pay. Also, during the
beginning of the process for creating the Super Center, a business support system can help users
make decisions by creating a computer model and applying a set of variables. In this situation,
they could use a what-if analysis to determine the price it must..
5.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The
centers
Have done well, and the company is planning an international expansion by opening a
new“Supercenter” in the Toronto area.
Personal Trainer’s president, Cassia Umi, hired an ITConsultant, Susan Park, to help develop an
information system for the new facility. During theProject, Susan will work closely with Gray
Lewis, who will manage the new operation.
Background:
At their initial meeting, Susan and Gray discussed some initial steps in planning an information
System for the new facility. The next morning, they worked together on a business profile, drew
an
Organization chart, discussed feasibility issues, and talked about various types of information
Systems that would provide the best support for the supercenter’s operations. Their main
objective
Was to carry out a preliminary investigation of the new system and report their
recommendations
To Personal Trainer’s top managers. After the working session with Gray, Susan returned to her
office and reviewed her notes.
She Knew that Personal Trainer’s president, Cassia Umi, wanted the supercenter to become a
model for
The company’s future growth, but she did not remember any mention of an overall strategic
planFor the company. Susan also wondered whether the firm had done a SWOT analysis or
analyzedThe internal and external factors that might affect an information system for the
supercenter.Because the new operation would be so important to the company, Susan believed
thatPersonal Trainer should consider an enterprise resource planning strategy that could provide
aCompany-wide framework for information man.
1) The Security wireless system is a Security technique which is use.pdfanithareadymade
1) The Security wireless system is a Security technique which is used to avoid the Unauthorized
access to prevent the intruders allow into the system by using wireless network.
2) In todays generations wireless technology has been increased and its services also been
increased. So many systems,laptops and mobile phones are installed with wireless cards to
connect to a wireless network so many hackers tries to get into our system by using different
techniques. So this Security wireless system stops the unauthorized access of the system.
3) In 1880 graham bell and charles has first intoduced the concept of wireless network which is
used to transfer the information and after that many scientists are worked and boosting the ideas
of the scientists each other solving the problem one after the other so there is no particular
scientist only which invented regarding to the wirelss security systems.
4) Step 1: Understand it.
Step 2: Plan it.
- Reduced cost of installation, Flexibility, Convenient information access, Evaluate
your current and future networking needs, Formulate a plan
Step 3: Do it
Wireless clients, Access points, Identify the equipment you want to buy, Determine the
number of users who need to have access to the network.,
Step 4: Use it:
MAC (media access control) addressing, WEP encryption, Traditional VPN (Virtual Private
Network) securities controls,
Step 5: Support it.
5) The Security Wireless System has became more popular in todays generatiojn because all the
equpiments are pre installed with wireless cards in order to connect to a wireless network so the
hackers uses this wireless network as a gate way in order to get into our system and get the
valuable data so the security wireless has to be provided in order to stop the unauthorized access.
Solution
1) The Security wireless system is a Security technique which is used to avoid the Unauthorized
access to prevent the intruders allow into the system by using wireless network.
2) In todays generations wireless technology has been increased and its services also been
increased. So many systems,laptops and mobile phones are installed with wireless cards to
connect to a wireless network so many hackers tries to get into our system by using different
techniques. So this Security wireless system stops the unauthorized access of the system.
3) In 1880 graham bell and charles has first intoduced the concept of wireless network which is
used to transfer the information and after that many scientists are worked and boosting the ideas
of the scientists each other solving the problem one after the other so there is no particular
scientist only which invented regarding to the wirelss security systems.
4) Step 1: Understand it.
Step 2: Plan it.
- Reduced cost of installation, Flexibility, Convenient information access, Evaluate
your current and future networking needs, Formulate a plan
Step 3: Do it
Wireless clients, Access points, Identify the equipment you want to buy, Determine the
number .
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The possible causative agent is Corynebacterium diptheriaeSore thr.pdfanithareadymade
The possible causative agent is Corynebacterium diptheriae
Sore throat, fever, shaking and chills, difficulty in breathing are all symptoms typically
assocaited with C. diptheriae. The bacterium is Gram positive bacillus, non capsulated, non
motile, toxin producing. They produce exotoxin called diptheria toxin, which is encoded by a
prophage. The bacteria adheres to mucosal epithelium and infect them. The toxtosin released by
endosomes stimulate localized inflammation followed by tissue destruction. Necrosis results
from tissue destruction. The toxin belongs to AB toxin class. The B fragment binds to host cell
and the A fragment toxin is innserted into the membrane and transported. It is proteolytically
activated inside the cell. The toxin binds to a histidine residue of elongation factor 2 or eEF2.
The active A fragment inhibits translocation of growing peptide chain on the ribosome. Thus, it
inhibits protein synthesis. The toxin transfers NAD to dipthamide (elongation factor 2) to
inactivate the elongation factor. Local tissue destruction makes the bacteria gain access into the
circulation, anters the lymphatic and blood stream, to spread to other parts of the body. Systemic
spreading causes diptheria toxin act on vital organs like kidney, myocardium, and nervous
system.
Innate immune responses against the bacterium includes Macrophages as the first line of defense.
They use pattern specific receptors to attach and engulf bacteria. Neutrophils also mediate the
same response. Macrophages further release cytokines to mediate inflammation.
Solution
The possible causative agent is Corynebacterium diptheriae
Sore throat, fever, shaking and chills, difficulty in breathing are all symptoms typically
assocaited with C. diptheriae. The bacterium is Gram positive bacillus, non capsulated, non
motile, toxin producing. They produce exotoxin called diptheria toxin, which is encoded by a
prophage. The bacteria adheres to mucosal epithelium and infect them. The toxtosin released by
endosomes stimulate localized inflammation followed by tissue destruction. Necrosis results
from tissue destruction. The toxin belongs to AB toxin class. The B fragment binds to host cell
and the A fragment toxin is innserted into the membrane and transported. It is proteolytically
activated inside the cell. The toxin binds to a histidine residue of elongation factor 2 or eEF2.
The active A fragment inhibits translocation of growing peptide chain on the ribosome. Thus, it
inhibits protein synthesis. The toxin transfers NAD to dipthamide (elongation factor 2) to
inactivate the elongation factor. Local tissue destruction makes the bacteria gain access into the
circulation, anters the lymphatic and blood stream, to spread to other parts of the body. Systemic
spreading causes diptheria toxin act on vital organs like kidney, myocardium, and nervous
system.
Innate immune responses against the bacterium includes Macrophages as the first line of defense.
They use pattern specific recep.
The answer is E) 1,2, and 3.The solubility of a gas in solvents de.pdfanithareadymade
The answer is E) 1,2, and 3.
The solubility of a gas in solvents depends on their intermolecular interactions, which is affected
by the nature of gas and the solvent as well as the temperature. So all three factors are relevant.
Solution
The answer is E) 1,2, and 3.
The solubility of a gas in solvents depends on their intermolecular interactions, which is affected
by the nature of gas and the solvent as well as the temperature. So all three factors are relevant..
by taking p1,p2,p3 as points in cordinate system.. displavement can .pdfanithareadymade
by taking p1,p2,p3 as points in cordinate system.. displavement can be found out
Solution
by taking p1,p2,p3 as points in cordinate system.. displavement can be found out.
Hello!!!!!!! This answer will help you ) H2Se would occur in a .pdfanithareadymade
Hello!!!!!!! This answer will help you :)
H2Se would occur in a bent formation similar to water, H2O. The asymmetry of this structure
causes the molecule to be polar.
The geometry of BeCl2 is linear with a symmetric charge distribution.
Therefore this molecule is non polar.
NF5 is a non polar.
Co2
It is a non-polar molecule. But it has polar covalent bonds between its atoms.
Solution
Hello!!!!!!! This answer will help you :)
H2Se would occur in a bent formation similar to water, H2O. The asymmetry of this structure
causes the molecule to be polar.
The geometry of BeCl2 is linear with a symmetric charge distribution.
Therefore this molecule is non polar.
NF5 is a non polar.
Co2
It is a non-polar molecule. But it has polar covalent bonds between its atoms.
.
Here is the code for youimport java.util.Scanner; import java.u.pdfanithareadymade
Here is the code for you:
import java.util.Scanner;
import java.util.Random;
public class TicTacToeGame {
static char[] [] board = new char[3][3];
static Scanner input=new Scanner(System.in);
//Object of Stats class to maintain statistics
static Stats stat = new Stats();
/**
* Prints the TicTacToe board
* @param arr: The board so far
*/
public static void printBoard(char [][] arr){
System.out.println();
for (int i=0; i<3; i++)
{
for (int j=0; j<3; j++)
{
System.out.print(arr[i][j]);
if(j!=2)
//Print the | for readable output
System.out.print(\" \" + \"|\" + \" \");
}
System.out.println();
if(i!=2) {
System.out.print(\"_ _ _ \"); // Print _ for readability
System.out.println();;
}
}
}
/**
* Clear the TicTacToe board before starting a new game
* @param arr: The board so far
*/
public static void clearBoard(char [][] arr){
for (int i=0; i<3; i++)
{
for (int j=0; j<3; j++)
{
arr[i][j]=\' \';
}
}
}
/** Determines if the player with the specified token wins
*
* @param symbol: Specifies whether the player is X or O
* @return true if player has won, false otherwise
*/
public static boolean isWon(char symbol) {
for (int i = 0; i < 3; i++) //horizontal
if (board[i][0] == symbol
&& board[i][1] == symbol
&& board[i][2] == symbol) {
return true;
}
//TODO!!! Also check for vertical and the two diagonals
for (int i = 0; i < 3; i++) //vertical
if (board[0][i] == symbol
&& board[1][i] == symbol
&& board[2][i] == symbol) {
return true;
}
//Leading diagonal
if (board[0][0] == symbol
&& board[1][1] == symbol
&& board[2][2] == symbol) {
return true;
}
//Trailing diagonal
if (board[0][2] == symbol
&& board[1][1] == symbol
&& board[2][0] == symbol) {
return true;
}
return false;
}
/** Determines if the cell is occupied
*
* @param row: Row of the cell to be checked
* @param col: Column of the cell to be checked
* @return true if the cell is occupied, false otherwise
*/
public static boolean isOccupied(int row, int col){
if (board[row][col]!=\' \') return false;
else return true;
}
/** Determines who starts the game
*/
public static int whoStarts(){
//TODO: Randomly chooses between 0 and 1 and returns the choice
return (int)(Math.random() + 0.5 );
}
/** takes care of the human\'s move
* 1. Prompt for a cell, then column
* 2. Puts a symbol (X or O) on the board
* 3. Prints the updated board
* 4. If a human wins: prints, updates stats and returns true
* 5. If not a win yet, returns false */
public static boolean humanTurn(char symbol){
//Prompt for a cell. User must enter
//row and column with a space in between.
System.out.print(\"\ \ Enter your move: (row column): \" );
int row = input.nextInt();
int col = input.nextInt();
//TODO!!! Mark user move in the board, print
//the board and check if user has won!
board[row][col] = symbol;
printBoard(board);
if(isWon(symbol))
return true;
return false;
}
/** takes care of the computer\'s move
* 1. Generates numbers until finds an empty cell
* 2. Puts a symbol (X or O) on the board
* 3. Prints the updated board
* 4. If a comp .
Following are the changes mentioned in bold in order to obtain the r.pdfanithareadymade
Following are the changes mentioned in bold in order to obtain the required result and stop
scrolling in the background.
#include \"SDL/SDL.h\"
#include
//The attributes of the screen can be defined as follows
const int SCN_WIDTH = 640;
const int SCN_HEIGHT = 480;
const int SCN_BPP = 32;
//BPP defines bits per pixel
SDL_Surface* Background = NULL;
SDL_Surface* SpriteImage = NULL;
SDL_Surface* Backbuffer = NULL;
int SpriteFrame = 0;
int FrameCounter = 0;
const int MaxSpriteFrame = 12;
const int FrameDelay = 2;
int BackgroundX = 0;
SDL_Surface* LoadImage(char* fileName);
bool LoadFiles();
void FreeFiles();
void DrawImage(SDL_Surface* image, SDL_Surface* destSurface, int x, int y);
void DrawImageFrame(SDL_Surface* image, SDL_Surface* destSurface, int x, int y, int width,
int height, int frame);
bool ProgramIsRunning();
int main(int argc, char* args[])
{
if(SDL_Init(SDL_INIT_EVERYTHING) < 0)
{
printf(\"Failed to initialize SDL!\ \");
return 0;
}
Backbuffer = SDL_SetVideoMode(800, 600, 32, SDL_SWSURFACE);
SDL_WM_SetCaption(\"Image Animation\", NULL);
if(!LoadFiles())
{
printf(\"Failed to load all files!\ \");
FreeFiles();
SDL_Quit();
return 0;
}
while(ProgramIsRunning())
{
//Update\'s the sprites frame
FrameCounter++;
if(FrameCounter > FrameDelay)
{
FrameCounter = 0;
SpriteFrame++;
}
if(SpriteFrame > MaxSpriteFrame)
SpriteFrame = 0;
//Background scrolling can be removed from this position
//Render the scene
DrawImage(Background,Backbuffer, BackgroundX, 0);
DrawImage(Background,Backbuffer, BackgroundX+800, 0);
DrawImageFrame(SpriteImage, Backbuffer, 350,250, 150, 120, SpriteFrame);
SDL_Delay(20);
SDL_Flip(Backbuffer);
}
FreeFiles();
SDL_Quit();
return 0;
}
SDL_Surface* LoadImage(char* fileName)
{
SDL_Surface* imageLoaded = NULL;
SDL_Surface* processedImage = NULL;
imageLoaded = SDL_LoadBMP(fileName);
if(imageLoaded != NULL)
{
processedImage = SDL_DisplayFormat(imageLoaded);
SDL_FreeSurface(imageLoaded);
if(processedImage != NULL)
{
//Here we map the color key
Uint32 colorKey = SDL_MapRGB(processedImage->format, 0, 0xFF, 0xFF);
//Now, set all the pixels of color R 0,G 0*FF,B 0*FF to be transparent
SDL_SetColorKey(processedImage, SDL_SRCCOLORKEY, colorKey);
}
}
return processedImage;
}
bool LoadFiles()
{
Background = LoadImage(\"graphics/background.bmp\");
if(Background == NULL)
return false;
SpriteImage = LoadImage(\"graphics/bat.bmp\");
//The file should be preloaded and linked with the required libraries in SDL
if(SpriteImage == NULL)
return false;
else
return true;
}
void FreeFiles()
{
SDL_FreeSurface(Background);
SDL_FreeSurface(SpriteImage);
}
void DrawImage(SDL_Surface* image, SDL_Surface* destSurface, int x, int y)
//A temporary rectangle is used to hold the offsets
{
SDL_Rect destRect;
//Giving the offsets to the rectangle
destRect.x = x;
destRect.y = y;
//Blit the surface
SDL_BlitSurface(image, NULL, destSurface, &destRect);
}
//Here, we need to start the main function:
int main(int argc,char** args)
//Now, initialize all SDL subsystems
if .
During meiosis, each member of a pair of genes tends to be randomly .pdfanithareadymade
During meiosis, each member of a pair of genes tends to be randomly distributed into gametes
(receive alleles) independently of how other chromosomes are distributed. Genes that are having
their loci nearer to each other are not generally separated during chromosomal crossover and are
inherited together to the offspring. These genes are known as linked genes (two different
chromosomes), and they always have multiple alleles.
Incompletely linked genes undergo crossing over, and the frequency of crossing over depends
upon their distance. In contrast, the completely linked genes do not undergo crossing over at all.
Means, they do not produce recombinant gametes.
If two linked genes are separated by 10 cM (centi morgans or map units), the percent
recombinants produced by this cross is always equal to the 10% and the remaining 90% will be
identical to the parental genotype. And, in case of cross between the linked genes, the highest
percent of offspring indicates (always, equal to or more than 50%) the paretnal and the remaining
are recombinants.
Solution
During meiosis, each member of a pair of genes tends to be randomly distributed into gametes
(receive alleles) independently of how other chromosomes are distributed. Genes that are having
their loci nearer to each other are not generally separated during chromosomal crossover and are
inherited together to the offspring. These genes are known as linked genes (two different
chromosomes), and they always have multiple alleles.
Incompletely linked genes undergo crossing over, and the frequency of crossing over depends
upon their distance. In contrast, the completely linked genes do not undergo crossing over at all.
Means, they do not produce recombinant gametes.
If two linked genes are separated by 10 cM (centi morgans or map units), the percent
recombinants produced by this cross is always equal to the 10% and the remaining 90% will be
identical to the parental genotype. And, in case of cross between the linked genes, the highest
percent of offspring indicates (always, equal to or more than 50%) the paretnal and the remaining
are recombinants..
ANSWERS12. B collecting ducts13. B efferent arteriol15. juxtag.pdfanithareadymade
ANSWERS
12. B collecting ducts
13. B efferent arteriol
15. juxtaglomerular cells
16. A can be active or passive
17. C loop of Henle
18. D proximal convoluted tubule
19. .C increase the surface area of the mucosa of the small intestine
20. D submucosa of the duodenum
21. E myenteric plexus
22. D secretion - gall bladder epithelial cells
( I AM NOT SURE ABOUT QUESTION NO .14 , )
Solution
ANSWERS
12. B collecting ducts
13. B efferent arteriol
15. juxtaglomerular cells
16. A can be active or passive
17. C loop of Henle
18. D proximal convoluted tubule
19. .C increase the surface area of the mucosa of the small intestine
20. D submucosa of the duodenum
21. E myenteric plexus
22. D secretion - gall bladder epithelial cells
( I AM NOT SURE ABOUT QUESTION NO .14 , ).
Array- Arrays is a collection of data items with same data type and.pdfanithareadymade
Array:- Arrays is a collection of data items with same data type and access using a common
name.
Linked List:-A linked list is a linear data structure where each element is a separate object. Each
element(node) of a list is comprising of two items - the data and a reference to the next node.
Both Arrays and Linked Lists having advantages and disadvantages.
Solution
Array:- Arrays is a collection of data items with same data type and access using a common
name.
Linked List:-A linked list is a linear data structure where each element is a separate object. Each
element(node) of a list is comprising of two items - the data and a reference to the next node.
Both Arrays and Linked Lists having advantages and disadvantages..
Ans. A. During protein folding, the hydrophobic residues are buried .pdfanithareadymade
Ans. A. During protein folding, the hydrophobic residues are buried (placed) towards the core
(center) of the proteins and the polar residues are preferentially exposed at the outer surface
exposed to the aqueous environment of the cell.
The hydrophobic residues interact among each other with hydrophobic interactions and van der
Waals interactions. Hydrophobic interactions also exhibit positive cooperativity, that is, rate of
protein folding increases as one hydrophobic interaction positively increases the occurrence of
next hydrophobic interactions and so on. Moreover, the hydrophobic core stabilized by
hydrophobic interactions in thermodynamically very stable.
Ans. B. Air oxidation results the oxidation of thiol groups (-SH) of cysteine residues by
removing their H-atoms, the resultant cysteine residues (oxidized) form disulfide bonds (-S-S)
with other oxidized cysteine residues.
-SH (of Cys residue 1) + -SH (of Cys residue 2) ---air oxidation--> -S-S- (disulfide bond)
Since, the air oxidation is a random process, a denatured and reduced peptide with 10 Cys
residues may form 5 disulfide bonds irrespective of the initial number of disulfide in the native
protein conformation.
Thus, number of disulfide bonds formed in (i) and (ii) is equal to 5.
Solution
Ans. A. During protein folding, the hydrophobic residues are buried (placed) towards the core
(center) of the proteins and the polar residues are preferentially exposed at the outer surface
exposed to the aqueous environment of the cell.
The hydrophobic residues interact among each other with hydrophobic interactions and van der
Waals interactions. Hydrophobic interactions also exhibit positive cooperativity, that is, rate of
protein folding increases as one hydrophobic interaction positively increases the occurrence of
next hydrophobic interactions and so on. Moreover, the hydrophobic core stabilized by
hydrophobic interactions in thermodynamically very stable.
Ans. B. Air oxidation results the oxidation of thiol groups (-SH) of cysteine residues by
removing their H-atoms, the resultant cysteine residues (oxidized) form disulfide bonds (-S-S)
with other oxidized cysteine residues.
-SH (of Cys residue 1) + -SH (of Cys residue 2) ---air oxidation--> -S-S- (disulfide bond)
Since, the air oxidation is a random process, a denatured and reduced peptide with 10 Cys
residues may form 5 disulfide bonds irrespective of the initial number of disulfide in the native
protein conformation.
Thus, number of disulfide bonds formed in (i) and (ii) is equal to 5..
A)worst case complexityit will compare with all element .pdfanithareadymade
A)
worst case complexity
it will compare with all element of array so worst case time complexity = O(n)
B)
in this algorithm we will always compare the elements so its best and average case complexity is
same as worst case complexity.
Solution
A)
worst case complexity
it will compare with all element of array so worst case time complexity = O(n)
B)
in this algorithm we will always compare the elements so its best and average case complexity is
same as worst case complexity.
.
a) Our lungs are lined with the surfactant which has phospholipid an.pdfanithareadymade
a) Our lungs are lined with the surfactant which has phospholipid and surfactant proteins. So as
soon as the foreign silicon particle enters, it gets coated with the phospholipid and surfactant
proteins. This changes the surface chemistry of silica and then it gets bind to alveolar
macrophage. Macrophages too have certain receptors which play important role in this binding.
b)When cell dies, it gets burst and release silica particles which again enter in endless cycle of
infection.
Solution
a) Our lungs are lined with the surfactant which has phospholipid and surfactant proteins. So as
soon as the foreign silicon particle enters, it gets coated with the phospholipid and surfactant
proteins. This changes the surface chemistry of silica and then it gets bind to alveolar
macrophage. Macrophages too have certain receptors which play important role in this binding.
b)When cell dies, it gets burst and release silica particles which again enter in endless cycle of
infection..
A four dimensional subspace cant be spanned by two vectors only. T.pdfanithareadymade
A four dimensional subspace can\'t be spanned by two vectors only. Therefore the information is
inadequate.
Solution
A four dimensional subspace can\'t be spanned by two vectors only. Therefore the information is
inadequate..
12L has mass 16 grams 22.4L of gas has M mass M= .pdfanithareadymade
12L has mass 16 grams 22.4L of gas has M mass M= molecular weight so M =
22.4/12 *16 = 29.87 grams
Solution
12L has mass 16 grams 22.4L of gas has M mass M= molecular weight so M =
22.4/12 *16 = 29.87 grams.
1.Personal Trainers Inc. is about to expand its’ successful fitnes.pdfanithareadymade
1.
Personal Trainers Inc. is about to expand its’ successful fitness center into a new fitness “Super
Center” in Toronto.
This Super Center will include the necessities of all fitness centers, like a large exercise area with
state of the art equipment, a swimming pool, a sporting goods store, a health food store, and a
snack bar. Along with these, they will offer new aspects like child care, a teen center, and a
computer cafe.
2.
Account Recievable:Business recieves payment from customers for goods or services
Account Payable:Payment that comes from the company to outside sources.
Generel Ledger:This record keeps information on all transaction.
Membership list/word processing:This is the information that will be kept on each member of the
fitness center.
4.
I believe Business Support would be a great asset for Personal Trainer Inc. to consider. For
example, business support systems can keep track of what a company sells when working with at
TP system.
In this case, membership balances can be updated for each month they pay. Also, during the
beginning of the process for creating the Super Center, a business support system can help users
make decisions by creating a computer model and applying a set of variables. In this situation,
they could use a what-if analysis to determine the price it must..
5.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The
centers
Have done well, and the company is planning an international expansion by opening a
new“Supercenter” in the Toronto area.
Personal Trainer’s president, Cassia Umi, hired an ITConsultant, Susan Park, to help develop an
information system for the new facility. During theProject, Susan will work closely with Gray
Lewis, who will manage the new operation.
Background:
At their initial meeting, Susan and Gray discussed some initial steps in planning an information
System for the new facility. The next morning, they worked together on a business profile, drew
an
Organization chart, discussed feasibility issues, and talked about various types of information
Systems that would provide the best support for the supercenter’s operations. Their main
objective
Was to carry out a preliminary investigation of the new system and report their
recommendations
To Personal Trainer’s top managers. After the working session with Gray, Susan returned to her
office and reviewed her notes.
She Knew that Personal Trainer’s president, Cassia Umi, wanted the supercenter to become a
model for
The company’s future growth, but she did not remember any mention of an overall strategic
planFor the company. Susan also wondered whether the firm had done a SWOT analysis or
analyzedThe internal and external factors that might affect an information system for the
supercenter.Because the new operation would be so important to the company, Susan believed
thatPersonal Trainer should consider an enterprise resource planning strategy that could provide
aCompany-wide framework for information man.
1) The Security wireless system is a Security technique which is use.pdfanithareadymade
1) The Security wireless system is a Security technique which is used to avoid the Unauthorized
access to prevent the intruders allow into the system by using wireless network.
2) In todays generations wireless technology has been increased and its services also been
increased. So many systems,laptops and mobile phones are installed with wireless cards to
connect to a wireless network so many hackers tries to get into our system by using different
techniques. So this Security wireless system stops the unauthorized access of the system.
3) In 1880 graham bell and charles has first intoduced the concept of wireless network which is
used to transfer the information and after that many scientists are worked and boosting the ideas
of the scientists each other solving the problem one after the other so there is no particular
scientist only which invented regarding to the wirelss security systems.
4) Step 1: Understand it.
Step 2: Plan it.
- Reduced cost of installation, Flexibility, Convenient information access, Evaluate
your current and future networking needs, Formulate a plan
Step 3: Do it
Wireless clients, Access points, Identify the equipment you want to buy, Determine the
number of users who need to have access to the network.,
Step 4: Use it:
MAC (media access control) addressing, WEP encryption, Traditional VPN (Virtual Private
Network) securities controls,
Step 5: Support it.
5) The Security Wireless System has became more popular in todays generatiojn because all the
equpiments are pre installed with wireless cards in order to connect to a wireless network so the
hackers uses this wireless network as a gate way in order to get into our system and get the
valuable data so the security wireless has to be provided in order to stop the unauthorized access.
Solution
1) The Security wireless system is a Security technique which is used to avoid the Unauthorized
access to prevent the intruders allow into the system by using wireless network.
2) In todays generations wireless technology has been increased and its services also been
increased. So many systems,laptops and mobile phones are installed with wireless cards to
connect to a wireless network so many hackers tries to get into our system by using different
techniques. So this Security wireless system stops the unauthorized access of the system.
3) In 1880 graham bell and charles has first intoduced the concept of wireless network which is
used to transfer the information and after that many scientists are worked and boosting the ideas
of the scientists each other solving the problem one after the other so there is no particular
scientist only which invented regarding to the wirelss security systems.
4) Step 1: Understand it.
Step 2: Plan it.
- Reduced cost of installation, Flexibility, Convenient information access, Evaluate
your current and future networking needs, Formulate a plan
Step 3: Do it
Wireless clients, Access points, Identify the equipment you want to buy, Determine the
number .
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
1. RainfallTest.java
import java.util.Arrays;
import java.util.Scanner;
public class RainfallTest {
/**
* @param args
*/
static String month[] = {"January", "Fabruary", "March", "April", "May", "June",
"July", "August", "September","October","November","December"};
public static void main(String[] args) {
// TODO Auto-generated method stub
int months[] = new int[12];
Scanner scan = new Scanner(System.in);
for(int i=0; i months[i]){
min = months[i];
minIndex = i;
}
}
System.out.println("The minimum rainfall is :"+min);
System.out.println("The minimum rainfall month is :"+month[minIndex]);
}
public static void updaeRainFallForMonth(int months[]){
Scanner scan = new Scanner(System.in);
System.out.println("Enter a month (1-12) for rainfall update:");
int month = scan.nextInt();
System.out.println("Enter rainfall for update:");
int rainfall = scan.nextInt();
months[month-1] = rainfall;
}
public static void exit(){
System.exit(0);
}
}
2. Output:
Enter Rainfall for the month 1:
55
Enter Rainfall for the month 2:
66
Enter Rainfall for the month 3:
77
Enter Rainfall for the month 4:
44
Enter Rainfall for the month 5:
33
Enter Rainfall for the month 6:
22
Enter Rainfall for the month 7:
11
Enter Rainfall for the month 8:
99
Enter Rainfall for the month 9:
88
Enter Rainfall for the month 10:
45
Enter Rainfall for the month 11:
56
Enter Rainfall for the month 12:
67
Entered rainfall details [55, 66, 77, 44, 33, 22, 11, 99, 88, 45, 56, 67]
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
1
January: 55
3. Fabruary: 66
March: 77
April: 44
May: 33
June: 22
July: 11
August: 99
September: 88
October: 45
November: 56
December: 67
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
2
The total rainfall is :663
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
3
The average rainfall is :55.25
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
4. .5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
4
The maximum rainfall is :99
The maximum rainfall month is :August
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
5
The minimum rainfall is :11
The minimum rainfall month is :July
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
6
Enter a month (1-12) for rainfall update:
7
Enter rainfall for update:
99
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
5. 6.update the amount of rain in any given month
7.quit
4
The maximum rainfall is :99
The maximum rainfall month is :July
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
7
Solution
RainfallTest.java
import java.util.Arrays;
import java.util.Scanner;
public class RainfallTest {
/**
* @param args
*/
static String month[] = {"January", "Fabruary", "March", "April", "May", "June",
"July", "August", "September","October","November","December"};
public static void main(String[] args) {
// TODO Auto-generated method stub
int months[] = new int[12];
Scanner scan = new Scanner(System.in);
for(int i=0; i months[i]){
min = months[i];
minIndex = i;
}
6. }
System.out.println("The minimum rainfall is :"+min);
System.out.println("The minimum rainfall month is :"+month[minIndex]);
}
public static void updaeRainFallForMonth(int months[]){
Scanner scan = new Scanner(System.in);
System.out.println("Enter a month (1-12) for rainfall update:");
int month = scan.nextInt();
System.out.println("Enter rainfall for update:");
int rainfall = scan.nextInt();
months[month-1] = rainfall;
}
public static void exit(){
System.exit(0);
}
}
Output:
Enter Rainfall for the month 1:
55
Enter Rainfall for the month 2:
66
Enter Rainfall for the month 3:
77
Enter Rainfall for the month 4:
44
Enter Rainfall for the month 5:
33
Enter Rainfall for the month 6:
22
Enter Rainfall for the month 7:
11
Enter Rainfall for the month 8:
99
Enter Rainfall for the month 9:
88
Enter Rainfall for the month 10:
7. 45
Enter Rainfall for the month 11:
56
Enter Rainfall for the month 12:
67
Entered rainfall details [55, 66, 77, 44, 33, 22, 11, 99, 88, 45, 56, 67]
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
1
January: 55
Fabruary: 66
March: 77
April: 44
May: 33
June: 22
July: 11
August: 99
September: 88
October: 45
November: 56
December: 67
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
2
8. The total rainfall is :663
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
3
The average rainfall is :55.25
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
4
The maximum rainfall is :99
The maximum rainfall month is :August
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
5
The minimum rainfall is :11
The minimum rainfall month is :July
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
9. 3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
6
Enter a month (1-12) for rainfall update:
7
Enter rainfall for update:
99
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
4
The maximum rainfall is :99
The maximum rainfall month is :July
Enter your choice:
1.the rainfall for each month
2.the total rainfall for the year
3.find the average monthly rainfall
4.the name of the month with the most rain
.5.the name of the month with the least rain.
6.update the amount of rain in any given month
7.quit
7