six lone pairs (each F has three lone pairs) nitrate has three resonance structures.
Solution
six lone pairs (each F has three lone pairs) nitrate has three resonance structures..
#include
#include
#include
#include
using namespace std;
struct city
{
string name; // name of the city
city *next; // pointer to the next city
int numberMessages; // how many messages passed through this city
string message; // message we are sending accross
};
city* addCity(city *head, city *previous, string cityName );
city* deleteCity(city *head, string cityName);
city* deleteEntireNetwork(city *head);
city* searchNetwork(city *head, string cityName);
city* loadDefaultSetup(city *head);
void transmitMsg(city *head, string receiver, string filename);
void printPath(city *head);
void displayMenu();
city* handleUserInput(city *head);
/* Do NOT modify main function */
int main(int argc, char* argv[])
{
// pointer to the head of our network of cities
city *head = NULL;
head = handleUserInput(head);
printPath(head);
head = deleteEntireNetwork(head);
if (head == NULL)
cout << \"Path cleaned\" << endl;
else
printPath(head);
cout << \"Goodbye!\" << endl;
return 0;
}
/*
* Purpose: handle the interaction with the user
* Do NOT modify
*/
city* handleUserInput(city *head)
{
bool quit = false;
string s_input;
int input;
// loop until the user quits
while (!quit)
{
displayMenu();
// read in input, assuming a number comes in
getline(cin, s_input);
input = stoi(s_input);
switch (input)
{
// print all nodes
case 1: //rebuild network
head = loadDefaultSetup(head);
printPath(head);
break;
case 2: // print path
printPath(head);
break;
case 3: //message is read in from file
{
string cityReceiver;
cout << \"Enter name of the city to receive the message: \" << endl;
getline(cin, cityReceiver);
cout << \"Enter the message to send: \" << endl;
string message;
getline(cin, message);
transmitMsg(head, cityReceiver, message);
}
break;
case 4:
{
string newCityName;
string prevCityName;
cout << \"Enter a new city name: \" << endl;
getline(cin, newCityName);
cout << \"Enter the previous city name (or First): \" << endl;
getline(cin, prevCityName);
// find the node containing prevCity
city *tmp = NULL;
if(prevCityName !=\"First\")
tmp = searchNetwork(head, prevCityName);
// add the new node
head = addCity(head, tmp, newCityName);
printPath(head);
}
break;
case 5: // delete city
{
string city;
cout << \"Enter a city name: \" << endl;
getline(cin, city);
head = deleteCity(head, city);
printPath(head);
}
break;
case 6: // delete network
head = deleteEntireNetwork(head);
break;
case 7: // quit
quit = true;
cout << \"Quitting... cleaning up path: \" << endl;
break;
default: // invalid input
cout << \"Invalid Input\" << endl;
break;
}
}
return head;
}
/*
* Purpose: Add a new city to the network
* between the city *previous and the city that follows it in the network.
*/
city* addCity(city *head, city *previous, string cityName )
{
city* add = new city; //to distinguish and create the new node, i named it add
add->name = cityName;
city* tmp = new city;
tmp=head;
if(previous == NULL){
add->next = head;
head = add;
}
while(tmp != NULL && previous != tmp){
tmp = tmp->next;
}
if(tm.
silver cyanide i think coz HCN will be formed whi.pdfannesmkt
silver cyanide i think coz HCN will be formed which is LESS Acidic compared to
others
Solution
silver cyanide i think coz HCN will be formed which is LESS Acidic compared to
others.
No. The Mo is in +3 oxidation state and thus its .pdfannesmkt
No. The Mo is in +3 oxidation state and thus its valence electron configuration is
4d3. It can use its three d electrons to form a Mo-Mo triple bond (bond order= 3).
Solution
No. The Mo is in +3 oxidation state and thus its valence electron configuration is
4d3. It can use its three d electrons to form a Mo-Mo triple bond (bond order= 3)..
In the automata theory, a nondeterministic finite.pdfannesmkt
In the automata theory, a nondeterministic finite automaton (NFA) or
nondeterministic finite state machine is a finite state machine where from each state and a given
input symbol the automaton may jump into several possible next states. This distinguishes it
from the deterministic finite automaton (DFA), where the next possible state is uniquely
determined. Although the DFA and NFA have distinct definitions, a NFA can be translated to
equivalent DFA using powerset construction, i.e., the constructed DFA and the NFA recognize
the same formal language. Both types of automata recognize only regular languages. NFAs were
introduced in 1959 by Michael O. Rabin and Dana Scott,[1] who also showed their equivalence
to DFAs. Informal introduction An NFA, similar to a DFA, consumes a string of input
symbols. For each input symbol, it transitions to a new state until all input symbols have been
consumed. Unlike a DFA, it is non-deterministic, i.e., for any input symbol the next state may be
any one of several possible states. Thus, in the formal definition, the next state is an element of
the power set of the states, which is a set of states to be considered at once. The notion of
accepting an input is similar to that for the DFA. When the last input symbol is consumed, the
NFA accepts if and only if there is some set of transitions that will take it to an accepting state.
Equivalently, it rejects, if, no matter what transitions are applied, it would not end in an
accepting state. Formal definition An NFA is represented formally by a 5-tuple, (Q, S, ?, q0, F),
consisting of a finite set of states Q a finite set of input symbols S a transition relation ? : Q × S
? P(Q). an initial (or start) state q0 ? Q a set of states F distinguished as accepting (or final) states
F ? Q. Here, P(Q) denotes the power set of Q. Let w = a1a2 ... an be a word over the alphabet S.
The automaton M accepts the word w if a sequence of states, r0,r1, ..., rn, exists in Q with the
following conditions: r0 = q0 ri+1 ? ?(ri, ai+1), for i = 0, ..., n-1 rn ? F. In words, the first
condition says that the machine starts in the start state q0. The second condition says that given
each character of string w, the machine will transition from state to state according to the
transition relation ?. The last condition says that the machine accepts w if the last input of w
causes the machine to halt in one of the accepting states. Otherwise, it is said that the automaton
rejects the string. The set of strings M accepts is the language recognized by M and this language
is denoted by L(M). We can also define L(M) in terms of ?*: Q × S* ? P(Q) such that: ?*(r, e)=
{r} where e is the empty string, and If x ? S*, a ? S, and ?*(r, x)={r1, r2,..., rk} then ?*(r, xa)=
?(r1, a)?...??(rk, a). Now L(M) = {w | ?*(q0, w) n F ? Ø}. Note that there is a single initial state,
which is not necessary. Sometimes, NFAs are defined with a set of initial states. There is an easy
construction that translates a NFA.
Formaldehyde is an organic compound with the form.pdfannesmkt
Formaldehyde is an organic compound with the formula CH2O. It is the simplest
aldehyde, hence its systematic name methanal. Formaldehyde is a colorless gas with a
characteristic pungent odor. It is an important precursor to many other chemical compounds,
especially for polymers. In 2005, annual world production of formaldehyde was estimated to be
23 million tonnes (50 billion pounds).[4] Commercial solutions of formaldehyde in water,
commonly called formalin, were formerly used as disinfectants and for preservation of biological
specimens. In view of its widespread use, toxicity and volatility, exposure to formaldehyde is a
significant consideration for human health.[5] On 10 June 2011, the US National Toxicology
Program has described formaldehyde as \"known to be a human carcinogen\".
Solution
Formaldehyde is an organic compound with the formula CH2O. It is the simplest
aldehyde, hence its systematic name methanal. Formaldehyde is a colorless gas with a
characteristic pungent odor. It is an important precursor to many other chemical compounds,
especially for polymers. In 2005, annual world production of formaldehyde was estimated to be
23 million tonnes (50 billion pounds).[4] Commercial solutions of formaldehyde in water,
commonly called formalin, were formerly used as disinfectants and for preservation of biological
specimens. In view of its widespread use, toxicity and volatility, exposure to formaldehyde is a
significant consideration for human health.[5] On 10 June 2011, the US National Toxicology
Program has described formaldehyde as \"known to be a human carcinogen\"..
#include
#include
#include
#include
using namespace std;
struct city
{
string name; // name of the city
city *next; // pointer to the next city
int numberMessages; // how many messages passed through this city
string message; // message we are sending accross
};
city* addCity(city *head, city *previous, string cityName );
city* deleteCity(city *head, string cityName);
city* deleteEntireNetwork(city *head);
city* searchNetwork(city *head, string cityName);
city* loadDefaultSetup(city *head);
void transmitMsg(city *head, string receiver, string filename);
void printPath(city *head);
void displayMenu();
city* handleUserInput(city *head);
/* Do NOT modify main function */
int main(int argc, char* argv[])
{
// pointer to the head of our network of cities
city *head = NULL;
head = handleUserInput(head);
printPath(head);
head = deleteEntireNetwork(head);
if (head == NULL)
cout << \"Path cleaned\" << endl;
else
printPath(head);
cout << \"Goodbye!\" << endl;
return 0;
}
/*
* Purpose: handle the interaction with the user
* Do NOT modify
*/
city* handleUserInput(city *head)
{
bool quit = false;
string s_input;
int input;
// loop until the user quits
while (!quit)
{
displayMenu();
// read in input, assuming a number comes in
getline(cin, s_input);
input = stoi(s_input);
switch (input)
{
// print all nodes
case 1: //rebuild network
head = loadDefaultSetup(head);
printPath(head);
break;
case 2: // print path
printPath(head);
break;
case 3: //message is read in from file
{
string cityReceiver;
cout << \"Enter name of the city to receive the message: \" << endl;
getline(cin, cityReceiver);
cout << \"Enter the message to send: \" << endl;
string message;
getline(cin, message);
transmitMsg(head, cityReceiver, message);
}
break;
case 4:
{
string newCityName;
string prevCityName;
cout << \"Enter a new city name: \" << endl;
getline(cin, newCityName);
cout << \"Enter the previous city name (or First): \" << endl;
getline(cin, prevCityName);
// find the node containing prevCity
city *tmp = NULL;
if(prevCityName !=\"First\")
tmp = searchNetwork(head, prevCityName);
// add the new node
head = addCity(head, tmp, newCityName);
printPath(head);
}
break;
case 5: // delete city
{
string city;
cout << \"Enter a city name: \" << endl;
getline(cin, city);
head = deleteCity(head, city);
printPath(head);
}
break;
case 6: // delete network
head = deleteEntireNetwork(head);
break;
case 7: // quit
quit = true;
cout << \"Quitting... cleaning up path: \" << endl;
break;
default: // invalid input
cout << \"Invalid Input\" << endl;
break;
}
}
return head;
}
/*
* Purpose: Add a new city to the network
* between the city *previous and the city that follows it in the network.
*/
city* addCity(city *head, city *previous, string cityName )
{
city* add = new city; //to distinguish and create the new node, i named it add
add->name = cityName;
city* tmp = new city;
tmp=head;
if(previous == NULL){
add->next = head;
head = add;
}
while(tmp != NULL && previous != tmp){
tmp = tmp->next;
}
if(tm.
silver cyanide i think coz HCN will be formed whi.pdfannesmkt
silver cyanide i think coz HCN will be formed which is LESS Acidic compared to
others
Solution
silver cyanide i think coz HCN will be formed which is LESS Acidic compared to
others.
No. The Mo is in +3 oxidation state and thus its .pdfannesmkt
No. The Mo is in +3 oxidation state and thus its valence electron configuration is
4d3. It can use its three d electrons to form a Mo-Mo triple bond (bond order= 3).
Solution
No. The Mo is in +3 oxidation state and thus its valence electron configuration is
4d3. It can use its three d electrons to form a Mo-Mo triple bond (bond order= 3)..
In the automata theory, a nondeterministic finite.pdfannesmkt
In the automata theory, a nondeterministic finite automaton (NFA) or
nondeterministic finite state machine is a finite state machine where from each state and a given
input symbol the automaton may jump into several possible next states. This distinguishes it
from the deterministic finite automaton (DFA), where the next possible state is uniquely
determined. Although the DFA and NFA have distinct definitions, a NFA can be translated to
equivalent DFA using powerset construction, i.e., the constructed DFA and the NFA recognize
the same formal language. Both types of automata recognize only regular languages. NFAs were
introduced in 1959 by Michael O. Rabin and Dana Scott,[1] who also showed their equivalence
to DFAs. Informal introduction An NFA, similar to a DFA, consumes a string of input
symbols. For each input symbol, it transitions to a new state until all input symbols have been
consumed. Unlike a DFA, it is non-deterministic, i.e., for any input symbol the next state may be
any one of several possible states. Thus, in the formal definition, the next state is an element of
the power set of the states, which is a set of states to be considered at once. The notion of
accepting an input is similar to that for the DFA. When the last input symbol is consumed, the
NFA accepts if and only if there is some set of transitions that will take it to an accepting state.
Equivalently, it rejects, if, no matter what transitions are applied, it would not end in an
accepting state. Formal definition An NFA is represented formally by a 5-tuple, (Q, S, ?, q0, F),
consisting of a finite set of states Q a finite set of input symbols S a transition relation ? : Q × S
? P(Q). an initial (or start) state q0 ? Q a set of states F distinguished as accepting (or final) states
F ? Q. Here, P(Q) denotes the power set of Q. Let w = a1a2 ... an be a word over the alphabet S.
The automaton M accepts the word w if a sequence of states, r0,r1, ..., rn, exists in Q with the
following conditions: r0 = q0 ri+1 ? ?(ri, ai+1), for i = 0, ..., n-1 rn ? F. In words, the first
condition says that the machine starts in the start state q0. The second condition says that given
each character of string w, the machine will transition from state to state according to the
transition relation ?. The last condition says that the machine accepts w if the last input of w
causes the machine to halt in one of the accepting states. Otherwise, it is said that the automaton
rejects the string. The set of strings M accepts is the language recognized by M and this language
is denoted by L(M). We can also define L(M) in terms of ?*: Q × S* ? P(Q) such that: ?*(r, e)=
{r} where e is the empty string, and If x ? S*, a ? S, and ?*(r, x)={r1, r2,..., rk} then ?*(r, xa)=
?(r1, a)?...??(rk, a). Now L(M) = {w | ?*(q0, w) n F ? Ø}. Note that there is a single initial state,
which is not necessary. Sometimes, NFAs are defined with a set of initial states. There is an easy
construction that translates a NFA.
Formaldehyde is an organic compound with the form.pdfannesmkt
Formaldehyde is an organic compound with the formula CH2O. It is the simplest
aldehyde, hence its systematic name methanal. Formaldehyde is a colorless gas with a
characteristic pungent odor. It is an important precursor to many other chemical compounds,
especially for polymers. In 2005, annual world production of formaldehyde was estimated to be
23 million tonnes (50 billion pounds).[4] Commercial solutions of formaldehyde in water,
commonly called formalin, were formerly used as disinfectants and for preservation of biological
specimens. In view of its widespread use, toxicity and volatility, exposure to formaldehyde is a
significant consideration for human health.[5] On 10 June 2011, the US National Toxicology
Program has described formaldehyde as \"known to be a human carcinogen\".
Solution
Formaldehyde is an organic compound with the formula CH2O. It is the simplest
aldehyde, hence its systematic name methanal. Formaldehyde is a colorless gas with a
characteristic pungent odor. It is an important precursor to many other chemical compounds,
especially for polymers. In 2005, annual world production of formaldehyde was estimated to be
23 million tonnes (50 billion pounds).[4] Commercial solutions of formaldehyde in water,
commonly called formalin, were formerly used as disinfectants and for preservation of biological
specimens. In view of its widespread use, toxicity and volatility, exposure to formaldehyde is a
significant consideration for human health.[5] On 10 June 2011, the US National Toxicology
Program has described formaldehyde as \"known to be a human carcinogen\"..
Water molecules do not participate in acid base neutralization react.pdfannesmkt
Water molecules do not participate in acid base neutralization reactions.addition
of distilled water doesnot alter the equivalence point.
Solution
Water molecules do not participate in acid base neutralization reactions.addition
of distilled water doesnot alter the equivalence point..
The Mouse and the track ball uses pointing and dragging tasks.The ac.pdfannesmkt
The Mouse and the track ball uses pointing and dragging tasks.The actions of pointing and
dragging are fundamental, low-level operations in direct manipulation interfaces.pointing and
dragging both are diffrent to each other.
pointing by fitt\'s law:
Pointing tasks have been studied extensively. Much of this work is based on a robust
model of human movement known as Fitts\' law. The law predicts that the time to acquire a
target is logarithmically related to the distance over the target size. More formally, the time (MT)
to move to a target of width W which lies at distance (or amplitude) A is
where a and b are empirical constants determined through linear regression.
The log term is called the index of difficulty (ID) and carries the units \"bits\" (because the base
is \"2\"). The reciprocal of b is the index of performance (IP) in bits/s. This is purportedly the
human rate of information processing for the movement task under investigation. Card, English,
and Burr (1978) found IP = 10.4 bits/s for the mouse in a text selection task.
MT = a + b log2(A / W + 1).
dragging by using fitt\'s law:
Using Fitts\' law to model dragging is best explained using an example. Consider the case of
deleting a file on the Apple Macintosh. First, the user acquires the icon for the file in question.
This point/select operation is a classic two-dimensional target acquisition task. Then, while
holding the mouse button down, the icon is dragged to the trashcan. This also is a target
acquisition task. One is really just acquiring the trashcan icon. In this case, however, the task is
performed with the mouse button depressed.
Pressing and releasing the mouse button over an icon selects the icon and leaves the user in State
1. Depressing the mouse button over an icon and moving the mouse drags the icon. This is a
State 2 action. Releasing the mouse button returns to the tracking state, State 1.
State 2 motion on most input devices requires active maintenance of the state (e.g., by holding
down a button), generally restricting the freedom of movement. Given the frequency of State 2
actions in direct manipulation systems, we feel the following are important:MT = a + b log2(2A /
W)(1)
Solution
The Mouse and the track ball uses pointing and dragging tasks.The actions of pointing and
dragging are fundamental, low-level operations in direct manipulation interfaces.pointing and
dragging both are diffrent to each other.
pointing by fitt\'s law:
Pointing tasks have been studied extensively. Much of this work is based on a robust
model of human movement known as Fitts\' law. The law predicts that the time to acquire a
target is logarithmically related to the distance over the target size. More formally, the time (MT)
to move to a target of width W which lies at distance (or amplitude) A is
where a and b are empirical constants determined through linear regression.
The log term is called the index of difficulty (ID) and carries the units \"bits\" (because the base
is \"2\"). T.
The employer must estimate the total cost of the benefits promised a.pdfannesmkt
The employer must estimate the total cost of the benefits promised and then allocate these costs
to the periods in which the employees provide service. Most Defined Benifit pension plans are
funded through a separate legal entity, typically a pension trust, and the assets of the trust are
used to make the payments to retirees. The Pension Trust make investment of the contribution to
meet the pension obligation in the stock,Bond market,real estate and commodity market knows
as Plan Asset. The sponsoring company is responsible for making contributions to the plan. The
company also must ensure that there are sufficient assets in the plan to pay the ultimate benefits
promised to plan participants. Regulatory requirements usually specify minimum funding levels
for Defined Benifit pension plans, but those requirements vary by country.Because the company
has promised a defined amount of benefit to the employees, it is obligated to make those pension
payments when they are due regardless of whether the pension plan assets generate sufficient
returns to provide the benefits. In other words, the company bears the investment risk.
Solution
The employer must estimate the total cost of the benefits promised and then allocate these costs
to the periods in which the employees provide service. Most Defined Benifit pension plans are
funded through a separate legal entity, typically a pension trust, and the assets of the trust are
used to make the payments to retirees. The Pension Trust make investment of the contribution to
meet the pension obligation in the stock,Bond market,real estate and commodity market knows
as Plan Asset. The sponsoring company is responsible for making contributions to the plan. The
company also must ensure that there are sufficient assets in the plan to pay the ultimate benefits
promised to plan participants. Regulatory requirements usually specify minimum funding levels
for Defined Benifit pension plans, but those requirements vary by country.Because the company
has promised a defined amount of benefit to the employees, it is obligated to make those pension
payments when they are due regardless of whether the pension plan assets generate sufficient
returns to provide the benefits. In other words, the company bears the investment risk..
public class Passenger { public static enum Section { .pdfannesmkt
public class Passenger {
public static enum Section {
First, Economy
}
private String name;
private Section section;
private String confirmationCode;
/**
* Constructor
*
* @param name
* @param section
* @param confirmationCode
*/
public Passenger(String name, Section section, String confirmationCode) {
this.name = name;
this.section = section;
this.confirmationCode = confirmationCode;
}
/**
* Copy Constructor that produces a deep copy of the argument
*
* @param
*/
public Passenger(Passenger p) {
this.name = p.name;
this.section = p.section;
this.confirmationCode = p.confirmationCode;
}
/**
* Returns a string with confirmation code
*/
public static String generateCode() {
String alphabet = \"abcdefghijklmnopqrstuvwxyz\";
String[] letters = new String[6];
String code = \"\";
for (int i = 0; i < 6; i++) {
letters[i] = \"\" + alphabet.charAt((int) Math.floor(Math.random() * 26));
code += letters[i];
}
return code.toUpperCase();
}
/**
* @return the name
*/
public String getName() {
return name;
}
/**
* @param name the name to set
*/
public void setName(String name) {
this.name = name;
}
/**
* @return the section
*/
public Section getSection() {
return section;
}
/**
* @param section the section to set
*/
public void setSection(Section section) {
this.section = section;
}
/**
* @return the confirmationCode
*/
public String getConfirmationCode() {
return confirmationCode;
}
/**
* @param confirmationCode the confirmationCode to set
*/
public void setConfirmationCode(String confirmationCode) {
this.confirmationCode = confirmationCode;
}
@Override
public String toString() {
return \"\ Passenger name: \" + getName() +
\"\ Class: \" + getSection() +
\"\ Confirmation Code: \" + getConfirmationCode();
}
}
import java.util.Scanner;
public class Manifest {
public static void printBP(Passenger p) {
System.out.print(String.format(\"\ %30s\", \" \").replaceAll(\" \", \"-\"));
System.out.print(p);
System.out.print(String.format(\"\ %30s\", \" \").replaceAll(\" \", \"-\"));
}
public static void main(String[] args) {
final int FIRST_CAPACITY = 2;
final int ECO_CAPACITY = 4;
// Scanner to get user input
Scanner in = new Scanner(System.in);
// Create passenger array
Passenger[] pList = new Passenger[6];
int reservationCount = 0;
// Variables to track whether a section is full
int firstSeats = 0;
int ecoSeats = 0;
char ch = \' \';
do {
// Get pax name
System.out.print(\"Enter the passenger\'s full name: \");
String name = in.nextLine();
// Get section
int section = -1;
while (true) {
System.out.println(\"Select a section 0-First, 1-Economy: \");
section = in.nextInt();
// Check if selected section is full
if (section == 0) {
if (firstSeats == FIRST_CAPACITY) {
System.out.println(\"First class seats are full. Do you wan to reserve a seat in the
economy section[Y/N]: \");
char reserve = in.next().charAt(0);
//If user does not want to make the reservation
//finish booking without a reservation
if(Character.toUpperCase(reserve) == \'N\')
break;
section = 1; //Change sect.
Prior to 2010, the United States banned HIV-positive individuals fro.pdfannesmkt
Prior to 2010, the United States banned HIV-positive individuals from entering the United states,
even the foreigners who were found HIV positive forced to leave US as undisirables. HIV is
deadily and transmissible, it spreads uncontrollably, millions will be infected and eventually will
die but these are fear rather than facts.
HIV positive individuals are already living in shadows, discriminating them is more like running
away from the problem instead fighting and defeating the problem.
Banning entry of HIV positive individuals into United states spreads a worldwide message which
is more fearful and vanquished. But message to the world from US should be more positive and
strong. The message to the world from US should be the fight against HIV is still on and we will
win.
Foreigners avoid the testing to enter US which worsen the situation. Individuals deny to be HIV
positive and takes extreme steps instead fighting with the disease.
Now when the Ban is lifted individuals are more truthful to the fact and mentally stronger to
fight with the disease, decrease in xenophobia and increase in responsibility and a positive
message gone to the world.
Solution
Prior to 2010, the United States banned HIV-positive individuals from entering the United states,
even the foreigners who were found HIV positive forced to leave US as undisirables. HIV is
deadily and transmissible, it spreads uncontrollably, millions will be infected and eventually will
die but these are fear rather than facts.
HIV positive individuals are already living in shadows, discriminating them is more like running
away from the problem instead fighting and defeating the problem.
Banning entry of HIV positive individuals into United states spreads a worldwide message which
is more fearful and vanquished. But message to the world from US should be more positive and
strong. The message to the world from US should be the fight against HIV is still on and we will
win.
Foreigners avoid the testing to enter US which worsen the situation. Individuals deny to be HIV
positive and takes extreme steps instead fighting with the disease.
Now when the Ban is lifted individuals are more truthful to the fact and mentally stronger to
fight with the disease, decrease in xenophobia and increase in responsibility and a positive
message gone to the world..
option (e) is correct.the feature that distinguishes fluorescence .pdfannesmkt
option (e) is correct.
the feature that distinguishes fluorescence from phosphorescence is the amount of the absorbed
energy.
lower energy, than the absorbed radiation
Solution
option (e) is correct.
the feature that distinguishes fluorescence from phosphorescence is the amount of the absorbed
energy.
lower energy, than the absorbed radiation.
NADP is the source of electrons for the light reactionsThe electro.pdfannesmkt
NADP is the source of electrons for the light reactions
The electron acceptor of the light reactions, NADP+, which functions as an electron carrier in
cellular respiration. The light reactions use solar power to reduce NADP+ to NADPH by adding
a pair of electrons along with a hydrogen nucleus, or H The light reactions also generate ATP by
powering the addition of a phosphate group to ADP, a process called photophosphorylation.
Solution
NADP is the source of electrons for the light reactions
The electron acceptor of the light reactions, NADP+, which functions as an electron carrier in
cellular respiration. The light reactions use solar power to reduce NADP+ to NADPH by adding
a pair of electrons along with a hydrogen nucleus, or H The light reactions also generate ATP by
powering the addition of a phosphate group to ADP, a process called photophosphorylation..
import java.util.Scanner;public class Bottle { private stat.pdfannesmkt
import java.util.Scanner;
public class Bottle {
private static final int MAX=100; //max constant
private static final int MIN=0; // min constant
static Scanner scan = new Scanner(System.in);
private int noOfBottle=0;
//method 1 to read the value form console
public void read()
{
int x = scan.nextInt();
noOfBottle=x;
}
//method 2 to set the no of bottle property of bottle class
public void set(int a)
{
if(a<=MAX)
{
noOfBottle=a;
}else
{
System.out.println(\"number is greater than max value\");
}
}
//method 3 to set the noOfBottle property from bottle object
public void setBottle(Bottle a)
{
if(a.noOfBottle<=MAX)
{
noOfBottle=a.noOfBottle;
}else
{
System.out.println(\"number is greater than max value\");
}
}
//method 4 to get he noOfBottle value
public int get()
{
return this.noOfBottle;
}
//method 5 addition of bottle objects
public Bottle add(Bottle bottle)
{
if(this.noOfBottle+bottle.noOfBottle<=MAX)
{
this.noOfBottle=this.noOfBottle+bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : addition excedding the maximum number \");
}
return this;
}
//method 6 subtraction of bottle objects
public Bottle subtract(Bottle bottle)
{
if(this.noOfBottle-bottle.noOfBottle>=MIN)
{
this.noOfBottle=this.noOfBottle-bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Subtraction reducing the bottle to below min range possible
\");
}
return this;
}
//method 7 multiplication of bottle objects
public Bottle multiply(Bottle bottle)
{
if(this.noOfBottle*bottle.noOfBottle<=MAX)
{
this.noOfBottle=this.noOfBottle*bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Multiplication exceeding MAX value \");
}
return this;
}
//method 8 division of bopttle objects
public Bottle divide(Bottle bottle)
{
try{
if(this.noOfBottle/bottle.noOfBottle>=MIN)
{
this.noOfBottle=this.noOfBottle/bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Division reducing to possible MIN value \");
}
}catch(Exception e)
{
System.out.println(\"/ By zero error\");
e.printStackTrace();
}
return this;
}
//method 9 addition of int value to bottle noOfObject property
public Bottle add(int a)
{
if(this.noOfBottle+a<=MAX)
{
this.noOfBottle=this.noOfBottle+a;
}
else
{
System.out.println(\"Alert : addition excedding the maximum number \");
}
return this;
}
//method 10 subtraction of bottle noOfObject property
public Bottle subtract(int a)
{
if(this.noOfBottle-a>=MIN)
{
this.noOfBottle=this.noOfBottle-a;
}
else
{
System.out.println(\"Alert : Subtraction reducing the bottle to below min range possible
\");
}
return this;
}
//method 11 multiplication of bottle noOfObject property
public Bottle multiply(int a)
{
if(this.noOfBottle*a<=MAX)
{
this.noOfBottle=this.noOfBottle*a;
}
else
{
System.out.println(\"Alert : Multiplication exceeding MAX value \");
}
return this;
}
//method 12 d of bottle noOfObject property
public Bottle divide(int a)
{
try{
if(this.noOfBottle/a>=MIN)
{
this.noOfBottle=this.noOfBottle/a;
}
else
{
System.out.println(\"Alert : Division reducing below to possible MIN val.
In previous year, 2 birthdays were on tuesday but this year theres.pdfannesmkt
In previous year, 2 birthdays were on tuesday but this year there\'s only 1 birthday on
wednesday.
It means 1 birthday was is month of feb or jan (which was on tuesday prev year) and now it is on
thursday. And the other 1 has wednesday birthday and falls after february. So the days of
birthday are wednesday, thursday, monday and saturday.
The months of birthday are jan/feb, nov, july, august. 1 birthday on jan which means jan
thursday was a birthday.
Novemeber b\'day could be mon/wed. the 2 person with 14 n 15 age must ve same age 4 2
months in a year.
only august n nov have 2 months difference. The person wid thursday b\'day was 4 years older
dan paul. So paul\'s age is 7 and the person with Jan Thusrday b\'day is 11. Either Don is 14 or
15 n born in aug.
The person with monday b\'day has month either nov or august. The july birthday can\'t be a
thursday or a monday. If it\'s a wednesday, Lucky has monday b\'day n is 15 years old. Else if
it\'s a sat, lucky cud be 15 n nov monday b\'day or wed b\'day in august n is 14. The 2nd option is
cancelled as Don is born in august. It imply that Lawrence is 11 and born in jan thursday. and
Paul is born on July wednesday. Hence don is born in august saturday.
Lawrence: Jan thursday 11
Paul: July Wednesday 7
Don: august saturday 14
Lucky: November monday 15
Solution
In previous year, 2 birthdays were on tuesday but this year there\'s only 1 birthday on
wednesday.
It means 1 birthday was is month of feb or jan (which was on tuesday prev year) and now it is on
thursday. And the other 1 has wednesday birthday and falls after february. So the days of
birthday are wednesday, thursday, monday and saturday.
The months of birthday are jan/feb, nov, july, august. 1 birthday on jan which means jan
thursday was a birthday.
Novemeber b\'day could be mon/wed. the 2 person with 14 n 15 age must ve same age 4 2
months in a year.
only august n nov have 2 months difference. The person wid thursday b\'day was 4 years older
dan paul. So paul\'s age is 7 and the person with Jan Thusrday b\'day is 11. Either Don is 14 or
15 n born in aug.
The person with monday b\'day has month either nov or august. The july birthday can\'t be a
thursday or a monday. If it\'s a wednesday, Lucky has monday b\'day n is 15 years old. Else if
it\'s a sat, lucky cud be 15 n nov monday b\'day or wed b\'day in august n is 14. The 2nd option is
cancelled as Don is born in august. It imply that Lawrence is 11 and born in jan thursday. and
Paul is born on July wednesday. Hence don is born in august saturday.
Lawrence: Jan thursday 11
Paul: July Wednesday 7
Don: august saturday 14
Lucky: November monday 15.
Homology is defined as structures which are derived from a common an.pdfannesmkt
Homology is defined as structures which are derived from a common ancestor like wings of bird
and forelimbs of bat.
Divergent evolution: It is the process where two or more related species become more and more
dissimilar. Divergent evolution produces homologous structures e.g.same bones can be used in
many ways leading to divergent evolutionary paths like frogs, bats, birds so on.
So the correct option is (c):Divergent evolution.
Solution
Homology is defined as structures which are derived from a common ancestor like wings of bird
and forelimbs of bat.
Divergent evolution: It is the process where two or more related species become more and more
dissimilar. Divergent evolution produces homologous structures e.g.same bones can be used in
many ways leading to divergent evolutionary paths like frogs, bats, birds so on.
So the correct option is (c):Divergent evolution..
HI is a strong acid, so its [H+] = 4.5 10-2 molesL = 0.045pH is.pdfannesmkt
HI is a strong acid, so its [H+] = 4.5 * 10-2 moles/L = 0.045
pH is the -log [H+] = -log (0.045)
pH = 1.35
Solution
HI is a strong acid, so its [H+] = 4.5 * 10-2 moles/L = 0.045
pH is the -log [H+] = -log (0.045)
pH = 1.35.
For first figure Member BEFor second figure Members BH , DFF.pdfannesmkt
For first figure : Member BE
For second figure : Members BH , DF
For third figure : Members HF, HE
For fourth figure : Members AB, AO, GF, GT, NM, HI, UM, VI.
Solution
For first figure : Member BE
For second figure : Members BH , DF
For third figure : Members HF, HE
For fourth figure : Members AB, AO, GF, GT, NM, HI, UM, VI..
constructor to initialize the tree objectFunction to insert the no.pdfannesmkt
constructor to initialize the tree object
Function to insert the nodes into the tree
function to create a node
function to get maximum in a tree
function to get minimum
function to check whether the element is present in the tree
function to remove an element from a tree
function to check the tree is empty
function isEmpty(node){
if(node==NULL)
return true;
else
return false;
}
function to find leaf node are present to the given node
functiom isLeaf(node){
if(node doesnot contain children)
return true;
else
return false;
funtion to copy into string and display
Solution
constructor to initialize the tree object
Function to insert the nodes into the tree
function to create a node
function to get maximum in a tree
function to get minimum
function to check whether the element is present in the tree
function to remove an element from a tree
function to check the tree is empty
function isEmpty(node){
if(node==NULL)
return true;
else
return false;
}
function to find leaf node are present to the given node
functiom isLeaf(node){
if(node doesnot contain children)
return true;
else
return false;
funtion to copy into string and display.
A)Provide three examples that demonstrate how security can be instil.pdfannesmkt
A)Provide three examples that demonstrate how security can be instilled within the Systems
Development Life Cycle (SDLC)
Context
Description
Example
Confidentiality
This is that there should be very less accessing right only to the authorize user.
Identify users of project and give them rights.
E.g. The student in a university database. It can view only its result or anything which is related
to it, not other information of university database.
Integrity
Trusted source of information
Monitoring of data from source to destination.
E.g.Like in android mobiles, there is an option Don’t allow installation from unknown sources
(other than googleplay) which is set to be off for security reason
Ownership
Possession for control of information
Give the role and responsibility in analysis phase of SDLC for different modules.
E.g. Role for the particular activity in a school play.
Q.
Provide two examples on what users may experience with software products if they are released
with minimal security planning.
If there is minimal security, then the security breach can effect on product in following terms
No Utility: No perfection for the product.
No Proper Authenticity.
Unsurprisingly availability of information
Also the confidentiality and integrity will be effected
(b) Suggest three ways that application security can be monitored and evaluated for
effectiveness. Choose what you believe to be the most effective way and discuss why.
System development life cycle
1.Planning
2.Feasibility Study
3.Analysis
4.Design
5.Testing
6.Implementation
7.Maintenance
These are the phases of SDLC. In first phase and second there is no need of security, because the
main part of SDLC begins from 3 phase i.e. analysis and continues till the last.
Analysis phase:
1.Risk analysis in the functional requirement specification and software requirement
specification
2.Identify security realm
3.Security functional requirement
Design Phase:
1. Develop some security controls
2.Develop security mechanism and security action plan
3.Develop security coding guidelines.
Testing phase:
1. Regression testing.
2. Independent functionality testing.
3. Threat analysis testing
The most effective way is Independent functionality testing. Because in this, each phase is tested
by outsiders, no person concerned in designing of project is included in testing. This is like Beta
testing in which a project is sent to company\'s friend company. Beceause it is difficult to find
own mistake.
Context
Description
Example
Confidentiality
This is that there should be very less accessing right only to the authorize user.
Identify users of project and give them rights.
E.g. The student in a university database. It can view only its result or anything which is related
to it, not other information of university database.
Integrity
Trusted source of information
Monitoring of data from source to destination.
E.g.Like in android mobiles, there is an option Don’t allow installation from unknown sources
(other than goo.
16).Active transport of molecules require energy. Active transport.pdfannesmkt
16).
Active transport of molecules require energy. Active transport needs energy, and it help to move
ions against their concentration gradients. The two types active transport mechanisms are,
(i). Primary active transport
(ii). Secondary active transport
For example, the concentration of sodium ions is more outside the cell. Still, the sodium ions
move from the inside of cell to outside through ion channels, by means of active transport.
Active transport needs energy, and it help to move ions against their concentration gradients.
Eg: Na+-K+ ATPase is an ATP (adenosine triphosphate) driven pump, which establishes the
sodium gradient (it pump sodium ions out of the cell against its concentration gradient and
allows the influx of potassium ions).
The theory of secondary active transport:
The secondary active transport is an active transport in which the downhill movement of an ion
(either sodium or hydrogen) is coupled with the uphill movement of another molecule (against its
concentration) by the transporter protein. Thus, the electrochemical gradient of an ion drives
uphill transport of another molecule.
Eg: Glucose absorption by cell is an example of secondary active transport.
The sodium-glucose linked transporter (SGLTs, a co-transporter) uses the energy generated by
the ATPase pump through the downhill sodium ion gradient for the glucose transportation across
the apical membrane (against the glucose gradient). SGLTs are an example of secondary active
transport. The glucose transporters (GLUT) present in the basolateral membrane now allow the
glucose transport into the peritubular capillaries. Inhibition of the Na+/K+/ATPase fails to
generate energy required for the SGLT secondary transporters, which inhibits glucose uptake.
Other examples include Na+/phosphate coransporter, Na+/Iodide symporter, Na+/Cl-
cotransporter, etc.
Solution
16).
Active transport of molecules require energy. Active transport needs energy, and it help to move
ions against their concentration gradients. The two types active transport mechanisms are,
(i). Primary active transport
(ii). Secondary active transport
For example, the concentration of sodium ions is more outside the cell. Still, the sodium ions
move from the inside of cell to outside through ion channels, by means of active transport.
Active transport needs energy, and it help to move ions against their concentration gradients.
Eg: Na+-K+ ATPase is an ATP (adenosine triphosphate) driven pump, which establishes the
sodium gradient (it pump sodium ions out of the cell against its concentration gradient and
allows the influx of potassium ions).
The theory of secondary active transport:
The secondary active transport is an active transport in which the downhill movement of an ion
(either sodium or hydrogen) is coupled with the uphill movement of another molecule (against its
concentration) by the transporter protein. Thus, the electrochemical gradient of an ion drives
uphill transport of another molecule.
Eg: .
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Water molecules do not participate in acid base neutralization react.pdfannesmkt
Water molecules do not participate in acid base neutralization reactions.addition
of distilled water doesnot alter the equivalence point.
Solution
Water molecules do not participate in acid base neutralization reactions.addition
of distilled water doesnot alter the equivalence point..
The Mouse and the track ball uses pointing and dragging tasks.The ac.pdfannesmkt
The Mouse and the track ball uses pointing and dragging tasks.The actions of pointing and
dragging are fundamental, low-level operations in direct manipulation interfaces.pointing and
dragging both are diffrent to each other.
pointing by fitt\'s law:
Pointing tasks have been studied extensively. Much of this work is based on a robust
model of human movement known as Fitts\' law. The law predicts that the time to acquire a
target is logarithmically related to the distance over the target size. More formally, the time (MT)
to move to a target of width W which lies at distance (or amplitude) A is
where a and b are empirical constants determined through linear regression.
The log term is called the index of difficulty (ID) and carries the units \"bits\" (because the base
is \"2\"). The reciprocal of b is the index of performance (IP) in bits/s. This is purportedly the
human rate of information processing for the movement task under investigation. Card, English,
and Burr (1978) found IP = 10.4 bits/s for the mouse in a text selection task.
MT = a + b log2(A / W + 1).
dragging by using fitt\'s law:
Using Fitts\' law to model dragging is best explained using an example. Consider the case of
deleting a file on the Apple Macintosh. First, the user acquires the icon for the file in question.
This point/select operation is a classic two-dimensional target acquisition task. Then, while
holding the mouse button down, the icon is dragged to the trashcan. This also is a target
acquisition task. One is really just acquiring the trashcan icon. In this case, however, the task is
performed with the mouse button depressed.
Pressing and releasing the mouse button over an icon selects the icon and leaves the user in State
1. Depressing the mouse button over an icon and moving the mouse drags the icon. This is a
State 2 action. Releasing the mouse button returns to the tracking state, State 1.
State 2 motion on most input devices requires active maintenance of the state (e.g., by holding
down a button), generally restricting the freedom of movement. Given the frequency of State 2
actions in direct manipulation systems, we feel the following are important:MT = a + b log2(2A /
W)(1)
Solution
The Mouse and the track ball uses pointing and dragging tasks.The actions of pointing and
dragging are fundamental, low-level operations in direct manipulation interfaces.pointing and
dragging both are diffrent to each other.
pointing by fitt\'s law:
Pointing tasks have been studied extensively. Much of this work is based on a robust
model of human movement known as Fitts\' law. The law predicts that the time to acquire a
target is logarithmically related to the distance over the target size. More formally, the time (MT)
to move to a target of width W which lies at distance (or amplitude) A is
where a and b are empirical constants determined through linear regression.
The log term is called the index of difficulty (ID) and carries the units \"bits\" (because the base
is \"2\"). T.
The employer must estimate the total cost of the benefits promised a.pdfannesmkt
The employer must estimate the total cost of the benefits promised and then allocate these costs
to the periods in which the employees provide service. Most Defined Benifit pension plans are
funded through a separate legal entity, typically a pension trust, and the assets of the trust are
used to make the payments to retirees. The Pension Trust make investment of the contribution to
meet the pension obligation in the stock,Bond market,real estate and commodity market knows
as Plan Asset. The sponsoring company is responsible for making contributions to the plan. The
company also must ensure that there are sufficient assets in the plan to pay the ultimate benefits
promised to plan participants. Regulatory requirements usually specify minimum funding levels
for Defined Benifit pension plans, but those requirements vary by country.Because the company
has promised a defined amount of benefit to the employees, it is obligated to make those pension
payments when they are due regardless of whether the pension plan assets generate sufficient
returns to provide the benefits. In other words, the company bears the investment risk.
Solution
The employer must estimate the total cost of the benefits promised and then allocate these costs
to the periods in which the employees provide service. Most Defined Benifit pension plans are
funded through a separate legal entity, typically a pension trust, and the assets of the trust are
used to make the payments to retirees. The Pension Trust make investment of the contribution to
meet the pension obligation in the stock,Bond market,real estate and commodity market knows
as Plan Asset. The sponsoring company is responsible for making contributions to the plan. The
company also must ensure that there are sufficient assets in the plan to pay the ultimate benefits
promised to plan participants. Regulatory requirements usually specify minimum funding levels
for Defined Benifit pension plans, but those requirements vary by country.Because the company
has promised a defined amount of benefit to the employees, it is obligated to make those pension
payments when they are due regardless of whether the pension plan assets generate sufficient
returns to provide the benefits. In other words, the company bears the investment risk..
public class Passenger { public static enum Section { .pdfannesmkt
public class Passenger {
public static enum Section {
First, Economy
}
private String name;
private Section section;
private String confirmationCode;
/**
* Constructor
*
* @param name
* @param section
* @param confirmationCode
*/
public Passenger(String name, Section section, String confirmationCode) {
this.name = name;
this.section = section;
this.confirmationCode = confirmationCode;
}
/**
* Copy Constructor that produces a deep copy of the argument
*
* @param
*/
public Passenger(Passenger p) {
this.name = p.name;
this.section = p.section;
this.confirmationCode = p.confirmationCode;
}
/**
* Returns a string with confirmation code
*/
public static String generateCode() {
String alphabet = \"abcdefghijklmnopqrstuvwxyz\";
String[] letters = new String[6];
String code = \"\";
for (int i = 0; i < 6; i++) {
letters[i] = \"\" + alphabet.charAt((int) Math.floor(Math.random() * 26));
code += letters[i];
}
return code.toUpperCase();
}
/**
* @return the name
*/
public String getName() {
return name;
}
/**
* @param name the name to set
*/
public void setName(String name) {
this.name = name;
}
/**
* @return the section
*/
public Section getSection() {
return section;
}
/**
* @param section the section to set
*/
public void setSection(Section section) {
this.section = section;
}
/**
* @return the confirmationCode
*/
public String getConfirmationCode() {
return confirmationCode;
}
/**
* @param confirmationCode the confirmationCode to set
*/
public void setConfirmationCode(String confirmationCode) {
this.confirmationCode = confirmationCode;
}
@Override
public String toString() {
return \"\ Passenger name: \" + getName() +
\"\ Class: \" + getSection() +
\"\ Confirmation Code: \" + getConfirmationCode();
}
}
import java.util.Scanner;
public class Manifest {
public static void printBP(Passenger p) {
System.out.print(String.format(\"\ %30s\", \" \").replaceAll(\" \", \"-\"));
System.out.print(p);
System.out.print(String.format(\"\ %30s\", \" \").replaceAll(\" \", \"-\"));
}
public static void main(String[] args) {
final int FIRST_CAPACITY = 2;
final int ECO_CAPACITY = 4;
// Scanner to get user input
Scanner in = new Scanner(System.in);
// Create passenger array
Passenger[] pList = new Passenger[6];
int reservationCount = 0;
// Variables to track whether a section is full
int firstSeats = 0;
int ecoSeats = 0;
char ch = \' \';
do {
// Get pax name
System.out.print(\"Enter the passenger\'s full name: \");
String name = in.nextLine();
// Get section
int section = -1;
while (true) {
System.out.println(\"Select a section 0-First, 1-Economy: \");
section = in.nextInt();
// Check if selected section is full
if (section == 0) {
if (firstSeats == FIRST_CAPACITY) {
System.out.println(\"First class seats are full. Do you wan to reserve a seat in the
economy section[Y/N]: \");
char reserve = in.next().charAt(0);
//If user does not want to make the reservation
//finish booking without a reservation
if(Character.toUpperCase(reserve) == \'N\')
break;
section = 1; //Change sect.
Prior to 2010, the United States banned HIV-positive individuals fro.pdfannesmkt
Prior to 2010, the United States banned HIV-positive individuals from entering the United states,
even the foreigners who were found HIV positive forced to leave US as undisirables. HIV is
deadily and transmissible, it spreads uncontrollably, millions will be infected and eventually will
die but these are fear rather than facts.
HIV positive individuals are already living in shadows, discriminating them is more like running
away from the problem instead fighting and defeating the problem.
Banning entry of HIV positive individuals into United states spreads a worldwide message which
is more fearful and vanquished. But message to the world from US should be more positive and
strong. The message to the world from US should be the fight against HIV is still on and we will
win.
Foreigners avoid the testing to enter US which worsen the situation. Individuals deny to be HIV
positive and takes extreme steps instead fighting with the disease.
Now when the Ban is lifted individuals are more truthful to the fact and mentally stronger to
fight with the disease, decrease in xenophobia and increase in responsibility and a positive
message gone to the world.
Solution
Prior to 2010, the United States banned HIV-positive individuals from entering the United states,
even the foreigners who were found HIV positive forced to leave US as undisirables. HIV is
deadily and transmissible, it spreads uncontrollably, millions will be infected and eventually will
die but these are fear rather than facts.
HIV positive individuals are already living in shadows, discriminating them is more like running
away from the problem instead fighting and defeating the problem.
Banning entry of HIV positive individuals into United states spreads a worldwide message which
is more fearful and vanquished. But message to the world from US should be more positive and
strong. The message to the world from US should be the fight against HIV is still on and we will
win.
Foreigners avoid the testing to enter US which worsen the situation. Individuals deny to be HIV
positive and takes extreme steps instead fighting with the disease.
Now when the Ban is lifted individuals are more truthful to the fact and mentally stronger to
fight with the disease, decrease in xenophobia and increase in responsibility and a positive
message gone to the world..
option (e) is correct.the feature that distinguishes fluorescence .pdfannesmkt
option (e) is correct.
the feature that distinguishes fluorescence from phosphorescence is the amount of the absorbed
energy.
lower energy, than the absorbed radiation
Solution
option (e) is correct.
the feature that distinguishes fluorescence from phosphorescence is the amount of the absorbed
energy.
lower energy, than the absorbed radiation.
NADP is the source of electrons for the light reactionsThe electro.pdfannesmkt
NADP is the source of electrons for the light reactions
The electron acceptor of the light reactions, NADP+, which functions as an electron carrier in
cellular respiration. The light reactions use solar power to reduce NADP+ to NADPH by adding
a pair of electrons along with a hydrogen nucleus, or H The light reactions also generate ATP by
powering the addition of a phosphate group to ADP, a process called photophosphorylation.
Solution
NADP is the source of electrons for the light reactions
The electron acceptor of the light reactions, NADP+, which functions as an electron carrier in
cellular respiration. The light reactions use solar power to reduce NADP+ to NADPH by adding
a pair of electrons along with a hydrogen nucleus, or H The light reactions also generate ATP by
powering the addition of a phosphate group to ADP, a process called photophosphorylation..
import java.util.Scanner;public class Bottle { private stat.pdfannesmkt
import java.util.Scanner;
public class Bottle {
private static final int MAX=100; //max constant
private static final int MIN=0; // min constant
static Scanner scan = new Scanner(System.in);
private int noOfBottle=0;
//method 1 to read the value form console
public void read()
{
int x = scan.nextInt();
noOfBottle=x;
}
//method 2 to set the no of bottle property of bottle class
public void set(int a)
{
if(a<=MAX)
{
noOfBottle=a;
}else
{
System.out.println(\"number is greater than max value\");
}
}
//method 3 to set the noOfBottle property from bottle object
public void setBottle(Bottle a)
{
if(a.noOfBottle<=MAX)
{
noOfBottle=a.noOfBottle;
}else
{
System.out.println(\"number is greater than max value\");
}
}
//method 4 to get he noOfBottle value
public int get()
{
return this.noOfBottle;
}
//method 5 addition of bottle objects
public Bottle add(Bottle bottle)
{
if(this.noOfBottle+bottle.noOfBottle<=MAX)
{
this.noOfBottle=this.noOfBottle+bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : addition excedding the maximum number \");
}
return this;
}
//method 6 subtraction of bottle objects
public Bottle subtract(Bottle bottle)
{
if(this.noOfBottle-bottle.noOfBottle>=MIN)
{
this.noOfBottle=this.noOfBottle-bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Subtraction reducing the bottle to below min range possible
\");
}
return this;
}
//method 7 multiplication of bottle objects
public Bottle multiply(Bottle bottle)
{
if(this.noOfBottle*bottle.noOfBottle<=MAX)
{
this.noOfBottle=this.noOfBottle*bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Multiplication exceeding MAX value \");
}
return this;
}
//method 8 division of bopttle objects
public Bottle divide(Bottle bottle)
{
try{
if(this.noOfBottle/bottle.noOfBottle>=MIN)
{
this.noOfBottle=this.noOfBottle/bottle.noOfBottle;
}
else
{
System.out.println(\"Alert : Division reducing to possible MIN value \");
}
}catch(Exception e)
{
System.out.println(\"/ By zero error\");
e.printStackTrace();
}
return this;
}
//method 9 addition of int value to bottle noOfObject property
public Bottle add(int a)
{
if(this.noOfBottle+a<=MAX)
{
this.noOfBottle=this.noOfBottle+a;
}
else
{
System.out.println(\"Alert : addition excedding the maximum number \");
}
return this;
}
//method 10 subtraction of bottle noOfObject property
public Bottle subtract(int a)
{
if(this.noOfBottle-a>=MIN)
{
this.noOfBottle=this.noOfBottle-a;
}
else
{
System.out.println(\"Alert : Subtraction reducing the bottle to below min range possible
\");
}
return this;
}
//method 11 multiplication of bottle noOfObject property
public Bottle multiply(int a)
{
if(this.noOfBottle*a<=MAX)
{
this.noOfBottle=this.noOfBottle*a;
}
else
{
System.out.println(\"Alert : Multiplication exceeding MAX value \");
}
return this;
}
//method 12 d of bottle noOfObject property
public Bottle divide(int a)
{
try{
if(this.noOfBottle/a>=MIN)
{
this.noOfBottle=this.noOfBottle/a;
}
else
{
System.out.println(\"Alert : Division reducing below to possible MIN val.
In previous year, 2 birthdays were on tuesday but this year theres.pdfannesmkt
In previous year, 2 birthdays were on tuesday but this year there\'s only 1 birthday on
wednesday.
It means 1 birthday was is month of feb or jan (which was on tuesday prev year) and now it is on
thursday. And the other 1 has wednesday birthday and falls after february. So the days of
birthday are wednesday, thursday, monday and saturday.
The months of birthday are jan/feb, nov, july, august. 1 birthday on jan which means jan
thursday was a birthday.
Novemeber b\'day could be mon/wed. the 2 person with 14 n 15 age must ve same age 4 2
months in a year.
only august n nov have 2 months difference. The person wid thursday b\'day was 4 years older
dan paul. So paul\'s age is 7 and the person with Jan Thusrday b\'day is 11. Either Don is 14 or
15 n born in aug.
The person with monday b\'day has month either nov or august. The july birthday can\'t be a
thursday or a monday. If it\'s a wednesday, Lucky has monday b\'day n is 15 years old. Else if
it\'s a sat, lucky cud be 15 n nov monday b\'day or wed b\'day in august n is 14. The 2nd option is
cancelled as Don is born in august. It imply that Lawrence is 11 and born in jan thursday. and
Paul is born on July wednesday. Hence don is born in august saturday.
Lawrence: Jan thursday 11
Paul: July Wednesday 7
Don: august saturday 14
Lucky: November monday 15
Solution
In previous year, 2 birthdays were on tuesday but this year there\'s only 1 birthday on
wednesday.
It means 1 birthday was is month of feb or jan (which was on tuesday prev year) and now it is on
thursday. And the other 1 has wednesday birthday and falls after february. So the days of
birthday are wednesday, thursday, monday and saturday.
The months of birthday are jan/feb, nov, july, august. 1 birthday on jan which means jan
thursday was a birthday.
Novemeber b\'day could be mon/wed. the 2 person with 14 n 15 age must ve same age 4 2
months in a year.
only august n nov have 2 months difference. The person wid thursday b\'day was 4 years older
dan paul. So paul\'s age is 7 and the person with Jan Thusrday b\'day is 11. Either Don is 14 or
15 n born in aug.
The person with monday b\'day has month either nov or august. The july birthday can\'t be a
thursday or a monday. If it\'s a wednesday, Lucky has monday b\'day n is 15 years old. Else if
it\'s a sat, lucky cud be 15 n nov monday b\'day or wed b\'day in august n is 14. The 2nd option is
cancelled as Don is born in august. It imply that Lawrence is 11 and born in jan thursday. and
Paul is born on July wednesday. Hence don is born in august saturday.
Lawrence: Jan thursday 11
Paul: July Wednesday 7
Don: august saturday 14
Lucky: November monday 15.
Homology is defined as structures which are derived from a common an.pdfannesmkt
Homology is defined as structures which are derived from a common ancestor like wings of bird
and forelimbs of bat.
Divergent evolution: It is the process where two or more related species become more and more
dissimilar. Divergent evolution produces homologous structures e.g.same bones can be used in
many ways leading to divergent evolutionary paths like frogs, bats, birds so on.
So the correct option is (c):Divergent evolution.
Solution
Homology is defined as structures which are derived from a common ancestor like wings of bird
and forelimbs of bat.
Divergent evolution: It is the process where two or more related species become more and more
dissimilar. Divergent evolution produces homologous structures e.g.same bones can be used in
many ways leading to divergent evolutionary paths like frogs, bats, birds so on.
So the correct option is (c):Divergent evolution..
HI is a strong acid, so its [H+] = 4.5 10-2 molesL = 0.045pH is.pdfannesmkt
HI is a strong acid, so its [H+] = 4.5 * 10-2 moles/L = 0.045
pH is the -log [H+] = -log (0.045)
pH = 1.35
Solution
HI is a strong acid, so its [H+] = 4.5 * 10-2 moles/L = 0.045
pH is the -log [H+] = -log (0.045)
pH = 1.35.
For first figure Member BEFor second figure Members BH , DFF.pdfannesmkt
For first figure : Member BE
For second figure : Members BH , DF
For third figure : Members HF, HE
For fourth figure : Members AB, AO, GF, GT, NM, HI, UM, VI.
Solution
For first figure : Member BE
For second figure : Members BH , DF
For third figure : Members HF, HE
For fourth figure : Members AB, AO, GF, GT, NM, HI, UM, VI..
constructor to initialize the tree objectFunction to insert the no.pdfannesmkt
constructor to initialize the tree object
Function to insert the nodes into the tree
function to create a node
function to get maximum in a tree
function to get minimum
function to check whether the element is present in the tree
function to remove an element from a tree
function to check the tree is empty
function isEmpty(node){
if(node==NULL)
return true;
else
return false;
}
function to find leaf node are present to the given node
functiom isLeaf(node){
if(node doesnot contain children)
return true;
else
return false;
funtion to copy into string and display
Solution
constructor to initialize the tree object
Function to insert the nodes into the tree
function to create a node
function to get maximum in a tree
function to get minimum
function to check whether the element is present in the tree
function to remove an element from a tree
function to check the tree is empty
function isEmpty(node){
if(node==NULL)
return true;
else
return false;
}
function to find leaf node are present to the given node
functiom isLeaf(node){
if(node doesnot contain children)
return true;
else
return false;
funtion to copy into string and display.
A)Provide three examples that demonstrate how security can be instil.pdfannesmkt
A)Provide three examples that demonstrate how security can be instilled within the Systems
Development Life Cycle (SDLC)
Context
Description
Example
Confidentiality
This is that there should be very less accessing right only to the authorize user.
Identify users of project and give them rights.
E.g. The student in a university database. It can view only its result or anything which is related
to it, not other information of university database.
Integrity
Trusted source of information
Monitoring of data from source to destination.
E.g.Like in android mobiles, there is an option Don’t allow installation from unknown sources
(other than googleplay) which is set to be off for security reason
Ownership
Possession for control of information
Give the role and responsibility in analysis phase of SDLC for different modules.
E.g. Role for the particular activity in a school play.
Q.
Provide two examples on what users may experience with software products if they are released
with minimal security planning.
If there is minimal security, then the security breach can effect on product in following terms
No Utility: No perfection for the product.
No Proper Authenticity.
Unsurprisingly availability of information
Also the confidentiality and integrity will be effected
(b) Suggest three ways that application security can be monitored and evaluated for
effectiveness. Choose what you believe to be the most effective way and discuss why.
System development life cycle
1.Planning
2.Feasibility Study
3.Analysis
4.Design
5.Testing
6.Implementation
7.Maintenance
These are the phases of SDLC. In first phase and second there is no need of security, because the
main part of SDLC begins from 3 phase i.e. analysis and continues till the last.
Analysis phase:
1.Risk analysis in the functional requirement specification and software requirement
specification
2.Identify security realm
3.Security functional requirement
Design Phase:
1. Develop some security controls
2.Develop security mechanism and security action plan
3.Develop security coding guidelines.
Testing phase:
1. Regression testing.
2. Independent functionality testing.
3. Threat analysis testing
The most effective way is Independent functionality testing. Because in this, each phase is tested
by outsiders, no person concerned in designing of project is included in testing. This is like Beta
testing in which a project is sent to company\'s friend company. Beceause it is difficult to find
own mistake.
Context
Description
Example
Confidentiality
This is that there should be very less accessing right only to the authorize user.
Identify users of project and give them rights.
E.g. The student in a university database. It can view only its result or anything which is related
to it, not other information of university database.
Integrity
Trusted source of information
Monitoring of data from source to destination.
E.g.Like in android mobiles, there is an option Don’t allow installation from unknown sources
(other than goo.
16).Active transport of molecules require energy. Active transport.pdfannesmkt
16).
Active transport of molecules require energy. Active transport needs energy, and it help to move
ions against their concentration gradients. The two types active transport mechanisms are,
(i). Primary active transport
(ii). Secondary active transport
For example, the concentration of sodium ions is more outside the cell. Still, the sodium ions
move from the inside of cell to outside through ion channels, by means of active transport.
Active transport needs energy, and it help to move ions against their concentration gradients.
Eg: Na+-K+ ATPase is an ATP (adenosine triphosphate) driven pump, which establishes the
sodium gradient (it pump sodium ions out of the cell against its concentration gradient and
allows the influx of potassium ions).
The theory of secondary active transport:
The secondary active transport is an active transport in which the downhill movement of an ion
(either sodium or hydrogen) is coupled with the uphill movement of another molecule (against its
concentration) by the transporter protein. Thus, the electrochemical gradient of an ion drives
uphill transport of another molecule.
Eg: Glucose absorption by cell is an example of secondary active transport.
The sodium-glucose linked transporter (SGLTs, a co-transporter) uses the energy generated by
the ATPase pump through the downhill sodium ion gradient for the glucose transportation across
the apical membrane (against the glucose gradient). SGLTs are an example of secondary active
transport. The glucose transporters (GLUT) present in the basolateral membrane now allow the
glucose transport into the peritubular capillaries. Inhibition of the Na+/K+/ATPase fails to
generate energy required for the SGLT secondary transporters, which inhibits glucose uptake.
Other examples include Na+/phosphate coransporter, Na+/Iodide symporter, Na+/Cl-
cotransporter, etc.
Solution
16).
Active transport of molecules require energy. Active transport needs energy, and it help to move
ions against their concentration gradients. The two types active transport mechanisms are,
(i). Primary active transport
(ii). Secondary active transport
For example, the concentration of sodium ions is more outside the cell. Still, the sodium ions
move from the inside of cell to outside through ion channels, by means of active transport.
Active transport needs energy, and it help to move ions against their concentration gradients.
Eg: Na+-K+ ATPase is an ATP (adenosine triphosphate) driven pump, which establishes the
sodium gradient (it pump sodium ions out of the cell against its concentration gradient and
allows the influx of potassium ions).
The theory of secondary active transport:
The secondary active transport is an active transport in which the downhill movement of an ion
(either sodium or hydrogen) is coupled with the uphill movement of another molecule (against its
concentration) by the transporter protein. Thus, the electrochemical gradient of an ion drives
uphill transport of another molecule.
Eg: .
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
six lone pairs (each F has three lone pairs) nit.pdf
1. six lone pairs (each F has three lone pairs) nitrate has three resonance structures.
Solution
six lone pairs (each F has three lone pairs) nitrate has three resonance structures.